Table of Contents

Chapter 16

 

Firewall ..............................................................................................................................................

133

16.1 Firewall Overview ..........................................................................................................................

133

16.2 Firewall Commands ......................................................................................................................

134

16.2.1 Firewall Sub-Commands .....................................................................................................

137

16.2.2 Firewall Command Examples ..............................................................................................

138

16.3 Session Limit Commands .............................................................................................................

139

Chapter 17

 

IPSec VPN..........................................................................................................................................

141

17.1 IPSec VPN Overview ....................................................................................................................

141

17.2 IPSec VPN Commands Summary ................................................................................................

142

17.2.1 IKE SA Commands ..............................................................................................................

143

17.2.2 IPSec SA Commands (except Manual Keys) ......................................................................

144

17.2.3 IPSec SA Commands (for Manual Keys) ............................................................................

147

17.2.4 VPN Concentrator Commands ............................................................................................

147

17.2.5 VPN Configuration Provisioning Commands .......................................................................

148

17.2.6 SA Monitor Commands .......................................................................................................

149

Chapter 18

 

SSL VPN ............................................................................................................................................

151

18.1 SSL Access Policy ........................................................................................................................

151

18.1.1 SSL Application Objects ......................................................................................................

151

18.1.2 SSL Access Policy Limitations .............................................................................................

151

18.2 SSL VPN Commands ....................................................................................................................

151

18.2.1 SSL VPN Commands ..........................................................................................................

152

18.2.2 Setting an SSL VPN Rule Tutorial .......................................................................................

153

Chapter 19

 

L2TP VPN...........................................................................................................................................

157

19.1 L2TP VPN Overview .....................................................................................................................

157

19.2 IPSec Configuration ......................................................................................................................

157

19.2.1 Using the Default L2TP VPN Connection ............................................................................

158

19.3 Policy Route ..................................................................................................................................

158

19.4 L2TP VPN Commands ..................................................................................................................

159

19.4.1 L2TP VPN Commands ........................................................................................................

159

19.5 L2TP VPN Example ......................................................................................................................

160

19.5.1 Configuring the Default L2TP VPN Gateway Example ........................................................

161

19.5.2 Configuring the Default L2TP VPN Connection Example ....................................................

161

19.5.3 Configuring the L2TP VPN Settings Example .....................................................................

161

19.5.4 Configuring the Policy Route for L2TP Example .................................................................

162

 

9

ZyWALL (ZLD) CLI Reference Guide