Zones are a group of one or more FortiGate interfaces, both physical and virtual, that you can apply security policies to control inbound and outbound traffic. Grouping interfaces and VLAN subinterfaces into zones simplifies the creation of security policies where a number of network segments can use the same policy settings and protection profiles. When you add a zone, you select the names of the interfaces and VLAN subinterfaces to add to the zone. Each interface still has its own address and routing is still done between interfaces, that is, routing is not affected by zones. Security policies can also be created to control the flow of intra-zone traffic.
For example, the network includes three separate groups of users representing different entities on the company network. While each group has its own set of port and VLANs, in each area, they can all use the same security policy and protection profiles to access the Internet. Rather than the administrator making nine separate security policies, he can add the required interfaces to a zone, and create three policies, making administration simpler.
You can configure policies for connections to and from a zone, but not between interfaces in a zone.
This example explains how to set up a zone to include the Internal interface and a VLAN.
To create a zone - web-based manager
- Go to Network > Interfaces.
- Select the arrow on the Create New button and select Zone.
- Enter a zone name of
- Select the required Interface Members.
- Select OK.
To create a zone - CLI
config system zone
set interface internal VLAN_1