I'm not sure where to request features, so let me know if there is a better way to send this.
We would love the ability to nest zones inside other zones! This would lower the number of policies required - especially in multi-tenant situations. In the example below this would allow for incredible flexibility.
Zone - Client 1 Networks
- Client 1, Network 1
- Client 1, Network 2
Zone - Client 2 Networks
- Client 2, Network 1
- Client 2, Network 2
Zone - Guests
- Guest, Network 1
- Guest, Network 2
Zone - Clients
- Client 1 Networks
- Client 2 Networks
Zone - Untrusted
- Clients
- Guests
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
If a multi-tenant situation, I would recommend separating tenants by vdoms. Then they don't share routing-tables and policies.
I agree with you, and in most cases we do use VDOMs. Thanks!
That doesn't mean that nested zones couldn't still be useful, that was just the first example that came to mind. Here's an alternate use, but substitute any use case for nesting zones:
Zone DMZ
-DMZ Network 1
-DMZ Network 2
Zone Servers
-Servers Network 1
-Servers Network 2
Zone High Security
-DMZ
-Servers
Zone doesn't aggregate networks but interfaces. Do you have multiple groups of DMZ interfaces?
When I put networks in my examples, I am referring to interfaces. But yes, depending on the client, we often run into scenarios where there are many interfaces. Some have common purposes, and others do not.
There are times we want to put policies on large groups of interfaces and other times when we want a subset of interfaces.
Never seen any vendors with nested zones. PANW , nope. CHKP,nope. CSCO, nope. Forcepoint , nope.
An "interface" should be of ONE zone only , and zones provide separation. Are you confusing nested-groups? Maybe ?
Ken Felix
PCNSE
NSE
StrongSwan
Thanks for contributing to the discussion!
Nested groups are useful too, but that's not what I'm referring to.
Fortinet does many great things that other vendors don't do, so I don't think that alone is a good reason not to innovate. Maybe there is a good technical reason that many vendors don't do this, but I do believe that some of that is based on how they use zones.
With Fortinet, zones do two things.
[ol]Am I missing anything? Does a zone do anything else besides these two things?
The challenge is that when an interface is added to a zone, it can no longer have unique policies applied to it because the interface itself can't be referenced for policies. Usually we group interfaces because the client indicates that the interface should have the same policies as other interfaces. We tend to group by network classification. But when the client calls back later and says the new network should behave like all other networks in that classification except for XYZ, then our grouping and organization breaks down.
How can we have the best of both worlds? How can we allow for the powerful grouping of interfaces without sacrificing the ability to have the occasional unique policy for a single network? Yes we can add multiple zones to policies, but what happens if the field tech misses a policy? We'd love to minimize the "attack surface" of human error!
My proposal would be to allow interfaces to be added to zones and then to allow zones to be added to parent zones. This way there could be hierarchy and would remove the limitations with the current model.
I have some real world examples that I'll gather, so that we can leave the theoretical world behind. I'll post again when I have those ready.
Thanks everyone!
Item#1 and item#2 are doable as is today in a zone concept for FortiOS. Not if you had a question in those two items but wanted to point that out.
it can no longer have unique policies applied to it because the interface itself can't be referenced for policies
That's the down fall with zones, once you decide on zones you can't do interface filter for a src/dst-intf, but you can still write specific rules as required.
The use of zones doesn't magically prevent you from writing rules that impact traffic from an interface or network level.
How can we allow for the powerful grouping of interfaces without sacrificing the ability to have the occasional unique policy for a single network?
Again, keep in mind traffic is only going to be allowed if you "allow" it. Firewalls don't magically allow all traffic to all interfaces in that zone-group unless you write a policy to allow it.
I'll try to demo what I'm getting at;
zone == INSIDE
members; vlan10, 20, 30 ( networks 10.10.0.0/16 10.20.0.0/16 10.30.0.0/16 )
zone == OUTSIDE
member; wan1 wan2
I could write a very simple policy that allows ALL of those members ;
src-zone INSIDE
dst-zone OUTSIDE
src-addr all
dst-addr all
service http https
action allow
schedule always
# that how a lot of fwadmin write such a rule which could be ideal or very much not, or total bad if some one add a new interface into INSIDE but didn't want that networks associated to existing rules for INSIDE--to--OUTSIDE zone.
or
If I only wanted to allow 10.20.0.0/16 and not 10.10.x.x or 10.30.x.x, then I would need to adjust the rule to allow that traffic and just only that traffic.
src-zone INSIDE
dst-zone OUTSIDE
src-addr 10.20.0.0/16
dst-addr all
service http https
action allow
schedule always
BOTH encompass the deployment of "zones", one is probably written much better or secured, YMMV but the ideal of zone management is demonstrated.
So determining what you need in rule set is critical , & when designing rules that uses zones and positioning of interfaces in a zone very critical and should be reviewed in depth.
Also to throw this out; vendors like CHKP and Forcepoint has an allowance for both zone and non-zone rules inject or mingled together in the rule-base. These rules allow for broad and fine crafting of traffic flows, but you still need to be careful in rules creations and where you use zones at.
So you can craft rules with src/dst zones; or even src-zone & dst address or even match statements similar to the following;
( ( src-zone & src-address) && ( dst-zone & dst-addr) ) this is what fortios, jnpr,panw...... can already can do btw so this is nothing new here..
I still do not see a clear picture of a grouping of zones and the benefits. Send an FR to sales and see what they say. Most admins are using zones for the 1> wrong reasons or 2> deploying them incorrectly or 3> without a full understanding of the zone concepts, and this based on my 20+ years of observations with zone based firewalls.
So my final answer, everything you mention can be controlled with the degree of a fine-tooth comb or as loose as mane comb for a horse , within the current usage of zones. You just have to think it out and design the zones to meet the security INF needs.
Ken Felix
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1660 | |
1072 | |
751 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.