Device Ha; Ddns; Policy Routes - ZyXEL Communications Unified Security Gateway ZyWALL 300 User Manual

Unified security gateway
Hide thumbs Also See for Unified Security Gateway ZyWALL 300:
Table of Contents

Advertisement

Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most one zone.
Virtual interfaces are automatically assigned to the same zone as the interface on which they
run.
When you create a zone, the ZyWALL does not create any firewall rules, assign an IDP
profile, or configure service control for the new zone.
MENU ITEM(S)
PREREQUISITES
WHERE USED
Example: For example, to create the DMZ-2 zone and add ge5 as in the network topology
example, click Network > Zone and then the Add icon.

5.4.8 Device HA

Use device HA to create redundant backup gateways. The ZyWALL runs VRRP v2. You can
only set up device HA with other ZyWALLs of the same model running the same firmware
version.
MENU ITEM(S)
PREREQUISITES
Example: See

5.4.9 DDNS

Dynamic DNS maps a domain name to a dynamic IP address. The ZyWALL helps maintain
this mapping.
MENU ITEM(S)
PREREQUISITES

5.4.10 Policy Routes

Use policy routes to control the routing of packets through the ZyWALL's interfaces, trunks,
and VPN connections. You also use policy routes for bandwidth management (out of the
ZyWALL), port triggering, and general NAT on the source address. You have to set up the
criteria, next-hops, and NAT settings in other screens first.
MENU ITEM(S)
PREREQUISITES
Example: You have an FTP server connected to ge 4 (in the DMZ zone). You want to limit
the amount of FTP traffic that goes out from the FTP server through your WAN connection.
1 Create an address object for the FTP server (Object > Address).
ZyWALL USG 300 User's Guide
Network > Zone
Interfaces, IPSec VPN, SSL VPN
Firewall, IDP, service control, anti-virus, ADP, application patrol
Device HA
Interfaces (with a static IP address), to-ZyWALL firewall
Chapter 6 on page
125.
Network > DDNS
Interfaces
Network > Routing > Policy Route
Criteria: users, user groups, interfaces (incoming), IPSec VPN (incoming),
addresses (source, destination), address groups (source, destination),
schedules, services, service groups
Next-hop: addresses (HOST gateway), IPSec VPN, SSL VPN, trunks, interfaces
NAT: addresses (translated address), services and service groups (port
triggering)
Chapter 5 Configuration Basics
117

Advertisement

Table of Contents
loading

Table of Contents