Configuring The Security Policy Control Screen - ZyXEL Communications ZyWALL 1100 User Manual

Zywall/usg series
Hide thumbs Also See for ZyWALL 1100:
Table of Contents

Advertisement

directly to the LAN without passing through the ZyWALL/USG. A better solution is to use virtual
interfaces to put the ZyWALL/USG and the backup gateway on separate subnets. Virtual interfaces
allow you to partition your network into logical sections over the same interface. See the chapter
about interfaces for more information.
By putting LAN 1 and the alternate gateway (A in the figure) in different subnets, all returning
network traffic must pass through the ZyWALL/USG to the LAN. The following steps and figure
describe such a scenario.
A computer on the LAN1 initiates a connection by sending a SYN packet to a receiving server on the
1
WAN.
The ZyWALL/USG reroutes the packet to gateway A, which is in Subnet 2.
2
The reply from the WAN goes to the ZyWALL/USG.
3
The ZyWALL/USG then sends it to the computer on the LAN1 in Subnet 1.
4
Figure 218 Using Virtual Interfaces to Avoid Asymmetrical Routes

19.2.1 Configuring the Security Policy Control Screen

Click Configuration > Security Policy > Policy Control to open the Security Policy screen.
Use this screen to enable or disable the Security Policy and asymmetrical routes, set a maximum
number of sessions per host, and display the configured Security Policies. Specify from which zone
packets come and to which zone packets travel to display only the policies specific to the selected
direction. Note the following.
• Besides configuring the Security Policy, you also need to configure NAT rules to allow computers
on the WAN to access LAN devices.
• The ZyWALL/USG applies NAT (Destination NAT) settings before applying the Security Policies. So
for example, if you configure a NAT entry that sends WAN traffic to a LAN IP address, when you
configure a corresponding Security Policy to allow the traffic, you need to set the LAN IP address
as the destination.
• The ordering of your policies is very important as policies are applied in sequence.
Chapter 19 Security Policy
ZyWALL/USG Series User's Guide
327

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents