L2Tp Vpn; Application Patrol - ZyXEL Communications ZyWALL USG 1000 User Manual

Unified security gateway
Hide thumbs Also See for ZyWALL USG 1000:
Table of Contents

Advertisement

6.5.17 L2TP VPN

Use L2TP VPN to let remote users use the L2TP and IPSec client software included
with their computers' operating systems to securely connect to the network
behind the ZyWALL.
MENU ITEM(S)
PREREQUISITES
WHERE USED
Example: See

6.5.18 Application Patrol

Use application patrol to control which individuals can use which services through
the ZyWALL (and when they can do so). You can also specify allowed amounts of
bandwidth and priorities. You must subscribe to use application patrol. You can
subscribe using the Configuration > Licensing > Registration screens or one
of the wizards.
MENU ITEM(S)
PREREQUISITES
Example: Suppose you want to allow vice president Bob to use BitTorrent and
block everyone else from using it.
Create a user account for Bob (User/Group).
1
Click AppPatrol > Peer to Peer to go to the application patrol configuration
2
screen. Click the BitTorrent application patrol entry's Edit icon.
• Set the default policy's access to Drop.
• Add another policy.
• Select the user account that you created for Bob.
• You can leave the source, destination and log settings at the default.
Note: With this example, Bob would have to log in using his account. If you do not
want him to have to log in, you might create an exception policy with Bob's
computer IP address as the source.
ZyWALL USG 1000 User's Guide
Configuration > VPN > L2TP VPN
Interfaces, IPSec VPN connection, certificates (authentication),
authentication methods (extended authentication), addresses (local
network, remote network, NAT, IP pool for assigning to clients, DNS
and WINS server addresses), to-ZyWALL firewall, firewall
The IPSec VPN connection used for L2TP VPN can be used in policy
routes and zones
Chapter 8 on page
171.
Configuration > AppPatrol
Registration, zones, Schedules, users, user groups, addresses
(source, destination), address groups (source, destination). These are
only used as criteria in exceptions and conditions.
Chapter 6 Configuration Basics
111

Advertisement

Table of Contents
loading

Table of Contents