The default zones on your firewall depends on the device.
The default security zones on the SonicWall Security Appliance are not modifiable:
This Zone | Security Type | Has this function |
---|---|---|
LAN | Trusted | Consist of multiple interfaces, depending on your network design. Even though each interface has a different network subnet attached to it, when grouped together, they can be managed as a single entity. |
WAN | Untrusted | Consist of multiple interfaces. If you are using the Security Appliance’s WAN failover capability, you need to add the second Internet interface to the WAN zone. |
MGMT | Management | Used for appliance management and includes only the MGMT interface. Interfaces in other zones can also be enabled for SonicOS management, but the MGMT zone or interface provides the added security of a separate zone just for management. |
DMZ | Public | Normally used for publicly accessible servers and can consist of one to four interfaces, depending on your network design. |
VPN | Encrypted | A virtual zone used for simplifying secure and remote connectivity. |
SSLVPN | Sslvpn | Used for secure remote access using the SonicWall NetExtender client. |
MULTICAST | Untrusted | Provides support for IP multicasting, which is a method for sending packets from a single source simultaneously to multiple hosts. |
WLAN | Wireless |
WLAN is available only in Classic Mode. Provides support to SonicWall SonicPoints and SonicWaves. Any unassigned interface can be added to WLAN, allowing the administrator to discover, provision, monitor, and protect the wireless traffic access through SonicPoints and SonicWaves connected to the WLAN zone. The WLAN zone supports:
|
Even though you can group interfaces together into one security zone, this does not preclude you from addressing a single interface within the zone.