ZyWALL 2 and ZyWALL 2WE

Figure 25-3 Applying Schedule Set(s) to a Remote Node (PPPoE)..............................................................

25-4

Figure 25-4 Applying Schedule Set(s) to a Remote Node (PPTP) ...............................................................

25-5

Figure 26-1 Encryption and Decryption .......................................................................................................

26-2

Figure 26-2 VPN Application .......................................................................................................................

26-3

Figure 26-3 IPSec Architecture.....................................................................................................................

26-4

Figure 26-4 Transport and Tunnel Mode IPSec Encapsulation.....................................................................

26-5

Figure 27-1 IPSec Summary Fields ..............................................................................................................

27-3

Figure 27-2 VPN Summary ..........................................................................................................................

27-3

Figure 27-3 NAT Router Between IPSec Routers.........................................................................................

27-5

Figure 27-4 Basic IKE VPN Rule Setup.......................................................................................................

27-8

Figure 27-5 Two Phases to Set Up the IPSec SA........................................................................................

27-12

Figure 27-6 Advanced IKE VPN Rule Setup .................................................................................................

27-15

Figure 27-7 Manual IKE VPN Rule Setup.....................................................................................................

27-21

Figure 27-8 VPN SA Monitor.....................................................................................................................

27-25

Figure 27-9 VPN Global Setting.................................................................................................................

27-26

Figure 27-10 Telecommuters Sharing One VPN Rule Example.................................................................

27-28

Figure 27-11 Telecommuters Using Unique VPN Rules Example .............................................................

27-29

xxii

List of Figures