One Arm Mode is when only one firewall interface is used, and all traffic comes into and out from the same interface. It is possible to apply security rules and Deep Packet Inspection (DPI) scans on data traffic from the One Arm interface. Data received from this interface is scanned by SonicOS security services and then sent out on this interface.
One example usage scenario is shown as follows for SonicWall Cloud Edge. Cloud Edge works well when using a single interface on the firewall where traffic comes into and goes out from the same interface.
For One Arm Mode, you need to configure the interface:
When you complete the One Arm Mode interface configuration, SonicOS automatically updates the system configuration to support One Arm Mode.
If the One Arm Mode interface is in the LAN zone, options on the NETWORK | Firewall > Advanced page are enabled or disabled. These are under ACCESS RULE OPTIONS:
Disable Enable ICMP Redirect on LAN zone - disable ICMP redirect if One Arm Mode interface is in LAN zone
An address object for the One Arm Peer is automatically created.
A security policy to allow traffic from One Arm Mode interface to One Arm Mode interface is automatically created so traffic is always allowed.
A routing policy is automatically added with the One Arm Peer as the gateway to allow other traffic to apply One Arm routing, if needed.
For using a single interface on the firewall, the minimum number of NIC is changed to 1. To use only X0, you need to shut down X1 to make all traffic go out from X0. When you shut down X1, the priority of the One Arm routing policy becomes higher than the default route priority and traffic uses the X0 One Arm routing policy.
For configuration of a One Arm Mode interface, see Configuring One Arm Mode.