ZyXEL Communications 3.1 Security Camera User Manual


 
Table of Contents
ZyWALL (ZLD) CLI Reference Guide
9
Chapter 16
Firewall ..............................................................................................................................................133
16.1 Firewall Overview ..........................................................................................................................133
16.2 Firewall Commands ......................................................................................................................134
16.2.1 Firewall Sub-Commands .....................................................................................................137
16.2.2 Firewall Command Examples ..............................................................................................138
16.3 Session Limit Commands .............................................................................................................139
Chapter 17
IPSec VPN..........................................................................................................................................141
17.1 IPSec VPN Overview ....................................................................................................................141
17.2 IPSec VPN Commands Summary ................................................................................................142
17.2.1 IKE SA Commands ..............................................................................................................143
17.2.2 IPSec SA Commands (except Manual Keys) ......................................................................144
17.2.3 IPSec SA Commands (for Manual Keys) ............................................................................147
17.2.4 VPN Concentrator Commands ............................................................................................147
17.2.5 VPN Configuration Provisioning Commands .......................................................................148
17.2.6 SA Monitor Commands .......................................................................................................149
Chapter 18
SSL VPN ............................................................................................................................................151
18.1 SSL Access Policy ........................................................................................................................151
18.1.1 SSL Application Objects ......................................................................................................151
18.1.2 SSL Access Policy Limitations .............................................................................................151
18.2 SSL VPN Commands ....................................................................................................................151
18.2.1 SSL VPN Commands ..........................................................................................................152
18.2.2 Setting an SSL VPN Rule Tutorial .......................................................................................153
Chapter 19
L2TP VPN...........................................................................................................................................157
19.1 L2TP VPN Overview .....................................................................................................................157
19.2 IPSec Configuration ......................................................................................................................157
19.2.1 Using the Default L2TP VPN Connection ............................................................................158
19.3 Policy Route ..................................................................................................................................158
19.4 L2TP VPN Commands ..................................................................................................................159
19.4.1 L2TP VPN Commands ........................................................................................................159
19.5 L2TP VPN Example ......................................................................................................................160
19.5.1 Configuring the Default L2TP VPN Gateway Example ........................................................161
19.5.2 Configuring the Default L2TP VPN Connection Example ....................................................161
19.5.3 Configuring the L2TP VPN Settings Example .....................................................................161
19.5.4 Configuring the Policy Route for L2TP Example .................................................................162