Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
Unified Security Gateway ZyWALL 1000
ZyXEL Communications Unified Security Gateway ZyWALL 1000 Manuals
Manuals and User Guides for ZyXEL Communications Unified Security Gateway ZyWALL 1000. We have
2
ZyXEL Communications Unified Security Gateway ZyWALL 1000 manuals available for free PDF download: User Manual, Brochure
ZyXEL Communications Unified Security Gateway ZyWALL 1000 User Manual (780 pages)
Unified Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 22 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Syntax Conventions
5
Warnings and Notes
5
Safety Warnings
7
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
31
List of Tables
43
Introduction
51
PART I Introduction
51
Chapter 1 Introducing the Zywall
53
Overview and Key Default Settings
53
Front Panel Leds
53
Figure 1 Zywall USG 1000 Front Panel
53
Management Overview
54
Figure 2 Managing the Zywall: Web Configurator
54
Table 1 Front Panel Leds
54
Starting and Stopping the Zywall
55
Table 2 Managing the Zywall: Console Port
55
Table 3 Starting and Stopping the Zywall
55
Features
57
High Availability
57
Chapter 2 Features and Applications
57
Packet Flow
58
Table 4 Packet Flow Key
58
Interface to Interface (from VPN Tunnel)
59
Interface to Interface (through Zywall)
59
Interface to Interface (to VPN Tunnel)
59
Interface to Interface (To/From Zywall)
59
Applications
60
VPN Connectivity
60
Figure 3 Applications: VPN Connectivity
60
SSL VPN Network Access
60
Reverse Proxy Mode
60
User-Aware Access Control
61
Figure 4 Network Access Mode: Reverse Proxy
61
Figure 5 Network Access Mode: Full Tunnel Mode
61
Multiple WAN Interfaces
62
Device HA
62
Figure 6 Applications: User-Aware Access Control
62
Figure 7 Applications: Multiple WAN Interfaces
62
Figure 8 Applications: Device HA
63
Web Configurator
65
Chapter 3 Web Configurator
65
Web Configurator Requirements
65
Web Configurator Access
65
Figure 9 Login Screen
66
Figure 10 Update Admin Info Screen
66
Web Configurator Main Screen
67
Title Bar
67
Figure 11 Main Screen
67
Navigation Panel
68
Table 5 Title Bar: Web Configurator Icons
68
Table 6 Navigation Panel Summary
68
Main Window
71
Message Bar
72
Figure 12 Message Bar
72
Figure 13 Warning Messages
72
CLI Messages
72
Figure 14 CLI Messages
73
Wizard Setup
75
Chapter 4 Wizard Setup
75
Wizard Setup Overview
75
Installation Setup, One ISP
76
Figure 15 Wizard Setup Welcome
76
Step 1 Internet Access
77
Figure 16 Internet Access: Step 1
77
Table 7 Internet Access: Step 1
77
Ethernet: Auto IP Address Assignment
78
Ethernet: Static IP Address Assignment
78
Figure 17 Ethernet Encapsulation: Auto: Finish
78
Figure 18 Ethernet Encapsulation: Static
79
Table 8 Ethernet Encapsulation: Static
79
Figure 19 Ethernet Encapsulation: Static: Finish
80
Step 2 Internet Access Ethernet
80
Figure 20 Pppoe Encapsulation: Auto
81
Pppoe: Auto IP Address Assignment
81
Table 9 Pppoe Encapsulation: Auto
81
Figure 21 Pppoe Encapsulation: Auto: Finish
82
Pppoe: Static IP Address Assignment
82
Figure 22 Pppoe Encapsulation: Static
83
Table 10 Pppoe Encapsulation: Static
83
ISP Parameters
84
Step 2 Internet Access Pppoe
84
WAN IP Address Assignments
84
Figure 23 Pppoe Encapsulation: Static: Finish
85
PPTP: Auto IP Address Assignment
85
Figure 24 PPTP Encapsulation: Auto
86
Table 11 PPTP Encapsulation: Auto
86
Figure 25 PPTP Encapsulation: Auto: Finish
87
Figure 26 PPTP Encapsulation: Static
88
PPTP: Static IP Address Assignment
88
Table 12 PPTP Encapsulation: Static
88
Step 2 Internet Access PPTP
89
Figure 27 PPTP Encapsulation: Static: Finish
90
PPTP Configuration
90
Device Registration
91
Step 4 Internet Access - Finish
91
Figure 28 Registration
92
Table 13 Registration
92
Figure 29 Registration: Registered Device
93
Installation Setup, Two Internet Service Providers
93
Figure 30 Internet Access: Step 1: First WAN Interface
94
Figure 31 Internet Access: Step 3: Second WAN Interface
94
Internet Access Wizard Setup Complete
95
Figure 32 Internet Access: Finish
95
VPN Setup
95
Figure 33 VPN Wizard: Wizard Type
96
Table 14 VPN Wizard: Step 1: Wizard Type
96
VPN Express Wizard
97
VPN Wizards
96
Figure 34 VPN Express Wizard: Step 2
