1.4.2 Star Topology ....................55 1.4.3 Star-Mesh Mixed Topology................64 1.5 Access via Central Site....................81 1.5.1 VPN Tunnel to Central Site (ZyWALL 70 to ZyWALL 1050)......81 1.6 Multiple Entry Point (MEP)................... 93 1.6.1 Deploying MEP....................93 1.7 Device High Availability ..................... 132 1.7.1 Device HA......................
Page 3
A03. What’s difference between “Admin Service Control” and “User Service Control” configuration in GUI menu Configuration > System > WWW? ....270 A04. Why ZyWALL 1050 redirects me to the login page when I am performing the management tasks in GUI? ..................270 A05.
Page 4
F04. What’s the routing order of policy route, dynamic route, static route and direct connect subnet table? ....................280 F05. Why can’t ZyWALL 1050 ping to the Internet host, but PC from LAN side can browse internet WWW? ..................... 280 F06.
Page 5
GUI redirected to login page after I click a button/link? ........... 294 M05. What is AAA?....................295 M05. What are ldap-users and radius-users used for? ..........295 M06. What privileges will be given for ldap-users and radius-users? ....... 295 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 6
O02. Why isn't the statistic data of "Report" exact? ..........298 O03. Does Report collect the traffic from/to ZyWALL itself? ........298 O04. Why cannot I see the connections from/to ZyWALL itself?......298 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Typically, an administrator has to configure many site-to-site VPN connections to allow a truly global VPN network. VPN connection management is made easily using the VPN concentrator. The VPN All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 8
VPN network with less effort but stronger security and management possibilities. For SMB customer, ZyXEL provides a total VPN solution from a personal client to a 500+ people firewall where all of these devices have the VPN connection ability.
There are two kinds of connection interface, static IP and dynamic DNS. Configure ZyWALL 1050 with Static IP address: ZyWALL 1050 uses the static IP address for VPN connection. The topology is shown at the following figure. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 10
167.35.4.3. The Local ID Type and content are IP and 210.110.7.1, Peer ID Type and content are IP and 167.35.4.3. 3) Repeat the step1 & 2 to configure the Remote ZyWALL 1050. The Local ID Type & content and Peer ID Type & content are reverse to the Local ZyWALL 1050.
Page 11
ZyWALL1050 to send the traffic to VPN tunnel when the traffic flows from the local subnet to a destination that is in the remote subnet. Switch to ZyWALL 1050 > Configuration > Policy > Route > Policy Route and add a new policy route. The source and the destination addresses are the local and remote subnets.
Page 12
[8] peer-ip 167.35.4.3 0.0.0.0 [9] authentication pre-share [10] keystring 123456789 [11] local-id type ip 210.110.7.1 [12] peer-id type ip 167.35.4.3 [13] peer-id type ip 167.35.4.3 [14] xauth type server default deactivate [15] group1 [16] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 13
3. Select the correct interface for VPN connection. 4. The Local and Peer ID type and content must the opposite and contain the same. 5. Make sure the VPN policy route has been configured in ZyWALL1050. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Desktop users Check Point VPN-1 The ZyWALL 1050 can be placed as a VPN gateway in the central site. It can communicate with other ZyXEL’s VPN-capable products as well as VPN products from other major vendors in the network device industry, e.g. Cisco PIX/IOS VPN products, Check Point VPN Pro,...
The exciting ZyWALL35 or 70 in central office gateway can be replaced by ZyWALL 1050, and the ZyWALL35 or 70 moved to a remote office. The ZyWALL 1050 can provide higher VPN throughput and deal with multiple VPN tunnels at the same time. To show how to build tunnel between ZyWALL5/35/70 and ZyWALL 1050 we used ZyWALL 70 as an example.
Page 16
3) Login to ZyWALL70 and go to Security > VPN > Gateway Policy, add a new gateway policy to connect with central office’s ZyWALL 1050. My Address and Remote Gateway Address are ZyWALL70 and ZyWALL 1050 WAN IP addresses. The Pre-Shared Key configured on both sides must exactly the same Local ID Type &...
Page 17
Route > Policy Route and add a new policy route, the source and destination address are the local and remote subnet and the Next-Hop type is a VPN tunnel. Then choose the corresponding VPN connection rule from the VPN tunnel drop down menu. Now, the VPN All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 18
9) After configuring both sides of the VPN, click the Dial up VPN tunnel icon to test the VPN connectivity. 10) “VPN tunnel establishment successful,” message appears. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 20
4. The Local and Peer ID type and content must be the opposite and not of the same content. 5. Make sure the VPN policy route had been setup in ZyWALL 1050. All contents copyright (c) 2006 ZyXEL Communications Corporation.
LAN: 192.168.2.X The central office gateway ZyWALL 1050’s interface and VPN setting retain the same setting as in the previous example. If you jumped this section first, please refer to ‘ZyWALL 1050 to ZYWALL70 VPN tunnel setting’ on page 8.
Page 22
4) Fill-in the VPN phase1 setting according to the table listed. We don’t have to setup the ID type and content because the FortiGate accepts any peer ID. Make sure both the pre-shares key and proposal are the same as in the ZyWALL1050. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 23
Advanced… button to edit the phase 2 proposal and source and destination address. Please make sure the phase 2 proposal is the same as in ZyWALL 1050 phase 2. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 24
Using the “Create New” button to create a new address object. 9) Switch to Firewall > Policy and click “Insert Policy Before” icon to add new policy for the VPN traffic from FortiGate to ZyWALL. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 25
Schedule and service type are always and ANY to ensure that all kinds of traffic can pass through the VPN tunnel at any time. Select “ACCEPT” as an action this time All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 26
2. Make sure both IKE and IPSec proposal are the same in both local and remote gateways. 3. Make sure the VPN policy route has been configured in ZyWALL1050. 4. Make sure the Firewall rule has been configured in FortiGate. All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes 1.2.2.2 ZyWALL with NetScreen VPN Tunneling This section guides how to setup a VPN connection between the ZyWALL 1050 and NetScreen 5GT. As on the figure below, the tunnel between Central and Remote offices ensures the packet flows between them are secure.
Page 28
VPN traffic routing. Refer to the pervious scenario or user guide to find help on setting the ZyWALL 1050 VPN. 2) Using a web browser, login NetScreen by entering the LAN IP address of the NetScreen in the URL field.
Page 29
ZyWALL's WAN IP address. In this example, we select Static IP Address option and enter IP 210.110.7.1 in the text box. Enter the key string 123456789 in Preshared Key text box, and then press Advanced button to edit the advanced settings. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 30
Key, group1, DES for Encryption Algorithm and MD5 for Authentication Algorithm. Select Main (ID Protection) option for Mode (Initiator). Then, press Return button, and press OK button on next page to save your settings. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 31
10) Give a name for the VPN, for example “ToZyWALL IPSec”. In Remote Gateway, choose the Predefined option and select the ToZyWALL rule. Then, press Advanced button to edit the advanced settings. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 32
Encryption Algorithm to DES and Authentication Algorithm to SHA1. Check the VPN Monitor check box so that you can monitor your VPN tunnels. Then, press Return button and OK button on next page to save the settings. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 33
13) Switch to Policies to set up policy rules for VPN traffic. In the field From choose Trust and in the field To choose Untrust (it means from LAN to WAN). Then press the New button to edit the policy rules. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 34
VPN policy for the opposite direction. Then, press OK button to save your settings. 15) After applying the settings, the new policy rules will be displayed in the Policies page. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 35
17) Ping the remote host and switch to VPNs > Monitor Status to check the VPN link status. If the Link status is Up, it means the VPN tunnel between ZyWALL and NetScreen has been successfully built. All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes 1.2.2.3 ZyWALL with SonicWall VPN Tunneling This section guides how to setup a VPN connection between the ZyWALL 1050 and SonicWall TZ170. As on the figure below, the tunnel between Central and Remote offices ensures the packet flows between them are secure.
