User Manual
Page 119
...VPN > IPSec VPN > VPN Gateway, and then click the Add icon. 2 Enable the VPN gateway and name it ("VPN_GW_EXAMPLE"). For the Peer Gateway Address, select ...example, the ZyWALL is router X (1.2.3.4), and the remote IPSec router is router Y (2.2.2.2). Figure 68 Configuration > VPN > IPSec VPN > VPN Gateway > Add ZyWALL USG 50 User's ...Guide 119 For My Address, select Interface and wan1. Create the VPN tunnel between ZyWALL X's LAN subnet (192.168.1.0/24) and the LAN subnet behind peer IPSec router Y (172.16.1.0/ 24). 7.4.1 Set Up the VPN Gateway The VPN gateway manages...
...VPN > IPSec VPN > VPN Gateway, and then click the Add icon. 2 Enable the VPN gateway and name it ("VPN_GW_EXAMPLE"). For the Peer Gateway Address, select ...example, the ZyWALL is router X (1.2.3.4), and the remote IPSec router is router Y (2.2.2.2). Figure 68 Configuration > VPN > IPSec VPN > VPN Gateway > Add ZyWALL USG 50 User's ...Guide 119 For My Address, select Interface and wan1. Create the VPN tunnel between ZyWALL X's LAN subnet (192.168.1.0/24) and the LAN subnet behind peer IPSec router Y (172.16.1.0/ 24). 7.4.1 Set Up the VPN Gateway The VPN gateway manages...
User Manual
Page 261
... in the table below. An interface is not available in a different bridge interface Select one, and click the >> arrow to add it to enable this interface. Clear this to display a greater or lesser number of configuration Settings / Hide fields. Description Enter a description of this button to ...only if you are part of the bridge interface. Each bridge interface can be up to apply security settings such as firewall, IDP, remote management, anti-virus, and application patrol. It is to which the interface is not used in the following situations: Member IP Address Assignment...
... in the table below. An interface is not available in a different bridge interface Select one, and click the >> arrow to add it to enable this interface. Clear this to display a greater or lesser number of configuration Settings / Hide fields. Description Enter a description of this button to ...only if you are part of the bridge interface. Each bridge interface can be up to apply security settings such as firewall, IDP, remote management, anti-virus, and application patrol. It is to which the interface is not used in the following situations: Member IP Address Assignment...
User Manual
Page 290
...enable bandwidth management in the main policy route screen (Network > Routing > Policy Route) in order to a remote server. Select the service that matches this interface. To use as they are applied in order of the packets that the client computer sends to apply bandwidth shaping. 290 ZyWALL USG 50 ...uses a dedicated range of ports on the client side and a dedicated range of ports on the outgoing interface) to the client computer that a remote server sends. Click this to delete it. Chapter 13 Policy and Static Routes Table 77 Configuration > Network > Routing > Policy Route > Edit ...
...enable bandwidth management in the main policy route screen (Network > Routing > Policy Route) in order to a remote server. Select the service that matches this interface. To use as they are applied in order of the packets that the client computer sends to apply bandwidth shaping. 290 ZyWALL USG 50 ...uses a dedicated range of ports on the client side and a dedicated range of ports on the outgoing interface) to the client computer that a remote server sends. Click this to delete it. Chapter 13 Policy and Static Routes Table 77 Configuration > Network > Routing > Policy Route > Edit ...
User Manual
Page 709
...633 for remote management. Figure 414 Configuration > System > SSH The following table describes the labels in the Service Control table to use that service for details). Add Click this screen. Note that you disable Telnet and FTP when you configure SSH for secure connections. ZyWALL USG 50 User's ... the computer with the IP address that opens. Refer to modify the entry's settings. Table 221 Configuration > System > SSH LABEL DESCRIPTION Enable Select the check box to create a new entry. You must use both SSH version 1 and version 2 protocols. Select an entry and...
...633 for remote management. Figure 414 Configuration > System > SSH The following table describes the labels in the Service Control table to use that service for details). Add Click this screen. Note that you disable Telnet and FTP when you configure SSH for secure connections. ZyWALL USG 50 User's ... the computer with the IP address that opens. Refer to modify the entry's settings. Table 221 Configuration > System > SSH LABEL DESCRIPTION Enable Select the check box to create a new entry. You must use both SSH version 1 and version 2 protocols. Select an entry and...
User Manual
Page 712
...Edit Double-click an entry or select it and click Edit to be used to manage the ZyWALL. The ZyWALL confirms you want to put it and click Remove. Server Port You may change... you can come. Add Click this to access the ZyWALL CLI using this action. Table 222 Configuration > System > TELNET LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer... where you typed. 712 ZyWALL USG 50 User's Guide Refer to create a new entry after the selected entry. Select an entry and click Add to Table 219 on page 695 for remote Telnet access. Note that ...
...Edit Double-click an entry or select it and click Edit to be used to manage the ZyWALL. The ZyWALL confirms you want to put it and click Remove. Server Port You may change... you can come. Add Click this to access the ZyWALL CLI using this action. Table 222 Configuration > System > TELNET LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer... where you typed. 712 ZyWALL USG 50 User's Guide Refer to create a new entry after the selected entry. Select an entry and click Add to Table 219 on page 695 for remote Telnet access. Note that ...
User Manual
Page 714
...Chapter 41 on the screen that service for remote management. Select the certificate whose corresponding private key is to be used to access the ZyWALL using this action. Server Port Server Certificate ... clients and/ or servers. Double-click an entry or select it and click Remove. ZyWALL USG 50 User's Guide Refer to modify the entry's settings. You may change the server port number...number in the Service Control table to identify the ZyWALL for FTP connections. Table 223 Configuration > System > FTP LABEL DESCRIPTION Enable Select the check box to allow or disallow the...
...Chapter 41 on the screen that service for remote management. Select the certificate whose corresponding private key is to be used to access the ZyWALL using this action. Server Port Server Certificate ... clients and/ or servers. Double-click an entry or select it and click Remove. ZyWALL USG 50 User's Guide Refer to modify the entry's settings. You may change the server port number...number in the Service Control table to identify the ZyWALL for FTP connections. Table 223 Configuration > System > FTP LABEL DESCRIPTION Enable Select the check box to allow or disallow the...
User Manual
Page 718
...ZyWALL zones. 718 ZyWALL USG 50 User's Guide Table 225 Configuration > System > SNMP LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer with each trap to access the ZyWALL using this screen. The default is private and allows all requests. Server Port You may change the server port number for remote management...which is the password for incoming Set requests from the management station. Destination Type the IP address of the station to send your SNMP traps to access the ZyWALL. Set Community Enter the Set community, which is ...
...ZyWALL zones. 718 ZyWALL USG 50 User's Guide Table 225 Configuration > System > SNMP LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer with each trap to access the ZyWALL using this screen. The default is private and allows all requests. Server Port You may change the server port number for remote management...which is the password for incoming Set requests from the management station. Destination Type the IP address of the station to send your SNMP traps to access the ZyWALL. Set Community Enter the Set community, which is ...
User Manual
Page 738
... address-object TW_SUBNET 172.23.37.0/24 object-group address TW_TEAM address-object TW_SUBNET exit # enable Telnet access (not enabled by default, unlike other services) ip telnet server # open WAN-to-ZyWALL firewall for TW_TEAM for remote management / to the way you run the example as a configuration file because the rest of a command ... . Comments in Configuration Files or Shell Scripts In a configuration file or shell script, use the address group in Configuration mode. Chapter 47 File Manager These files have the ZyWALL treat the line as a comment. 738 ZyWALL USG 50 User's Guide
... address-object TW_SUBNET 172.23.37.0/24 object-group address TW_TEAM address-object TW_SUBNET exit # enable Telnet access (not enabled by default, unlike other services) ip telnet server # open WAN-to-ZyWALL firewall for TW_TEAM for remote management / to the way you run the example as a configuration file because the rest of a command ... . Comments in Configuration Files or Shell Scripts In a configuration file or shell script, use the address group in Configuration mode. Chapter 47 File Manager These files have the ZyWALL treat the line as a comment. 738 ZyWALL USG 50 User's Guide
User Manual
Page 842
... HTTPS is used when sending packets to test whether or not a remote host is used in e-commerce. IGMP User-Defined 2 (MULTICAST) Internet Group Management Protocol is a secured http session often used for diagnostic or routing purposes...Defined 1 Packet INternet Groper is a protocol that may not be used for key distribution and management. NFS is often used to enable fast transfer of files, including TCP 21 large files that sends out ICMP echo requests to ... from a POP3 server through a temporary connection (TCP/IP or other). 842 ZyWALL USG 50 User's Guide
... HTTPS is used when sending packets to test whether or not a remote host is used in e-commerce. IGMP User-Defined 2 (MULTICAST) Internet Group Management Protocol is a secured http session often used for diagnostic or routing purposes...Defined 1 Packet INternet Groper is a protocol that may not be used for key distribution and management. NFS is often used to enable fast transfer of files, including TCP 21 large files that sends out ICMP echo requests to ... from a POP3 server through a temporary connection (TCP/IP or other). 842 ZyWALL USG 50 User's Guide
User Manual
Page 843
... the web. SNMP TCP/UDP 161 Simple Network Management Program. TELNET TCP 23 Telnet is a remote control for the Internet. SMTP enables you to send system logs to a UNIX server. SQL-NET TCP 1521 Structured Query Language is to allow users to log into remote host systems. ZyWALL USG 50 User's Guide 843 Its primary function is...
... the web. SNMP TCP/UDP 161 Simple Network Management Program. TELNET TCP 23 Telnet is a remote control for the Internet. SMTP enables you to send system logs to a UNIX server. SQL-NET TCP 1521 Structured Query Language is to allow users to log into remote host systems. ZyWALL USG 50 User's Guide 843 Its primary function is...