97
Table 15 VPN Express Wizard: Step 2
97
VPN Express Wizard - Remote Gateway
97
Figure 35 VPN Express Wizard: Step 3
98
Table 16 VPN Express Wizard: Step 3
98
Figure 36 VPN Express Wizard: Step 4
99
VPN Express Wizard - Policy Setting
99
Figure 37 VPN Express Wizard: Step 6
100
Table 17 VPN Express Wizard: Step 4
100
VPN Express Wizard - Summary
100
VPN Advanced Wizard
101
VPN Express Wizard - Finish
101
Figure 38 VPN Advanced Wizard: Step 2
102
Phase 1 Setting
103
Table 18 VPN Advanced Wizard: Step 2
103
VPN Advanced Wizard - Remote Gateway
103
Figure 39 VPN Advanced Wizard: Step 3
104
Table 19 VPN Advanced Wizard: Step 3
105
VPN Advanced Wizard - Phase 1
105
Figure 40 VPN Advanced Wizard: Step 4
106
Phase 2 Setting
106
Table 20 VPN Advanced Wizard: Step 4
107
VPN Advanced Wizard - Phase 2
107
Figure 41 VPN Advanced Wizard: Step 5
108
Table 21 VPN Advanced Wizard: Step 5
108
VPN Advanced Wizard - Summary
108
Figure 42 VPN Wizard: Step 6: Advanced
109
VPN Advanced Wizard - Finish
109
Chapter 5 Configuration Basics
111
Granular Configuration
111
Terminology in the Zywall
112
Physical Ports, Interfaces, and Zones
112
Table 22 Zywall Terminology that Is Different than Zynos
112
Table 23 Zywall Terminology that Might be Different than Other Products
112
Table 24 NAT: Differences between the Zywall and Zynos
112
Table 25 Bandwidth Management: Differences between the Zywall and Zynos
112
Table 26 Physical Ports, Interfaces, and Zones
112
Network Topology Example
113
Feature Configuration Overview
114
Feature
114
Figure 43 Interfaces and Zones: Example
114
Interface
115
Trunks
115
Ipsec VPN
116
Ssl Vpn
116
L2Tp Vpn
116
Zones
116
Device HA
117
Ddns
117
Policy Routes
117
Static Routes
118
Firewall
118
Application Patrol
119
Anti-Virus
120
Idp
120
Adp
120
Content Filter
120
Virtual Server (Port Forwarding)
121
HTTP Redirect
121
Alg
122
Objects
122
User/Group
122
Table 27 Objects
122
Table 28 User Types
122
System Management and Maintenance
123
DNS, WWW, SSH, TELNET, FTP, SNMP, Dial-In Mgmt, Vantage CNM
123
File Manager
124
Licensing Registration
124
Licensing Update
124
Logs and Reports
124
Diagnostics
124
Tutorials
125
Chapter 6 Tutorials
125
Interfaces and Zones
125
Set up Port Grouping
125
Table 29 Interfaces and Zones Example
125
Figure 44 Network > Interface > Port Grouping, Initial
126
Figure 45 Network > Interface > Port Grouping, Drag-And-Drop
126
Set up Ethernet Interfaces
127
Figure 46 Status: Interface Status Summary after Port Grouping
127
Figure 47 Network > Interface > Ethernet, Initial
127
Table 30 Ethernet Interfaces Example
127
Figure 48 Network > Interface > Ethernet > Ge4
128
Figure 49 Network > Interface > Ethernet > Ge5 > IP Address Assignment
128
Figure 50 Network > Interface > Ethernet > Ge5 > DHCP Setting
128
WAN Trunk
129
Figure 51 Status > Interface Status Summary, after Ethernet Interface Edits
129
Figure 52 Network > Interface > Trunk, Initial
129
Figure 53 Network > Interface > Trunk > Edit, Initial
129
Table 31 Trunk Example
129
Zones
130
Figure 54 Network > Interface > Trunk > Edit > Member
130
Figure 55 Network > Zone, Initial
130
Table 32 Zones Example
130
Figure 56 Network > Zone > DMZ, Remove Ge4
131
Figure 57 Network > Zone > WAN, Add Ge4
131
Figure 58 Status: Interface Status Summary after Zone Edits
131
Ipsec VPN
132
Set up the Ethernet Interfaces and Zones
132
Set up the VPN Gateway
132
Figure 59 VPN Example
132
Set up the VPN Connection
133
Figure 60 VPN > Ipsec VPN > VPN Gateway > Add
133
Figure 61 Object > Address > Address > Add
133
Set up the Policy Route for the VPN Tunnel
134
Figure 62 VPN > Ipsec VPN > VPN Connection > Add
134
Figure 63 Network > Routing > Policy Route
134
Set up the Zone for the VPN Tunnel
135
Figure 64 Network > Routing > Policy Route > Add
135
Figure 65 Network > Zone > Add
135
Device HA
136
Set up DNS for the Virtual Router
136
Set up the VRRP Groups on the Master
136
Figure 66 Device HA Example
136
Figure 67 Device HA > VRRP Group > Add: Ge1
137
Figure 68 Status: Interface Status Summary: Device HA Master Configured
137
Set up the Password for Synchronization
138
Figure 69 Network > Device HA > VRRP Group > Add: Ge4
138
Figure 70 Device HA > Synchronize
138
Finish Configuring the Master
139
Set up the Ethernet Interfaces on the Backup
139
Set up the VRRP Groups on the Backup
139
Figure 71 Device HA > VRRP Group > Add
139
Figure 72 Status: Interface Status Summary
139
Synchronize the Backup
140
User-Aware Access Control
140
Figure 73 Device HA > Synchronize
140
Table 33 User-Aware Access Control Example
140
Figure 74 User/Group > User > Add
141
Figure 75 User/Group > Group > Add
141
Set up User Accounts
141
Set up User Groups
141
Figure 76 Object > AAA Server > RADIUS > Default
142
Figure 77 Object > Auth. Method > Add
142
Figure 78 System > WWW > Authentication
142
Set up User Authentication Using the RADIUS Server
142
Figure 79 Object > User/Group > Setting > Add (Force User Authentication Policy)
143
Figure 80 Apppatrol > Http
143
Set up Web Surfing Policies with Bandwidth Restrictions
143
Figure 81 Apppatrol > Http > Edit Default
144
Figure 82 Apppatrol > Http > Edit Default
144
Set up MSN Policies
144
Figure 83 Object > Schedule > Recurring > Add
145
Figure 84 Firewall > LAN > DMZ > Edit
145
Set up LAN-To-DMZ Policies
145
Trunks
146
Set up Available Bandwidth on Ethernet Interfaces
146
Figure 85 Firewall > LAN > DMZ > Add
146
Figure 86 Trunk Example
146
Change WAN Trunk Algorithm
147
NAT 1:1 Example
147
Figure 87 Network > Interface > Ethernet > Edit > Ge2
147
Figure 88 Network > Interface > Trunk > WAN_TRUNK > Edit
147
Figure 89 NAT 1:1 Example Network Topology
148
Figure 90 Create Address Objects
148
Figure 91 Address Objects
148
NAT 1:1 Address Objects
148
Figure 92 NAT 1:1 Example Virtual Server
149
Figure 93 Create a Virtual Server
149
NAT 1:1 Policy Route
149
NAT 1:1 Virtual Server
149
Figure 94 NAT 1:1 Example Policy Route
150
Figure 95 Create a Policy Route
150
NAT 1:1 Firewall Rule
150
NAT Loopback
151
Figure 96 Create a Firewall Rule
151
Figure 97 LAN Computer Queries the DNS Server
151
Figure 98 NAT Loopback Virtual Server
152
Figure 99 Create a Virtual Server
152
NAT Loopback Virtual Server
152
Figure 100 Triangle Route
153
Figure 101 NAT Loopback Policy Route
153
NAT Loopback Policy Route
153
Figure 102 Create a Policy Route
154
Figure 103 NAT Loopback Successful
154
Service Control and the Firewall
155
Allowing HTTPS Administrator Access Only from the LAN
155
Figure 104 System > WWW
155
Figure 105 System > WWW > Service Control Rule Edit
156
Figure 106 System > WWW
156
Status
157
Chapter 7 Status
157
Status Screen
157
Figure 107 Status
157
Table 34 Status
158
VPN Status
160
DHCP Table
161
Figure 108 Status > VPN Status
161
Table 35 Status > VPN Status
161
Port Statistics
162
Figure 109 Status > DHCP Table
162
Table 36 Status > DHCP Table
162
Current Users
163
Figure 110 Status > Port Statistics
163
Table 37 Status > Port Statistics
163
Figure 111 Status > Current Users
164
Table 38 Status > Current Users
164
Registration
165
Chapter 8 Registration
165
Myzyxel.com Overview
165
Subscription Services Available on the Zywall
165
Registration
166
Figure 112 Licensing > Registration
166
Table 39 Licensing > Registration
167
Service
168
Figure 113 Licensing > Registration: Registered Device
168
Figure 114 Licensing > Registration > Service
168
Table 40 Licensing > Registration > Service
168
Update
171
Chapter 9 Update
171
Updating Anti-Virus Signatures
171
Figure 115 Licensing > Update >Anti-Virus
172
Updating IDP and Application Patrol Signatures
173
Figure 116 Licensing > Update > Idp/Apppatrol
173
Table 41 Licensing > Update > Idp/Apppatrol
173
Figure 117 Downloading IDP Signatures
174
Figure 118 Successful IDP Signature Download
174
Updating System Protect Signatures
175
Figure 119 Licensing > Update > System Protect
175
Table 42 Licensing > Update > System Protect
175
Figure 120 Downloading System Protect Signatures
176
Figure 121 Successful System Protect Signature Download
176
Network
177
Part II: Network
177
Interface
179
Chapter 10 Interface
179
Interface Overview
179
Types of Interfaces
179
IP Address Assignment
180
Table 43 Ethernet, VLAN, Bridge, Pppoe/Pptp, and Virtual Interfaces Characteristics
180
Figure 122 Example: Entry in the Routing Table Derived from Interfaces
181
Table 44 Example: Routing Table Entries for Interfaces
181
Table 45 Example: Routing Table Entry for a Gateway
181
Interface Parameters
182
DHCP Settings
182
Table 46 Example: Assigning IP Addresses from a Pool
182
Wins
183
Ping Check Settings
183
Relationships between Interfaces
184
Ethernet Interfaces
184
Ethernet Interfaces Overview
184
Table 47 Relationships between Different Types of Interfaces
184
Interface Summary Screen
185
Figure 123 Network > Interface > Interface Summary
186
Table 48 Network > Interface > Interface Summary
186
Ethernet Summary Screen
188
Figure 124 Network > Interface > Ethernet
188
Ethernet Edit
189
Table 49 Network > Interface > Ethernet
189
Figure 125 Network > Interface > Ethernet > Edit
190
Table 50 Network > Interface > Ethernet > Edit
191
Port Grouping
194
Port Grouping Overview
194
Figure 126 Network > Interface > Ethernet > Edit > Edit Static DHCP Table
194
Port Grouping Screen
195
Figure 127 Port Grouping Example: Network
195
Figure 128 Port Grouping Example: Screen
195
VLAN Interfaces
196
VLAN Overview
196
Figure 129 Network > Interface > Port Grouping
196
Table 51 Network > Interface > Port Grouping
196
Figure 130 Example: before VLAN
197
Figure 131 Example: after VLAN
197
VLAN Interfaces Overview
198
VLAN Summary Screen
198
Figure 132 Network > Interface > VLAN
198
Table 52 Network > Interface > VLAN
198
VLAN Add/Edit
199
Figure 133 Network > Interface > VLAN > Edit
200
Table 53 Network > Interface > VLAN > Edit
201
Bridge Interfaces
203
Figure 134 Network > Interface > Edit > Edit Static DHCP Table
203
Bridge Overview
204
Table 54 Example: Bridge Table after Computer a Sends a Packet to Computer B
204
Table 55 Example: Bridge Table after Computer B Responds to Computer a
204
Bridge Interface Overview
205
Bridge Summary
205
Figure 135 Network > Interface > Bridge
205
Table 56 Example: Routing Table before and after Bridge Interface Br0 Is Created
205
Table 57 Network > Interface > Bridge
205
Bridge Add/Edit
206
Figure 136 Network > Interface > Bridge > Edit
207
Table 58 Network > Interface > Bridge > Edit
208
Pppoe/Pptp Interfaces
210
Pppoe/Pptp Overview
210
Figure 137 Network > Interface > Edit > Edit Static DHCP Table
210
Pppoe/Pptp Interfaces Overview
211
Figure 138 Example: Pppoe/Pptp Interfaces
211
Pppoe/Pptp Interface Summary
212
Figure 139 Network > Interface > Pppoe/Pptp
212
Table 59 Network > Interface > Pppoe/Pptp
212
Pppoe/Pptp Interface Add/Edit
213
Figure 140 Network > Interface > Pppoe/Pptp > Edit
213
Table 60 Network > Interface > Pppoe/Pptp > Edit
214
Auxiliary Interface
215
Auxiliary Interface Overview
215
Auxiliary
215
Figure 141 Network > Interface > Auxiliary
216
Table 61 Network > Interface > Auxiliary
216
Virtual Interfaces
217
Virtual Interfaces Add/Edit
217
Figure 142 Network > Interface > Add
218
Table 62 Network > Interface > Add
218
Trunks
219
Chapter 11 Trunks
219
Trunks Overview
219
Trunk Scenario Examples
219
Load Balancing Introduction
219
Load Balancing Algorithms
220
Least Load First
220
Figure 143 Least Load First Example 1
220
Table 63 Least Load First: Example 1
220
Weighted Round Robin
221
Spillover
221
Figure 144 Weighted Round Robin Algorithm Example
221
Trunk Summary
222
Configuring a Trunk
222
Figure 145 Spillover Algorithm Example
222
Figure 146 Network > Interface > Trunk
222
Table 64 Network > Interface > Trunk
222
Figure 147 Network > Interface > Trunk > Edit
223
Table 65 Network > Interface > Trunk > Edit
223
Chapter 12 Policy and Static Routes
225
Policy Route
225
Benefits
225
Routing Policy
225
NAT and SNAT
226
Port Triggering
226
Maximize Bandwidth Usage
227
Reserving Bandwidth for Non-Bandwidth Class Traffic
227
IP Routing Policy Setup
227
Figure 148 Trigger Port Forwarding Example
227
Figure 149 Network > Routing > Policy Route
228
Table 66 Network > Routing > Policy Route
228
Policy Route Edit
229
Figure 150 Network > Routing > Policy Route > Edit
230
Table 67 Network > Routing > Policy Route > Edit
230
IP Static Routes
232
Figure 151 Example of Static Routing Topology
232
Static Route Summary
233
Edit a Static Route
233
Figure 152 Network > Routing > Static Route
233
Figure 153 Network > Routing > Static Route > Edit
233
Table 68 Network > Routing > Static Route
233
Table 69 Network > Routing > Static Route > Edit
234
Routing Protocols
235
Chapter 13 Routing Protocols
235
Routing Protocols Overview
235
RIP Overview
235
Table 70 OSPF Vs. RIP
235
Authentication Types
236
RIP Screen
236
OSPF Overview
237
Figure 154 Network > Routing > RIP
237
Table 71 Network > Routing Protocol > RIP
237
Figure 155 OSPF: Types of Areas
238
OSPF Areas
238
OSPF Routers
239
Table 72 OSPF: Redistribution from Other Sources to each Type of Area
239
Figure 156 OSPF: Types of Routers
240
Figure 157 OSPF: Virtual Link
240
OSPF Configuration
240
Virtual Links
240
OSPF Screens
241
OSPF Summary
241
Figure 158 Network > Routing > OSPF
241
Table 73 Network > Routing Protocol > OSPF
241
OSPF Area Add/Edit
242
Figure 159 Network > Routing > OSPF > Edit
243
Table 74 Network > Routing > OSPF > Edit
243
Zones
245
Chapter 14 Zones
245
Zones Overview
245
Effect of Zones on Different Types of Traffic
245
Figure 160 Example: Zones
245
Zone Summary
246
Figure 161 Network > Zone
246
Table 75 Network > Zone
246
Zone Add/Edit
247
Figure 162 Network > Zone > Edit
247
Table 76 Network > Zone > Edit
247
Ddns
249
Chapter 15 DDNS
249
DDNS Overview
249
DYNDNS Wildcard
249
High Availability (HA)
250
Mail Exchanger
250
DDNS Screens
250
DDNS Summary
251
Figure 163 Network > DDNS
251
Table 77 Network > DDNS
251
Dynamic DNS Add/Edit
252
Figure 164 Network > DDNS > Edit
252
Table 78 Network > DDNS > Edit
252
Virtual Servers
255
Chapter 16 Virtual Servers
255
Virtual Server Overview
255
Virtual Server Example
256
Virtual Server Screens
256
Virtual Server Summary Screen
256
Figure 165 Multiple Servers Behind NAT Example
256
Figure 166 Network > Virtual Server
257
Table 79 Network > Virtual Server
257
Figure 167 Network > Virtual Server > Edit
258
Table 80 Network > Virtual Server > Edit
258
Virtual Server Add/Edit
258
HTTP Redirect
261
Chapter 17 HTTP Redirect
261
HTTP Redirect Overview
261
Web Proxy Server
261
HTTP Redirect, Firewall and Policy Route
261
Configuring HTTP Redirect
262
Figure 168 HTTP Redirect Example
262
HTTP Redirect Edit
263
Figure 169 Network > HTTP Redirect
263
Figure 170 Network > HTTP Redirect > Edit
263
Table 81 Network > HTTP Redirect
263
Table 82 Network > HTTP Redirect > Edit
263
Alg
265
Chapter 18 ALG
265
ALG Introduction
265
Application Layer Gateway (ALG) and NAT
265
ALG and Trunks
265
Ftp
266
266
266
Rtp
266
ALG Details
266
Sip
267
Figure 171 H.323 ALG Example
267
Figure 172 SIP ALG Example
267
Peer-To-Peer Calls and the Zywall
268
Voip Calls from the WAN with Multiple Outgoing Calls
268
Voip with Multiple WAN IP Addresses
268
Figure 173 Voip Calls from the WAN with Multiple Outgoing Calls
268
ALG Screen
269
Figure 174 Voip with Multiple WAN IP Addresses
269
Figure 175 Network > ALG
269
Table 83 Network > ALG
270
WAN to LAN SIP Peer-To-Peer Calls Example
271
Figure 176 WAN to LAN H.323 Peer-To-Peer Calls Example
271
Figure 177 Network > Virtual Server > Add
271
Figure 178 Firewall > WAN to LAN
272
Figure 179 Firewall > WAN > LAN > Add
272
Figure 180 Object > Address > Add
272
Figure 181 Firewall > WAN > LAN > Add
273
Firewall and VPN
275
Part III: Firewall and VPN
275
Firewall
277
Chapter 19 Firewall
277
Firewall Overview
277
Figure 182 Default Firewall Action
277
Firewall Rules
278
Rule Directions
278
Table 84 Default Firewall Rules
279
Firewall and VPN Traffic
280
Firewall Rule Example Applications
280
Figure 183 Blocking All LAN to WAN IRC Traffic Example
280
Figure 184 Limited LAN to WAN IRC Traffic Example
281
Table 85 Blocking All LAN to WAN IRC Traffic Example
281
Alerts
282
Asymmetrical Routes
282
Table 86 Limited LAN to WAN IRC Traffic Example 1
282
Table 87 Limited LAN to WAN IRC Traffic Example 2
282
Virtual Interfaces and Asymmetrical Routes
283
Configuring the Firewall
283
Figure 185 Triangle Route: Using Virtual Interfaces
283
Figure 186 Firewall
284
Table 88 Firewall
284
Edit a Firewall Rule
286
Figure 187 Firewall > Edit
286
Table 89 Firewall > Edit
286
Firewall Rule Configuration Example
287
Figure 188 Firewall Example: Select the Traveling Direction of Traffic
288
Figure 189 Firewall Example: Edit a Firewall Rule 1
288
Figure 190 Firewall Example: Create an Address Object
