SonicOS 7.1 Objects
- SonicOS 7.1 Action Objects
- About SonicOS
- Match Objects
- Zones
- How Zones Work
- Default Zones
- Security Types
- Allow Interface Trust
- Effect of Wireless Controller Modes
- Zones Overview
- The Zones Page
- Adding a New Zone
- Adding a New Zone in Policy Mode
- Adding a New Zone in Classic Mode
- Configuring a Zone for Guest Access
- Configuring a Zone for Open Authentication and Social Login
- Configuring the WLAN Zone
- Configuring the RADIUS Server
- Configuring DPI-SSL Granular Control per Zone
- Enabling Automatic Redirection to the User-Policy Page
- Cloning a Zone
- Editing a Zone
- Deleting Custom Zones
- Addresses
- Addresses Page
- About UUIDs for Address Objects and Groups
- Working with Dynamic Address Objects
- Services
- URI Lists
- Schedules
- Dynamic Group
- Email Addresses
- Match Objects
- Countries
- Applications
- Web Categories
- Websites
- Match Patterns
- Custom Match
- Profile Objects
- Endpoint Security
- Bandwidth
- QoS Marking
- Content Filter
- DHCP Option
- DNS Filtering
- Block Page
- Anti-Spyware
- Gateway Anti-Virus
- Log and Alerts
- Intrusion Prevention
- AWS
- Action Profiles
- Security Action Profile
- DoS Action Profile
- Action Objects
- App Rule Actions
- Content Filter Actions
- Object viewer
- SonicWall Support
Default Zones
The default zones on your firewall depends on the device.
The default security zones on the SonicWall Security Appliance are not modifiable:
This Zone | Security Type | Has this function |
---|---|---|
LAN | Trusted | Consist of multiple interfaces, depending on your network design. Even though each interface has a different network subnet attached to it, when grouped together, they can be managed as a single entity. |
WAN | Untrusted | Consist of multiple interfaces. If you are using the Security Appliance’s WAN failover capability, you need to add the second Internet interface to the WAN zone. |
MGMT | Management | Used for appliance management and includes only the MGMT interface. Interfaces in other zones can also be enabled for SonicOS management, but the MGMT zone or interface provides the added security of a separate zone just for management. |
DMZ | Public | Normally used for publicly accessible servers and can consist of one to four interfaces, depending on your network design. |
VPN | Encrypted | A virtual zone used for simplifying secure and remote connectivity. |
SSLVPN | Sslvpn | Used for secure remote access using the SonicWall NetExtender client. |
MULTICAST | Untrusted | Provides support for IP multicasting, which is a method for sending packets from a single source simultaneously to multiple hosts. |
WLAN | Wireless |
WLAN is available only in Classic Mode. Provides support to SonicWall SonicPoints and SonicWaves. Any unassigned interface can be added to WLAN, allowing the administrator to discover, provision, monitor, and protect the wireless traffic access through SonicPoints and SonicWaves connected to the WLAN zone. The WLAN zone supports:
|
Even though you can group interfaces together into one security zone, this does not preclude you from addressing a single interface within the zone.
Was This Article Helpful?
Help us to improve our support portal