
Chapter 6 Configuration Basics
WHERE USED Policy routes, zones
Example: See Chapter 7 on page 119.
6.5.17 L2TP VPN
Use L2TP VPN to let remote users use the L2TP and IPSec client software included with their computers’ operating systems to securely connect to the network behind the ZyWALL.
MENU ITEM(S) Configuration > VPN > L2TP VPN
Interfaces, IPSec VPN connection, certificates (authentication),
authentication methods (extended authentication), addresses (local PREREQUISITES network, remote network, NAT, IP pool for assigning to clients, DNS
and WINS server addresses),
WHERE USED | The IPSec VPN connection used for L2TP VPN can be used in policy | |
routes and zones | ||
|
Example: See Chapter 8 on page 171.
6.5.18 Application Patrol
Use application patrol to control which individuals can use which services through the ZyWALL (and when they can do so). You can also specify allowed amounts of bandwidth and priorities. You must subscribe to use application patrol. You can subscribe using the Configuration > Licensing > Registration screens or one of the wizards.
MENU ITEM(S) Configuration > AppPatrol
Registration, zones, Schedules, users, user groups, addresses
PREREQUISITES (source, destination), address groups (source, destination). These are
only used as criteria in exceptions and conditions.
Example: Suppose you want to allow vice president Bob to use BitTorrent and block everyone else from using it.
1Create a user account for Bob (User/Group).
2Click AppPatrol > Peer to Peer to go to the application patrol configuration screen. Click the BitTorrent application patrol entry’s Edit icon.
•Set the default policy’s access to Drop.
•Add another policy.
•Select the user account that you created for Bob.
•You can leave the source, destination and log settings at the default.
| 111 |
ZyWALL USG 2000 User’s Guide | |
|
|