289
Figure 191 Firewall Example: Create a Service Object
289
Figure 192 Firewall Example: Edit a Firewall Rule
289
Figure 193 Firewall Example: Myservice Example Rule in Summary
290
Ipsec VPN
291
Chapter 20 Ipsec VPN
291
Ipsec VPN Overview
291
Figure 194 VPN: Example
291
Figure 195 VPN: IKE SA and Ipsec SA
292
Ipsec SA Overview
292
Figure 196 VPN: Transport and Tunnel Mode Encapsulation
293
Additional Topics for Ipsec SA
294
Figure 197 VPN Example: NAT for Inbound and Outbound Traffic
295
VPN Related Configuration
296
VPN Connection Screens
297
VPN Connection Summary
297
Figure 198 VPN > Ipsec VPN > VPN Connection
297
VPN Connection Add/Edit IKE
298
Table 90 VPN > Ipsec VPN > VPN Connection
298
Figure 199 VPN > Ipsec VPN > VPN Connection > Edit (IKE)
299
Table 91 VPN > Ipsec VPN > VPN Connection > Edit
299
VPN Connection Add/Edit Manual Key
302
Figure 200 VPN > Ipsec VPN > VPN Connection > Manual Key > Edit
303
Table 92 VPN > Ipsec VPN > VPN Connection > Manual Key > Edit
303
VPN Gateway Screens
306
IKE SA Overview
306
Figure 201 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
307
Diffie-Hellman (DH) Key Exchange
308
Figure 202 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
308
Figure 203 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication
309
Additional Topics for IKE SA
310
Table 93 VPN Example: Matching ID Type and Content
310
Table 94 VPN Example: Mismatching ID Type and Content
310
Extended Authentication
311
VPN, NAT, and NAT Traversal
311
Figure 204 VPN/NAT Example
311
VPN Gateway Summary
312
Figure 205 VPN > Ipsec VPN > VPN Gateway
312
Table 95 VPN > Ipsec VPN > VPN Gateway
312
VPN Gateway Add/Edit
313
Figure 206 VPN > Ipsec VPN > VPN Gateway > Edit
314
Table 96 VPN > Ipsec VPN > VPN Gateway > Edit
314
VPN Concentrator
318
Figure 207 VPN Topologies
318
Figure 208 VPN > Ipsec VPN > Concentrator
319
Figure 209 VPN > Ipsec VPN > Concentrator > Edit
319
Table 97 VPN > Ipsec VPN > Concentrator
319
VPN Concentrator Add/Edit
319
VPN Concentrator Summary
319
SA Monitor Screen
320
Figure 210 Network > Ipsec VPN > Concentrator > Edit > Member
320
Table 98 VPN > Ipsec VPN > Concentrator > Edit
320
Figure 211 VPN > Ipsec VPN > SA Monitor
321
Table 99 VPN > Ipsec VPN > SA Monitor
321
Regular Expressions in Searching Ipsec Sas by Name or Policy
322
Ssl Vpn
323
Chapter 21 SSL VPN
323
SSL Access Policy
323
SSL Access Policy Objects
323
SSL Access Policy Limitations
324
SSL Access Privilege List
324
Figure 212 VPN > SSL VPN > Access Privilege
324
Table 101 VPN > SSL VPN > Access Privilege
324
Creating/Editing an SSL Access Policy
325
Figure 213 VPN > SSL VPN > Access Privilege > Add/Edit
325
Table 102 VPN > SSL VPN > Access Privilege > Add/Edit
325
SSL Connection Monitor
326
Configuring SSL Global Setting
327
Figure 214 VPN > SSL VPN > Connection Monitor
327
Table 103 VPN > SSL VPN > Connection Monitor
327
Figure 215 VPN > SSL VPN > Global Setting
328
Table 104 VPN > SSL VPN > Global Setting
328
Uploading a Custom Logo
329
Establishing an SSL VPN Connection
329
Figure 216 Example Logo Graphic Display
329
Figure 217 SSL VPN Client Portal Screen Example
330
SSL User Screens
331
Chapter 22 SSL User Screens
331
Overview
331
Network Resource Access Methods
331
System Requirements
331
Figure 218 Network Example
331
Information You Need
332
Certificates
332
Remote User Login
332
Figure 219 Enter the Address in a Web Browser
332
Figure 220 Login Security Screen
333
Figure 221 Login Screen
333
Figure 222 Secuextender Progress
333
SSL VPN User Screens
334
Figure 223 Remote User Screen
334
Table 105 Remote User Screen Overview
334
Bookmark
335
Logout
335
Figure 224 Add Favorite
335
Figure 225 Logout: Prompt
335
Figure 226 Logout: Connection Termination Progress
335
Chapter 23 SSL User Application Screens
337
Overview
337
The Application Screen
337
Figure 227 Application
337
Chapter 24 SSL User File Sharing Screens
339
Overview
339
Main File Sharing Screen
339
Opening a File or Folder
340
Figure 228 File Sharing
340
Figure 229 File Sharing: Enter Access User Name and Password
340
Downloading a File
341
Figure 230 File Sharing: Open a Word File
341
Saving a File
341
Creating a New Folder
342
Renaming a File or Folder
342
Figure 231 File Sharing: Save a Word File
342
Figure 232 File Sharing: Save a Word File
342
Deleting a File or Folder
343
Figure 233 File Sharing: Rename
343
Figure 234 File Sharing: Rename
343
Figure 235 File Sharing: Delete Prompt
343
Uploading a File
344
Figure 236 File Sharing: File Upload
344
L2Tp Vpn
345
Chapter 25 L2TP VPN
345
L2TP VPN Overview
345
Ipsec Configuration
345
Figure 237 L2TP VPN Overview
345
Using the Default L2TP VPN Connection
346
Policy Route
346
Figure 238 Policy Route for L2TP VPN
346
L2TP VPN Configuration
347
Figure 239 VPN > L2TP VPN
347
Table 106 VPN > Ipsec VPN > VPN Connection
347
L2TP VPN Session Monitor
348
Figure 240 VPN > L2TP VPN > Session Monitor
348
Table 107 VPN > L2TP VPN > Session Monitor
348
L2TP VPN Example
351
Chapter 26 L2TP VPN Example
351
Configuring the Default L2TP VPN Gateway Example
351
Figure 241 L2TP VPN Example
351
Figure 242 VPN > Ipsec VPN > VPN Gateway > Edit
352
Figure 243 VPN > Ipsec VPN > VPN Gateway (Enable)
352
Configuring the Default L2TP VPN Connection Example
353
Figure 244 VPN > Ipsec VPN > VPN Connection > Edit
353
Configuring the L2TP VPN Settings Example
354
Configuring the Policy Route for L2TP Example
354
Figure 245 VPN > Ipsec VPN > VPN Connection (Enable)
354
Figure 246 VPN > L2TP VPN Example
354
Configuring L2TP VPN in Windows XP and 2000
355
Figure 247 Routing > Add: L2TP VPN Example
355
Configuring L2TP in Windows XP
356
Figure 248 New Connection Wizard: Network Connection Type
356
Figure 249 New Connection Wizard: Network Connection
356
Figure 250 New Connection Wizard: Connection Name
357
Figure 251 New Connection Wizard: Public Network
357
Figure 252 New Connection Wizard: VPN Server Selection
358
Figure 253 Connect L2TP to Zywall
358
Figure 254 Connect L2TP to Zywall: Security
359
Figure 255 Connect Zywall L2TP: Security > Advanced
359
Figure 256 L2TP to Zywall Properties > Security
360
Figure 257 L2TP to Zywall Properties > Security > Ipsec Settings
360
Figure 258 L2TP to Zywall Properties: Networking
360
Configuring L2TP in Windows 2000
361
Figure 259 Connect L2TP to Zywall
361
Figure 260 Zywall-L2TP System Tray Icon
361
Figure 261 Zywall-L2TP Status: Details
361
Figure 262 Starting the Registry Editor
362
Figure 263 Registry Key
362
Figure 264 New DWORD Value
362
Figure 265 Prohibitipsec DWORD Value
363
Figure 266 Run MMC
363
Figure 267 Console > Add/Remove Snap-In
363
Figure 268 Add > IP Security Policy Management > Finish
364
Figure 269 Create IP Security Policy
364
Figure 270 IP Security Policy: Name
365
Figure 271 IP Security Policy: Request for Secure Communication
365
Figure 272 IP Security Policy: Completing the IP Security Policy Wizard
365
Figure 273 IP Security Policy Properties > Add
366
Figure 274 IP Security Policy Properties: Tunnel Endpoint
366
Figure 275 IP Security Policy Properties: Network Type
367
Figure 276 IP Security Policy Properties: Authentication Method
367
Figure 277 IP Security Policy Properties: IP Filter List
368
Figure 278 IP Security Policy Properties: IP Filter List > Add
368
Figure 279 Filter Properties: Addressing
369
Figure 280 Filter Properties: Protocol
369
Figure 281 IP Security Policy Properties: IP Filter List
370
Figure 282 IP Security Policy Properties: IP Filter List
370
Figure 283 Console: L2TP to Zywall Assign
370
Figure 284 Start New Connection Wizard
371
Figure 285 New Connection Wizard: Network Connection Type
371
Figure 286 New Connection Wizard: Destination Address
372
Figure 287 New Connection Wizard: Connection Availability
372
Figure 288 New Connection Wizard: Naming the Connection
372
Click Properties
373
Figure 289 Connect L2TP to Zywall
373
Figure 290 Connect L2TP to Zywall: Security
373
Figure 291 Connect L2TP to Zywall: Security > Advanced
374
Figure 292 Connect L2TP to Zywall: Networking
374
Figure 293 Connect L2TP to Zywall
375
Figure 294 Zywall-L2TP System Tray Icon
375
Figure 295 L2TP to Zywall Status: Details
375
Application Patrol & Anti-X
377
Part IV: Application Patrol & Anti-X
377
Chapter 27 Application Patrol
379
Application Patrol Overview
379
Classification of Applications
379
Configurable Application Policies
380
Bandwidth Management