Page 37
2) Using a web browser, login SonicWall by entering the LAN IP address of SonicWall in the URL field. The default username and password is admin/password. 3) Switch to menu Network > Interfaces and configure the WAN/LAN IP address to WAN: 167.35.4.3 LAN: 192.168.2.1/24. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 38
4) Switch to VPN > Settings, check Enable VPN check box and press Add button. This will bring the VPN settings. Note: The VPN Policy Wizard is an alternative way to set up the VPN rules. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 39
Address is the ZyWALL's WAN IP Address (IP address of the remote gateway). In this example, we use 210.110.7.1 in IPSec Primary Gateway Name or Address text box. Then, enter the key string 123456789 in the text box Shared Secret. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 40
Therefore, we have to create a new address object in the remote network drop down list. Then a new address object window will pop-up. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 41
Network text box and then type 255.255.255.0 in Subnet Mask text box. Then press OK. Now after the address object successfully configured, the new address object “Remote_Subnet” can be selected from the destination network drop down list. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 42
8) Switch to Proposals tab. In IKE (Phase1) proposal settings, select Main mode, set DH Group to Group1, Encryption to DES and Authentication to MD5. In IPSec (Phase2) proposal settings, select ESP Protocol, Encryption to DES and Authentication to SHA1. Then press the OK button. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 43
9) Switch to Advanced tab. In the setting VPN policy bound to select Interface WAN. Then press the OK button. 10) The VPN status page will show a new VPN rule. Make sure the rule has been enabled. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 44
11) Ping the remote host to dial up the tunnel. We can check the connected VPN status in the VPN status page. The VPN tunnel should appear in the Currently Active VPN Tunnels page. It should show that the tunnel had been successfully built-up. All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL1050’s remote gateway setting it represents “any IPs”. On the other end, the teleworker use ZyWALL VPN client on their notebooks to establish IPSec VPN with the main office. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 46
Phase 1 Phase 1 Negotiation Mode : Main Negotiation Mode : Main Pre-share key: 123456789 Pre-share key: 123456789 Encryption :DES Encryption :DES Authentication :MD5 Authentication :MD5 Key Group :DH1 Key Group :DH1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 47
Perfect Forward Secrecy (PFS): None Below is a step by step configuration: 1) Login ZyWALL 1050 GUI and go to Configuration > Objects > Address to create an address object (local subnet) for remote access. 2) Create another address object for the remote host. The IP Address of the host should be 0.0.0.0, which means that remote user dials in dynamically.
Page 48
4) To create a VPN rule, go to Configuration > Network > IPSec VPN > VPN Connection. Set Policy as defined in step 1 and step 2. Remote policy should be a dynamic host address. We put VPN Gateway as dynamic as was defined in step 3. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 49
ZyWALL 1050 Support Notes 5) Go to remote host to configure ZyXEL VPN Client. We create a Net Connection set remote access subnet to 192.168.2.x. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 50
ZyWALL 1050 Support Notes In My Identity, select local ID type as Any. Note: Do not forget to enter Pre-Shared Key by clicking the button Pre-Shared Key. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 51
ZyWALL 1050 Support Notes The last step is to go to Security Policy to configure parameters for Phase1 and Phase 2. After saving the configuration, the VPN connection should be initialed from the host site. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 52
[5] dpd [6] local-ip interface ge2 [7] peer-ip 0.0.0.0 0.0.0.0 [8] authentication pre-share [9] keystring 123456789 [10] local-id type ip 0.0.0.0 [11] peer-id type any [12] xauth type server default deactivate [13] group1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 53
4. The Local and Peer ID type and content must the opposite and not of the same content. 5. The Local Policy of ZyWALL 1050 should be ‘dynamic single host with the value 0.0.0.0’. The VPN tunnel should be initialed from the remote host site.
1.4 Large-scale VPN Deployment With the business growing, network administrator will face the more and more complicated VPN topology and applications. ZyWALL 1050 supports various types of VPN topology that can meet the needs of the organizations of any size.
Central site Amsterdam Oslo In a Star VPN topology, ZyWALL 1050 acts as a central site (enabling Hub & Spoke VPN) and spoke sites can be any model of ZyWALL series Paris Hannover All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 56
VPN traffic across the HQ to the destination office’s internal network. The VPN configuration parameter Remote Office WAN: 10.59.1.11 WAN: 10.59.1.10 WAN: 10.59.1.17 LAN: 192.168.100.0/24 LAN: 192.168.101.0/24 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 57
I don’t list the detail configuration steps here,. Configure the NL site address object for each remote office subnet Setup NL site address group that includes all the remote office subnets; the address object All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 58
ZyWALL 1050 Support Notes group is used as a policy route destination criterion. The screenshot below is the NL site VPN Gateway status page. NL site VPN Connection status page All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 60
Perfect Forward Secrecy (PFS): None Perfect Forward Secrecy (PFS): None Setup the remote offices’ subnets address objects for the further VPN configuring. Setup the HQ VPN Gateway for all the remote sites All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 61
The next step is the most important one. We need to build up a VPN concentrator and join all the remote sites’ VPN traffic to it. Switch to ZyWALL 1050 > Configuration > Network > IPSec VPN > Concentrator and then click the add icon to add a new concentrator.
Page 62
Thus, this depends on how customers want to deploy their Global VPN network. We can add the following policy route to allow the HQ subnet to connect with all the concentrator’s remote subnets. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 63
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
Asia central site (Singapore) then again routed to the final destination – Tokyo spoke site In a Star-mesh mixed VPN topology, ZyWALL 1050 acts as a regional central site (enabling Hub & Spoke VPN) and spoke sites can be any model of ZyWALL series. The Star –...
Page 65
We can check the status page to confirm the correctness. Please refer to ZyWALL5 user guide for detail interface setting steps. The VPN configuration parameters in Asia Region Regional Remote Sites Regional Center WAN: 179.25.3.24 ZyWALL5 WAN: 179.25.106.124 Local Policy: 192.168.0.0/16 Local Policy: 192.168.12.0/24 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 66
192.168.20.x), ZyWALL 2 Plus (LAN subnet: 192.168.21.x) and ZyWALL70 (LAN subnet: 192.168.22.x) by building one VPN tunnel with local center ZyWALL 1050. Thus a separate VPN tunnel to each remote site is not needed. We will use a class B subnet (192.168.0.0/255.255.0.0) as remote policy in order to include all ranges of the remote policies...
Page 67
VPN status page will brief list the VPN tunnel information like following screen shot after the VPN setting. The VPN can’t be dialed up for testing because the remote ZyWALL 1050 didn’t setup the corresponding VPN tunnel until now. The test and debug can start only after both sites’...
Page 68
Please make sure to activate the “VPN rules skip applying to the overlap range of local and remote IP addresses” option before starting to setup the VPN tunnel. The VPN tunnel status page after configured the local center ZyWALL 1050 tunnel. As soon as we finish the configuration of ZyWALL5 and ZyWALL35, we can move to ZyWALL 1050’s configuration.
Page 69
Perfect Forward Secrecy (PFS): None Perfect Forward Secrecy (PFS): None Please refer to the application topology to setup the ZyWALL 1050 interface first. We can move to next steps only after setting up the interface. We use ge1 as LAN interface and IP address is 192.168.10.1/255.255.255.0.
Page 70
ZyWALL70 (192.168.22.0) it will match these two addresses’ object ranges and ZyWALL 1050 can do next processing. This ZyWALL 1050 is the local center of Asia region. We need to setup the VPN tunnel between local sites ZyWALL5 and ZyWALL35 and Europe region center ZyWALL 1050.
Page 71
The next step is to create the VPN connection (IPSec / IPSec Phase2). Make sure the parameters are configured correctly, otherwise the VPN will fail to dial. Below is the VPN connection global page. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 72
VPN concentrator. Switch to Concentrator sub menu and click the Add icon to add a new concentrator. Give a name to this concentrator and then click add icon to make the existing VPN connection become a member of this concentrator. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 73
ZyWALL 1050 Support Notes The remote regional center ZyWALL 1050 VPN connection is also treated as a member of this concentrator and the packets will be sent to the remote center first and then following the remote concentrator setting will be routed to the destination sites where the traffic destination is the site allocated under remote VPN concentrator.
Page 74
Remember to activate “VPN rules skip applying to the overlap range of local and remote IP addresses” option before configuring the VPN tunnel. Follow the VPN parameter table to configure the VPN tunnel. ZyWALL70 WAN and LAN interface setting. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 75
Remember to activate “VPN rules skip applying to the overlap range of local and remote IP addresses” option before configuring the VPN tunnel. Follow the VPN parameter table to configure the VPN tunnel. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 76
Authentication: SHA1 Perfect Forward Secrecy (PFS): None Perfect Forward Secrecy (PFS): None Please refer to the application topology to setup the ZyWALL 1050 interface first. Then we can move to setting the VPN. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 77
The needed address objects list is as follows. This ZyWALL 1050 is the local center of Europe region. We need to setup the VPN tunnel between local sites ZyWALL 2 Plus and ZyWALL70 and Asia region center ZyWALL 1050.
Page 78
Now, we already successfully added the three VPN connection rules and we can start to edit our regional VPN concentrator. Switch to the Concentrator sub menu and click the Add icon to add a new concentrator. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 79
Assign a name to this concentrator and then click the add icon to make the existing VPN become the member of this concentrator. The remote regional center ZyWALL 1050 VPN connection is also treated as a member of this concentrator and the packets will be sent to the remote center first and then following the remote concentrator setting will be routed to the destination sites where the traffic destination is the site allocated under remote VPN concentrator.
Page 80
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes 1.5 Access via Central Site 1.5.1 VPN Tunnel to Central Site (ZyWALL 70 to ZyWALL 1050) The idea of this scenario is to redirect all the outgoing traffic originated from the branch office to the main office via the VPN tunnel so that the network administrator can manage and control the traffic or apply additional secure access control or inspection.
Page 82
ZyWALL1050 B which is the internet connection gateway of main office. Thus, ZyWALL1050 A will route the traffic from the VPN tunnel and send it to the appropriate place of the packet destination. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 83
Phase 1 Phase 1 Negotiation Mode : Main Negotiation Mode : Main Pre-share key: 123456789 Pre-share key: 123456789 Encryption :DES Encryption :DES Authentication :MD5 Authentication :MD5 Key Group :DH1 Key Group :DH1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 84
1) Login ZyWALL1050 A GUI and go to Configuration > Network > Interface > Ethernet and configure the IP setting as shown in the topology. 2) Go to Configuration > Object >Address to create an address object for all the incoming traffic. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 85
Security Gateway Address and 123456789 as the Pre-Shared Key. For other parameters, we leave them as default. There are no special settings for these parameters and the main concern is to let the VPN peers match each other. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 86
Here, we assume the peer subnet is 192.168.1.x and select the default address object ‘VPN_LAN_SUBNET’ to meet our requirements. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 87
LAN host to internet, thus the next-hop will be ge3 that is connected to the internet gateway ZyWALL 1050 B. The third rule is for the traffic coming from the VPN tunnel and the destination is the internet. Then next-hop will be ge3.
Page 89
2) Go to Security >VPN to set the IKE rules. We put 172.23.23.1 as My Address, 172.23.23.2 as the Remote Gateway address and 123456789 as the Pre-Shared Key. For other parameters, we set them to match those set in the ZyWALL1050 A. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 90
ZyWALL 1050 Support Notes Go to the Associated Network Policies of this rule to configure the IPSec rule. Please note that the Remote Network should be within 0.0.0.0-255.255.255.255 range. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 91
1) Login the ZyWALL1050 A GUI and go to Configuration > Network > Interface > Ethernet and configure the IP settings as shown in the topology. 2) We have to add one more policy route for the traffic from DMZ (ge4) to internet All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 92
ZyWALL 1050 Support Notes (WAN_TRUNK). After we finish the setting in ZyWALL 70 and ZyWALL 1050 A and B, the setup is complete. The CLI commands for application: Policy Route: [0] policy 1 [1] no deactivate [2] no description [3] no user...
1.6 Multiple Entry Point (MEP) To ensure high reliability and high availability of Headquarters’ network access for branch office or teleworker, ZyWALL 1050 supports multiple entry points application to bring the following benefits: 1. Ensuring the network path is always available – if the use of the primary network path fails, user can access the same resources via a backup path 2.
Page 94
2 Plus which supports VPN HA and Dial Backup functions. When the primary WAN access to the VPN tunnel is down, ZyWALL1050 will trigger the dialup backup and establish a VPN tunnel with second secure gateway of another ZyWALL1050 located at the branch office. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 95
One ZyWALL 2 Plus Two ZyWALL 1050 One ES-4024A One modem connecting to ZyWALL 2 Plus’s AUX port (ex. ZyXEL omni.lite com+) One FTP server One PC behind ZyWALL 2 Plus Now, we are going to complete the following main tasks: 1.
Page 96
Subnet, 192.168.1.0 Subnet, 192.168.3.0 Subnet, 192.168.3.0 SNAT Change Change 192.168.3.0 192.168.3.0 192.168.1.0 192.168.1.0 192.168.30.0 192.168.31.0 192.168.1.0 192.168.1.0 Phase1 Negotiation Main Main Main Mode Pre-share key 123456789 123456789 123456789 Encryption Authentication Key Group Phase2 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 97
1. Configuration on ZyWALL 1050-A (1) LAN/WAN Network Setting Login ZyWALL 1050-A’s GUI, go to menu Configuration > Network > Interface. Modify ge2’s IP address to 59.124.163.154 with subnet 255.255.255.224 and gateway 59.124.163.129. Secondly, modify interface “ge1” to be as LAN network. Here we keep to use the default IP address “192.168.1.0”...
Page 98
Host, 59.124.163.152/255.255.255.255 9. Create one more still to indicate ZyWALL 1050-A’s ge2(WAN) IP address for Firewall rule usage which will allow ZyWALL 1050-A’s ge2 to be ping from ZyWALL 2 plus and also can response to the ping. Name: ge2_IP Host, 59.124.163.154/255.255.255.255...
Page 99
Step2. Create an IKE rule 1. Go to menu Configuration > Network > IPSec VPN, switch to 'VPN Gateway' 2. Create a new IKE by clicking '+' icon 3. Fill out the fields as following. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 100
ZyWALL 1050 Support Notes CLI commands for reference: [0] isakmp policy IKE1 [1] mode main [2] transform-set des-md5 [3] lifetime 86400 [4] no natt [5] dpd [6] local-ip interface ge2 [7] peer-ip 0.0.0.0 0.0.0.0 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 101
Step3. Configure the IPSec rule 1. Go to menu Configuration > Network > IPSec VPN, switch to 'VPN Connection' 2. Create a new IPSec by clicking '+' icon 3. Configure the VPN setting as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 102
ZyWALL 1050 Support Notes Note: In ZyWALL 1050-A, we use “Source NAT” to change the VPN traffic from 192.168.3.0 network which will go to 192.168.1.0 network to 192.168.30.0 network. And we will also configure ZyWALL 1050-B to change the VPN traffic from 192.168.3.0 network which will go to 192.168.2.0 network to 192.168.31.0 network later.
Page 103
WAN and trigger the VPN tunnel then. Click the ‘+’ icon to add another new policy route which will be used to route traffic from ZyWALL 1050-B to return via original path. Define that all the traffic from 192.168.1.0 network that wants to go to 192.168.31.0 routed by the gateway, the host of 192.168.1.254.
Page 104
ES-4024A FTP server (now the packet is with source 192.168.31.0 to destination 192.168.1.33). The FTP server’s gateway is ZyWALL 1050-A’s ge2 applied via DHCP or manually configured. So when traffic would return, it will be flowed from FTP server ZyWALL 1050-A’s ge2 (which will redirect the traffic to another host )
Page 105
After the configuration is down, you will see two policy routes as shown below. CLI commands for reference: [0] policy 1 [1] no deactivate [2] no description [3] no user [4] interface ge1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 106
Go to GUI menu Security > Firewall Enable Firewall: On Choose To-ZyWALL rules and click “+” at the right site to add a new rule. Fill out the information as following and click “apply” button then. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 107
ZyWALL 1050 Support Notes The new firewall rule is available as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 108
2. Configuration on ZyWALL 1050-B (1). LAN/WAN Network Setting Login ZyWALL 1050-A’s GUI, go to menu Configuration > Network > Interface. Modify ge2’s(WAN) IP address to 59.124.163.155 with subnet 255.255.255.224 and gateway 59.124.163.129. Secondly, modify ge1’s(LAN) IP address to 192.168.2.1 with subnet 255.255.255.0 and configure it as a DHCP server with the IP poor starting address and pool...
Page 109
Step2. Create an IKE rule 1. Go to menu Configuration > Network > IPSec VPN, switch to 'VPN Gateway' 2. Create a new IKE by clicking '+' icon 3. Fill out the fields as following. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 110
ZyWALL 1050 Support Notes CLI commands for reference: [0] isakmp policy IKE1 [1] mode main [2] transform-set des-md5 [3] lifetime 86400 [4] no natt [5] dpd [6] local-ip interface ge2 [7] peer-ip 0.0.0.0 0.0.0.0 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 111
Step3. Configure the IPSec rule 1. Go to menu Configuration > Network > IPSec VPN, switch to 'VPN Connection' 2. Create a new IPSec by click '+' icon 3. Fill out the fields as following All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 112
Note that we use Source NAT to change the VPN traffic from 192.168.3.0 which will goes to 192.168.1.0 network and to 192.168.31.0 network. CLI commands for reference [0] crypto map IPsec1 [1] ipsec-isakmp IKE1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 113
Click the ‘+’ icon to add another policy route which indicates where all the traffic which wants to go to the ZyWALL 1050-A’s LAN network will be routed to. Define that all the traffic that wants to go to 192.168.1.0 network will be routed by the gateway, the host of 192.168.2.254.
Page 114
ZyWALL 1050 Support Notes After the configuration is down, you will see two policy routes as shown below. CLI commands for reference: [0] policy 1 [1] no deactivate All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 115
[3] no user [4] no interface [5] no tunnel [6] source any [7] destination Local_192_168_1 [8] no schedule [9] service any [10] next-hop gateway HOST_192_168_2_254 [11] no snat [12] no bandwidth [13] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 116
2. Telnet or login ZyWALL 2 Plus console and switch to menu 24.8 to enable the pingcheck to detect the WAN connection availability. - Execute the CLI command: sys rn pingcheck 1 3. Add the CLI to autoexec.net to make it always enabled even after device reboot. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 117
(4) VPN Setting 1. Switch to GUI menu Security > VPN, click the ‘+’ icon as following to add a VPN-IKE rule. 2. Configure VPN-IKE setting on ZyWALL 2 Plus as following. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 118
ZyWALL 1050 Support Notes 3. At the same page of menu Security > VPN, click the icon to add a VPN-IPSec rule. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 119
ZyWALL 1050 Support Notes 4. Configure the IPSec rule as following. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 120
1. Login to ES-4024A’s GUI menu Advanced Application > VLAN > Static VLAN link. 2. Add vlan2 (including port 9-16, Fixed, Untag when Egress process) and vlan3 (including port 17-24, Fixed, Untag when Egress process). Then click the Add button. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 121
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 122
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 123
3. Switch to menu Advanced Application > VLAN > VLAN Port Setting link. Configure PVID equal to 2 for port 9 ~16 and PVID equal to 3 for port 17~24 as shown below. Then click the Apply button. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 124
1. Enter the ES4024A’s GUI, go to menu Routing Protocol > Static Routing. 2. Define that the traffic that wants to go to the 192.168.31.0/24 network will be routed by the gateway, 192.168.2.1. The configuration is as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 127
Keeping Ping from the PC(ex. IP with 192.168.3.33) behind ZyWALL2 Plus to the FTP server(ex. IP with 192.168.1.33), it will be reachable after the primary VPN tunnel is on. See the screen capture of ZyWALL 2 Plus’s log as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 128
See the screen capture of the progress as shown below at this step. The ZyWALL 2 Plus’s IKE detect the tunnel is down and send HASH-DEL packet out. (However, since the Internet access is down, so ZyWALL 1050-A won’t receive those HASH-DEL packets.) The dial backup starts right away then.
Page 129
ZyWALL 1050 Support Notes The screen capture below shows you the dial backup gets dynamic IP 218.32.98.40. And the IPSec HA take action after several IKE packets sent without any packet returned. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 130
ZyWALL 1050 Support Notes Then ZyWALL 2 Plus tries to establish VPN tunnel with ZyWALL 1050-B (59.124.163.155). All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 131
ZyWALL 1050 Support Notes Finally, the VPN tunnel has been successfully established with ZyWALL 1050-B. And the PC behind ZyWALL 2 Plus can ping the FTP server then. See the screen capture shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
In the Global or multi-site Enterprise network deployment, reliability is another major concern while planning a VPN deployment. ZyWALL 1050 provides advanced features to support the following scenarios to achieve high availability of the VPN infrastructure. The benefits for the customer are ‧...
1.1. Interface setup The default LAN subnet is combined with ge1 and default IP is 192.168.1.1. Please connect to ge1 and ZyWALL 1050 will dispatch an IP for your PC. Then we can start to setup the basic interface and routing setting.
Page 134
ZyWALL 1050 Support Notes Step2. We can check all the interface information on the Status display page. Step3. Setup WAN1, WAN2, LAN and DMZ interface IP parameters as in the demo All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 135
The default interface configuration is as follows. We will configure ge2, ge3, ge4 and ge1 in turn. User needs to click the “Edit” icon to modify the setting. ge2 Fix IP: 220.123.123.2/255.255.255.0 Gateway: 220.123.123.1 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 136
ZyWALL 1050 Support Notes ge3 Fix IP: 220.123.133.2/255.255.255.0 Gateway: 220.123.133.1 ge4 Fix IP: 192.168.20.254/255.255.255.0 DHCP server All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 137
ZyWALL 1050 Support Notes ge1 Fix IP: 192.168.10.254/255.255.255.0 DHCP server All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 138
ZyWALL 1050 Support Notes User’s pc network connection will disconnect and get the new IP address from ZyWALL 1050 after applying ge1’s new setting. 1.2. Configure the interface to correspond Zone All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 139
ZyWALL 1050 Support Notes Step1. Switch to ZyWALL 1050 > Configuration > Network > Zone and click the “Edit” icon to modify the setting. Step2. The default setting of ZyWALL 1050 is having three Zones. User can add more Zones or modify the Zone’s name if they wish. The main purpose of Zone is to add the security checking between different interfaces.
Page 140
Step1. Switch to ZyWALL 1050 > Configuration > Objects > Address > Address and we will find there is one default LAN_SUBNET address object.
Page 141
There is one default policy route form LAN for the traffic outgoing to the network behind WAN. Switch to ZyWALL 1050 > Configuration > Policy > Route > Policy Route or Static Route to check the routing settings. User can click the “Edit” icon to check the detail settings...
Page 142
1.4. Setup Device HA (Activate-Passive) We will configure the Device HA setting on master ZyWALL 1050 first. Then we can connect the Backup ZyWALL 1050 cables to L3 and L2 switch and then synchronize the configuration from Master.
Page 143
ZyWALL 1050 Support Notes Setup the ge1 (LAN) VRRP group Setup the ge2 (WAN1) VRRP group All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 144
ZyWALL 1050 Support Notes Setup the ge3 (WAN2) VRRP group Setup the ge4 (DMZ) VRRP group All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 145
ZyWALL 1050 Support Notes Step2. Connect the PC to Backup ZyWALL 1050 ge1 and the PC should be dispatched an IP address from the device. User can login to the Backup ZyWALL 1050 and configure the Backup Device HA setting. We have to set the ge1 interface IP setting as Master ZyWALL 1050 ge1.
Page 146
HA > VRRP GROUP. Then click the ”add” icon to add a VRRP group. Between Master and Backup Role, the difference in settings is the Management IP configuration. The Backup ZyWALL 1050 will copy all settings from the Master one so we need a management IP to access and configure the Backup ZyWALL 1050.
Page 147
ZyWALL 1050 Support Notes Step4. Unplug the PC cable from Backup ZyWALL 1050 ge1 and plug it back to L2 switch LAN segment. Connect all the cables from L2 and L3 switches to the Backup ZyWALL 1050 as on the network topology diagram shown on the index page. Login to Backup ZyWALL 1050 via management IP.
Page 148
ZyWALL 1050 Support Notes synchronize the configuration from the Master to the Backup. Note: Don’t check the “Auto Synchronize” since there is a bug related. Sync process in action Sync successful notification window All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 149
ZyWALL 1050 Support Notes Switch to ZyWALL 1050 > Maintenance > Logs > View Log to check the log record. Step6. Check the system status page. You will see that the Master ZyWALL 1050’s configuration has been synchronized to Backup ZyWALL 1050 and we can continue to setup the rest three VRRP group.
Page 150
ZyWALL 1050 Support Notes Setup the ge3 (WAN2) VRRP group Setup the ge4 (DMZ) VRRP group All contents copyright (c) 2006 ZyXEL Communications Corporation.
Step1. Setup the VPN at Master ZyWALL 1050 Switch to ZyWALL 1050 > Configuration > Network > IPSec VPN > VPN Gateway and click the “Add” icon to add a VPN gateway.
Page 152
As My Address, we use Domain Name 0.0.0.0 defining a dynamic source as this VPN gateway will be accepting the traffic from ge2 (WAN1) and ge3 (WAN2). Setup the DNS ”ZyWALL 1050” and “ZyWALL 2”as Local and Peer ID type. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 153
DMZ subnet as a VPN local policy and we also need to add the address object for a remote subnet. Switch to ZyWALL 1050 > Configuration > Objects > Address > Address and we will find the LAN subnet already setup and we need to click the “Add” icon to add one more address object.
Page 154
Set the 192.168.1.0 subnet as the remote address object. Get back to the overview of the address object page. You can see that three address object R and VPN REMOTE has already been set up. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 155
We have to setup the policy route for the VPN traffic routing to LAN and DMZ. Switch to ZyWALL 1050 > Configuration > Policy > Route > Policy Route and add the policy route for the VPN traffic to LAN and DMZ.
Page 156
Step6. Connect the PC to ZyWALL 2 Plus and set the VPN settings. In this step, we have to configure two VPN policies for remote ZyWALL 1050 LAN subnet and DMZ subnet. Login ZyWALL 2 Plus and switch to the VPN configuration page.
Page 157
Click the Add icon to edit the VPN Network Policy. Setup the VPN policy for local LAN subnet (192.168.1.0/24) and Remote address type set to “Range Address” and IP is from 192.168.10.0 to 192.168.20.255. Click Apply to save the configuration. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 158
Ping the remote subnet to trigger the VPN tunnel. User can unplug the WAN1 connection cable and test the VPN HA functionality now! Supposedly the VPN connection will switch to WAN2 connection in several seconds. All contents copyright (c) 2006 ZyXEL Communications Corporation.
‧ Prevent from identity theft (VoIP over VPN) ‧ Mitigate impact of denial of service We use a simple topology to illustrate and show how ZyWALL 1050 can protect the VoIP line step by step in the following notes. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 160
LAN: 192.168.10.0/24 LAN: 192.168.22.0/24 We used two VoIP ATA (ZyXEL P2002 series) connected to office gateway. Each of the VoIP ATA has a SIP number for remote ATA dialing. This kind of application is called Fix VoIP Line application. User only needs to install and configure VoIP ATA device and doesn’t need to register with an external SIP server.
Page 161
ZyWALL 1050 Support Notes Switch to the Maintenance menu and check what IP address was granted from ZyWALL 1050. Connect to the other P2002 GUI and repeat the same steps to find out the IP address. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 162
ZyWALL 1050 Support Notes 1. Setup the SIP Number in the Branch Office. 2. Setup the SIP Number in the Main Office. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 163
ATA and then click the Add button to add this record in the Speed Dial Phone Book. 4. Setup the Main Office SIP number and the IP address in the Branch Office’s P2002’s PHONEBOOK menu. The remote office SIP info will show up in Speed Dial Phone Book All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 164
Main Office ZyWALL 1050 Configuration: 1. Login to the ZyWALL 1050 Web GUI and setup the ZyWALL 1050 WAN and LAN interface as shown on the previous topology diagram. 2. Setup the remote subnet address object for the subnet behind the remote office ZyWALL70.
Page 165
Office. Switch to ZyWALL 1050 > Configuration > Network > IPSec VPN > VPN Gateway and add a new VPN gateway rule. 4. Switch to ZyWALL 1050 > Configuration > Network > IPSec VPN > VPN Connection and add a new VPN connection. The local and remote policy are the Address objects LAN_SUBNET and zw70VPN_LAN.
Page 166
ZyWALL 1050 Support Notes 5. Switch to ZyWALL 1050 > Configuration > Policy > Route > Policy Route to add a policy route for routing the local subnet traffic to the remote branch office subnet via the tunnel - zw70VPN.
Page 167
6. We have finished the VPN connection and routing configuration. Now we can start to setup the security checking rule over this VPN tunnel. Switch to ZyWALL 1050 > Configuration > Network > Zone and add a new Zone for VPN.
Page 168
8. We also can use IDP to detect and intercept the intrusion in the VPN tunnel. Switch to ZyWALL 1050 > Configuration > Policy > IDP and follow the steps shown on the diagram below to add the IDP protection to the VPN zone.
Page 169
ZyWALL 1050 Support Notes shown in the previous topology diagram. 2. Configure the VPN tunnel for connecting with ZyWALL 1050. We can start to enjoy the VoIP Phone Line convenience and cost saving without security issues after the VPN connection and security policy enforcement have been deployed in the network environment.
IM/P2P applications, managing IM/P2P application well can mitigate security breaches. Besides, restricting access to IM/P2P applications can help employees focusing on his/her job to increase productivity and reduce misuse of network resources, e.g. bandwidth. All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes 2.1.2 What does ZyWALL 1050 provide for managing IM/P2P applications? ZyWALL provides best solution to solve the rigidity of the “all-or-nothing” approach and can meet customer’s expectation. 1. Application patrol: it can “recognize” IM/P2P applications and IT administrators can leverage it to restrict access to IM/P2P applications 2.
We are going to complete following setting. 1. Create user/group object 2. Create schedule object 3. Configure layer 7 application control -- App Patrol 4. Configure Policy Route 5. Configure IDP All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 173
[1] username Victor description Local User [2] username Victor logon-lease-time 1440 [3] username Victor logon-re-auth-time 1440 3. Switch to the Group tab, create group ‘Manager’ and add member ‘Victor’ to it on the following figure. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 174
5. Create two more group ‘Engineer1’ and Engineer2’ to and add ‘Peter’ and ‘John’ in similarly. Step2. Create schedule object 1. Go to menu Object > Schedule, click the “+” from the Recurring schedule to create a new schedule as following figures. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 175
3. Choose the application to define further setting. In Instant Messenger and Peer-to-Peer category, there are several applications allowed to be configured. We take ‘MSN’ for example. Click the modify icon to get to the further configuration. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 176
6. Choose access ‘Drop’, then the action in the exception policy will change to ‘Forward’ automatically. 7. Click ‘+’ to add two exception rules for 2 groups, Engineer2 and Manager, as on the figure shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 177
[14] no schedule [15] user Manager [16] source LAN_SUBNET [17] no destination [18] no log [19] exit Step4. Configuration of the Policy Route 1. Got to menu Configuration > Policy > Route All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 178
Enter the maximum bandwidth 100Kbps. 4. Press the OK button to complete the setting. Corresponding CLI commands for your reference [0] policy 1 [1] no deactivate [2] description IM_access_by_Engineer2 [3] user Engineer2 [4] no interface All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 179
2. Then create an IDP profile by going to the menu Policy > IDP > Profile tab > Packet inspection tab. 3. Name it as ‘IM_P2P’ and enable IM and P2P from application list. 4. Click Ok button then. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 180
ZyWALL 1050 Support Notes 5. Back to IDP > General, choose the IDP profile we just created for WAN zone as on the figure below. 6. Enable it and click Apply button then. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 181
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
We recommend that Wireless AP must be isolated from your Intranet. Also, there must be a mechanism to centrally manage access privileges and access credentials regardless of whether the clients are wired or wireless. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 183
Interface name is vlan10 (same as the vlan tag id for its not being confusing). Choose ‘ge5’ for physical port interface that we want to bind with. Virtual VLAN Tag is 10. Give it a clear description. Use the fixed IP address with 192.168.10.1/24. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 184
ZyWALL 1050 Support Notes Leave other fields as default and press ‘ok’ button Step2. Define WLAN zones Go to menu Network > Zone. Define a zone for wireless and bind it to interface “vlan10”. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 185
2. Go to menu User/Group > Setting > Force User Authentication Policy, click ‘+’ to force all the packets from wireless network to be redirected to the authentication page. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 186
ZyWALL 1050 Support Notes Step4. Configure the LDAP server information. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 187
2. Co-work with LDAP server admin to create user/groups with lease time / re-authentication time attributes configured. 3. Go to menu User/Group > User, configure user “ldap-users” for “non-employees” by clicking the modify icon. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 189
3. Go to menu System > WWW, make sure the authentication method is the profile we just modified. (That is, if I just have created another profile which is not named as ‘default’, then here we have to choose it.) All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 190
1. Go to menu Network > Firewall 2. Enable firewall and choose from the zone “Wireless_Zone” that we just created and to each zone. Here we configure to zone “WAN” first. 3. Click ‘+’ to add rules. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 191
4. Configure a rule to allow employee access from the source “wireless network” to “any” in WAN. Corresponding CLI commands for your reference [0] firewall 8 [1] no schedule [2] user ldap-employee [3] sourceip Wireless [4] no destinationip All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 192
6. After this, you will see the results as on the figure below. Click Apply button. Corresponding CLI commands for your reference [0] firewall activate [1] no firewall asymmetrical-route activate [2] firewall 8 [3] activate [4] exit [5] firewall 9 [6] activate [7] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 193
ZyWALL 1050 Support Notes 7. Continue to configure WLAN-to-LAN, WLAN-to-DMZ, WLAN-to-WLAN. Those are accessible for employees only. See the following figures. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Regulatory compliance–get rid of porn/violent web contents that may bring legal issues 2.3.2 EIM on ZyWALL 1050 ZyWALL 1050 supports EIM through the following features. Flexible access policy: provides the Enforce Access policy with granularity Always up to date: query dynamically updated URL database...
Page 195
Step1. Make sure the Internet access has been configured well from PC behind ZyWALL 1050. By default, ge2 and ge3 of ZyWALL 1050’s WAN ports will get the IP address from the ISP or the DHCP server in front of ZyWALL 1050. Connect an Ethernet cable to ZyWALL 1050’s...
Page 196
ZyWALL 1050 Support Notes ge2 or ge3 and on the GUI Home page check whether ZyWALL 1050 gets the IP address. Make sure ZyWALL 1050 can access the Internet using CLI commands via console or telnet. See the example shown below.
Page 197
ZyWALL 1050 Support Notes Step2. Login the ZyWALL 1050’s GUI, Go to menu Registration. Complete the user, product, and Content Filter service registration on myZyXEL.com. Here the Content Filter service enabling by activating the trial period is shown. If you are new to myZyXEL.com registration, choose ‘Create a new user’.
Page 198
Click the modify icon to configure the trusted website list. Switch to Customization tab, enable the web site customization. Add the website, www.zyxel.com for example, to the trusted websites. Click OK button. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 199
Then follow the similar configuration to create another filtering profile for Sales department. For example, we add an extra access restriction to the websites with ActiveX and Cookies features as configured on the figure below. Click OK button. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 200
ZyWALL 1050 Support Notes After it’s done, you will see two profiles as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 201
[13] content-filter profile Sales-profile custom trust www.zyxel.com Step4. Switch to menu Configuration > Object > Address, create two Address Objects to define the IP address range for the Engineer and the Sales department. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 202
[0] content-filter block message The web access is restricted. Please contact with administrator. [1] content-filter policy insert 1 none any Engineer-IP-range Engineer-profile [2] content-filter policy insert 1 none any Sales-IP-range Sales-profile [3] content-filter activate All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 203
ZyWALL 1050 Support Notes Then when Engineers try to surf Interface behind ZyWALL 1050, the HTTP requests will be inspected by the Engineer filter profile whereas Sales’ Internet access will be inspected by the Sales filter profile. For example, if an engineer with PC’s IP address 192.168.1.101 is trying to access http://www.playboy.com, it will return the warning message on the browser.
With transparent firewall, you do not need to change the IP addressing scheme of your existing network topology. What you need to do is to insert ZyWALL 1050 into your existing network environment. Bridge the ports you think that need to be included in this bridge interface.
Page 205
To make this scenario works the follow the configuration steps as stated below: 1) Login the ZyWALL 1050 GUI and setup the ge2 interface for internet connection and manually assign a static IP. The configuration path is ZyWALL 1050 > Configuration >...
Page 206
3) Switch to Configuration > Policy > Route > Policy Route, to modify the default rule there. The default rule is for the Router Mode (NAT Mode). Since we have two different modes co-existing here, we need to make some adjustments to this rule. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 207
[1] no deactivate [2] no description [3] user admin [4] interface ge1 [5] source LAN_SUBNET [6] destination any [7] no schedule [8] service any [9] next-hop interface br1 [10] snat outgoing-interface [11] no bandwidth All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 208
ZyWALL 1050 Support Notes [12] exit Tips for application: Disable the Firewall to test the connectivity. Every time you make a change, don’t forget to click the “apply” button All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 209
To make this scenario work; follow the configuration steps stated below: 1) Login ZyWALL 1050 GUI and setup the ge2 interface for internet connection and manually assign a static IP. Login ZyWALL 1050 GUI and go to Configuration > Network > Interface > Edit > ge2 2) Switch to Configuration >...
Page 210
192.168.1.55 map-type port protocol tcp original-port 80 mapped-port 80 3)Switch to Configuration > Objects > Address, and add a new address object for your Web server. CLI to create an address object [0] address-object WebServer 192.168.1.55 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 211
[8] to LAN [9] log [10] activate [11] description WebServerFW [12] exit Tips for application: Do not forget to place your rule before the default “Deny all” Rule in the WAN-to-LAN direction. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 212
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes 3.2 Zone-based IDP Protection ZyWALL 1050 comes with a state of art Intrusion Detection Protection System (IDP) which can provide comprehensive and easy to use protection against current and emerging threats at both the application and network layer. Using industry recognized state of art detection and prevention techniques;...
Page 214
IDP profiles to them. Here are the steps: 1) Login the ZyWALL 1050 GUI and go to Configuration > Network > Interface > Ethernet. Since we are going to have three intra-networks in our scenario, we will make GE4 and GE5 another two networks for DMZ and LAN2.
Page 215
ZyWALL 1050 Support Notes Tips: You do not need a Gateway here since this interface is directly connected to ZyWALL 1050. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 216
Since we need GE5 for our LAN2 Zone, we will need to remove the interface GE5 from the DMZ Zone. Click the “edit” icon of DMZ Zone and then click on the “remove” icon of the GE5 interface. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 217
6) Put the name “LAN2” and click the “+” icon again to bind the interface to this Zone. Now we only have one interface in this Zone. It is not necessary to care about any Intra-zone traffic. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 218
7) Since GE5 is the only interface left, GE5 will be automatically selected. Finally click “OK” to apply the new setting. 8) Before you apply the IDP profiles, you need to make sure that the IDP Service on your ZyWALL 1050 is licensed. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 219
Each ZyWALL 1050 comes with a 30 days free trial on IDP Service. Just register your ZyWALL 1050 and your ZyWALL 1050 will receive the license automatically. Here a page which is already registered is shown.
Page 221
CLI commands for removing GE5 from the DMZ Zone: [0] zone DMZ [1] block [2] no interface ge4 [3] no interface ge5 [4] interface ge4 [5] exit CLI commands for creating the LAN2 Zone: [0] zone LAN2 [1] no block All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 222
CLI commands for activating the IDP service: [0] idp activate [1] idp zone LAN activate [2] no idp zone WAN activate [3] idp zone DMZ activate [4] no idp zone LAN2 activate All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 is VLAN aware and it supports virtual interface as well. With ZyWALL 1050, you can run a maximum number of thirty two VLANs. As a result, it makes networking partitioning very easy. However, a VLAN-capable L2 switch is required to create the VLAN tags in front of ZyWALL 1050.
Page 224
VLAN virtual interfaces on port 1. These are VLAN10, VLAN 20 and VLAN30. In this scenario, the VLAN aware Switch will need to apply VLAN10, VLAN20 and VLAN30 802.1q tags to the corresponding packets and send all the packets to the ZyWALL 1050 port 1 through a single physical RJ45 cable.
Page 225
ZyWALL 1050 Support Notes 3) By following the above steps you can create another two VLAN interfaces. (VLAN20 and VLAN30). The CLI commands to create the above VLAN10: [0] interface vlan10 All contents copyright (c) 2006 ZyXEL Communications Corporation.
VLANs. To create these zones, please follow the configuration steps as below: 1) Login ZyWALL 1050 GUI and go to Configuration > Network > Zone. Then click the “+” to create a new zone.
Page 227
However, it may not be the one that you have been looking for. Thus, you will need to click on the box of the interface and choose the one that you are looking for. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 228
ZyWALL 1050 Support Notes 4) Finally, click “OK” to apply your settings. 4) Repeat the above steps to create the other two Zones for VLAN20 and VLAN30. All contents copyright (c) 2006 ZyXEL Communications Corporation.
To create those two rules, please follow the configuration steps as stated below: 1) Login the ZyWALL 1050 GUI and go to Configuration > Policy > Firewall. Check “Enable Firewall” to activate your Firewall. Then pick your Zone pairs and click the “+” icon to create a new firewall rule especially for your selected pair.
Page 230
12) It is optional to give this rule a description. If you want to allow anything or block anything, just simply choose “allow” or “deny” as the option of “Access”. Option “Reject” means dropping the packets that match with this rule silently. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 231
Zone to “LAN_VLAN20” Zone. The CLI commands for the above actions: [0] firewall Finance Secret insert 1 [1] no schedule [2] no user [3] no sourceip [4] no destinationip [5] no service [6] action deny All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 232
ZyWALL 1050 Support Notes [7] from Finance [8] to Secret [9] no log [10] activate [11] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
WAN Link. Basically, ZyWALL 1050 can build up to 12 PPPoE WAN links via one single port or having multiple fixed links over four physical ports. Moreover, ZyWALL 1050 supports an easy management feature for all your WAN Links.
Page 234
ZyWALL 1050 Support Notes 1) Login ZyWALL 1050 GUI and go to Configuration > Network > ISP Account. Then click the “+” to create a new account for a PPPoE connection. 2) Now, on the screen, you can give a name to this profile. Select the protocol as PPPoE.
Page 235
PPPoE connections are coming from GE2. Thus, we pick GE2 as our base interface. Pick the account profile that you want to apply for this PPPoE interface. All other remaining settings are either optional or depending on the requirements of your ISP. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 236
7) Now all the PPPoE interfaces are created. And all of them are desired to be added to the WAN Zone as well. Go to Configuration > Network > Zone to click on the modify icon All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 237
9) Now check the box below to pick PPP1 as the Interface to join the WAN Zone. Repeat the above steps to add PPP2 and PPP3 into the WAN Zone as well. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 238
10) Second, we will need to add all three of our PPPoE Interfaces into the WAN Trunk interface. Please go to Configuration > Network > Interface > Trunk 11) Click on the “+” icon to add a new interface into this WAN_Trunk interface. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 239
Bandwidth” here are the values used for reference of the Load Balancing Algorithm. 13) Repeat the above steps until all three PPPoE interfaces are added into this WAN_Trunk interface. Remove the fixed links on GE2 and/GE3 if you want. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 240
[4] compression no [5] idle 0 [6] exit CLI commands to create a PPPoE interface [0] interface ppp1 [1] no shutdown [2] description ISP1 [3] mtu 1492 [4] upstream 1048576 [5] downstream 1048576 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 241
[7] interface ge2 [8] interface ge3 [9] exit CLI commands to add those three PPPoE interfaces into the WAN_Trunk interface [0] interface-group WAN_TRUNK [1] mode trunk [2] algorithm llf [3] no interface ge2 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 242
[4] no interface ge3 [5] no interface aux [6] interface 1 ppp3 [7] interface 2 ppp2 [8] interface 3 ppp1 [9] interface 4 ge2 [10] interface 5 ge3 [11] interface 6 aux passive [12] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
3.4.2 Multiple fixed WAN links Besides multiple PPPoE links, fixed links are also supported on ZyWALL 1050. With ZyWALL 1050, you can have at most 4 fixed links for a WAN. Here is an example with 2 fixed links on GE2, GE3 and GE4.
Page 244
3) Now since GE4 is in the DMZ Zone by default, we will need to release it for us to use. Go to Configuration > Network > Zone and click on the modify icon of DMZ. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 245
5) Next, we will need GE4 to join the WAN Zone in order for us to be able to apply a single WAN policy on ZyWALL 1050. Go to Configuration > Network > Zone and click on the modify icon of WAN Zone.
Page 246
ZyWALL 1050 Support Notes 6) Click the “+” icon again to make the new interface to join this Zone. 7) Since GE4 is the only free interface here, it will be selected automatically. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 247
Configuration > Network > Interface > Trunk and click on to modify the settings of the WAN_Trunk. 9) Click on the “+” icon to add a new interface into this WAN_Trunk interface. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 248
10) Click the box below to switch the interface from GE1 to GE4. Click OK and to complete the setup of this scenario. CLI commands to configure the IP information on GE4: [0] interface ge4 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 249
[4] interface ge5 [5] exit CLI commands to join GE4 to the WAN Zone: [0] zone WAN [1] block [2] no interface ge2 [3] no interface ge3 [4] interface ge4 [5] interface ge2 All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 250
[2] algorithm llf [3] no interface ge2 [4] no interface ge3 [5] no interface aux [6] interface 1 ge4 [7] interface 2 ge2 [8] interface 3 ge3 [9] interface 4 aux passive [10] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 251
ZyWALL 1050. Here is an example. Asdfasdf First of all, we are going to configure three PPPoE links on ZyWALL 1050. Also, we will assign GE2 to connect with the enabled DHCP Client as a Fix link, since DHCP Server is enabled on the E1 Router.
Page 252
3) Since we have three PPPoE links in our scenario, you will need two additional PPPoE accounts here as well. Repeat the above steps to create all the other accounts. Your final PPPoE account summary screen should look like this. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 253
PPPoE connections are coming from GE2. Thus, we pick GE2 as our base interface. Pick the account profile that you want to apply for this PPPoE interface; all other remaining settings are either optional or depending on the requirements of your ISP. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 254
6) Repeat the above steps to create the other two PPPoE Interfaces. Then you should get a screen that looks like this. If you want to connect your PPPoE interface manually, click on the icon below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 255
9) Now check the box below to pick PPP1 as the Interface to join the WAN Zone. Repeat the above steps to add PPP2 and PPP3 into the WAN Zone as well. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 256
10) Second, we will need to add all three of our PPPoE Interfaces into the WAN Trunk interface. Please go to Configuration > Network > Interface > Trunk 11) Click on the “+” icon to add a new interface into this WAN_Trunk interface. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 257
“Passive” here. The “Downstream Bandwidth” and the “Upstream Bandwidth” are the values used for reference of the Load Balancing Algorithm. 13) Repeat the above steps until all the three PPPoE interfaces are added into this WAN_Trunk interface. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 258
[0] account pppoe ISP1 [1] user test1@isp1.com [2] password abcdefg [3] authentication chap-pap [4] compression no [5] idle 0 [6] exit CLI commands to create a PPPoE interface [0] interface ppp1 [1] no shutdown All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 259
CLI commands to add all the PPPoE interfaces into the WAN Zone: [0] zone WAN [1] block [2] no interface ge2 [3] no interface ge3 [4] interface ppp3 [5] interface ppp2 [6] interface ppp1 [7] interface ge2 [8] interface ge3 [9] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 260
[4] no interface ge3 [5] no interface aux [6] interface 1 ppp3 [7] interface 2 ppp2 [8] interface 3 ppp1 [9] interface 4 ge2 [10] interface 5 ge3 [11] interface 6 aux passive [12] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
3.5.1 Priority & Bandwidth management ZyWALL 1050 supports both prioritizing and bandwidth management for outgoing traffic. IT administrator can define bandwidth management policies to ensure quality of running services in their network environment.
Page 262
To fulfill this scenario; please follow the configuration steps as below: 1) By default, ZyWALL 1050 created a WAN Trunk interface for you. Thus, you don’t need to worry about WAN Trunk in this scenario. Now, we will need to create those Bandwidth Management policies for our application.
Page 263
We can assign this policy a relatively high priority (like 100) just in case the bandwidth is not enough at all but SMTP service can still get more bandwidth than the other type of network services. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 264
3) Repeat the above steps to create two more policy routes for “WWW” and “FTP” services. In the policy route you can set their Maximum Bandwidth to 800Kbps and 100Kbps along with a priority value. Below is what you should get so far: All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 265
WAN is 1.5Mbps. Now we already spent 400kbps for SMTP, 800kbps for HTTP, and 100kbps for SMTP. What left over is 200kbps available to us; thus, we can apply it for the remaining traffic, which is our default route. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 266
ZyWALL 1050 Support Notes 5) Modify the values of bandwidth and priority here in the default policy route. Click “OK” to apply. 6) Now the final list should look like the one below: All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 267
[9] next-hop trunk WAN_TRUNK [10] snat outgoing-interface [11] bandwidth 400 priority 100 [12] exit CLI commands for applying bandwidth and priority to the default policy route: [0] policy 4 (the number of your default policy) All contents copyright (c) 2006 ZyXEL Communications Corporation.
Page 268
[3] no user [4] interface ge1 [5] source LAN_SUBNET [6] destination any [7] no schedule [8] service any [9] next-hop trunk WAN_TRUNK [10] snat outgoing-interface [11] bandwidth 200 priority 1024 [12] exit All contents copyright (c) 2006 ZyXEL Communications Corporation.
A01. How can I connect to ZyWALL 1050 to perform administrator’s tasks? You can connect your PC to ZyWALL 1050 port 1 interface with Ethernet cable, which is most left Ethernet port. You will get the IP address automatically from DHCP by default. Connect to http://192.168.1.1...
Page 270
Control” configuration table is for controlling user login with access user-type to perform user access task including User and Guest. A04. Why ZyWALL 1050 redirects me to the login page when I am performing the All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 Support Notes management tasks in GUI? There may be several reasons for ZyWALL 1050 to redirect you to login page when you are doing configuration. 1. Admin user’s re-auth time (force re-login time) has reached. The default time value is 24hours.
Page 272
Set the transfer mode to binary (use “bin” in the Windows command prompt). (4). Reload the firmware. (ex. use command “put 1.00(XL.1)C0.bin” to upload firmware file) (5). Wait the FTP uploading completed and it will restart the ZyWALL 1050 automatically. All contents copyright (c) 2006 ZyXEL Communications Corporation.
No. The device and service registration information are NOT stored in flash which is temporary memory. So it will not be erased after ZyWALL 1050 is reset to system defaults. All contents copyright (c) 2006 ZyXEL Communications Corporation.
C. File Manager FAQ C01. How can ZyWALL 1050 manage multiple configuration files? From ZyWALL 1050 GUI menu File Manager > Configuration File, it allows admin to save multiple configuration files. Besides, Admin could “manipulate” files, such as to upload, delete, copy, rename, download the files, and apply a certain file to hot-switching the configuration without hardware reboot.
Other settings do not change. C05. How to write a shell script? You can edit shell scripts in a text editor and upload them to the ZyWALL 1050 through GUI menu File manager > Shell Script tab. Some notes as followings.
D01. Why does ZyWALL 1050 use objects? ZyWALL 1050 objects include address, service, schedule, authentication method, certificate, zone, interface group and ISP account objects. The ZyWALL 1050 uses objects as a basic configuration block. It can simplify the configuration change once your have some change in the network topology.
LAN PCs. So make sure all the interfaces that provide DNS server don’t go down because of link down, ping-check or All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL will try to maintain connectivity. E06. What is the port grouping used for in ZyWALL 1050? We can group two or more ports (up to five) together to form up a port grouping. For example, we group port1 and port2 together and the representative port is port1.
IPsec tunnel, you need to select “VPN tunnel”. Please note that the policy routes will be matched in order. If the first route matches the criteria, ZyWALL 1050 will use the route setting to direct the traffic to the next hop.
3. Main table, which includes routes learned from RIP/OSPF, static routes and default routes. F05. Why can’t ZyWALL 1050 ping to the Internet host, but PC from LAN side can browse internet WWW? This is mainly caused by your interface configuration. If you setup two WAN interfaces, which have gateway IP address configured, the default route will have two entries added in ZyWALL 1050.
ZyWALL 1050 Support Notes interface, ZyWALL 1050 will select this as default route and traffic can’t go out from the ZyWALL 1050. F06. Why can’t I ping to the, Internet, after I shutdown the primary WAN interface? ZyWALL 1050 routes packets by checking session information first. Once packet matched a session that is already created, it would not lookup the routing table.
F10. Why can’t ZyWALL learn the route from RIP and/or OSPF? ZyWALL blocks RIP/OSPF routing advertisement from WAN/DMZ by default. If you find that it fails to learn the routes, check your firewall to-ZyWALL rules. All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 1050 VPN traffic is the route base VPN, this means we need to configure a policy route rule to guide the ZyWALL 1050 how to route the VPN traffic to the VPN remote subnet. We can check if our VPN parameter setting is working by clicking connect icon after VPN tunnel has configured in both gateway.
ZyWALL 1050 Support Notes We need a policy route to notify the ZyWALL 1050 send the packet to VPN tunnel when the packet’s destination address is VPN remote subnet. Please switch to ZyWALL 1050 GUI > Configuration > Policy > Route > Policy Route and check if there is a rule that direct the traffic to VPN tunnel.
If the traffic doesn't match the policy and the policy enforcement is active, it will be dropped by the VPN. For Inbound traffic SNAT/DNAT, check if there is a directly connected subnet or a route rule to the destination. All contents copyright (c) 2006 ZyXEL Communications Corporation.
H03. Can I have access control rules to the device in firewall? If your ZYWALL 1050 image is older than b6, the answer is No. Firewall only affects the forwarded traffic. You need to set the access control rules in system for each service such as DNS, ICMP, WWW, SSH, TELNET, FTP and SNMP.
OSI layer 7, regardless of the port numbers. I02. What applications can the Application Patrol function inspect? The Application Patrol on ZyWALL 1050 supports four categories of application protocols at the time of writing. 1. General protocols -- HTTP, FTP, SMTP, POP3 and IRC.
Page 288
To use Port-based option, it could help: (1) Provide a clear port lists which is pre-defined in ZyWALL 1050. For example, it could help user to know the eDonkey service is defined the take action on port 4661 ~ 4665 as shown below.
Page 289
ZyWALL 1050 Support Notes All contents copyright (c) 2006 ZyXEL Communications Corporation.
GUI showing “wait data timeout”. This is because GUI can’t get the IDP module setting result for a period of time, even if the configuration of ZyWALL 1050 is correct. J03. When I want to configure the packet inspection (signatures), the GUI becomes very slow.
IDP? Please ensure to activate the “protected zone” you would like to protect and configure the action for attack of the “protected zone” in the related IDP profile is others than “none”. All contents copyright (c) 2006 ZyXEL Communications Corporation.
MSN messenger wants to access are not in the trusted website, access would be blocked. If you really want this option enabled, you have to add these websites in the trusted websites list. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Backup device is online. And Master can always preempt any Backup. L02. What is the password in Synchronization? If the Backup wants to synchronize the configuration from Master, both Master and Backup device must be set the same password. All contents copyright (c) 2006 ZyXEL Communications Corporation.
M01. What is the difference between user and guest account? Both “user” and “guest” are accounts for network access. But the difference is that “user” account can login ZyWALL 1050 via telnet/SSH to view limited personal information. M02. What is the “re-authentication time” and “lease time”? For security reasons, administrators and accessing users are required to authenticate themselves after a period of time.
AAA stands for Authentication/Authorization/Accounting. AAA is a model for access control and also a basis for user-aware device. A user-aware device like ZyWALL 1050 could use authentication method to authenticate a user (to prove who the user is) and give the user proper authority (defining what the user is allowed and not allowed to do) by authorization method.
Page 296
ZyWALL 1050 Support Notes Configuration > User/Group > User tab as below. The default lease time and re-authentication time of ldap-users and radius-users are 1440 minutes. See the flow as shown below. All contents copyright (c) 2006 ZyXEL Communications Corporation.
N02. After I have all the required field filled. Why can’t I receive the log mail? E-mail server may reject the event/alert mail delivering due to many reasons. Please enable system debug log and find out why the e-mail server refused to receive the mail. All contents copyright (c) 2006 ZyXEL Communications Corporation.
O04. Why cannot I see the connections from/to ZyWALL itself? In Session module, only the forwarding traffic will be listed The forwarding traffic means the traffic going through ZyWALL. Therefore, the broadcast traffic in the bridge interface will be listed. All contents copyright (c) 2006 ZyXEL Communications Corporation.
Need help?
Do you have a question about the ZYWALL 1050 and is the answer not in the manual?
Questions and answers