Table of Contents
Chapter 16
Firewall ..............................................................................................................................................
133
16.1 Firewall Overview ..........................................................................................................................
16.2 Firewall Commands ......................................................................................................................
134
16.2.1 Firewall Sub-Commands .....................................................................................................
137
16.2.2 Firewall Command Examples ..............................................................................................
138
16.3 Session Limit Commands .............................................................................................................
139
Chapter 17
IPSec VPN..........................................................................................................................................
141
17.1 IPSec VPN Overview ....................................................................................................................
17.2 IPSec VPN Commands Summary ................................................................................................
142
17.2.1 IKE SA Commands ..............................................................................................................
143
17.2.2 IPSec SA Commands (except Manual Keys) ......................................................................
144
17.2.3 IPSec SA Commands (for Manual Keys) ............................................................................
147
17.2.4 VPN Concentrator Commands ............................................................................................
17.2.5 VPN Configuration Provisioning Commands .......................................................................
148
17.2.6 SA Monitor Commands .......................................................................................................
149
Chapter 18
SSL VPN ............................................................................................................................................
151
18.1 SSL Access Policy ........................................................................................................................
18.1.1 SSL Application Objects ......................................................................................................
18.1.2 SSL Access Policy Limitations .............................................................................................
18.2 SSL VPN Commands ....................................................................................................................
18.2.1 SSL VPN Commands ..........................................................................................................
152
18.2.2 Setting an SSL VPN Rule Tutorial .......................................................................................
153
Chapter 19
L2TP VPN...........................................................................................................................................
157
19.1 L2TP VPN Overview .....................................................................................................................
19.2 IPSec Configuration ......................................................................................................................
19.2.1 Using the Default L2TP VPN Connection ............................................................................
158
19.3 Policy Route ..................................................................................................................................
19.4 L2TP VPN Commands ..................................................................................................................
159
19.4.1 L2TP VPN Commands ........................................................................................................
19.5 L2TP VPN Example ......................................................................................................................
160
19.5.1 Configuring the Default L2TP VPN Gateway Example ........................................................
161
19.5.2 Configuring the Default L2TP VPN Connection Example ....................................................
19.5.3 Configuring the L2TP VPN Settings Example .....................................................................
19.5.4 Configuring the Policy Route for L2TP Example .................................................................
162
9
ZyWALL (ZLD) CLI Reference Guide