Did you read the pages I recommended you in the pdf? Page 78 describes inter-vsys communications (if you want this). One can also use shared gateway (described at page 79) for some situations. So if you want vsys0 to communicate with vsys1 you have basically three options (unless I missed something): 1) vsys0 (ethX) -> (int0/1) L2/L3-switch/router (int0/2) -> vsys1 (ethY) This way your vsys wont touch each other inside your PAN. 2) vsys0 (zoneX) -> vsys1 (zoneY) This way the traffic never leaves the box and is routed internally instead. Im not sure if you can perform tcpdump in this mode (as with 1 above where you can just span the interface you want on the L2/L3-switch/router to record traffic). Another downside with internal routing is if you (in case of emergency) must cut the connection for a certain vsys. If you use physical interfaces you can just disconnect the cables - otherwise you need to login to the device and shutdown the interfaces and then commit. 3) vsys0 (ethX) -> shared gateway (internally in PAN) -> vsys1 (ethY) This is like a combo between 1 and 2 above. Shared gateway (as described in page 79) is when you for example only have a single cable (or single ip) from the uplinkprovider. I dont remember in which order you can assign the subinterfaces but I think you first create the VSYS and then when you setup interfaces you choose which vsys and vrouter it belongs to. In my case the setup was really easy (something like): VSYS0 (eth0-3), VSYS1 (eth4-7), VSYS2 (eth8-11). This way I could use the 10G interfaces for uplink and downlink and then bond 2x1G to the DMZ-switches. So PAN1 had (for each VSYS): 10G: Uplink (internetrouter1) 2x1G: DMZ (switch1, LACP) 10G: Downlink (corerouter1) and PAN2 had: 10G: Uplink (internetrouter2) 2x1G: DMZ (switch2, LACP) 10G: Downlink (corerouter2) and then a couple of cables (in LACP) between each DMZ-switch1 and DMZ-switch2 (in total 2 DMZ-switches per VSYS just to get physical separation). Oh and in my case only 2 of the VSYS had 10G links while the 3rd had to use "only" 1G for uplink/downlink. But this is up to you how you wish to construct/design this regarding how much of separation you wish between the different DMZ's for the different VSYS. Another design would be if you use 2x10G bonded for downlink and connect that internally to a shared gateway. And do the same for uplink (but to another internal shared gateway). And then hook each interface for each VSYS to each shared gateway. And finally use the rest of the 1G interfaces as a large LACP bond to DMZ (and then use VLANs to separate them). But I dunno if this will actually work 🙂 Like so: Shared gateway Internet: LACP(eth10G_0, eth10G_1) Shared gateway Core: LACP(eth10G_2, eth10G_3) Shared gateway DMZ: LACP(eth1G_4, eth1G_5,eth1G_6,eth1G_7,eth1G_8,eth1G_9,eth1G_10,eth1G_11) VSYS0: int_Internet: Shared gateway Internet int_Core: Shared gateway Core int_DMZ: Shared gateway DMZ VSYS1: int_Internet: Shared gateway Internet int_Core: Shared gateway Core int_DMZ: Shared gateway DMZ VSYS2: int_Internet: Shared gateway Internet int_Core: Shared gateway Core int_DMZ: Shared gateway DMZ DMZ-switch1: DMZ_PAN1: LACP(int0/1-7) DMZ_switch2: LACP(int0/8-15) DMZ-switch2: DMZ_PAN2: LACP(int0/1-7) DMZ_switch1: LACP(int0/8-15)
... View more