Security Settings For Vpn Traffic; Idp For From Vpn Traffic Example; Figure 48 Tutorial: Other Computers Pinging A Network Y Ip Address Example - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

The system log can also help identify a configuration problem. Click LOGS to see the system
log. See
Section 22.3.1 on page 347
click LOGS > Log Settings and make sure IKE and IPSec logging is enabled at both ends.
Then clear the log and re-attempt to build the tunnel.
Other computers (that are not on network Y) do not receive a reply when attempting to ping a
device on the network Y. In this example another computer with IP address 192.168.167.3 is
connected to ZyWALL A. It cannot ping the computers on network Y because its IP address
does not match the local network policy on ZyWALL A (192.168.167.2).

Figure 48 Tutorial: Other Computers Pinging a Network Y IP Address Example

C:\>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 10.0.0.2:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum =

4.2 Security Settings for VPN Traffic

The ZyWALL can apply the firewall, IDP and anti-virus to the traffic going to or from VPN
tunnels. The ZyWALL applies the security settings to the traffic before encrypting VPN traffic
that it sends out or after decrypting received VPN traffic.
The security settings apply to VPN traffic going to or from the ZyWALL's VPN
tunnels. They do not apply to other VPN traffic for which the ZyWALL is not
one of the gateways (VPN pass-through traffic).
You can apply firewall, IDP and anti-virus security to VPN traffic based on its direction of
travel. The following examples show how you do this for IDP and the firewall.

4.2.1 IDP for From VPN Traffic Example

You can apply security settings to the From VPN packet direction to protect your network
from attacks, intrusions, viruses and spam that may come in through a VPN tunnel. For
example, you can use IDP to protect your LAN from intrusions that might come in through
any of the VPN tunnels or interfaces.
ZyWALL P1 User's Guide
for information on the log messages. You may need to
0ms, Average =
0ms
Chapter 4 Tutorial
91

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents