ZYXEL ZYWALL USG 2000 - UTM Firewall

ZYWALL USG 2000 - UTM Firewall ZYXEL - Free user manual and instructions

Find the device manual for free ZYWALL USG 2000 ZYXEL in PDF.

📄 964 pages English EN Download 💬 AI Question
Notice ZYXEL ZYWALL USG 2000 - page 3
View the manual : Français FR English EN
Pick your language and provide your email: we'll send you a specifically translated version.

User questions about ZYWALL USG 2000 ZYXEL

0 question about this device. Answer the ones you know or ask your own.

Ask a new question about this device

The email remains private: it is only used to notify you if someone responds to your question.

No questions yet. Be the first to ask one.

Download the instructions for your UTM Firewall in PDF format for free! Find your manual ZYWALL USG 2000 - ZYXEL and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. ZYWALL USG 2000 by ZYXEL.

USER MANUAL ZYWALL USG 2000 ZYXEL

Unified Security Gateway

User's Guide

Default Login Details

LAN PortP1
IP Addresshttp://192.168.1.1
User Nameadmin
Password1234

ZYXEL ZYWALL USG 2000 - User's Guide - 1

natural_image Exterior view of a Siemens 1000 network switch (no visible text or labels on the device body)

Firmware Version 2.11

Edition 1, 2/2009

www.zyxel.com

ZyXEL

About This User's Guide

Intended Audience

This manual is intended for people who want to want to configure the ZyWALL using the web configurator.

How To Use This Guide

  • Read Chapter 1 on page 31 chapter for an overview of features available on the ZyWALL.
  • Read Chapter 3 on page 47 for web browser requirements and an introduction to the main components, icons and menus in the ZyWALL web configurator.
  • Read Chapter 4 on page 59 if you're using the wizards for first time setup and you want more detailed information than what the real time online help provides.
  • It is highly recommended you read Chapter 5 on page 101 for detailed information on essential terms used in the ZyWALL, what prerequisites are needed to configure a feature and how to use that feature.
  • It is highly recommended you read Chapter 6 on page 119 for ZyWALL application examples.
  • Subsequent chapters are arranged by menu item as defined in the web configurator. Read each chapter carefully for detailed information on that menu item.
  • To find specific information in this guide, use the Contents Overview, the Table of Contents, the Index, or search the PDF file. E-mail techwriters@zyxel.com.tw if you cannot find the information you require.

- Quick Start Guide

The Quick Start Guide is designed to show you how to make the ZyWALL hardware connections, rack mounting and access the web configurator wizards. (See the wizard real time help for information on configuring each screen.) It contains a connection diagram, default settings, handy checklists and information on setting up your network and configuring for Internet access.

• CLI Reference Guide

The CLI Reference Guide explains how to use the Command-Line Interface (CLI) to configure the ZyWALL.

Note: It is recommended you use the web configurator to configure the ZyWALL.

• Web Configurator Online Help

Click the help icon in any screen for help in configuring that screen and supplementary information.

- Support Disc

Refer to the included CD for support documents.

- ZyXEL Web Site

Please refer to www.zyxel.com for additional support documentation and product certifications.

User Guide Feedback

Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!

The Technical Writing Team,

ZyXEL Communications Corp.,

6 Innovation Road II,

Science-Based Industrial Park,

Hsinchu, 300, Taiwan.

E-mail: techwriters@zyxel.com.tw

Customer Support

In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.

• Product model and serial number.
- Warranty Information.
- Date that you received your device.
- Brief description of the problem and the steps you took to solve it.

Disclaimer

Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.

Document Conventions

Warnings and Notes

These are how warnings and notes are shown in this User's Guide.

Warnings tell you about things that could harm you or your device.

Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.

Syntax Conventions

  • The ZyWALL USG 2000 may be referred to as the "ZyWALL", the "device", the "system" or the "product" in this User's Guide.
  • Product labels, screen names, field labels and field choices are all in bold font.
  • A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the "enter" or "return" key on your keyboard.
  • "Enter" means for you to type one or more characters and then press the [ENTER] key. "Select" or "choose" means for you to use one of the predefined choices.
  • A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
  • Units of measurement may denote the "metric" value or the "scientific" value. For example, "k" for kilo may denote "1000" or "1024", "M" for mega may denote "1000000" or "1048576" and so on.
  • "e.g.," is a shorthand for "for instance", and "i.e.," means "that is" or "in other words".

Icons Used in Figures

Figures in this User's Guide may use the following generic icons. The ZyWALL icon is not an exact representation of your device.

ZyWALLZYXEL ZYWALL USG 2000 - Icons Used in Figures - 1ComputerZYXEL ZYWALL USG 2000 - Icons Used in Figures - 2-Notebook computerZYXEL ZYWALL USG 2000 - Icons Used in Figures - 3-
ServerZYXEL ZYWALL USG 2000 - Icons Used in Figures - 4FirewallZYXEL ZYWALL USG 2000 - Icons Used in Figures - 5-TelephoneZYXEL ZYWALL USG 2000 - Icons Used in Figures - 6-
SwitchZYXEL ZYWALL USG 2000 - Icons Used in Figures - 7-RouterZYXEL ZYWALL USG 2000 - Icons Used in Figures - 8

Safety Warnings

  • Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
  • Do NOT expose your device to dampness, dust or corrosive liquids.
  • Do NOT store things on the device.
  • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
  • Connect ONLY suitable accessories to the device.
  • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
  • Make sure to connect the cables to the correct ports.
  • Place connecting cables carefully so that no one will step on them or stumble over them.
    • Always disconnect all cables from this device before servicing or disassembling.
  • Caution: This unit has more than one power supply cord. Disconnect two power supply cords before servicing to avoid electric shock. (has multiple power cords, e.g., chassis-based Ethernet switch. Make sure you specify the correct number of power cords in both the English and the French that follows)
  • Attention: Cet appareil comporte plus d'un cordon d'alimentation. Afin de prévenir les chocs électriques, debrancher les deux cordons d'alimentation avant de faire le dépannage.
  • Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
  • Do NOT remove the plug and connect it to a power outlet by itself; always attach the plug to the power adaptor first before connecting it to a power outlet.
  • Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
  • Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
  • If the power adaptor or cord is damaged, remove it from the device and the power source.
  • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
  • Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
  • CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling of electrical and electronic equipment. For detailed information about recycling of this product, please contact your local city office, your household waste disposal service or the store where you purchased the product.
  • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.

Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.

ZYXEL ZYWALL USG 2000 - Safety Warnings - 1

Contents Overview

Getting Started 29

Introducing the ZyWALL 31

Features and Applications 39

Web Configurator 47

Wizard Setup 59

Configuration Basics 101

Tutorials 119

Status 149

Registration 165

Signature Update 171

Network 179

Interface 181

Trunks 239

Policy and Static Routes 249

Routing Protocols 263

Zones 275

DDNS 279

Virtual Servers 287

HTTP Redirect 301

ALG 305

IP/MAC Binding 313

Firewall 319

Firewall 321

VPN 337

IPSec VPN 339

SSL VPN 379

SSL User Screens 391

SSL User Application Screens 399

SSL User File Sharing 401

L2TP VPN 409

L2TP VPN Example 415

Application Patrol 443

Application Patrol 445

Anti-X 471

Anti-Virus 473

IDP 489

ADP 523

Content Filtering 543

Content Filter Reports 567

Anti-Spam 575

Device HA 591

Device HA 593

Objects 611

User/Group 613

Addresses 629

Services 635

Schedules 641

AAA Server 647

Authentication Method 659

Certificates 663

ISP Accounts 685

SSL Application 689

System 695

System 697

Maintenance, Troubleshooting, & Specifications 747

File Manager 749

Logs 761

Reports 775

Diagnostics 793

Reboot 795

Troubleshooting 797

Product Specifications 803

Appendices and Index 809

Table of Contents

About This User's Guide .... 3

Document Conventions....5

Safety Warnings....7

Contents Overview ......9

Table of Contents....11

Part I: Getting Started 29

Chapter 1 Introducing the ZyWALL ....31

1.1 Overview and Key Default Settings 31

1.2 Front Panel 32

1.2.1 Dual Personality Interfaces ...... 32

1.2.2 Front Panel LEDs 35

1.3 Management Overview ...... 36

1.4 Starting and Stopping the ZyWALL 37

Chapter 2 Features and Applications....39

2.1 Features 39

2.2 Packet Flow 41

2.2.1 Interface to Interface (Through ZyWALL) 42

2.2.2 Interface to Interface (To/From ZyWALL) 42

2.2.3 Interface to Interface (From VPN Tunnel) 42

2.2.4 Interface to Interface (To VPN Tunnel) 42

2.3 Applications 43

2.3.1 VPN Connectivity 43

2.3.2 SSL VPN Network Access 43

2.3.3 User-Aware Access Control 45

2.3.4 Multiple WAN Interfaces 45

2.3.5 Device HA 46

Chapter 3 Web Configurator......47

3.1 Web Configurator Requirements 47
3.2 Web Configurator Access 47
3.3 Web Configurator Main Screen 49

3.3.1 Title Bar 50
3.3.2 Navigation Panel 50
3.3.3 Main Window 55
3.3.4 Message Bar 55

Chapter 4

Wizard Setup 59

4.1 Wizard Setup Overview 59
4.2 Installation Setup, One ISP 60
4.3 Step 1 Internet Access 62

4.3.1 Ethernet: Auto IP Address Assignment 62
4.3.2 Ethernet: Static IP Address Assignment 63
4.3.3 Step 2 Internet Access Ethernet 64
4.3.4 PPPoE: Auto IP Address Assignment 66
4.3.5 PPPoE: Static IP Address Assignment 68
4.3.6 Step 2 Internet Access PPPoE 69
4.3.7 PPTP: Auto IP Address Assignment 71
4.3.8 PPTP: Static IP Address Assignment 74
4.3.9 Step 2 Internet Access PPTP 75
4.3.10 Step 4 Internet Access - Finish 77

4.4 Device Registration 77

4.5 Installation Setup, Two Internet Service Providers 80

4.5.1 Internet Access Wizard Setup Complete 83

4.6 VPN Setup 84

4.7 VPN Wizards 85

4.7.1 VPN Express Wizard 85

4.8 VPN Express Wizard - Scenario 86

4.8.1 VPN Express Wizard - Policy Setting 88
4.8.2 VPN Express Wizard - Summary 89
4.8.3 VPN Express Wizard - Finish 90
4.8.4 VPN Advanced Wizard 91
4.8.5 VPN Advanced Wizard - Advanced Settings 94
4.8.6 VPN Advanced Wizard - Phase 2 96
4.8.7 VPN Advanced Wizard - Summary 98
4.8.8 VPN Advanced Wizard - Finish 99

Chapter 5

Configuration Basics....101

5.1 Object-based Configuration 101
5.2 Zones, Interfaces, and Physical Ports 102

5.2.1 Interface Types 102
5.2.2 Default Interface and Zone Configuration 103

5.3 Terminology in the ZyWALL 104

5.4 Feature Configuration Overview 105

5.4.1 Feature 105

5.4.2 Interface 106

5.4.3 Trunks 106

5.4.4 IPSec VPN 107

5.4.5 SSL VPN 107

5.4.6 L2TP VPN 107

5.4.7 Zones 108

5.4.8 Device HA 108

5.4.9 DDNS 108

5.4.10 Policy Routes 108

5.4.11 Static Routes ...... 110

5.4.12 Firewall 110

5.4.13 Application Patrol 111

5.4.14 Anti-Virus 111

5.4.15 IDP 112

5.4.16 ADP 112

5.4.17 Content Filter 112

5.4.18 Anti-Spam 113

5.4.19 Virtual Server (Port Forwarding) 113

5.4.20 HTTP Redirect 114

5.4.21 ALG 115

5.5 Objects 115

5.5.1 User/Group 116

5.6 System Management and Maintenance ....116

5.6.1 DNS, WWW, SSH, TELNET, FTP, SNMP, Dial-in Mgmt, Vantage CNM .....116

5.6.2 File Manager ....117

5.6.3 Licensing Registration 117

5.6.4 Licensing Update ....118

5.6.5 Logs and Reports ...... 118

5.6.6 Diagnostics ....118

Chapter 6 Tutorials......119

6.1 How to Configure Interfaces, Port Grouping, and Zones 119

6.1.1 Configure a WAN Ethernet Interface 120

6.1.2 Configure Zones 120

6.1.3 Configure Port Grouping 121

6.2 How to Configure Load Balancing 122

6.2.1 Set Up Available Bandwidth on Ethernet Interfaces 123

6.2.2 Configure the WAN Trunk 123

6.3 How to Set Up an IPSec VPN Tunnel 124

6.3.1 Set Up the VPN Gateway 125
6.3.2 Set Up the VPN Connection 125
6.3.3 Set Up the Policy Route for the VPN Tunnel 126
6.3.4 Configure Security Policies for the VPN Tunnel 128

6.4 How to Configure User-aware Access Control 128

6.4.1 Set Up User Accounts 128
6.4.2 Set Up User Groups 129
6.4.3 Set Up User Authentication Using the RADIUS Server 129
6.4.4 Set Up Web Surfing Policies With Bandwidth Restrictions 131
6.4.5 Set Up MSN Policies 133
6.4.6 Set Up Firewall Rules 134

6.5 How to Configure Service Control 135

6.5.1 Allow HTTPS Administrator Access Only From the LAN 135

6.6 How to Allow Incoming H.323 Peer-to-peer Calls 138

6.6.1 Turn On the ALG 139
6.6.2 Set Up a Virtual Server Policy For H.323 139
6.6.3 Set Up a Firewall Rule For H.323 140

6.7 How to Use Active-Passive Device HA 141

6.7.1 Before You Start 142
6.7.2 Configure Device HA on the Master ZyWALL 143
6.7.3 Configure the Backup ZyWALL 144
6.7.4 Deploy the Backup ZyWALL 145
6.7.5 Check Your Device HA Setup 146

6.8 How to Allow Public Access to a Server 146

6.8.1 Create the Address Objects 146
6.8.2 Configure a Virtual Server 147

Chapter 7 Status....149

7.1 Overview 149

7.1.1 What You Can Do in the Status Screens 149

7.2 The Status Screen 150

7.2.1 The CPU Usage Screen 155
7.2.2 The Memory Usage Screen 156
7.2.3 The Session Usage Screen 157
7.2.4 The VPN Status Screen 158
7.2.5 The DHCP Table Screen 159
7.2.6 The Port Statistics Screen 160
7.2.7 The Port Statistics Graph Screen 161
7.2.8 The Current Users Screen 162
7.2.9 The SEM Status Detail Screen 162

Chapter 8

Registration 165

8.1 Overview ...... 165

8.1.1 What You Can Do in the Registration Screens 165
8.1.2 What you Need to Know About Service Registration 165

8.2 The Registration Screen 167

8.3 The Service Screen 169

Chapter 9

Signature Update 171

9.1 Overview ...... 171

9.1.1 What You Can Do in the Update Screens .... 171
9.1.2 What you Need to Know About Signature Updates 171

9.2 The Antivirus Update Screen 172
9.3 The IDP/AppPatrol Update Screen 173
9.4 The System Protect Update Screen 175

Part II: Network.... 179

Chapter 10

Interface 181

10.1 Interface Overview 181

10.1.1 What You Can Do in the Interface Screens .... 181
10.1.2 What You Need to Know About Interfaces 182

10.2 Interface Status Screen 185

10.3 Port Grouping 188

10.3.1 Port Grouping Overview 188
10.3.2 Port Grouping Screen 189

10.4 Ethernet Summary Screen 190

10.4.1 Ethernet Edit 191

10.5 The Static DHCP Screen 198

10.6 The PPP Interfaces 198

10.6.1 PPPoE/PPTP Overview 199
10.6.2 PPPoE/PPTP Interfaces Overview 199
10.6.3 PPP Interface Summary 200
10.6.4 PPP Interface Add/Edit 202

10.7 Cellular Configuration Screen (3G) 205

10.7.1 Cellular Add/Edit Screen 208

10.8 Cellular Status Screen 212

10.9 VLAN Interfaces 214

10.9.1 VLAN Overview 214

10.9.2 VLAN Interfaces Overview 216
10.9.3 VLAN Summary Screen 216
10.9.4 VLAN Add/Edit 217
10.10 Bridge Interfaces 222
10.10.1 Bridge Overview 222
10.10.2 Bridge Interface Overview 223
10.10.3 Bridge Summary 224
10.10.4 Bridge Add/Edit 225
10.11 Auxiliary Interface 230
10.11.1 Auxiliary Interface Overview 230
10.11.2 Auxiliary 231
10.12 Virtual Interfaces 233
10.12.1 Virtual Interfaces Add/Edit 233
10.13 Interface Technical Reference 235

Chapter 11

Trunks 239

11.1 Overview 239
11.1.1 What You Can Do in the Trunk Screens 239
11.1.2 What You Need to Know About Trunks 240
11.2 The Trunk Summary Screen 243
11.3 Configuring a Trunk 245
11.4 Trunk Technical Reference 246

Chapter 12

Policy and Static Routes 249

12.1 Policy and Static Routes Overview 249
12.1.1 What You Can Do in the Policy and Static Route Screens 250
12.1.2 What You Need to Know About Policy and Static Routing 250
12.2 Policy Route Screen 251
12.2.1 Policy Route Edit Screen 253
12.3 IP Static Route Screen 257
12.3.1 Static Route Add/Edit Screen 258
12.4 Policy Routing Technical Reference 259

Chapter 13

Routing Protocols......263

13.1 Routing Protocols Overview 263
13.1.1 What You Can Do in the RIP and OSPF Screens 263
13.1.2 What You Need to Know About Routing Protocols 263
13.2 The RIP Screen 264
13.3 The OSPF Screen 265
13.3.1 Configuring the OSPF Screen 269

13.3.2 OSPF Area Add/Edit Screen 271
13.4 Routing Protocol Technical Reference 273

Chapter 14

Zones 275

14.1 Zones Overview 275
14.1.1 What You Can Do in the Zones Screens 275
14.1.2 What You Need to Know About Zones 276
14.2 The Zone Screen 277
14.3 Zone Add/Edit 278

Chapter 15

DDNS....279

15.1 DDNS Overview 279
15.1.1 What You Can Do in the DDNS Screens 279
15.1.2 What You Need to Know About DDNS 279
15.2 The DDNS Screen 280
15.2.1 The Dynamic DNS Add/Edit Screen 282
15.3 The DDNS Status Screen 285

Chapter 16

Virtual Servers....287

16.1 Virtual Servers Overview 287
16.1.1 What You Can Do in the Virtual Server Screens 287
16.1.2 What You Need to Know About Virtual Servers 287
16.2 The Virtual Server Screen 288
16.2.1 The Virtual Server Add/Edit Screen 289
16.3 NAT 1:1 and NAT Loopback Examples ....292

Chapter 17

HTTP Redirect 301

17.1 Overview 301
17.1.1 What You Can Do in the HTTP Redirect Screens .... 301
17.1.2 What You Need to Know About HTTP Redirect 302
17.2 The HTTP Redirect Screen 303
17.2.1 The HTTP Redirect Edit Screen 304

Chapter 18

ALG 305

18.1 ALG Overview 305
18.1.1 What You Can Do in the ALG Screen 305
18.1.2 What You Need to Know About ALG 306
18.1.3 Before You Begin 308

18.2 The ALG Screen 308
18.3 ALG Technical Reference 310

Chapter 19

IP/MAC Binding 313

19.1 IP/MAC Binding Overview 313

19.1.1 What You Can Do in the IP/MAC Binding Screens 313
19.1.2 What You Need to Know About IP/MAC Binding 314

19.2 IP/MAC Binding Summary 314

19.2.1 IP/MAC Binding Edit 315
19.2.2 Static DHCP Edit 316

19.3 IP/MAC Binding Exempt List 317

19.4 IP/MAC Binding Monitor 317

Part III: Firewall 319

Chapter 20

Firewall....321

20.1 Overview ...... 321

20.1.1 What You Can Do in the Firewall Screens .... 321
20.1.2 What You Need to Know About the Firewall 322
20.1.3 Firewall Rule Example Applications 324
20.1.4 Firewall Rule Configuration Example 326

20.2 The Firewall Screen 328

20.2.1 Configuring the Firewall Screen 329
20.2.2 The Firewall Edit Screen 333

20.3 The Session Limit Screen 334

20.3.1 The Session Limit Edit Screen 336

Part IV: VPN 337

Chapter 21

IPSec VPN 339

21.1 IPSec VPN Overview 339

21.1.1 What You Can Do in the IPSec VPN Screens 340
21.1.2 What You Need to Know About IPSec VPN 340
21.1.3 Before You Begin 341

21.2 The VPN Connection Screen 341

21.2.1 The VPN Connection Add/Edit (IKE) Screen 343
21.2.2 The VPN Connection Add/Edit Manual Key Screen 350

21.3 The VPN Gateway Screen 354

21.3.1 The VPN Gateway Add/Edit Screen 355

21.4 The VPN Concentrator Screen 363

21.4.1 The VPN Concentrator Add/Edit Screen 364

21.5 The SA Monitor Screen 366

21.6 IPSec VPN Background Information 367

Chapter 22

SSL VPN 379

22.1 Overview 379

22.1.1 What You Can Do in the SSL VPN Screens 379

22.1.2 What You Need to Know About SSL VPN 379

22.2 The SSL Access Privilege Screen 381

22.2.1 The SSL Access Policy Add/Edit Screen 383

22.3 The SSL VPN Connection Monitor Screen 385

22.4 The SSL Global Setting Screen 386

22.4.1 How to Upload a Custom Logo 387

22.5 Establishing an SSL VPN Connection 388

Chapter 23

SSL User Screens 391

23.1 Overview 391

23.1.1 What You Need to Know About the SSL User Screens 391

23.2 Remote User Login 392

23.3 The SSL VPN User Screens 395

23.4 Bookmarking the ZyWALL 396

23.5 Logging Out of the SSL VPN User Screens 396

Chapter 24

SSL User Application Screens 399

24.1 SSL User Application Screens Overview 399

24.2 The Application Screen 399

Chapter 25

SSL User File Sharing 401

25.1 Overview 401

25.1.1 What You Need to Know About the SSL VPN File Sharing 401

25.2 The Main File Sharing Screen 402

25.3 Opening a File or Folder 402

25.3.1 Downloading a File 404

25.3.2 Saving a File 405

25.4 Creating a New Folder 405

25.5 Renaming a File or Folder ...... 406

25.6 Deleting a File or Folder 406

25.7 Uploading a File 407

Chapter 26

L2TP VPN 409

26.1 Overview 409

26.1.1 What You Can Do in the L2TP VPN Screens 409

26.1.2 What You Need to Know About L2TP VPN 409

26.2 L2TP VPN Screen 411

26.3 L2TP VPN Session Monitor Screen 412

Chapter 27

L2TP VPN Example 415

27.1 L2TP VPN Example 415

27.2 Configuring the Default L2TP VPN Gateway Example 416

27.3 Configuring the Default L2TP VPN Connection Example 417

27.4 Configuring the L2TP VPN Settings Example 418

27.5 Configuring the Policy Route for L2TP Example 419

27.6 Configuring L2TP VPN in Windows XP and 2000 420

27.6.1 Configuring L2TP in Windows XP 420

27.6.2 Configuring L2TP in Windows 2000 426

Part V: Application Patrol.... 443

Chapter 28

Application Patrol 445

28.1 Overview 445

28.1.1 What You Can Do in the Application Patrol Screens 445

28.1.2 What You Need to Know About Application Patrol 446

28.1.3 Application Patrol Bandwidth Management Examples 450

28.2 Application Patrol General Screen 454

28.3 Application Patrol Applications 455

28.3.1 The Application Patrol Edit Screen 456

28.3.2 The Application Patrol Policy Edit Screen 459

28.4 The Other Applications Screen 462

28.4.1 The Other Applications Add/Edit Screen 464

28.5 Application Patrol Statistics 466

28.5.1 Application Patrol Statistics: General Setup 467

28.5.2 Application Patrol Statistics: Bandwidth Statistics 468

28.5.3 Application Patrol Statistics: Protocol Statistics 469

Part VI: Anti-X 471

Chapter 29

Anti-Virus 473

29.1 Overview 473

29.1.1 What You Can Do in the Anti-Virus Screens 473
29.1.2 What You Need to Know About Anti-Virus 474
29.1.3 Before You Begin 476

29.2 Anti-Virus Summary Screen 476

29.2.1 Anti-Virus Policy Add or Edit Screen 479

29.3 Anti-Virus Black List 481
29.4 Anti-Virus Black List or White List Add/Edit 482
29.5 Anti-Virus White List 484
29.6 Signature Searching 485
29.7 Anti-Virus Technical Reference 487

Chapter 30

IDP 489

30.1 Overview 489

30.1.1 What You Can Do Using the IDP Screens 489
30.1.2 What You Need To Know About IDP 489
30.1.3 Before You Begin 490

30.2 The IDP General Screen 491

30.2.1 Configuring IDP Policies 493

30.3 Introducing IDP Profiles 494

30.3.1 Base Profiles 494

30.4 The Profile Summary Screen 495

30.5 Creating New Profiles 496

30.5.1 Procedure To Create a New Profile 496

30.6 Profiles: Packet Inspection 498

30.6.1 Policy Types .... 501
30.6.2 IDP Service Groups 502
30.6.3 Profile > Query View Screen 504
30.6.4 Query Example 505

30.7 Introducing IDP Custom Signatures 506

30.7.1 IP Packet Header 507

30.8 Configuring Custom Signatures 508

30.8.1 Creating or Editing a Custom Signature 510
30.8.2 Custom Signature Example 516
30.8.3 Applying Custom Signatures 519
30.8.4 Verifying Custom Signatures 519

30.9 IDP Technical Reference 520

Chapter 31

ADP 523

31.1 Overview 523

31.1.1 ADP and IDP Comparison 523
31.1.2 What You Can Do Using the ADP Screens 523
31.1.3 What You Need To Know About ADP 523
31.1.4 Before You Begin 524

31.2 The ADP General Screen 525

31.2.1 Configuring ADP Policies 526

31.3 The Profile Summary Screen 527

31.3.1 Base Profiles 528
31.3.2 Configuring The ADP Profile Summary Screen 528
31.3.3 Creating New ADP Profiles 529
31.3.4 Traffic Anomaly Profiles 529
31.3.5 Protocol Anomaly Profiles 532
31.3.6 Protocol Anomaly Configuration 532

31.4 Technical Reference 534

Chapter 32

Content Filtering 543

32.1 Overview 543

32.1.1 What You Can Do in the Content Filter Screens 543
32.1.2 What You Need to Know About Content Filtering 543
32.1.3 Before You Begin 545

32.2 Content Filter General Screen 546
32.3 Content Filter Policy Add or Edit Screen 549
32.4 Content Filter Profile Screen 550
32.5 Content Filter Categories Screen 550
32.6 Content Filter Customization Screen 561
32.7 Content Filter Cache Screen 563
32.8 Content Filter Technical Reference 566

Chapter 33

Content Filter Reports 567

33.1 Overview 567
33.2 Viewing Content Filter Reports 567

Chapter 34

Anti-Spam 575

34.1 Overview 575

34.1.1 What You Can Do in the Anti-Spam Screens 575
34.1.2 What You Need to Know About Anti-Spam 575

34.2 Before You Begin 578

34.3 The Anti-Spam General Screen 578

34.3.1 The Anti-Spam Policy Add or Edit Screen 579

34.4 The Anti-Spam Black List Screen 581

34.4.1 The Anti-Spam Black or White List Add/Edit Screen 583

34.4.2 Regular Expressions in Black or White List Entries 584

34.5 The Anti-Spam White List Screen 585

34.6 The DNSBL Screen 586

34.6.1 The DNSBL Add/Edit Screen 588

34.7 The Anti-Spam Status Screen 589

Part VII: Device HA.... 591

Chapter 35

Device HA 593

35.1 Overview 593

35.1.1 What You Can Do in the Device HA Screens 593

35.1.2 What You Need to Know About Device HA 593

35.1.3 Before You Begin 594

35.2 Device HA General 595

35.3 The Active-Passive Mode Screen 596

35.3.1 Configuring Active-Passive Mode Device HA 598

35.4 Configuring an Active-Passive Mode Monitored Interface 601

35.5 The Legacy Mode Screen 602

35.6 Configuring the Legacy Mode Screen 603

35.7 The Legacy Mode Add/Edit Screen 605

35.8 Device HA Technical Reference 608

Part VIII: Objects 611

Chapter 36

User/Group 613

36.1 Overview 613

36.1.1 What You Can Do Using The User/Group Screens 613

36.1.2 What You Need To Know About User/Groups 613

36.2 User Summary Screen 616

36.2.1 User Add/Edit Screen 616

36.3 User Group Summary Screen 619

36.3.1 Group Add/Edit Screen 620

36.4 Setting Screen 620

36.4.1 Force User Authentication Policy Add/Edit Screen 624

36.4.2 User Aware Login Example 625

36.5 User /Group Technical Reference 626

Chapter 37

Addresses....629

37.1 Overview 629

37.1.1 What You Can Do Using The Addresses Screens 629

37.1.2 What You Need To Know About Addresses /Groups 629

37.2 Address Summary Screen 629

37.2.1 Address Add/Edit Screen 631

37.3 Address Group Summary Screen 632

37.3.1 Address Group Add/Edit Screen 633

Chapter 38

Services 635

38.1 Overview 635

38.1.1 What You Can Do in the Services Screens 635

38.1.2 What You Need to Know About Protocols 635

38.2 The Service Summary Screen 636

38.2.1 The Service Add/Edit Screen 638

38.3 The Service Group Summary Screen 638

38.3.1 The Service Group Add/Edit Screen 640

Chapter 39

Schedules 641

39.1 Overview 641

39.1.1 What You Can Do in the Schedule Screens 641

39.1.2 What You Need to Know About Schedules 641

39.2 The Schedule Summary Screen 642

39.2.1 The One-Time Schedule Add/Edit Screen 643

39.2.2 The Recurring Schedule Add/Edit Screen 644

Chapter 40

AAA Server 647

40.1 Overview 647

40.1.1 Directory Service (AD/LDAP) Overview 647

40.1.2 RADIUS Server Overview 648

40.1.3 ASAS 648

40.1.4 What You Can Do Using The AAA Screens 648

40.1.5 What You Need To Know About AAA Servers 649

40.2 Active Directory or LDAP Default Server Screen 649

40.2.1 Configuring Active Directory or LDAP Default Server Settings 651

40.3 Active Directory or LDAP Group Summary Screen 652

40.3.1 Creating an Active Directory or LDAP Group 653

40.4 Configuring a Default RADIUS Server 654

40.5 Configuring a Group of RADIUS Servers 655

40.5.1 Adding a RADIUS Server Member 656

Chapter 41

Authentication Method 659

41.1 Overview 659

41.1.1 What You Can Do Using The Auth. Method Screens 659

41.1.2 Before You Begin 659

41.1.3 Example: Selecting a VPN Authentication Method 659

41.2 Viewing Authentication Method Objects 660

41.3 Creating an Authentication Method Object 661

Chapter 42

Certificates 663

42.1 Overview 663

42.1.1 What You Can Do in the Certificate Screens 663

42.1.2 What You Need to Know About Certificates 663

42.1.3 Verifying a Certificate 665

42.2 The My Certificates Screen 667

42.2.1 The My Certificates Add Screen 668

42.2.2 The My Certificates Edit Screen 673

42.2.3 The My Certificates Import Screen 676

42.3 The Trusted Certificates Screen 677

42.3.1 The Trusted Certificates Edit Screen 678

42.3.2 The Trusted Certificates Import Screen 682

42.4 Certificates Technical Reference 683

42.4.1 OCSP 683

Chapter 43

ISP Accounts......685

43.1 Overview 685

43.1.1 What You Can Do in the ISP Account Screens 685

43.2 ISP Account Summary 685

43.2.1 ISP Account Edit 686

Chapter 44

SSL Application 689

44.1 Overview 689

44.1.1 What You Can Do in the SSL Application Screens 689

44.1.2 What You Need to Know About SSL Application Objects 689

44.1.3 Example: Specifying a Web Site for Access 690

44.2 The SSL Application Screen 691

44.2.1 Creating/Editing a Web-based SSL Application Object 691

44.2.2 Creating/Editing a File Sharing SSL Application Object 693

Part IX: System.... 695

Chapter 45

System 697

45.1 Overview 697

45.1.1 What You Can Do In The System Screens 697

45.2 Host Name 698

45.3 Date and Time 698

45.3.1 Pre-defined NTP Time Servers List 701

45.3.2 Time Server Synchronization 702

45.4 Console Port Speed 703

45.5 DNS Overview 703

45.5.1 DNS Server Address Assignment 703

45.5.2 Configuring the DNS Screen 704

45.5.3 Address Record 706

45.5.4 PTR Record 707

45.5.5 Adding an Address/PTR Record 707

45.5.6 Domain Zone Forwarder 707

45.5.7 Adding a Domain Zone Forwarder 708

45.5.8 MX Record 709

45.5.9 Adding a MX Record 709

45.5.10 Adding a DNS Service Control Rule 709

45.6 WWW Overview 710

45.6.1 Service Access Limitations ....711

45.6.2 System Timeout ....711

45.6.3 HTTPS 711

45.6.4 Configuring WWW 712

45.6.5 Service Control Rules 716

45.6.6 Customizing the WWW Login Page 716

45.6.7 HTTPS Example 720

45.7 SSH 728

45.7.1 How SSH Works 729

45.7.2 SSH Implementation on the ZyWALL 730

45.7.3 Requirements for Using SSH 730

45.7.4 Configuring SSH 730

45.7.5 Secure Telnet Using SSH Examples 732

45.8 Telnet 734

45.8.1 Configuring Telnet 734

45.9 FTP 735

45.9.1 Configuring FTP 736

45.10 SNMP 737

45.10.1 Supported MIBs 739

45.10.2 SNMP Traps 739

45.10.3 Configuring SNMP 739

45.11 Dial-in Management 741

45.11.1 Configuring Dial-in Mgmt 742

45.12 Vantage CNM 743

45.12.1 Configuring Vantage CNM 743

45.13 Language Screen 744

Part X: Maintenance, Troubleshooting, & Specifications.... 747

Chapter 46

File Manager 749

46.1 Overview 749

46.1.1 What You Can Do in the File Manager Screens 749

46.1.2 What you Need to Know About the File Manager 749

46.2 The Configuration File Screen 752

46.3 The Firmware Package Screen 756

46.4 The Shell Script Screen 758

Chapter 47

Logs 761

47.1 Overview 761

47.2 What You Can Do In The Log Screens 761

47.3 View Log Screen 761

47.4 Log Setting Screens 764

47.4.1 Log Setting Summary 765

47.4.2 Edit System Log Settings 766

47.4.3 Edit Remote Server Log Settings 770

47.4.4 Active Log Summary Screen 771

Chapter 48

Reports 775

48.1 Overview 775

48.1.1 What You Can Do in the Report Screens 775

48.2 The Traffic Statistics Screen 775

48.3 The Session Monitor Screen 778

48.4 The Anti-Virus Report Screen 781
48.5 The IDP Report Screen 783
48.6 The Content Filter Report Screen 785
48.7 The Anti-Spam Report Screen 787
48.8 The Email Daily Report Screen 790

Chapter 49

Diagnostics....793

49.1 The Diagnostics Screen 793

Chapter 50

Reboot....795

50.1 Overview 795
50.1.1 What You Need To Know About Reboot 795
50.2 The Reboot Screen 795

Chapter 51

Troubleshooting....797

51.1 Resetting the ZyWALL 799
51.2 Changing a Power Module 800
51.3 Getting More Troubleshooting Help 802

Chapter 52

Product Specifications 803

Part XI: Appendices and Index 809

Appendix A Log Descriptions 811

Appendix B Common Services....871

Appendix C Displaying Anti-Virus Alert Messages in Windows....875

Appendix D Importing Certificates....881

Appendix E Open Software Announcements 887

Appendix F Legal Information 933

Index......937

PART I

Getting Started

Introducing the ZyWALL (31)

Features and Applications (39)

Web Configurator (47)

Configuration Basics (101)

Tutorials (119)

Status (149)

Registration (165)

Signature Update (171)

Introducing the ZyWALL

This chapter gives an overview of the ZyWALL. It explains the front panel ports, LEDs, introduces the management methods, and lists different ways to start or stop the ZyWALL.

1.1 Overview and Key Default Settings

The ZyWALL is a comprehensive security device designed for medium to large organizations. Its flexible configuration helps network administrators set up the network and enforce security policies efficiently. In addition, the ZyWALL provides excellent throughput, making it an ideal solution for reliable, secure service.

The ZyWALL's security features include VPN, firewall, anti-virus, content filtering, IDP (Intrusion Detection and Prevention), ADP (Anomaly Detection and Protection), and certificates. It also provides bandwidth management, Instant Messaging (IM) and Peer to Peer (P2P) control, NAT, port forwarding, policy routing, DHCP server and many other powerful features. Flexible configuration helps you set up the network and enforce security policies efficiently. See Chapter 2 on page 39 for a more detailed overview of the ZyWALL's features.

The front panel physical Gigabit Ethernet ports (labeled P1, P2, P3, and so on) are mapped to Gigabit Ethernet (ge) interfaces. By default P1 is mapped to ge1, P2 is mapped to ge2 and so on. By default ge1 is the LAN interface, ge2 and ge3 are combined as the WAN_TRUNC. The Ethernet management interface can only be accessed from the LAN side by default. The default LAN IP address is 192.168.1.1; the default administrator login user name and password are "admin" and "1234" respectively. P7 and P8 are GbE dual personality interfaces. A dual personality interface includes one Gigabit port and one slot for a mini-GBIC transceiver (SFP module) with one port active at a time.

1.2 Front Panel

Figure 1 ZyWALL USG 2000 Front Panel
ZYXEL ZYWALL USG 2000 - Front Panel - 1

text_image ZyXEL ZyWALL USG 2000 UNIFIED SECURITY GATEWAY SECURITY EXTENSION MODULE HDD SLOT CARD SLOT P211 AUX P221 AUX CONSOLE RESET BUZER RESET P1 P2 P3 P4 P5 P6 S7 S8 S9 10/100/1000 USB 1 2

1.2.1 Dual Personality Interfaces

The ZyWALL's dual personality interfaces are 1000Base-T/mini-GBIC combo ports. For each interface you can connect either to the 1000Base-T port or the mini-GBIC port. The mini-GBIC ports have priority over the 1000Base-T ports. This means that if a mini-GBIC port and the corresponding 1000Base-T port are connected at the same time, the 1000Base-T port will be disabled.

1.2.1.1 1000Base-T Ports

The 1000Base-T auto-negotiating, auto-crossover Ethernet ports support 100/1000 Mbps Gigabit Ethernet so the speed can be 100 Mbps or 1000 Mbps. The duplex mode can be both half or full duplex at 100 Mbps and full duplex only at 1000 Mbps.

An auto-negotiating port can detect and adjust to the optimum Ethernet speed (100/1000 Mbps) and duplex mode (full duplex or half duplex) of the connected device.

An auto-crossover (auto-MDI/MDI-X) port automatically works with a straight-through or crossover Ethernet cable.

Default Ethernet Settings

The factory default negotiation settings for the Ethernet ports on the ZyWALL are:

  • Speed: Auto
  • Duplex: Auto
  • Flow control: On (you cannot configure the flow control setting, but the ZyWALL can negotiate with the peer and turn it off if needed)

1.2.1.2 Mini-GBIC Slots

These are slots for Small Form-Factor Pluggable (SFP) transceivers. A transceiver is a single unit that houses a transmitter and a receiver. Use a transceiver to

connect a fiber-optic cable to the ZyWALL. The ZyWALL does not come with transceivers. You must use transceivers that comply with the Small Form-Factor Pluggable (SFP) Transceiver MultiSource Agreement (MSA). See the SFF committee's INF-8074i specification Rev 1.0 for details.

You can change transceivers while the ZyWALL is operating. You can use different transceivers to connect to devices with different types of fiber-optic connectors.

  • Type: SFP connection interface
  • Connection speed: 1 Gigabit per second (Gbps)

To avoid possible eye injury, do not look into an operating fiber-optic module's connectors or fiber-optic cable.

Transceiver and Fiber-optic Cable Installation

Use the following steps to install a mini GBIC transceiver (SFP module).

1 Insert the transceiver into the slot with the exposed section of PCB board facing down.

Figure 2 Transceiver Installation Example
ZYXEL ZYWALL USG 2000 - Transceiver and Fiber-optic Cable Installation - 1

natural_image Technical line drawing of a mechanical component with an arrow indicating direction (no text or symbols)

2 Press the transceiver firmly until it clicks into place.

Figure 3 Installed Transceiver
ZYXEL ZYWALL USG 2000 - Transceiver and Fiber-optic Cable Installation - 2

natural_image Technical line drawing of a mechanical component with two square holes, no text or symbols present

3 Push the end of the fiber-optic cable firmly into the transceiver until it locks into place. When the other end of the fiber-optic cable is connected, check the LEDs to verify the link status.

Figure 4 Installing the Fiber-optic Cable
ZYXEL ZYWALL USG 2000 - Transceiver and Fiber-optic Cable Installation - 3

natural_image Diagram showing a device with two connectors and an arrow indicating direction (no text or symbols)

Fiber-optic Cable and Transceiver Removal

Use the following steps to remove a mini GBIC transceiver (SFP module).

1 Press down on the top of the fiber-optic cable where it connects to the transceiver to release it. Then pull the fiber-optic cable out.

Figure 5 Removing the Fiber-optic Cable Example
ZYXEL ZYWALL USG 2000 - Fiber-optic Cable and Transceiver Removal - 1

natural_image Diagram showing a device with two connectors and a directional arrow indicating connection (no text or symbols present)

2 Open the transceiver's latch (latch styles vary).

Figure 6 Opening the Transceiver's Latch Example
ZYXEL ZYWALL USG 2000 - Fiber-optic Cable and Transceiver Removal - 2

natural_image Diagram of a printer or printer with a downward arrow indicating compression or disassembly (no text or symbols present)

3 Pull the transceiver out of the slot.

Figure 7 Transceiver Removal Example
ZYXEL ZYWALL USG 2000 - Pull the transceiver out of the slot. - 1

natural_image Diagram showing a device casing with an arrow pointing to it, no text or symbols present

1.2.2 Front Panel LEDs

The following table describes the LEDs.

Table 1 Front Panel LEDs

LEDCOLORSTATUSDESCRIPTION
PWR1, PWR2OffBoth power modules are turned off, not receiving power, or not functioning.
GreenOnThe power module is operating.
RedOnThe power module has malfunctioned. Turn the power module off, wait a few minutes, and turn the power module back on (see Section 1.4 on page 37). If the LED shines red again, then please contact your vendor.
SYSOffThe ZyWALL is turned off.
GreenOnThe ZyWALL is ready and operating normally.
FlashingThe ZyWALL is self-testing.
RedOnThe ZyWALL is malfunctioning.
AUXOffThe AUX port is not connected.
OrangeOnThe AUX port has a dial-in management connection.
FlashingThe AUX port is sending or receiving packets for the dial-in management connection.
GreenOnThe AUX port has a dial backup connection.
FlashingThe AUX port is sending or receiving packets for the dial backup connection.
CARDGreenOffReserved for future use. There is no card in the CARD SLOT.
OnThere is a card in the CARD SLOT.
HDDThis LED is reserved for future use.
P1~P8GreenOffThere is no traffic on this port.
FlashingThe ZyWALL is sending or receiving packets on this port.
OrangeOffThere is no connection on this port.
OnThis port has a successful link.
LNKOrangeOffThe Ethernet link is down.
OnThe Ethernet link is up.
ACTGreenOffThe system is not transmitting/receiving Ethernet traffic.
BlinkingThe system is transmitting/receiving Ethernet traffic.

1.3 Management Overview

You can use the following ways to manage the ZyWALL.

Web Configurator

The web configurator allows easy ZyWALL setup and management using an Internet browser. This User's Guide provides information about the web configurator.

Figure 8 Managing the ZyWALL: Web Configurator
ZYXEL ZYWALL USG 2000 - Web Configurator - 1

text_image ZyXEL Status Device Information System Name: usg2000 Model Name: ZywWALL USG 2000 Serial Number: 234131340 80-009-011011A4 MAC Address Range: 00.05.44.77.39.46 - #4 Hardware Version: 1.15/AA/W 3301 (2008-02-04 21):1 System Resources CPU Usage: 0 % Memory Usage: 26% Flash Usage: 22% Active Sessions: 1000000 Interface Status summary Sname Status HA Status Finance IP Address Action gs1 Down n/a LAN 192.168.1 n/a gs2 Up/Down n/a WAN 172.23.37.122 /N/A gs3 Down n/a WAN 0.0.0.0 /N/A gs4 Down n/a GMZ 192.168.2 n/a gs5 Down n/a GMZ 192.168.3 n/a gs6 Down n/a N/A 0.0.0.0 /N/a gs7 Down n/a N/A 0.0.0.0 /N/a gs8 Down n/a N/A 0.0.0.0 /N/a goi Inactive n/a N/A 0.0.0.0 /N/a Reference List Hot Disease Status PC Card none USB 1 none USB 2 none SEM Card SEM-CUAL System Status System Options: 01.20.52 Current Date/Time: 2008-03-18 08:17:04 VPA Status: DHCP Table: Port Statistics: Current Login User: admin (unlimited/unlimited) Number of Login Users: 1 Boot Status: Redundant Power Module: Power Module 1: Fail Power Module 2: Fail Licensed Status Status IDP - License Status/Remaining days: Licensed / 334 - Signature Version: V2.028 (2007/06/20 17:08:16) - Last Update Time: N/A - Total Signature Number: 2020 Anti-Virus - License Status/Remaining days: Licensed / 334 - Signature Version: V1.055 (2007-07-05 29:58:13) - Last Update Time: N/A - Total Signature Number: $K16 Content Filter - License Status/Remaining days: Not Licensed / 9 Top 5 Inclusion & Virus Detection Back Information Detected Status Selected Ready

Command-Line Interface (CLI)

The CLI allows you to use text-based commands to configure the ZyWALL. You can access it using remote management (for example, SSH or Telnet) or via the console port. See the Command Reference Guide for more information about the CLI.

Console Port

You can use the console port to manage the ZyWALL using CLI commands. See the Command Reference Guide for more information about the CLI.

The default settings for the console port are as follows.

Table 2 Console Port Default Settings

SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff

1.4 Starting and Stopping the ZyWALL

Here are some of the ways to start and stop the ZyWALL.

Table 3 Starting and Stopping the ZyWALL

METHODDESCRIPTION
Connecting the powerA cold start occurs when you turn on the power to the ZyWALL. The ZyWALL powers up, checks the hardware, and starts the system processes.
Rebooting the ZyWALLA warm start (without powering down and powering up again) occurs when you use the Reboot button in the Reboot screen or when you use the reboot command. The ZyWALL writes all cached data to the local storage, stops the system processes, and then does a warm start.
Using the RESET buttonIf you press the RESET button, the ZyWALL sets the configuration to its default values and then reboots.
Using the shutdown commandThe shutdown command writes all cached data to the local storage and stops the system processes. It does not turn off the power.You have to turn the power off and on manually to start the ZyWALL again. You should use this command before you turn off the ZyWALL.
Disconnecting the powerPower off occurs when you turn off the power to the ZyWALL. The ZyWALL simply turns off. It does not stop the system processes or write cached data to local storage.

Note: It is recommended you use the shutdown command before turning off the ZyWALL.

When you apply configuration files or running shell scripts, the ZyWALL does not stop or start the system processes. However, you might lose access to network

resources temporarily while the ZyWALL is applying configuration files or running shell scripts.

Features and Applications

This chapter introduces the main features and applications of the ZyWALL.

2.1 Features

The ZyWALL's security features include VPN, firewall, anti-virus, content filtering, IDP (Intrusion Detection and Prevention), ADP (Anomaly Detection and Protection), and certificates. It also provides bandwidth management, NAT, port forwarding, policy routing, DHCP server and many other powerful features.

The rest of this section provides more information about the features of the ZyWALL.

High Availability

To ensure the ZyWALL provides reliable, secure Internet access, set up one or more of the following:

  • Multiple WAN ports and configure load balancing between these ports.
  • An auxiliary (backup) Internet connection.
  • A backup ZyWALL in the event the master ZyWALL fails (device HA).

Virtual Private Networks (VPN)

Use IPSec, SSL, or L2TP VPN to provide secure communication between two sites over the Internet or any insecure network that uses TCP/IP for communication. The ZyWALL also offers hub-and-spoke IPSec VPN.

Flexible Security Zones

Many security settings are made by zone, not by interface, port, or network. As a result, it is much simpler to set up and to change security settings in the ZyWALL. You can create or remove zones, and you can assign each network, VLAN, or interface to any zone.

Firewall

The ZyWALL's firewall is a stateful inspection firewall. The ZyWALL restricts access by screening data packets against defined access rules. It can also inspect sessions. For example, traffic from one zone is not allowed unless it is initiated by a computer in another zone first.

Intrusion Detection and Prevention (IDP)

IDP (Intrusion Detection and Protection) can detect malicious or suspicious packets and respond instantaneously. It detects pattern-based attacks in order to protect against network-based intrusions. See Section 30.6.1 on page 501 for a list of attacks that the ZyWALL can protect against. You can also create your own custom IDP rules.

Anomaly Detection and Prevention (ADP)

ADP (Anomaly Detection and Prevention) can detect malicious or suspicious packets and respond instantaneously. It can detect:

  • Anomalies based on violations of protocol standards (RFCs – Requests for Comments)
  • Abnormal flows such as port scans.

The ZyWALL's ADP protects against network-based intrusions. See Section 31.3.4 on page 529 and Section 31.3.5 on page 532 for more on the kinds of attacks that the ZyWALL can protect against. You can also create your own custom ADP rules.

Bandwidth Management

Bandwidth management allows you to allocate network resources according to defined policies. This policy-based bandwidth allocation helps your network to better handle applications such as Internet access, e-mail, Voice-over-IP (VoIP), video conferencing and other business-critical applications.

Content Filter

Content filtering allows schools and businesses to create and enforce Internet access policies tailored to the needs of the organization.

You can also subscribe to category-based content filtering that allows your ZyWALL to check web sites against an external database of dynamically-updated ratings of millions of web sites. You then simply select categories to block or monitor, such as pornography or racial intolerance, from a pre-defined list.

Anti-Virus Scanner

With the anti-virus packet scanner, your ZyWALL scans files transmitting through the enabled interfaces into the network. The ZyWALL helps stop threats at the network edge before they reach the local host computers.

Anti-Spam

The anti-spam feature can mark or discard spam. Use the white list to identify legitimate e-mail. Use the black list to identify spam e-mail. The ZyWALL can also check e-mail against a DNS black list (DNSBL) of IP addresses of servers that are suspected of being used by spammers.

Application Patrol

Application patrol (App. Patrol) manages instant messenger (IM), peer-to-peer (P2P) applications like MSN and BitTorrent. You can even control the use of a particular application's individual features (like text messaging, voice, video conferencing, and file transfers). Application patrol has powerful bandwidth management including traffic prioritization to enhance the performance of delay-sensitive applications like voice and video. You can also use an option that gives SIP priority over all other traffic. This maximizes SIP traffic throughput for improved VoIP call sound quality.

2.2 Packet Flow

This section lists the order in which the ZyWALL applies its features and checks. The following is the key used to describe the packet flow in the ZyWALL.

Table 4 Packet Flow Key

EthernetThe interface on which the packet is received or sent
VLANVirtual LAN
EncapThe PPPoE or PPTP encapsulation used
ALGApplication Layer Gateway
DNATDestination NAT
RoutingRouting includes policy routes, interface routing, static routes and load balancing for example.
FWFirewall (Through ZyWALL)
zFWFirewall (To ZyWALL)
IDPIntrusion Detection and Protection

Table 4 Packet Flow Key

ADPAnomaly Detection and Protection
APApplication Patrol
ASAnti-spam
CFContent Filtering
SNATSource NAT
IPSec D/EVPN Decryption/Encryption
BWMBandwidth Management
RMRemote Management (System)
AVAnti-Virus

2.2.1 Interface to Interface (Through ZyWALL)

Ethernet -> VLAN -> Encap -> ALG -> DNAT-> Routing -> FW -> IDP -> AP-> CF -> AV -> AS -> SNAT -> BWM -> Encap -> VLAN -> Ethernet

2.2.2 Interface to Interface (To/From ZyWALL)

To: Ethernet -> VLAN -> Encap -> ALG -> DNAT -> Routing -> zFW -> ADP -> RM From: RM -> Routing -> BWM -> Encap -> VLAN -> Ethernet

2.2.3 Interface to Interface (From VPN Tunnel)

This example shows the flow from a VPN tunnel though the ZyWALL, not to the ZyWALL or to another VPN tunnel (VPN concentrator).

Ethernet -> VLAN -> Encap -> ALG -> DNAT-> Routing -> zFW -> IPSec D -> ALG -> AC -> DNAT-> Routing -> FW -> IDP -> AP -> CF -> AV -> AS -> SNAT -> BWM -> Encap -> VLAN -> Ethernet

2.2.4 Interface to Interface (To VPN Tunnel)

This example shows the flow to a VPN tunnel from a source other than the ZyWALL or another VPN tunnel (VPN concentrator).

Ethernet -> VLAN -> Encap -> ALG -> DNAT-> Routing -> FW -> IDP -> AP -> CF -> AV -> AS -> SNAT -> IPSec E -> Routing -> BWM -> Encap -> VLAN -> Ethernet

2.3 Applications

These are some example applications for your ZyWALL. See also Chapter 6 on page 119 for configuration tutorial examples.

2.3.1 VPN Connectivity

Set up VPN tunnels with other companies, branch offices, telecommuters, and business travelers to provide secure access to your network. You can also set up additional connections to the Internet to provide better service.

Figure 9 Applications: VPN Connectivity
ZYXEL ZYWALL USG 2000 - VPN Connectivity - 1

flowchart
graph TD
    A["House"] --> B["Internet"]
    C["Laptop"] --> B
    D["Desktop"] --> B
    E["Building"] --> B
    F["Server"] --> B
    B --> G["Server 1"]
    B --> H["Server 2"]
    B --> I["Server 3"]
    B --> J["Server 4"]

2.3.2 SSL VPN Network Access

You can configure the ZyWALL to provide SSL VPN network access to remote users. There are two SSL VPN network access modes: reverse proxy and full tunnel.

2.3.2.1 Reverse Proxy Mode

In reverse proxy mode, the ZyWALL is a proxy that acts on behalf of the local network servers (such as your web and mail servers). As the final destination, the ZyWALL appears to be the server to remote users. This provides an added layer of protection for your internal servers.

With reverse proxy mode, remote users can easily access any web-based applications on the local network by clicking on links or entering the provided URL. You do not have to install additional client software on the remote user computers for access.

Figure 10 Network Access Mode: Reverse Proxy
ZYXEL ZYWALL USG 2000 - Reverse Proxy Mode - 1

flowchart
graph LR
    A["User"] -->|https://| B["Internet"]
    B --> C["Server"]
    C --> D["LAN (192.168.1.x)"]
    D --> E["Web Mail"]
    D --> F["File Share"]
    E --> G["Web-based Application"]
    F --> G

2.3.2.2 Full Tunnel Mode

In full tunnel mode, a virtual connection is created for remote users with private IP addresses in the same subnet as the local network. This allows them to access network resources in the same way as if they were part of the internal network.

Figure 11 Network Access Mode: Full Tunnel Mode
ZYXEL ZYWALL USG 2000 - Full Tunnel Mode - 1

flowchart
graph LR
    A["User"] -->|https://| B["Internet"]
    B --> C["Server"]
    C --> D["LAN (192.168.1.x)"]
    D --> E["Web-based Application"]
    E --> F["Application Server"]
    E --> G["Web Mail"]
    E --> H["Non-Web"]
    E --> I["File Share"]
    style A fill:#f9f,stroke:#333
    style D fill:#ccf,stroke:#333

2.3.3 User-Aware Access Control

Set up security policies that restrict access to sensitive information and shared resources based on the user who is trying to access it.

Figure 12 Applications: User-Aware Access Control
ZYXEL ZYWALL USG 2000 - User-Aware Access Control - 1

flowchart
graph TD
    A["INTERNET"] --> B["路由器"]
    B --> C["云"]
    B --> D["网"]
    C --> E["云"]
    C --> F["云"]
    C --> G["云"]
    D --> H["电脑"]
    D --> I["笔记本电脑"]
    D --> J["笔记本电脑"]
    D --> K["笔记本电脑"]

2.3.4 Multiple WAN Interfaces

Set up multiple connections to the Internet on the same port, or set up multiple connections on different ports. In either case, you can balance the loads between them.

Figure 13 Applications: Multiple WAN Interfaces
ZYXEL ZYWALL USG 2000 - Multiple WAN Interfaces - 1

text_image INTERNET INTERNET

2.3.5 Device HA

Set up an additional ZyWALL as a backup gateway to ensure the default gateway is always available for the network.

Figure 14 Applications: Device HA
ZYXEL ZYWALL USG 2000 - Device HA - 1

flowchart
graph TD
    A["INTERNET"] --> B["Server"]
    A --> C["Server"]
    B --> D["Router"]
    C --> D
    D --> E["master"]
    D --> F["backup"]
    E --> G["Server Rack"]
    F --> H["Server Rack"]

Web Configurator

The ZyWALL web configurator allows easy ZyWALL setup and management using an Internet browser.

3.1 Web Configurator Requirements

In order to use the web configurator, you must

  • Use Internet Explorer 6.0 or later, Netscape Navigator 7.2 or later, or Firefox 1.0.7 or later
  • Allow pop-up windows (blocked by default in Windows XP Service Pack 2)
  • Enable JavaScripts (enabled by default)
  • Enable Java permissions (enabled by default)
  • Enable cookies

The recommended screen resolution is 1024 x 768 pixels.

3.2 Web Configurator Access

1 Make sure your ZyWALL hardware is properly connected. See the Quick Start Guide.

2 Open your web browser, and go to http://192.168.1.1. By default, the ZyWALL automatically routes this request to its HTTPS server, and it is recommended to keep this setting. The Login screen appears.

Figure 15 Login Screen
ZYXEL ZYWALL USG 2000 - Web Configurator Access - 1

text_image ZyXEL ZyWALL USG 2000 Enter User Name/Password and click to login. User Name: Password: One-Time Password: (Optional) (max. 31 alphanumeric, printable characters and no spaces) Log into SSL VPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. 3. Turn on Java Runtime Environment (JRE) in your web browser. Login Reset

3 Type the user name (default: "admin") and password (default: "1234").

If your account is configured to use an ASAS authentication server, use the OTP (One-Time Password) token to generate a number. Enter it in the One-Time Password field. The number is only good for one login. You must use the token to generate a new number the next time you log in.

4 Click Login. If you logged in using the default user name and password, the Update Admin Info screen (Figure 16 on page 48) appears. Otherwise, the main screen (Figure 17 on page 49) appears.

Figure 16 Update Admin Info Screen
ZYXEL ZYWALL USG 2000 - Web Configurator Access - 2

text_image ZyXEL Update Admin Info As a security precaution, it is highly recommended that you change the admin password. New Password: ***** Retype to Confirm: ***** (max. 31 alphanumeric, printable characters and no spaces) Apply Ignore

5 The screen above appears every time you log in using the default user name and default password. If you change the password for the default user account, this screen does not appear anymore.

Follow the directions in this screen. If you change the default password, the Login screen (Figure 15 on page 48) appears after you click Apply. If you click Ignore, the main screen appears.

Figure 17 Main Screen
ZYXEL ZYWALL USG 2000 - Web Configurator Access - 3

text_image ZyXEL Status Refresh Interval: None Refresh Now Device Information System Name: usg2000 Model Name: ZyWALL USG 2000 Serial Number: Z34131340 80-009-011001AA MAC Address Range: 00:00:aa:77:98:66 ~ 6d Firmware Version: 2.10(AQW.0)b1 |2008-02-04 21:1 System Resources CPU Usage: 0 % Memory Usage: 26% Flash Usage: 22% Active Sessions: 0/1000000 Interface Status Summary Name Status HA Status Zone IP Address Action ge1 Down n/a LAN 192.168.1.1 n/a ge2 100M/Full n/a WAN 172.23.37.122 Renew ge3 Down n/a WAN 0.0.0.0 Renew ge4 Down n/a DMZ 192.168.2.1 n/a ge5 Down n/a DMZ 192.168.3.1 n/a ge6 Down n/a n/a 0.0.0.0 n/a ge7 Down n/a n/a 0.0.0.0 n/a ge8 Down n/a n/a 0.0.0.0 n/a aux Inactive n/a n/a 0.0.0.0 n/a License Service Status IDP - License Status/Remaining days: Licensed / 334 - Signature Version: V2.026 |2007/06/20 17:08:10 - Last Update Time: n/a - Total Signature Number: 2020 Anti-Virus - License Status/Remaining days: Licensed / 334 - Signature Version: V1.055 |2007-07-05 20:58:13 - Last Update Time: n/a - Total Signature Number: 5936 Content Filter - License Status/Remaining days: Not Licensed / 0 Top 5 Intrusion & Virus Detection Rank Invasion Detected Virus Detected Extension Slot Slot Device Status PC Card none USB 1 none USB 2 none SEM Card SEM-DUAL Message Ready. C

ZYXEL ZYWALL USG 2000 - Web Configurator Access - 4

3.3 Web Configurator Main Screen

As illustrated in Figure 17 on page 49, the main screen is divided into these parts:

  • A - title bar
  • B - navigation panel

  • C - main window

  • D - status bar

3.3.1 Title Bar

The title bar provides some icons in the upper right corner.

ZYXEL ZYWALL USG 2000 - Title Bar - 1

The icons provide the following functions.

Table 5 Title Bar: Web Configurator Icons

ICONDESCRIPTION
[0&7W]Help: Click this icon to open the help page for the current screen.
ZYXEL ZYWALL USG 2000 - Title Bar - 2Wizards: Click this icon to open one of the web configurator wizards.See Chapter 4 on page 59 for more information.
ZYXEL ZYWALL USG 2000 - Title Bar - 3Console: Click this icon to open the console in which you can use the command line interface (CLI).
ZYXEL ZYWALL USG 2000 - Title Bar - 4Site Map: Click this icon to display the site map for the web configurator.You can use the site map to go directly to any menu item or any tab in the web configurator.
[0W8K]About: Click this icon to display basic information about the ZyWALL.
ZYXEL ZYWALL USG 2000 - Title Bar - 5Logout: Click this icon to log out of the web configurator.

3.3.2 Navigation Panel

Use the menu items on the navigation panel to open screens to configure ZyWALL features. The following tables describe each menu item.

Table 6 Navigation Panel Summary

LINKTABFUNCTION
StatusUse this screen to look at the ZyWALL's general device information, system status, system resource usage, licensed service status, and interface status.
Licensing
RegistrationRegistrationUse this screen to register the device and activate trial services.
ServiceUse this screen to look at the licensed service status and to upgrade licensed services.
UpdateAnti-VirusUse this screen to schedule anti-virus signature updates and to update signature information immediately.
IDP/AppPatrolUse this screen to schedule IDP signature updates and to update signature information immediately.
NetworkSystem ProtectUse this screen to schedule system-protect signature updates and to update signature information immediately.
InterfaceInterface SummaryUse this screen to see information about all of the ZyWALL's interfaces and their connection status.
EthernetUse this screen to manage Ethernet interfaces and virtual Ethernet interfaces.
Port GroupingUse this screen to configure physical port groups.
VLANUse this screen to create and manage VLAN interfaces and virtual VLAN interfaces.
BridgeUse this screen to create and manage bridges and virtual bridge interfaces.
PPPoE/PPTPUse this screen to create and manage PPPoE and PPTP interfaces.
AuxiliaryUse this screen to manage the AUX port.
TrunkUse this screen to create and manage trunks for load balancing and link HA.
RoutingPolicy RouteUse this screen to create and manage routing policies.
Static RouteUse this screen to create and manage IP static routing information.
RIPUse this screen to configure device-level RIP settings.
OSPFUse this screen to configure device-level OSPF settings, including areas and virtual links.
ZoneUse this screen to configure zones used to define various policies.
DDNSProfileUse this screen to define and manage the ZyWALL's DDNS domain names.
StatusUse this screen to view the status of the ZyWALL's DDNS domain names.
Virtual ServerUse this screen to set up and manage port forwarding rules.
HTTP RedirectUse this screen to set up and manage HTTP redirection rules.
ALGUse this screen to configure SIP, H.323, and FTP pass-through settings.
FirewallUse this screen to create and manage level-3 traffic rules.
VPN
IPSec VPNVPN ConnectionUse this screen to configure IPSec tunnels.
VPN GatewayUse this screen to configure IKE tunnels.
ConcentratorUse this screen to configure VPN concentrators (hub-and-spoke VPN).
SA MonitorUse this screen to monitor current IPSec VPN tunnels.
SSL VPNAccess PrivilegeUse this screen to configure SSL VPN access rights for users and groups.
Connection MonitorUse this screen to monitor current SSL VPN connection.
Global SettingUse this screen to configure the ZyWALL's SSL VPN settings that apply to all connections.
L2TP VPNL2TP Over IPSecUse this screen to configure L2TP Over IPSec VPN settings.
Session MonitorUse this screen to monitor current L2TP Over IPSec VPN sessions.
AppPatrolGeneralUse this screen to enable or disable traffic management by application and see registration and signature information.
CommonUse this screen to manage traffic of the most commonly used web, file transfer and e-mail protocols.
Instant MessengerUse this screen to manage instant messenger traffic.
Peer to PeerUse this screen to manage peer-to-peer traffic.
VoIPUse this screen to manage VoIP traffic.
StreamingUse this screen to manage streaming traffic.
OtherUse this screen to manage other kinds of traffic.
StatisticsUse this screen to view bandwidth usage and traffic statistics for the protocols that the ZyWALL is managing.
Anti-X
Anti-VirusGeneralUse this screen to turn anti-virus on or off, set up anti-virus policies and check the anti-virus engine type and the anti-virus license and signature status.
Black/White ListUse this screen to set up anti-virus black (blocked) and white (allowed) lists of virus file patterns.
SignatureUse these screens to search for signatures by signature name or attributes and configure how the ZyWALL uses them.
IDPGeneralUse this screen to look at and manage IDP bindings.
ProfileUse this screen to create and manage IDP profiles.
Custom SignaturesUse this screen to create, import, or export custom signatures.
ADPGeneralUse this screen to look at and manage ADP bindings.
ProfileUse this screen to create and manage ADP profiles.
Content FilterGeneralUse this screen to create and manage content filter policies.
Filter ProfileUse this screen to create and manage the detailed filtering rules for content filtering policies.
CacheUse this screen to manage the URL cache in the ZyWALL.
Anti-SpamGeneralUse these screens to turn anti-spam on or off and manage anti-spam policies.
Black/White ListUse these screens to set up a black list to identify spam and a white list to identify legitimate e-mail.
DNSBLUse these screens to have the ZyWALL check e-mail against DNS Black Lists.
StatusUse this screen to see how many mail sessions the ZyWALL is currently checking and DNSBL statistics.
Device HAGeneralUse this to configure device HA global settings, and see the status of each interface monitored by device HA.
Active-Passive ModeUse these screens to configure (the new) active-passive mode device HA.
Legacy ModeUse these screens to use legacy mode device HA with other ZyWALLs that already have device HA setup using a firmware version earlier than 2.10.
Object
User/GroupUserUse this screen to create and manage users.
GroupUse this screen to create and manage groups of users.
SettingUse this screen to manage default settings for all users, general settings for user sessions, and rules to force user authentication.
AddressAddressUse this screen to create and manage host, range, and network (subnet) addresses.
Address GroupUse this screen to create and manage groups of addresses.
ServiceServiceUse this screen to create and manage TCP and UDP services.
Service GroupUse this screen to create and manage groups of services.
ScheduleUse this screen to create one-time and recurring schedules.
AAA ServerActive Directory-DefaultUse this screen to configure the default Active Directory settings.
Active Directory-GroupUse this screen to create and manage groups of Active Directory servers.
LDAP-DefaultUse this screen to configure the default LDAP settings.
LDAP-GroupUse this screen to create and manage groups of LDAP servers.
RADIUS-DefaultUse this screen to configure the default RADIUS settings.
RADIUS-GroupUse this screen to create and manage groups of RADIUS servers.
Auth. MethodUse these screens to create and manage ways of authenticating users.
CertificateMy CertificatesUse this screen to create and manage the ZyWALL's certificates.
Trusted CertificatesUse this screen to import and manage certificates from trusted sources.
ISP AccountUse this screen to create and manage ISP account information for PPPoE/PPTP interfaces.
SSL ApplicationUse these screens to create SSL web application or file sharing objects.
System
Host NameUse this screen to configure the system and domain name for the ZyWALL.
Date/TimeUse this screen to configure the current date, time, and time zone in the ZyWALL.
Console SpeedUse this screen to set the console speed.
DNSUse this screen to configure the DNS server and address records for the ZyWALL.
WWWUse this screen to configure HTTP, HTTPS, and general authentication.
SSHUse this screen to configure the SSH server and SSH service settings for the ZyWALL.
TELNETUse this screen to configure the telnet server settings for the ZyWALL.
FTPUse this screen to configure the FTP server settings for the ZyWALL.
SNMPUse this screen to configure SNMP communities and services.
Dial-in Mgmt.Use this screen to configure settings for an out of band management connection through a modem connected to the AUX port.
Vantage CNMUse this screen to configure and allow your ZyWALL to be managed by the Vantage CNM server.
LanguageUse this screen to select the language of the ZyWALL's web configurator screens.
Maintenance
File ManagerConfiguration FileUse this screen to manage and upload configuration files for the ZyWALL.
Firmware PackageUse this screen to look at the current firmware version and to upload firmware.
Shell ScriptUse this screen to manage and run shell script files for the ZyWALL.
LogView LogUse this screen to look at log entries.
Log SettingUse this screen to configure the system log, e-mail logs, and remote syslog servers.
ReportTraffic StatisticsUse this screen to collect traffic information and display basic reports about it.
SessionUse this screen to display the status of all current sessions.
Anti-VirusUse this screen to collect and display statistics on the viruses that the ZyWALL has detected.
IDPUse this screen to collect and display statistics on the intrusions that the ZyWALL has detected.
Anti-SpamUse this screen to start or stop data collection and view spam statistics.
Email Daily ReportUse this screen to configure where and how to send daily reports and what reports to send.
DiagnosticsUse this screen to have the ZyWALL collect diagnostic information.
RebootUse this screen to restart the ZyWALL.

3.3.3 Main Window

The main window shows the screen you select in the menu. It is discussed in the rest of this document.

Right after you log in, the Status screen is displayed. See Chapter 7 on page 149 for more information about the Status screen.

3.3.4 Message Bar

The message bar displays configuration status information. Check the message bar after you click Apply or OK to verify that the configuration has been updated.

Figure 18 Message Bar
ZYXEL ZYWALL USG 2000 - Message Bar - 1

text_image Message Ready.

3.3.4.1 Warning Messages

Click the up arrow to view the ZyWALL's current warning messages. These warning messages display in a popup window, such as the following.

Figure 19 Warning Messages
ZYXEL ZYWALL USG 2000 - Warning Messages - 1

text_image Warning Message Refresh Now Clear Warning Messages

Click Refresh Now to update the screen. Close the popup window when you are done with it.

Click Clear Warning Messages to remove the current warning messages from the window.

3.3.4.2 CLI Messages

Click CLI to look at the CLI commands sent by the web configurator. These commands appear in a popup window, such as the following.

Figure 20 CLI Messages
ZYXEL ZYWALL USG 2000 - CLI Messages - 1

text_image Start CLI command ==== [0] show fqdn [1] show version [2] show system uptime [3] show interface all [4] show zone binding-iface [5] show service-register status all [6] show users all [7] show mac [8] show cpu status [9] show mem status [10] show idp signatures version

Click Change Display Style to show or hide the index numbers for the commands (the commands are more convenient to copy and paste without the index numbers).

Click Refresh Now to update the screen. For example, if you just enabled a particular feature, you can look at the commands the web configurator generated to enable it. Close the popup window when you are done with it.

See the Command Reference Guide for information about the commands.

Wizard Setup

This chapter provides information on configuring the Wizard setup screens in the web configurator. See the feature-specific chapters in this User's Guide for background information.

4.1 Wizard Setup Overview

Note: Use the wizards only for initial configuration starting from the default configuration.

The web configurator's setup wizards help you configure Internet and VPN connection settings.

Note: Changes you make in an installation or VPN wizard may not be applied if you have already changed the ZyWALL's configuration.

In the ZyWALL web configurator, click the Wizard icon 📁 to open the Wizard Setup Welcome screen. The following summarizes the wizards you can select:

- INSTALLATION SETUP, ONE ISP

Click this link to open a wizard to set up a single Internet connection for Gigabit Ethernet port 2. This wizard creates matching ISP account settings in the ZyWALL if you use PPPoE or PPTP. See Section 4.2 on page 60.

- INSTALLATION SETUP, TWO ISP

Click this link to open a wizard to set up Internet connections for Gigabit Ethernet (ge) interfaces 2 and 3. See Section 4.5 on page 80. You can connect one interface to one ISP (or network) and connect the other to a second ISP (or network). You can use the second WAN connection for load balancing to increase overall network throughput or as a backup to enhance network reliability (see Load Balancing Algorithms on page 241 for more on load balancing).

This wizard creates matching ISP account settings in the ZyWALL if you use PPPoE or PPTP. This wizard also creates a WAN trunk.

- VPN SETUP

Use VPN SETUP to configure a VPN connection. See Section 4.6 on page 84.

Figure 21 Wizard Setup Welcome
ZYXEL ZYWALL USG 2000 - - VPN SETUP - 1

text_image ZyXEL Welcome to the ZyWALL Wizard Setup INSTALLATION SETUP, ONE ISP (helps user quickly configure the ZyWALL USG 2000 to secure Internet connection) INSTALLATION SETUP, TWO ISP (helps user quickly configure the ZyWALL USG 2000 to secure Internet connection) VPN SETUP (helps user quickly configure the ZyWALL USG 2000 to secure VPN connection) Close

4.2 Installation Setup, One ISP

The wizard screens vary depending on what encapsulation type you use. Refer to information provided by your ISP to know what to enter in each field. Leave a field blank if you don't have that information.

Note: Enter the Internet access information exactly as your ISP gave it to you.

Figure 22 Internet Access: Step 1
ZYXEL ZYWALL USG 2000 - Installation Setup, One ISP - 1

text_image STEP 1 > STEP 2 > STEP 3 > STEP 4 > STEP 5 > STEP 6 Internet Access ISP Parameters Encapsulation: Ethernet WAN IP Address Assignments WAN Interface: ge2 Zone: WAN IP Address Assignment: Static < Back Next >

The following table describes the labels in this screen.

Table 7 Internet Access: Step 1

LABELDESCRIPTION
ISP Parameters
EncapsulationChoose the Ethernet option when the WAN port is used as a regular Ethernet.Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from your ISP.
WAN IP Address Assignments
WAN InterfaceThis is the interface you are configuring for Internet access.
ZoneSelect the security zone to which you want this interface and Internet connection to belong.
IP Address AssignmentSelect Auto If your ISP did not assign you a fixed IP address.Select Static If the ISP assigned a fixed IP address.
NextClick Next to continue.

4.3 Step 1 Internet Access

Encapsulation: Choose the Ethernet option when the WAN port is used as a regular Ethernet. Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from your ISP.

WAN Interface: This is the interface you are configuring for Internet access.

Zone: Select the security zone to which you want this interface and Internet connection to belong.

IP Address Assignment: Select Auto If your ISP did not assign you a fixed IP address.

Select Static If the ISP assigned a fixed IP address.

4.3.1 Ethernet: Auto IP Address Assignment

If you select Auto as the IP Address Assignment in the previous screen, the following screen displays. Click Next to apply the configuration settings.

Figure 23 Ethernet Encapsulation: Auto: Finish
ZYXEL ZYWALL USG 2000 - Ethernet: Auto IP Address Assignment - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access ISP Parameters Encapsulation Ethernet WAN IP Address Assignments WAN Interface ge2 Zone WAN IP Address Auto < Back Next > STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ... STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation Ethernet WAN Interface ge2 Zone WAN IP Assignment Auto IP Address 0.0.0.0 IP Subnet Mask 0.0.0.0 Gateway IP Address You can register ZyWALL on mvZvXEL.com and activate "Free Trial" of Content Filtering, AntiSpam, AntiVirus and IDP services on your ZyWALL. Click "Next" to activate these services for FREE. Close Next

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.3.2 Ethernet: Static IP Address Assignment

If you select Static as the IP Address Assignment, the following screen displays.

Figure 24 Ethernet Encapsulation: Static
ZYXEL ZYWALL USG 2000 - Ethernet: Static IP Address Assignment - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access ISP Parameters Encapsulation Ethernet WAN IP Address Assignments WAN Interface ge2 Zone WAN IP Address 10.0.0.1 IP Subnet Mask 255.255.255.0 Gateway IP Address 10.0.0.2 First DNS Server 10.0.0.3 Second DNS Server 10.0.0.4 < Back Next >

The following table describes the labels in this screen.

The ZyWALL applies the configuration settings.
Table 8 Ethernet Encapsulation: Static

LABELDESCRIPTION
ISP Parameters
EncapsulationThis displays the type of Internet connection you are configuring.
WAN IP Address Assignments
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP AddressEnter the IP address that your ISP gave you. This should be a static, public IP address.
IP Subnet MaskEnter the subnet mask for the IP address.
Gateway IP AddressEnter the IP address of the router through which this WAN connection will send traffic (the default gateway).
First DNS ServerSecond DNS ServerDNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses a system DNS server (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.Enter the DNS server IP addresses.
NextClick Next to continue.

4.3.3 Step 2 Internet Access Ethernet

You do not configure this screen if you selected Auto as the IP Address Assignment in the previous screen.

Note: Enter the Internet access information exactly as given to you by your ISP.

WAN Interface: This is the number of the interface that will connect with your ISP.

Zone: This is the security zone to which this interface and Internet connection will belong.

IP Address: Enter your (static) public IP address.

IP Subnet Mask: Enter the subnet mask for this WAN connection's IP address.

Gateway IP Address: Enter the IP address of the router through which this WAN connection will send traffic (the default gateway).

DNS Server: The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The ZyWALL uses

these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.

Figure 25 Ethernet Encapsulation: Static: Finish
ZYXEL ZYWALL USG 2000 - Step 2 Internet Access Ethernet - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ... STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation Ethernet WAN Interface ge2 Zone WAN IP Assignment Static IP Address 10.0.0.1 IP Subnet Mask 255.255.255.0 Gateway IP Address 10.0.0.2 First DNS Server 10.0.0.3 Second DNS Server 10.0.0.4 You can register ZyWALL on myZvXEL.com and activate "Free Trial" of Content Filtering and IDP services on your ZyWALL. Click "Next" to activate these services for FREE. Close Next

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.3.4 PPPoE: Auto IP Address Assignment

If you select Auto as the IP Address Assignment in the previous screen, the following screen displays after you click Next.

Figure 26 PPPoE Encapsulation: Auto
ZYXEL ZYWALL USG 2000 - PPPoE: Auto IP Address Assignment - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access ISP Parameters Encapsulation PPPoE Service Name test (Optional) User Name test Password ***** Retype to Confirm ***** Nailed-Up Idle Timeout 100 (Seconds) WAN IP Address Assignments WAN Interface ppp0 Zone WAN IP Address Auto < Back Next >

The following table describes the labels in this screen.

Table 9 PPPoE Encapsulation: Auto

LABELDESCRIPTION
ISP Parameters
EncapsulationThis displays the type of Internet connection you are configuring.
Service NameType the PPPoE service name given to you by your ISP. PPPoE uses a service name to identify and reach the PPPoE server. You can use alphanumeric and -_@. / characters, and it can be up to 64 characters long.
User NameType the user name given to you by your ISP. You can use alphanumeric and -_@ . / characters, and it can be up to 31 characters long.
PasswordType the password associated with the user name above. Use up to 64 ASCII characters except the [] and ?. This field can be blank.
Retype to ConfirmType your password again for confirmation.
Nailed-UpSelect Nailed-Up if you do not want the connection to time out.
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects from the PPPoE server. The default time is 100 seconds.
WAN IPAddressAssignments
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP AddressThe ISP will assign your WAN IP address automatically
NextClick Next to continue.

The ZyWALL applies the configuration settings.

Figure 27 PPPoE Encapsulation: Auto: Finish
ZYXEL ZYWALL USG 2000 - PPPoE: Auto IP Address Assignment - 2

text_image STEP 1 • STEP 2 • STEP 3 • STEP 4 • STEP 5 • STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ...

ZYXEL ZYWALL USG 2000 - PPPoE: Auto IP Address Assignment - 3

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation PPPoE Service Name test User Name test Nailed-Up no Idle Timeout 100 WAN Interface ge2 Zone WAN IP Assignment Auto IP Address 10.0.0.5 IP Subnet Mask 255.255.255.0 Gateway IP Address 10.0.0.1 You can register ZyWALL on mvZvXEL.com and activate "Free Trial" of Content Filtering and IDP services on your ZyWALL. Click "Next" to activate these services for FREE. Close Next

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.3.5 PPPoE: Static IP Address Assignment

If you select Static as the IP Address Assignment, the following screen displays.

Figure 28 PPPoE Encapsulation: Static
ZYXEL ZYWALL USG 2000 - PPPoE: Static IP Address Assignment - 1

text_image STEP 1 > STEP 2 > STEP 3 > STEP 4 > STEP 5 > STEP 6 Internet Access ISP Parameters Encapsulation PPPoE Service Name test (Optional) User Name test Password ***** Retype to Confirm ***** Nailed-Up Idle Timeout 100 (Seconds) WAN IP Address Assignments WAN Interface ppp0 Zone WAN IP Address 10.0.0.2 First DNS Server 10.0.0.7 Second DNS Server 10.0.0.8 < Back Next >

The following table describes the labels in this screen.

Table 10 PPPoE Encapsulation: Static

LABELDESCRIPTION
ISP Parameters
EncapsulationThis displays the type of Internet connection you are configuring.
Service NameType the PPPoE service name given to you by your ISP. PPPoE uses a service name to identify and reach the PPPoE server. You can use alphanumeric and -_@. / characters, and it can be up to 64 characters long.
User NameType the user name given to you by your ISP. You can use alphanumeric and -_@ . / characters, and it can be up to 31 characters long.
PasswordType the password associated with the user name above. Use up to 64 ASCII characters except the [] and ?. This field can be blank.
Retype to ConfirmType your password again for confirmation.
Nailed-UpSelect Nailed-Up if you do not want the connection to time out.
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects from the PPPoE server. The default time is 100 seconds.
WAN IP Address Assignments
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP AddressEnter your WAN IP address in this field.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses a system DNS server (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.
First DNS ServerSecond DNS ServerEnter the DNS server's IP address(es) in the field(s) to the right.Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
NextClick Next to continue.

4.3.6 Step 2 Internet Access PPPoE

Note: Enter the Internet access information exactly as given to you by your ISP.

4.3.6.1 ISP Parameters

Type the PPPoE Service Name from your service provider.

Type the User Name given to you by your ISP.

Type the Password associated with the user name.

Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPPoE server.

4.3.6.2 WAN IP Address Assignments

You do not configure this section if you selected Auto as the IP Address Assignment in the previous screen.

WAN Interface: This is the number of the interface that will connect with your ISP.

Zone: This is the security zone to which this interface and Internet connection will belong.

IP Address: Enter your (static) public IP address.

DNS Server: The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The ZyWALL uses these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.

Figure 29 PPPoE Encapsulation: Static: Finish
ZYXEL ZYWALL USG 2000 - WAN IP Address Assignments - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ... STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation PPPoE Service Name test User Name test Nailed-Up no Idle Timeout 100 WAN Interface ge2 Zone WAN IP Assignment Static IP Address 10.0.0.2 First DNS Server 10.0.0.7 Second DNS Server 10.0.0.8 You can register ZyWALL on mvZvXEL.com and activate "Free Trial" of Content Filtering and IDP services on your ZyWALL. Click "Next" to activate these services for FREE. Close Next

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.3.7 PPTP: Auto IP Address Assignment

If you select Auto as the IP Address Assignment in the previous screen, the following screen displays.

Figure 30 PPTP Encapsulation: Auto
ZYXEL ZYWALL USG 2000 - PPTP: Auto IP Address Assignment - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access ISP Parameters Encapsulation PPTP User Name test Password ****** Retype to Confirm ****** Nailed-Up Idle Timeout 100 (Seconds) PPTP Configuration Base Interface ge2 Base IP Address 10.0.0.5 IP Subnet Mask 255.255.255.0 Server IP 10.0.0.1 (IP Address) Connection ID (Optional) WAN IP Address Assignments WAN Interface ppp0 Zone WAN IP Address Auto < Back Next >

The following table describes the labels in this screen.

Table 11 PPTP Encapsulation: Auto

LABELDESCRIPTION
ISP Parameters
EncapsulationThis displays the type of Internet connection you are configuring.
User NameType the user name given to you by your ISP. You can use alphanumeric and -_@$ . / characters, and it can be up to 31 characters long.
PasswordType the password associated with the user name above. Use up to 64 ASCII characters except the [] and ?. This field can be blank.
Retype to ConfirmType your password again for confirmation.
Nailed-UpSelect Nailed-Up if you do not want the connection to time out.
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects from the PPTP server.
PPTP Configuration
Base InterfaceThis displays the identity of the Ethernet interface you configure to connect with a modem or router.
Base IP AddressType the (static) IP address assigned to you by your ISP.
IP Subnet MaskType the subnet mask assigned to you by your ISP (if given).
Server IPType the IP address of the PPTP server.
Connection IDEnter the connection ID or connection name in this field. It must follow the "c:id" and "n:name" format. For example, C:12 or N:My ISP.This field is optional and depends on the requirements of your DSL modem.You can use alphanumeric and -_: characters, and it can be up to 31 characters long.
WAN IP Address Assignments
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP AddressEnter your WAN IP address in this field.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses a system DNS server (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.
First DNS ServerSecond DNS ServerEnter the DNS server's IP address(es) in the field(s) to the right.Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
NextClick Next to continue.

The ZyWALL applies the configuration settings.

Figure 31 PPTP Encapsulation: Auto: Finish
ZYXEL ZYWALL USG 2000 - PPTP: Auto IP Address Assignment - 2

text_image STEP 1 • STEP 2 • STEP 3 • STEP 4 • STEP 5 • STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ...

ZYXEL ZYWALL USG 2000 - PPTP: Auto IP Address Assignment - 3

text_image STEP 1 > STEP 2 > STEP 3 > STEP 4 > STEP 5 > STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation PPTP Server IP 10.0.0.1 User Namealed funds Nailed-Up=no Idle Timeout 100 Connection ID WAN Interface ge2 Zone WAN IP Assignment Auto IP Address 10.0.0.5 IP Subnet Mask 255.255.255.0 Gateway IP Address 10.0.0.1 You can register ZyWALL on my2vXEL.com and activate "Free Trial" of Content Filtering and IDP services on your ZyWALL. Click "Next" to activate these carulace for FREE. Close Next

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.3.8 PPTP: Static IP Address Assignment

If you select Static as the IP Address Assignment, the following screen displays.

Figure 32 PPTP Encapsulation: Static
ZYXEL ZYWALL USG 2000 - PPTP: Static IP Address Assignment - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access ISP Parameters Encapsulation PPTP User Name test Password ***** Retype to Confirm ***** Nailed-Up Idle Timeout 100 (Seconds) PPTP Configuration Base Interface ge2 Base IP Address 10.0.0.5 IP Subnet Mask 255.255.255.0 Server IP 10.0.0.1 (IP Address) Connection ID (Optional) WAN IP Address Assignments WAN Interface ppp0 Zone WAN IP Address 10.0.0.3 First DNS Server 10.0.0.7 Second DNS Server 10.0.0.8 < Back Next >

The following table describes the labels in this screen.

Table 12 PPTP Encapsulation: Static

LABELDESCRIPTION
ISP Parameters
EncapsulationThis displays the type of Internet connection you are configuring.
User NameType the user name given to you by your ISP. You can use alphanumeric and -_@$ . / characters, and it can be up to 31 characters long.
PasswordType the password associated with the user name above. Use up to 64 ASCII characters except the [] and ?.
Retype to ConfirmType your password again for confirmation.
Nailed-UpSelect Nailed-Up if you do not want the connection to time out.
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects from the PPTP server.
PPTPConfiguration
Base InterfaceThis displays the identity of the Ethernet interface you configure to connect with a modem or router.
Base IP AddressType the (static) IP address assigned to you by your ISP.
IP Subnet MaskType the subnet mask assigned to you by your ISP (if given).
Server IPType the IP address of the PPTP server.
Connection IDEnter the connection ID or connection name in this field. It must follow the "c:id" and "n:name" format. For example, C:12 or N:My ISP.This field is optional and depends on the requirements of your DSL modem.You can use alphanumeric and -_: characters, and it can be up to 31 characters long. This field can be blank.
WAN IP Address Assignments
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP AddressEnter your WAN IP address in this field.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses a system DNS server (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.
First DNS ServerSecond DNS ServerEnter the DNS server's IP address(es) in the field(s) to the right.Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
NextClick Next to continue.

4.3.9 Step 2 Internet Access PPTP

Note: Enter the Internet access information exactly as given to you by your ISP.

4.3.9.1 ISP Parameters

Type the User Name given to you by your ISP.

Type the Password associated with the user name.

Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPTP server.

4.3.9.2 PPTP Configuration

Base Interface: This is the identity of the Ethernet interface you configure to connect with a modem or router.

Type a Base IP Address (static) assigned to you by your ISP.

Type the IP Subnet Mask assigned to you by your ISP (if given).

Server IP: Type the IP address of the PPTP server.

Type a Connection ID or connection name. It must follow the "c:id" and "n:name" format. For example, C:12 or N:My ISP. This field is optional and depends on the requirements of your broadband modem or router.

4.3.9.3 WAN IP Address Assignments

You do not configure this section if you selected Auto as the IP Address Assignment in the previous screen.

WAN Interface: This is the connection type on the interface you are configuring to connect with your ISP.

Zone: This is the security zone to which this interface and Internet connection will belong.

IP Address: Enter your (static) public IP address.

DNS Server: The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The ZyWALL uses these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.

The ZyWALL applies the configuration settings.

Figure 33 PPTP Encapsulation: Static: Finish
ZYXEL ZYWALL USG 2000 - WAN IP Address Assignments - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Detection AUTO CONFIGURE WAN PLEASE WAIT A MOMENT ...

ZYXEL ZYWALL USG 2000 - WAN IP Address Assignments - 2

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: Setting: Encapsulation PPTP Server IP 10.0.0.1 User Name test Nailed-Up no Idle Timeout 100 Connection ID WAN Interface ge2 Zone WAN IP Assignment Static IP Address 10.0.0.3 First DNS Server 10.0.0.7 Second DNS Server 10.0.0.8 You can register ZyWALL on mv2vXEL.com and activate "Free Trial" of Content Filtering and IDV services on your ZyWALL. Click "yes" to activate these services for MHz Close Next

4.3.10 Step 4 Internet Access - Finish

You have set up your ZyWALL to access the Internet.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.4 Device Registration

Use this screen to register your ZyWALL with myZXEL.com and activate trial periods of subscription security features if you have not already done so.

Note: You must be connected to the Internet to register.

This screen displays a read-only user name and password if the ZyWALL is already registered. It also shows which trial services are activated (if any). You can still

select the unchecked trial service(s) to activate it after registration. Use the Registration > Service screen to update your service subscription status.

Figure 34 Registration
ZYXEL ZYWALL USG 2000 - Device Registration - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Device Registration This device is not registered to myZyXEL.com. Please enter information below to register your device. If you don't have myZyXEL.com account, please select "new myZyXEL.com account" below. If you have a myZyXEL.com account, but you forget your User Name or Password, please go to for help. new myZyXEL.com account existing myZyXEL.com account User Name Check you can click to check if username exists Password Confirm Password E-Mail Address Country Code ---- Select ---- Trial Service Activation IDP/AppPatrol Anti-Virus Content Filter Close Next >

The following table describes the labels in this screen.

Table 13 Registration

LABELDESCRIPTION
Device RegistrationIf you select existing myZyXEL.com account, only the User Name and Password fields are available.
new myZyXEL.com accountIf you haven't created an account at myZyXEL.com, select this option and configure the following fields to create an account and register your ZyWALL.
existing myZyXEL.com accountIf you already have an account at myZyXEL.com, select this option and enter your user name and password in the fields below to register your ZyWALL.
UserNameEnter a user name for your myZyXEL.com account. The name should be from six to 20 alphanumeric characters (and the underscore). Spaces are not allowed.
CheckClick this button to check with the myZyXEL.com database to verify the user name you entered has not been used.
PasswordEnter a password of between six and 20 alphanumeric characters (and the underscore). Spaces are not allowed.
Confirm PasswordEnter the password again for confirmation.
E-Mail AddressEnter your e-mail address. You can use up to 80 alphanumeric characters (periods and the underscore are also allowed) without spaces.
Country CodeSelect your country from the drop-down box list.
Trial Service ActivationYou can try a trial service subscription. After the trial expires, you can buy an iCard and enter the license key in the Registration Service screen to extend the service.
IDP/AppPatrol Anti-Virus Content FilterSelect the check box to activate a trial. The trial period starts the day you activate the trial.
CloseClick Close to exit the wizard.
NextClick Next to save your changes back to the ZyWALL and activate the selected services.

Figure 35 Registration: Registered Device
ZYXEL ZYWALL USG 2000 - Device Registration - 2

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Device Registration User Name zld_tester Password ********** Trial Service Activation IDP/AppPatrol Anti-Virus Content Filter Close

4.5 Installation Setup, Two Internet Service Providers

This wizard allows you to configure two interfaces for Internet access through either two different Internet Service Providers (ISPs) or two different accounts with the same ISP.

The configuration of the following screens is explained in Section 4.2 on page 60 section. Configure the First WAN Interface and click Next.

Figure 36 Internet Access: Step 1: First WAN Interface
ZYXEL ZYWALL USG 2000 - Installation Setup, Two Internet Service Providers - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 STEP 7 STEP 8 Internet Access, First WAN Interface ISP Parameters Encapsulation: Ethernet WAN IP Address Assignments WAN Interface: ge2 Zone: WAN IP Address Assignment: Auto < Back Next >

After you configure the First WAN Interface, you can configure the Second WAN Interface. Click Next to continue.

Figure 37 Internet Access: Step 3: Second WAN Interface
ZYXEL ZYWALL USG 2000 - Installation Setup, Two Internet Service Providers - 2

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 STEP 7 STEP 8 Internet Access, Second WAN Interface ISP Parameters Encapsulation: Ethernet WAN IP Address Assignments WAN Interface: ge3 Zone: WAN IP Address Assignment: Static < Back Next >

After you configure the Second WAN Interface, a summary of configuration settings display for both WAN interfaces.

Figure 38 Internet Access: Finish
ZYXEL ZYWALL USG 2000 - Installation Setup, Two Internet Service Providers - 3

text_image STEP 1 > STEP 2 > STEP 3 > STEP 4 > STEP 5 > STEP 6 > STEP 7 > STEP 8 Internet Access Congratulations. The Internet Access wizard is completed Summary of Internet Access configuration: First Setting: Encapsulation Ethernet First WAN Interface ge2 Zone WAN IP Assignment Static IP Address 172.23.37.240 IP Subnet Mask 255.255.255.0 Gateway IP Address 172.23.37.254 First DNS Server 172.23.5.1 Second DNS Server 172.23.5.2 Second Setting: Encapsulation Ethernet Second WAN Interface ge3 Zone WAN IP Assignment Auto IP Address 0.0.0.0 IP Subnet Mask 0.0.0.0 Gateway IP Address You can register ZyWALL on mvZvXEL.com and activate "Free Trial" of Content Filtering and IDP services on your ZyWALL. Click "Next" to activate these services for FREE. Close Next >

Note: You can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

Use the myZyXEL.com link if you do already have a myZyXEL.com account. If you already have a myZyXEL.com account, you can click Next and use the following screen to register your ZyWALL and activate service trials (see Section 4.4 on page 77).

Alternatively, click Close to exit the wizard.

4.5.1 Internet Access Wizard Setup Complete

Well done! You have successfully set up your ZyWALL to access the Internet.

4.6 VPN Setup

The VPN wizard creates corresponding VPN connection and VPN gateway settings, a policy route and address objects that you can use later in configuring more VPN connections or other features.

Click VPN SETUP in the Wizard Setup Welcome screen (Figure 21 on page 60) to open the following screen. Use it to select which type of VPN settings you want to configure.

Figure 39 VPN Wizard: Wizard Type
ZYXEL ZYWALL USG 2000 - VPN Setup - 1

text_image STEP 1 > STEP 2 > STEP 3 > STEP 4 > STEP 5 > STEP 6 Please select the type of VPN policy you wish to setup. Express Advanced < Back Next >

The following table describes the labels in this screen.

Table 14 VPN Wizard: Step 1: Wizard Type

LABELDESCRIPTION
ExpressUse this wizard to create a VPN connection with another ZLD-based ZyWALL using a pre-shared key and default security settings.
AdvancedUse this wizard to configure detailed VPN security settings such as using certificates. The VPN connection can be to another ZLD-based ZyWALL or other IPSec device.
NextClick Next to continue.

4.7 VPN Wizards

A VPN (Virtual Private Network) tunnel is a secure connection to another computer or network.

Use the Express wizard to create a VPN connection with another ZLD-based ZyWALL using a pre-shared key and default security settings.

Use the Advanced wizard to configure detailed VPN security settings such as using certificates. The VPN connection can be to another ZLD-based ZyWALL or other IPSec devices.

4.7.1 VPN Express Wizard

Click the Express radio button as shown in Figure 39 on page 84 to display the following screen.

Figure 40 VPN Express Wizard: Step 2
ZYXEL ZYWALL USG 2000 - VPN Express Wizard - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Express Settings Scenario Rule Name VMZ_VPN Site-to-site Site-to-site with Dynamic Peer Remote Access (Server Role) Remote Access (Client Role) < Back Next >

The following table describes the labels in this screen.

Table 15 VPN Express Wizard: Step 2

LABELDESCRIPTION
Rule NameType the name used to identify this VPN connection (and VPN gateway). You may use 1-31 alphanumeric characters, underscores( ), or dashes (- ), but the first character cannot be a number. This value is case-sensitive.
Site-to-siteChoose this if the remote IPSec router has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.
Site-to-site with Dynamic PeerChoose this if the remote IPSec router has a dynamic IP address. Only the remote IPSec router can initiate the VPN tunnel.
Remote Access (Server Role)Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.
Remote Access (Client Role)Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
BackClick Back to return to the previous screen.
NextClick Next to continue.

4.8 VPN Express Wizard - Scenario

Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.

Select the scenario that best describes your intended VPN connection.

  • Site-to-site - Choose this if the remote IPSec router has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.
  • Site-to-site with Dynamic Peer - Choose this if the remote IPSec router has a dynamic IP address. Only the remote IPSec router can initiate the VPN tunnel.
  • Remote Access (Server Role) - Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.

- Remote Access (Client Role) - Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.

Figure 41 VPN Express Wizard: Step 3
ZYXEL ZYWALL USG 2000 - VPN Express Wizard - Scenario - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Express Settings Configuration Secure Gateway (IP/DNS) Pre-Shared Key Local Policy (IP/Mask) 0.0.0.0 / 255.255.255.0 Remote Policy (IP/Mask) 0.0.0.0 / 255.255.255.0 < Back Next >

The following table describes the labels in this screen.

Table 16 VPN Express Wizard: Step 3

LABELDESCRIPTION
Secure GatewayIf Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, enter the WAN IP address or domain name of the remote IPSec router (secure gateway) to identify the remote IPSec router by its IP address or a domain name.
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection. Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9", "A-F") characters. Precede hexadecimal characters with "0x". Both ends of the VPN tunnel must use the same pre-shared key. You will receive a PYLD_MALFORMED (payload malformed) packet if the same pre-shared key is not used on both ends.
Local Policy (IP/Mask)Type a static local IP address that corresponds to the remote IPSec router's configured remote IP address (the remote IP address of the other ZyWALL). To specify IP addresses on a network by their subnet mask, type the subnet mask of the LAN behind your ZyWALL.
Remote Policy (IP/ Mask)If Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, type a static local IP address that corresponds to the remote IPSec router's configured local IP address (the local IP address of the other ZyWALL). To specify IP addresses on a network by their subnet mask, type the subnet mask of the LAN behind the remote gateway.
BackClick Back to return to the previous screen.
NextClick Next to continue.

4.8.1 VPN Express Wizard - Policy Setting

The Policy Setting specifies which devices can use the VPN tunnel. Local and remote IP addresses must be static.

Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also specify a subnet. This must match the remote IP address configured on the peer IPSec device.

Remote Policy (IP/Mask): Type the IP address of a computer behind the peer IPSec device. You can also specify a subnet. This must match the local IP address configured on the peer IPSec device.

Figure 42 VPN Express Wizard: Step 4
ZYXEL ZYWALL USG 2000 - VPN Express Wizard - Policy Setting - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Express Settings Summary Rule Name WIZ_VPN Secure Gateway 10.1.2.3 Pre-Shared Key 12345678 Local Policy 192.168.1.2 / 255.255.255.0 Remote Policy 10.10.10.10 / 255.255.255.0 Configuration for Secure Gateway

Edit this shell script according to

the comments before using it in the remote gateway.

Check the peer-ip interface.

Check the local-ip interface.

Then remove the following line.

PLEASE REMOVE THIS LINE configure terminal Click "Save" button to write the VPN configuration to ZyWALL. < Back Save

The following table describes the labels in this screen.

Table 17 VPN Express Wizard: Step 4

LABELDESCRIPTION
Summary
Rule NameThis is the name of the VPN connection (and VPN gateway).
Secure GatewayThis is the WAN IP address or domain name of the remote IPSec router. If this field displays 0.0.0.0, only the remote IPSec router can initiate the VPN connection.
Pre-Shared KeyThis is a pre-shared key identifying a communicating party during a phase 1 IKE negotiation.
Local PolicyThis is a (static) IP address and Subnet Mask on the LAN behind your ZyWALL.
Remote PolicyThis is a (static) IP address and Subnet Mask on the network behind the remote IPSec router.
Configuration for Remote GatewayThese commands set the matching VPN connection settings for the remote gateway. If the remote gateway is a ZLD-based ZyWALL, you can copy and paste this list into its command line interface in order to configure it for the VPN tunnel.You can also use a text editor to save these commands as a shell script file with a “.zysh” filename extension. Then you can use the file manager to run the script in order to configure the VPN connection.See the commands reference guide for details on the commands displayed in this list.
SaveClick Save to store the VPN settings on your ZyWALL.

4.8.2 VPN Express Wizard - Summary

This summary of VPN tunnel settings is read-only.

Name: Identifies the VPN gateway policy.

Secure Gateway: IP address or domain name of the peer IPSec device.

Pre-Shared Key: VPN tunnel password.

Local Policy: IP address and subnet mask of the computers on the network behind your ZyWALL that can use the tunnel.

Remote Policy: IP address and subnet mask of the computers on the network behind the peer IPSec device that can use the tunnel.

You can copy and paste the Configuration for Remote Gateway commands into another ZLD-based ZyWALL's command line interface.

Figure 43 VPN Express Wizard: Step 6
ZYXEL ZYWALL USG 2000 - VPN Express Wizard - Summary - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Express Settings Congratulations. The VPN Access wizard is completed Summary of VPN Access configuration: Rule Name WIZ_VPN Secure Gateway 10.1.2.3 Pre-Shared Key 12345678 Local Policy 192.168.1.2 / 255.255.255.0 Remote Policy 10.10.10.10 / 255.255.255.0 Now if you are doing first time installation of this device, you may click this myZyXEL.com link and to register this device and activate trial service of advanced security features.(You need to have internet access to register) Close

Note: If you have not already done so, use the myZyXEL.com link and register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

Alternatively, click Close to exit the wizard.

4.8.3 VPN Express Wizard - Finish

Now you can use the VPN tunnel.

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

4.8.4 VPN Advanced Wizard

Click the Advanced radio button as shown in Figure 39 on page 84 to display the following screen.

Figure 44 VPN Advanced Wizard: Step 2
ZYXEL ZYWALL USG 2000 - VPN Advanced Wizard - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Advanced Settings Scenario Rule Name VMZ_VPN Site-to-site Site-to-site with Dynamic Peer Remote Access (Server Role) Remote Access (Client Role) < Back Next >

The following table describes the labels in this screen.

Table 18 VPN Advanced Wizard: Step 2

LABELDESCRIPTION
Rule NameType the name used to identify this VPN connection (and VPN gateway). You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Site-to-siteChoose this if the remote IPSec router has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.
Site-to-site with Dynamic PeerChoose this if the remote IPSec router has a dynamic IP address. Only the remote IPSec router can initiate the VPN tunnel.
Remote Access (Server Role)Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.
Remote Access (Client Role)Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
BackClick Back to return to the previous screen.
NextClick Next to continue.

There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA (Security Association).