380
Connection and Packet Directions
381
Outbound and Inbound Bandwidth Limits
381
Figure 296 LAN to WAN Connection and Packet Directions
381
Bandwidth Management Priority
382
Maximize Bandwidth Usage
382
Bandwidth Management Behavior
382
Figure 297 LAN to WAN, Outbound 200 Kbps, Inbound 500 Kbps
382
Figure 298 Bandwidth Management Behavior
383
Table 108 Configured Rate Effect
383
Table 109 Priority Effect
383
Table 110 Maximize Bandwidth Usage Effect
383
Application Patrol Bandwidth Management Examples
384
Table 111 Priority and over Allotment of Bandwidth Effect
384
Figure 299 Application Patrol Bandwidth Management Example
385
Setting the Interface's Bandwidth
385
SIP any to WAN Bandwidth Management Example
385
Figure 300 SIP any to WAN Bandwidth Management Example
386
Figure 301 HTTP any to WAN Bandwidth Management Example
386
FTP WAN to DMZ Bandwidth Management Example
386
HTTP any to WAN Bandwidth Management Example
386
SIP WAN to any Bandwidth Management Example
386
Figure 302 FTP WAN to DMZ Bandwidth Management Example
387
Figure 303 FTP LAN to DMZ Bandwidth Management Example
387
FTP LAN to DMZ Bandwidth Management Example
387
Other Applications
388
Application Patrol Screens
388
Application Patrol General
388
Figure 304 Apppatrol > General
389
Table 112 Apppatrol > General
389
Application Patrol Applications
390
Figure 305 Apppatrol > Common
390
Table 113 Apppatrol > Common
390
Application Patrol Edit
391
Figure 306 Application Edit
391
Table 114 Application Edit
391
Application Patrol Policy Edit
393
Figure 307 Application Policy Edit
393
Table 115 Application Policy Edit
393
Other Protocol Screen
395
Figure 308 Apppatrol > Other
395
Table 116 Apppatrol > Other
396
Figure 309 Apppatrol > Other > Edit
397
Other Configuration Add/Edit
397
Table 117 Apppatrol > Other > Edit
397
Application Patrol Statistics
399
Application Patrol Statistics: General Setup
399
Figure 310 Apppatrol > Statistics: General Setup
399
Application Patrol Statistics: Bandwidth Statistics
400
Application Patrol Statistics: Protocol Statistics
400
Figure 311 Apppatrol > Statistics: Bandwidth Statistics
400
Table 118 Apppatrol > Statistics: General Setup
400
Figure 312 Apppatrol > Statistics: Protocol Statistics
401
Table 119 Apppatrol > Statistics: Protocol Statistics
401
Anti-Virus
403
Chapter 28 Anti-Virus
403
Anti-Virus Overview
403
Types of Computer Viruses
403
Computer Virus Infection and Prevention
403
Table 120 Common Computer Virus Types
403
Types of Anti-Virus Scanner
404
Introduction to the Zywall Anti-Virus Scanner
404
How the Zywall Anti-Virus Scanner Works
404
Notes about the Zywall Anti-Virus
405
Figure 313 Zywall Anti-Virus Example
405
Anti-Virus Summary
406
Figure 314 Anti-X > Anti-Virus > General
406
Table 121 Anti-X > Anti-Virus > General
407
Anti-Virus Policy Edit
408
Figure 315 Anti-X > Anti-Virus > General > Edit
408
Table 122 Anti-X > Anti-Virus > General > Edit
408
Anti-Virus Setting
410
Figure 316 Anti-X > Anti-Virus > Setting
410
Table 123 Anti-X > Anti-Virus > Setting
411
Anti-Virus White List Add/Edit
412
Figure 317 Anti-X > Anti-Virus > Setting > White List Add
412
Table 124 Anti-X > Anti-Virus > Setting > White List Add
412
Anti-Virus Black List Add/Edit
413
Signature Searching
413
Figure 318 Anti-X > Anti-Virus > Setting > Black List Add
413
Table 125 Anti-X > Anti-Virus > Setting > Black List Add
413
Figure 319 Anti-X > Anti-Virus > Signature: Search by Severity
414
Table 126 Anti-X > Anti-Virus > Signature
414
Idp
417
Advertisement
ZyXEL Communications Unified Security Gateway ZyWALL 1000 Brochure (2 pages)
1000 Series Enterprise LAN Switches
Brand:
ZyXEL Communications
| Category:
Switch
| Size: 0 MB
Advertisement
Related Products
ZyXEL Communications Internet Security Gateway 10~100 Series
ZyXEL Communications ZYWALL 1050 - V2.00 EDITION 1
ZyXEL Communications ZyWALL 10/10
ZyXEL Communications 10 Series
ZyXEL Communications 100 Series
ZyXEL Communications ZyWALL 10/10 II/50
ZyXEL Communications Unified Security Gateway ZyWALL 300
ZyXEL Communications Prestige 100L
ZyXEL Communications 100-NH
ZyXEL Communications ZyXEL Prestige 100WH
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL