SonicOSX 7 System

SonicOSX Secure Objects

The SonicOSX scheme of interface addressing works in conjunction with address objects, service objects, and network zones. This structure is based on secure objects, which are utilized by rules and policies within SonicOSX.

Secured objects include interface objects that are directly linked to physical interfaces and managed in the NETWORK | System > Interfaces page. Address and Service Objects are defined in Match Objects > Addresses and Match Objects > Services respectively.

Zones are the hierarchical apex of SonicOSX’s secure objects architecture. SonicOSX includes predefined zones as well as allow you to define your own zones. Predefined zones include LAN, WAN, DMZ, VPN, SSLVPN, Multicast, and Custom. For more information about zones, see Configuring Network Zones.

Zones can include multiple interfaces; the WAN zone, however, is restricted to a maximum of the total number of interfaces minus one. Within the WAN zone, either one or more WAN interfaces can be actively passing traffic depending on the WAN Failover and Load Balancing configuration on NETWORK | System > Failover & Load Balancing. For more information on WAN Failover and Load Balancing on SonicWall security appliances, see Failover & LB.

At the zone configuration level, the Allow Interface Trust setting for zones automates the processes involved in creating a permissive intra-zone Access Rule. It creates a comprehensive Address Object for the entire zone and a inclusively permissive Access Rule from zone address to zone addresses.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden