ZyXEL Communications 10 User Manual
Page 23

ZyWALL 10~100 Series Internet Security Gateway
List of Figures
xxiii
Figure 25-10 Bandwidth Management Statistics ....................................................................................... 25-16
Figure 25-11 Bandwidth Manager Monitor ............................................................................................... 25-18
Figure 26-2 IP Routing Policy Setup ........................................................................................................... 26-2
Figure 26-4 Menu 25.1: Sample IP Routing Policy Setup ........................................................................... 26-3
Figure 26-5 IP Routing Policy ..................................................................................................................... 26-4
Figure 26-6 Menu 3.2: TCP/IP and DHCP Ethernet Setup .......................................................................... 26-6
Figure 26-7 Example of IP Policy Routing .................................................................................................. 26-7
Figure 26-8 IP Routing Policy Example ...................................................................................................... 26-8
Figure 26-9 IP Routing Policy ..................................................................................................................... 26-9
Figure 26-10 Applying IP Policies ............................................................................................................. 26-10
Figure 27-1 Menu 26 - Schedule Setup........................................................................................................ 27-1
Figure 27-2 Schedule Set Setup ................................................................................................................... 27-2
Figure 27-3 Applying Schedule Set(s) to a Remote Node (PPPoE)............................................................. 27-4
Figure 27-4 Applying Schedule Set(s) to a Remote Node (PPTP)............................................................... 27-5
Figure 28-1 Encryption and Decryption....................................................................................................... 28-2
Figure 28-2 VPN Application ...................................................................................................................... 28-3
Figure 28-3 IPSec Architecture.................................................................................................................... 28-4
Figure 28-4 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 28-5
Figure 29-1 VPN SMT Menu Tree............................................................................................................... 29-1
Figure 29-2 Menu 27: VPN/IPSec Setup ..................................................................................................... 29-2
Figure 29-3 IPSec Summary Fields ............................................................................................................. 29-3
Figure 29-4 Telecommuter’s ZyWALL Configuration................................................................................. 29-7
Figure 29-5 Headquarters ZyWALL Configuration ..................................................................................... 29-7
Figure 29-6 Menu 27.1: IPSec Summary..................................................................................................... 29-8
Figure 29-7 Menu 27.1.1: IPSec Setup ...................................................................................................... 29-12
Figure 29-8 Two Phases to Set Up the IPSec SA....................................................................................... 29-17
Figure 29-9 Menu 27.1.1.1: IKE Setup...................................................................................................... 29-19