Chapter 6 Configuration Basics

WHERE USED Policy routes, zones

Example: See Chapter 7 on page 119.

6.5.17 L2TP VPN

Use L2TP VPN to let remote users use the L2TP and IPSec client software included with their computers’ operating systems to securely connect to the network behind the ZyWALL.

MENU ITEM(S) Configuration > VPN > L2TP VPN

Interfaces, IPSec VPN connection, certificates (authentication),

authentication methods (extended authentication), addresses (local PREREQUISITES network, remote network, NAT, IP pool for assigning to clients, DNS

and WINS server addresses), to-ZyWALL firewall, firewall

WHERE USED

The IPSec VPN connection used for L2TP VPN can be used in policy

routes and zones

 

Example: See Chapter 8 on page 171.

6.5.18 Application Patrol

Use application patrol to control which individuals can use which services through the ZyWALL (and when they can do so). You can also specify allowed amounts of bandwidth and priorities. You must subscribe to use application patrol. You can subscribe using the Configuration > Licensing > Registration screens or one of the wizards.

MENU ITEM(S) Configuration > AppPatrol

Registration, zones, Schedules, users, user groups, addresses

PREREQUISITES (source, destination), address groups (source, destination). These are

only used as criteria in exceptions and conditions.

Example: Suppose you want to allow vice president Bob to use BitTorrent and block everyone else from using it.

1Create a user account for Bob (User/Group).

2Click AppPatrol > Peer to Peer to go to the application patrol configuration screen. Click the BitTorrent application patrol entry’s Edit icon.

Set the default policy’s access to Drop.

Add another policy.

Select the user account that you created for Bob.

You can leave the source, destination and log settings at the default.

 

111

ZyWALL USG 2000 User’s Guide