Table of Contents

24.3.1 Downloading a File .................................................................................................

341

24.3.2 Saving a File ..........................................................................................................

341

24.4

Creating a New Folder .....................................................................................................

342

24.5

Renaming a File or Folder ...............................................................................................

342

24.6

Deleting a File or Folder ..................................................................................................

343

24.7

Uploading a File ...............................................................................................................

344

Chapter 25

 

L2TP VPN...............................................................................................................................

345

25.1 L2TP VPN Overview ........................................................................................................

345

25.2

IPSec Configuration .........................................................................................................

345

25.2.1 Using the Default L2TP VPN Connection ..............................................................

346

25.3

Policy Route ....................................................................................................................

346

25.4

L2TP VPN Configuration .................................................................................................

347

25.5

L2TP VPN Session Monitor .............................................................................................

348

Chapter 26

 

L2TP VPN Example...............................................................................................................

351

26.1 L2TP VPN Example .........................................................................................................

351

26.2

Configuring the Default L2TP VPN Gateway Example ....................................................

351

26.3

Configuring the Default L2TP VPN Connection Example ................................................

353

26.4

Configuring the L2TP VPN Settings Example .................................................................

354

26.5

Configuring the Policy Route for L2TP Example .............................................................

354

26.6

Configuring L2TP VPN in Windows XP and 2000 ...........................................................

355

26.6.1 Configuring L2TP in Windows XP ..........................................................................

356

26.6.2 Configuring L2TP in Windows 2000 .......................................................................

361

Part IV: Application Patrol & Anti-X....................................................

377

Chapter 27

 

Application Patrol .................................................................................................................

379

27.1

Application Patrol Overview .............................................................................................

379

27.2

Classification of Applications ...........................................................................................

379

27.3

Configurable Application Policies ....................................................................................

380

27.4

Bandwidth Management ..................................................................................................

380

27.4.1 Connection and Packet Directions .........................................................................

381

27.4.2 Outbound and Inbound Bandwidth Limits ..............................................................

381

27.4.3 Bandwidth Management Priority ............................................................................

382

27.4.4 Maximize Bandwidth Usage ...................................................................................

382

27.4.5 Bandwidth Management Behavior .........................................................................

382

27.5

Application Patrol Bandwidth Management Examples ....................................................

384

20

 

ZyWALL USG 1000 User’s Guide