beautypg.com

ZyXEL Communications ZyXEL ZyWALL 2WE User Manual

Page 22

background image

ZyWALL 2 and ZyWALL 2WE

xxii

List of Figures

Figure 25-3 Applying Schedule Set(s) to a Remote Node (PPPoE)..............................................................25-4

Figure 25-4 Applying Schedule Set(s) to a Remote Node (PPTP) ...............................................................25-5

Figure 26-1 Encryption and Decryption .......................................................................................................26-2

Figure 26-2 VPN Application .......................................................................................................................26-3

Figure 26-3 IPSec Architecture.....................................................................................................................26-4

Figure 26-4 Transport and Tunnel Mode IPSec Encapsulation.....................................................................26-5

Figure 27-1 IPSec Summary Fields ..............................................................................................................27-3

Figure 27-2 VPN Summary ..........................................................................................................................27-3

Figure 27-3 NAT Router Between IPSec Routers.........................................................................................27-5

Figure 27-4 Basic IKE VPN Rule Setup.......................................................................................................27-8

Figure 27-5 Two Phases to Set Up the IPSec SA........................................................................................27-12

Figure 27-6 Advanced

IKE VPN Rule Setup

.................................................................................................27-15

Figure 27-7 Manual

IKE VPN Rule Setup

.....................................................................................................27-21

Figure 27-8 VPN SA Monitor.....................................................................................................................27-25

Figure 27-9 VPN Global Setting.................................................................................................................27-26

Figure 27-10 Telecommuters Sharing One VPN Rule Example.................................................................27-28

Figure 27-11 Telecommuters Using Unique VPN Rules Example .............................................................27-29