Add Security Zones for Stacked Security Policies
Table of Contents
Expand all | Collapse all
-
-
- Add a Branch
- Add a Data Center
- Add a Branch Gateway
- Configure Circuits
- Configure Internet Circuit Underlay Link Aggregation
- Configure Private WAN Underlay Link Quality Aggregation
- Configure Circuit Categories
- Configure Device Initiated Connections for Circuits
- Add Public IP LAN Address to Enterprise Prefixes
- Manage Data Center Clusters
- Configure a Site Prefix
- Configure a DHCP Server
- Configure NTP for Prisma SD-WAN
- Configure the ION Device at a Branch Site
- Configure the ION Device at a Data Center
- Switch a Site to Control Mode
- Allow IP Addresses in Firewall Configuration
-
- Configure a Controller Port
- Configure Internet Ports
- Configure WAN/LAN Ports
- Configure a Loopback Interface
- Configure a PoE Port
- Configure and Monitor LLDP Activity and Status
- Configure a PPPoE Interface
- Configure a Layer 3 LAN Interface
- Configure Application Reachability Probes
- Configure a Secondary IP Address
- Configure a Static ARP
- Configure a DHCP Relay
- Configure IP Directed Broadcast
- VPN Keep-Alives
-
- Configure Prisma SD-WAN IPFIX
- Configure IPFIX Profiles and Templates
- Configure and Attach a Collector Context to a Device Interface in IPFIX
- Configure and Attach a Filter Context to a Device Interface in IPFIX
- Configure Global and Local IPFIX Prefixes
- Flow Information Elements
- Options Information Elements
- Configure the DNS Service on the Prisma SD-WAN Interface
- Configure SNMP
-
-
- Prisma SD-WAN Branch Routing
- Prisma SD-WAN Data Center Routing
-
- Configure Multicast
- Create a WAN Multicast Configuration Profile
- Assign WAN Multicast Configuration Profiles to Branch Sites
- Configure a Multicast Source at a Branch Site
- Configure Global Multicast Parameters
- Configure a Multicast Static Rendezvous Point (RP)
- Learn Rendezvous Points (RPs) Dynamically
- View LAN Statistics for Multicast
- View WAN Statistics for Multicast
- View IGMP Membership
- View the Multicast Route Table
- View Multicast Flow Statistics
- View Routing Statistics
- Prisma SD-WAN Incident Policies
-
- Prisma SD-WAN Branch HA Key Concepts
- Configure Branch HA
- Configure HA Groups
- Add ION Devices to HA Groups
- View Device Configuration of HA Groups
- Edit HA Groups and Group Membership
-
- Configure Branch HA with Gen-1 Platforms (2000, 3000, 7000, and 9000)
- Configure Branch HA with Gen-2 Platforms (3200, 5200, and 9200)
- Configure Branch HA with Gen-2 Embedded Switch Platforms (1200-S or 3200-L2)
- Configure Branch HA for Devices with Software Cellular Bypass (1200-S-C-5G)
- Configure Branch HA for Platforms without Bypass Pairs
- Configure Branch HA in a Hybrid Topology with Gen-1 (3000) and Gen-2 (3200) Platforms
- Prisma SD-WAN Incidents and Alerts
Add Security Zones for Stacked Security Policies
Learn how to create security zones for stacked security
policies.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Security Zones specify enforcement boundaries
where traffic is subject to inspection and filtering. Each security
zone maps to networks attached to physical interfaces, logical interfaces,
or sub-interfaces of a device. These zone-level interfaces serve
as a proxy for physical circuits and virtual circuits, such as VLAN,
Layer 3 VPN, and Layer 2 VPN circuits.
You can manage and
secure every interface in a zone independently.
- Allow or deny every interface in zone access to other zones within an enterprise network.
- Segregate interface traffic by blocking all access not explicitly allowed by the security policies of an enterprise.
- Isolate networks that have private or secure information by restricting access to it from public networks.
An
area includes source and destination zones with network IDs for
a site and is associated with one or more WAN, LAN, or VPN. Attach
a zone to multiple networks, but each network type LAN, WAN, or
VPN would be connected to one location. Typically, most organizations
create three to four zones to segregate traffic using the model’s
guest zone, one or more corporate LAN zones, an outside zone for
internet underlay, and a corporate WAN zone for private WAN and
VPN over the internet or private WAN.
Policy rules use zones
in the form of Source Zones or Destination Zones. In Security Policy
rules, specify the source and destination zones to which the rule
applies. You must establish one or more source and destination zones
for each security rule to configure. The source zone identifies
the network from where traffic originates and the destination zone
identifies the destination traffic of the network.
Add security
zones from Stacked Policies.
- Select ManagePoliciesSecuritySecurity ZonesAdd Security Zone.On the Add Security Zone screen, enter a Name for the security zone and an optional description.Click Create to create a security zone.You must bind a zone to a site or a device interface(s) for policy rules to be effective.