ZyXEL Communications ZyWALL USG 300 User Manual page 357

Unified security gateway
Hide thumbs Also See for ZyWALL USG 300:
Table of Contents

Advertisement

The VPN wizard automatically creates a corresponding policy route. If you create
the VPN connection in the VPN > IPSec VPN screens, you need to manually
create a corresponding policy route.
Figure 236 VPN > IPSec VPN > VPN Connection
Each field is discussed in the following table. See
Section 21.2.1 on page 358
Table 112 VPN > IPSec VPN > VPN Connection
LABEL
Use Policy
Route to
control
dynamic
IPSec rules
Ignore
""Don't
Fragment""
setting in
packet header
Total
Connection
connection
per page
Page x of x
#
Name
VPN Gateway
Encapsulation
Algorithm
ZyWALL USG 300 User's Guide
for more information.
DESCRIPTION
Leave this cleared to have the ZyWALL automatically obtain source and
destination addresses for dynamic IPSec rules. When you leave this
option's check box cleared, you do not need to configure policy routes for
the dynamic IPSec tunnels.
Only select this if you want to use policy routes to manually specify the
destination addresses of dynamic IPSec rules. You must configure a policy
route for each dynamic IPSec tunnel.
Select this to fragment packets larger than the MTU (Maximum
Transmission Unit) that have the "don't" fragment" bit in the header
turned on. When you clear this the ZyWALL drops packets larger than the
MTU that have the "don't" fragment" bit in the header turned on.
This field displays the total number of VPN connection policies.
Select how many entries you want to display on each page.
This is the number of the page of entries currently displayed and the total
number of pages of entries. Type a page number to go to or use the
arrows to navigate the pages of entries.
This field is a sequential value, and it is not associated with a specific
connection.
This field displays the name of the IPSec SA.
This field displays the associated VPN gateway(s). If there is no VPN
gateway, this field displays "manual key".
This field displays what encapsulation the IPSec SA uses.
This field displays what encryption and authentication methods,
respectively, the IPSec SA uses.
Chapter 21 IPSec VPN
Section 21.2.2 on page 365
and
357

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents