ZyXEL Communications Internet Security Gateway ZyWALL 100 User Manual
Page 12

ZyWALL 100 Internet Security Gateway
xii
Table of Contents
25.1
Introduction...........................................................................................................................25-1
25.2
Benefits .................................................................................................................................25-1
25.3
Routing Policy ......................................................................................................................25-1
25.4
IP Routing Policy Setup........................................................................................................25-2
25.5
Applying an IP Policy...........................................................................................................25-6
25.6
IP Policy Routing Example...................................................................................................25-6
Chapter 26 Call Scheduling...................................................................................................................26-1
26.1
Introduction...........................................................................................................................26-1
Chapter 27 Introduction to IPSec .........................................................................................................27-1
27.1
Introduction...........................................................................................................................27-1
27.2
IPSec Architecture ................................................................................................................27-3
27.3
Encapsulation........................................................................................................................27-5
27.4
IPSec and NAT .....................................................................................................................27-5
Chapter 28 VPN/IPSec Setup ................................................................................................................28-1
28.1
VPN/IPSec Setup..................................................................................................................28-1
28.2
IPSec Algorithms ..................................................................................................................28-2
28.3
IPSec Summary.....................................................................................................................28-3
28.4
IPSec Setup ...........................................................................................................................28-9
28.5
IKE Setup............................................................................................................................28-12
28.6
Manual Setup ......................................................................................................................28-17
Chapter 29 SA Monitor..........................................................................................................................29-1
29.1
Introduction...........................................................................................................................29-1
29.2
Using SA Monitor.................................................................................................................29-1
Chapter 30 IPSec Log ............................................................................................................................30-1
30.1
VPN Initiator IPSec Log.......................................................................................................30-1
30.2
VPN Responder IPSec Log...................................................................................................30-2
Troubleshooting, Appendices and Index ...................................................................................................31-1