Firewall security zones add an extra, flexible layer of security. With zone-based security, administrators can group similar interfaces and apply the same policies to them rather than writing separate policies for each interface.
SonicOS zones allow the application of security policies to the internal network, enabling administrators to organize network resources into different zones and control traffic between them.
Zones enable full exposure of the NAT table, allowing administrators to control traffic across interfaces by managing the source and destination addresses as traffic moves from one zone to another. This means that NAT can be applied internally or across VPN tunnels. Security appliances can also direct VPN traffic through the NAT policy and zone policy, as VPNs are logically grouped into their own VPN zone.
The security appliance has 7 predefined security zones that cannot be modified. The specific predefined zones depend on the device.
Each firewall also has a set of Zone defaults. See Default Zones.