You can find the different default zones and the interface assignments toward these zones: In the Zone menu via Configuration > Object > Zone In case you might be wondering, what is meant by this statement - this should hopefully become clear very soon. In this case, the Zones are a perfect container for interfaces. When it comes to firewall rules, you might have a group of interfaces which you want to have the same rules applying to - most likely you want to have all LAN groups having the same rights throughout the network, or you want your multiple WAN ports treated the same. In most cases, a USG or ATP will consist of multiple LANs, multiple VLANs and/or multiple WANs as well. Now that we understand the very core concept of the interfaces, let's move over to Zones, as especially the Zones will become important for our firewall rules / security policies. In this example, a screenshot of the default ethernet interfaces on an ATP200: Interfaces are basically independent network segments on the gateway and can be found within the menu path Configuration > Network > Interface Our USG consists of multiple interfaces, from WAN ports to LAN ports to all other virtual interfaces you create on the unit. This tutorial is supposed to give you a basic understanding in the ways of working of our Firewall appliance and should ready you to make your first steps in creating your own firewall rules!īefore we dive deep into the configuration, we first have to shortly talk about how we structure our firewalls - which we for the sake of ease of read will just further refer to as "USG" or "ATP". The Firewall, or "Security Policy" as we call it in our newer generation devices, is the core of our devices.
0 Comments
Leave a Reply. |