Next-Generation Firewall
Segment Your Network Using Interfaces and Zones
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Segment Your Network Using Interfaces and Zones
Learn to segment the network on your NGFW using interfaces and zones to keep your
data safe.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Traffic must pass through the firewall in order for the firewall to manage and
control it. Physically, traffic enters and exits the firewall through interfaces.
The firewall determines how to act on a packet based on whether the packet matches a
Security Policy rule. At the most basic
level, each Security policy rule must identify where the traffic came from and where
it is going. On a Palo Alto Networks next-generation firewall, Security policy rules
are applied between zones.
A zone is a grouping of interfaces (physical or virtual) that represents a segment of
your network that is connected to, and controlled by, the firewall. Because traffic
can only flow between zones if there is a Security policy rule to allow it, this is
your first line of defense. The more granular the zones you create, the greater
control you have over access to sensitive applications and data and the more
protection you have against malware moving laterally throughout your network. For
example, you might want to segment access to the database servers that store your
customer data into a zone called Customer Data. You can then define security
policies that only permit certain users or groups of users to access the Customer
Data zone, thereby preventing unauthorized internal or external access to the data
stored in that segment.