Perform this task if you have a use case, perhaps within a single enterprise, where you want the virtual systems to be able to communicate with each other within the firewall. Such a scenario is described in Inter-VSYS Traffic That Remains Within the Firewall. This task presumes:
You completed the task, Configure Virtual Systems. When configuring the virtual systems, in the Visible Virtual System field, you checked the boxes of all virtual systems that must communicate with each other to be visible to each other.
Configure Inter-Virtual System Communication within the Firewall
Configure an external zone for each virtual system. Select Network > Zones and Add a new zone by Name. For Location, select the virtual system for which you are creating an external zone. For Type, select External. For Virtual Systems, click Add and enter the virtual system that the external zone can reach. Zone Protection Profile —Optionally select a zone protection profile (or configure one later) that provides flood, reconnaissance, or packet-based attack protection. Log Setting —Optionally select a log forwarding profile for forwarding zone protection logs to an external system. Optionally select the Enable User Identification check box to enable User-ID for the external zone. Click OK.
Configure the Security policy rules to allow or deny traffic from the internal zones to the external zone of the virtual system, and vice versa. See Create a Security Policy Rule. See Inter-VSYS Traffic That Remains Within the Firewall.
Save the configuration. Click Commit.

Related Documentation