Figure 45 VPN Advanced Wizard: Step 3
ZYXEL ZYWALL USG 2000 - VPN Advanced Wizard - 2

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Advanced Settings Phase 1 Setting Secure Gateway (IP/DNS) My Address (interface) ge2 Negotiation Mode Main Encryption Algorithm DES Authentication Algorithm MD5 Key Group DH1 SA Life Time 86400 (180 - 3000000 Seconds) NAT Traversal Dead Peer Detection (DPD) Authentication Method Pre-Shared Key Certificate default < Back Next >

The following table describes the labels in this screen.

Table 19 VPN Advanced Wizard: Step 3

LABELDESCRIPTION
Phase 1 Setting
Secure GatewayIf Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, enter the WAN IP address or domain name of the remote IPSec router (secure gateway) in the field below to identify the remote IPSec router by its IP address or a domain name. Set this field to 0.0.0.0 if the remote IPSec router has a dynamic WAN IP address.
My Address (interface)Select an interface from the drop-down list box to use on your ZyWALL.
Negotiation ModeSelect Main for identity protection. Select Aggressive to allow more incoming connections from dynamic IP addresses to use separate passwords.Note: Multiple SAs (security associations) connecting through a secure gateway must have the same negotiation mode.
Encryption AlgorithmWhen DES is used for data communications, both sender and receiver must know the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key and AES256 uses a 256-bit key. Select Null to have no encryption.
Authentication AlgorithmMD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA1 for maximum security.
Key GroupYou must choose a key group for phase 1 IKE setup. DH1 (default) refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit random number.
SA Life Time (Seconds)Define the length of time before an IKE SA automatically renegotiates in this field. The minimum value is 60 seconds.A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected.
NAT TraversalSelect this check box to enable NAT traversal. NAT traversal allows you to set up a VPN connection when there are NAT routers between the two IPSec routers.Note: The remote IPSec router must also have NAT traversal enabled. See Chapter 21 on page 339 for more information.
Dead Peer Detection (DPD)Select this check box if you want the ZyWALL to make sure the remote IPSec router is there before it transmits data through the IKE SA. If there has been no traffic for at least 15 seconds, the ZyWALL sends a message to the remote IPSec server. If the remote IPSec server responds, the ZyWALL transmits the data. If the remote IPSec server does not respond, the ZyWALL shuts down the IKE SA.
Authentication Method
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection.Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9", "A-F") characters. Precede hexadecimal characters with "0x".Both ends of the VPN tunnel must use the same pre-shared key. You will receive a PYLD_MALFORMED (payload malformed) packet if the same pre-shared key is not used on both ends.
CertificateUse the drop-down list box to select the certificate to use for this VPN tunnel. You must have certificates already configured in the My Certificates screen. Click Certificate under the Object menu to go to the My Certificates screen where you can view the ZyWALL's list of certificates.
BackClick Back to return to the previous screen.
NextClick Next to continue.

4.8.5 VPN Advanced Wizard - Advanced Settings

Phases: IKE (Internet Key Exchange) negotiation has two phases. A phase 1 exchange establishes an IKE SA (Security Association) and phase 2 (Key Exchange) uses the SA to negotiate SAs for IPSec.

Note: Multiple SAs connecting through a secure gateway must have the same negotiation mode.

Negotiation Mode: Select Main for identity protection. Select Aggressive to allow more incoming connections from dynamic IP addresses to use separate passwords.

Proposal: 3DES and AES use encryption. The longer the AES key, the higher the security (this may affect throughput). Null uses no encryption.

Authentication Algorithm: MD5 gives minimal security. SHA-1 gives higher security.

SA Life Time: Set how often the ZyWALL renegotiates the IKE SA. A short SA Life Time increases security, but renegotiation temporarily disconnects the VPN tunnel.

NAT Traversal: Select this if the VPN tunnel must pass through NAT (there is a NAT router between the IPSec devices).

Use Dead Peer Detection (DPD) to have the ZyWALL make sure the remote IPSec router is there before transmitting data through the IKE SA. If the remote IPSec server does not respond, the ZyWALL shuts down the IKE SA.

Phase 2 in an IKE uses the SA that was established in phase 1 to negotiate SAs for IPSec.

Figure 46 VPN Advanced Wizard: Step 4
ZYXEL ZYWALL USG 2000 - VPN Advanced Wizard - Advanced Settings - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Advanced Settings Phase 2 Setting Active Protocol ESP Encapsulation Tunnel Encryption Algorithm DES Authentication Algorithm SHA1 SA Life Time 86400 (180 - 3000000 Seconds) Perfect Forward Secrecy (PFS) None Policy Setting Local Policy (IP/Mask) 0.0.0.0 / 255.255.255.0 Incoming Interface ge1 Remote Policy (IP/Mask) 0.0.0.0 / 255.255.255.0 Property Nailed-Up < Back Next >

The following table describes the labels in this screen.

Table 20 VPN Advanced Wizard: Step 4

LABELDESCRIPTION
Phase 2 Setting
Active ProtocolSelect the security protocols used for an SA.Both AH and ESP increase ZyWALL processing requirements and communications latency (delay).
EncapsulationTunnel is compatible with NAT, Transport is not.Tunnel mode encapsulates the entire IP packet to transmit it securely. Tunnel mode is required for gateway services to provide access to internal systems. Tunnel mode is fundamentally an IP tunnel with authentication and encryption. Transport mode is used to protect upper layer protocols and only affects the data in the IP packet. In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).
Encryption AlgorithmWhen DES is used for data communications, both sender and receiver must know the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key and AES256 uses a 256-bit key. Select Null to have no encryption.
SA Life Time (Seconds)Define the length of time before an IKE SA automatically renegotiates in this field. The minimum value is 60 seconds.A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected.
Perfect Forward Secret (PFS)Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA setup. This allows faster IPSec setup, but is not so secure.Select DH1, DH2 or DH5 to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit random number (more secure, yet slower).
Policy Setting
Local Policy (IP/ Mask)Type a static local IP address that corresponds to the remote IPSec router's configured remote IP address.To specify IP addresses on a network by their subnet mask, type the subnet mask of the LAN behind your ZyWALL.
Incoming InterfaceSelect an interface from the drop-down list box to have packets encrypted by the remote IPSec router to enter the ZyWALL via this interface.
Remote Policy (IP/Mask)Type a static local IP address that corresponds to the remote IPSec router's configured local IP address.To specify IP addresses on a network by their subnet mask, type the subnet mask of the LAN behind the remote gateway.
Property
Nail UpSelect this if you want the ZyWALL to automatically renegotiate the IPSec SA when the SA life time expires.
NextClick Next to continue.

4.8.6 VPN Advanced Wizard - Phase 2

Active Protocol: ESP is compatible with NAT, AH is not.

Encapsulation: Tunnel is compatible with NAT, Transport is not.

Proposal: 3DES and AES use encryption. The longer the AES key, the higher the security (this may affect throughput). Null uses no encryption.

Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also specify a subnet. This must match the remote IP address configured on the peer IPSec device.

Incoming Interface: The peer IPSec device connects to the ZyWALL via this interface.

Remote Policy (IP/Mask): Type the IP address of a computer behind the peer IPSec device. You can also specify a subnet. This must match the local IP address configured on the peer IPSec device.

Nail Up: Select this to have the ZyWALL automatically renegotiate the IPSec SA when the SA life time expires.

This read-only screen shows the status of the current VPN setting. Use the summary table to check whether what you have configured is correct.

Figure 47 VPN Advanced Wizard: Step 5
ZYXEL ZYWALL USG 2000 - VPN Advanced Wizard - Phase 2 - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Advanced Settings Summary Rule Name WIZ_VPN Secure Gateway Any Pre-Shared Key 12345678 Local Policy 192.168.1.2 / 255.255.255.0 Remote Policy Any Configuration for Remote Gateway

Edit this shell script according to

the comments before using it in the remote gateway.

Check the peer-ip interface.

Check the local-ip interface.

Edit the WIZ_VPN_LOCAL address-object.

Then remove the following line.

PLEASE REMOVE THIS LINE 2. Click "Save" button to write the VPN configuration to ZyWALL. < Back Save

The following table describes the labels in this screen.

Table 21 VPN Advanced Wizard: Step 5

LABELDESCRIPTION
Summary
Rule NameThis is the name of the VPN connection (and VPN gateway).
Secure GatewayThis is the WAN IP address or domain name of the remote IPSec router. If this field displays 0.0.0.0, only the remote IPSec router can initiate the VPN connection.
Pre-Shared KeyThis is a pre-shared key identifying a communicating party during a phase 1 IKE negotiation.
Local PolicyThis is a (static) IP address and Subnet Mask on the LAN behind your ZyWALL.
Remote PolicyThis is a (static) IP address and Subnet Mask on the network behind the remote IPSec router.
Remote Gateway CLIThese commands set the matching VPN connection settings for the remote gateway. If the remote gateway is a ZLD-based ZyWALL, you can copy and paste this list into its command line interface in order to configure it for the VPN tunnel.You can also use a text editor to save these commands as a shell script file with a “.zysh” filename extension. Then you can use the file manager to run the script in order to configure the VPN connection.See the commands reference guide for details on the commands displayed in this list.
SaveClick Save to store the VPN settings on your ZyWALL.

4.8.7 VPN Advanced Wizard - Summary

This summary of VPN tunnel settings is read-only.

Name: Identifies the VPN connection (and the VPN gateway).

Secure Gateway: IP address or domain name of the peer IPSec device.

Pre-Shared Key: VPN tunnel password.

Local Policy: IP address and subnet mask of the computers on the network behind your ZyWALL that can use the tunnel.

Remote Policy: IP address and subnet mask of the computers on the network behind the peer IPSec device that can use the tunnel.

Copy and paste the Remote Gateway CLI commands into another ZLD-based ZyWALL's command line interface.

Click Save to save the VPN rule.

4.8.8 VPN Advanced Wizard - Finish

Now you can use the VPN tunnel.

Figure 48 VPN Wizard: Step 6: Advanced
ZYXEL ZYWALL USG 2000 - VPN Advanced Wizard - Finish - 1

text_image STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 STEP 6 Advanced Settings Congratulations. The VPN Access wizard is completed Summary of VPN Access configuration: Rule Name WIZ_VPN Secure Gateway Any My Address (interface) ge2 Pre-Shared Key 12345678 Phase 1 Negotiation Mode main Encryption Algorithm des Authentication Algorithm md5 Key Group group1 SA Life Time 86400 NAT Traversal no Dead Peer Detection (DPD) yes Phase 2 Active Protocol ESP Encapsulation Tunnel Encryption Algorithm des Authentication Algorithm sha SA Life Time 86400 Perfect Forward Secrecy none Policy Local Policy 192.168.1.2 / 255.255.255.0 Remote Policy Any Incoming Interface ge1 Nailed-Up no Now if you are doing first time installation of this device, you may click this myZvXEL.com link and to register this device and activate trial service of advanced security features.(You need to have internet access to register) Close

Note: If you have not already done so, you can register your ZyWALL with myZyXEL.com and activate trials of services like IDP.

You can click Next and use the following screen to perform a basic registration (see Section 4.4 on page 77). If you want to do a more detailed registration or manage your account details, click myZyXEL.com.

Alternatively, click Close to exit the wizard.

Configuration Basics

This section provides information to help you configure the ZyWALL effectively. Some of it is helpful when you are just getting started. Some of it is provided for your reference when you configure various features in the ZyWALL.

  • Section 5.1 on page 101 introduces the ZyWALL's object-based configuration.
    • Section 5.2 on page 102 introduces zones, interfaces, and port groups.
  • Section 5.3 on page 104 introduces some differences in terminology and organization between the ZyWALL and other routers, particularly ZyNOS routers.
  • Section 5.4 on page 105 identifies the features you should configure before and after you configure the main screens for each feature. For example, if you want to configure a trunk for load-balancing, you should configure the member interfaces before you configure the trunk. After you configure the trunk, you should configure a policy route for it as well. (You might also have to configure criteria for the policy route.)
  • Section 5.5 on page 115 identifies the objects that store information used by other features.
  • Section 5.6 on page 116 introduces some of the tools available for system management.

5.1 Object-based Configuration

The ZyWALL stores information or settings as objects. You use these objects to configure many of the ZyWALL's features and settings. Once you configure an object, you can reuse it in configuring other features.

When you change an object's settings, the ZyWALL automatically updates all the settings or rules that use the object. For example, if you create a schedule object, you can have firewall, application patrol, content filter, and other settings use it. If you modify the schedule, all the firewall, application patrol, content filter, and other settings that use the schedule automatically apply the updated schedule.

You can create address objects based on an interface's IP address, subnet, or gateway. The ZyWALL automatically updates every rule or setting that uses these objects whenever the interface's IP address settings change. For example, if you

change ge1's IP address, the ZyWALL automatically updates the rules or settings that use the ge1 interface-based, LAN subnet address object.

You can use the Objects screens to create objects before you configure features that use them. If you are in a screen that uses objects, you can also usually select Create Object to open a screen where you can configure a new object.

For a list of common objects, see Section 5.5 on page 115.

5.2 Zones, Interfaces, and Physical Ports

Zones (groups of interfaces and VPN tunnels) simplify security settings. Here is an overview of zones, interfaces, and physical ports in the ZyWALL.

Figure 49 Zones, Interfaces, and Physical Ethernet Ports
ZYXEL ZYWALL USG 2000 - Zones, Interfaces, and Physical Ports - 1

flowchart
graph TD
    A["LAN<br>ge1"] --> B["P1"]
    C["WAN<br>ge2 ge3"] --> D["P2"]
    E["DMZ<br>ge4 ge5 ge6"] --> F["P3"]
    G["ge7"] --> H["P4"]
    I["ge8"] --> J["P5"]
    K["Physical Ports"] --> L["P6"]
    M["10/100/1000"] --> N["P1"]
    O["10/100/1000"] --> P["P2"]
    Q["10/100/1000"] --> R["P3"]
    S["10/100/1000"] --> T["P4"]
    U["10/100/1000"] --> V["P5"]
    W["10/100/1000"] --> X["P6"]
    Y["10/100/1000"] --> Z["P7"]
    AA["SFP"] --> AB["LNK"]
    AA --> AC["ACT"]
    AD["L9"] --> AE["P8"]
    AF["SFP"] --> AG["LNK"]
    AF --> AH["ACT"]

Table 22 Zones, Interfaces, and Physical Ethernet Ports

Zones(WAN, LAN, DMZ)A zone is a group of interfaces and VPN tunnels. Use zones to apply security settings such as firewall, IDP, remote management, anti-virus, and application patrol.
Interfaces(Ethernet, VLAN,...)Interfaces are logical entities that (layer-3) packets pass through. Use interfaces in configuring VPN, zones, trunks, device HA, DDNS, policy routes, static routes, HTTP redirect, and virtual server.Port groups combine physical ports into interfaces.
Physical Ethernet Ports(P1~P8)The physical port is where you connect a cable. In configuration, you use physical ports when configuring port groups. You use interfaces and zones in configuring other features.

5.2.1 Interface Types

There are many types of interfaces in the ZyWALL. In addition to being used in various features, interfaces also describe the network that is directly connected to the ZyWALL.

  • Ethernet interfaces are the foundation for defining other interfaces and network policies. You also configure RIP and OSPF in these interfaces.
  • Port groups create a hardware connection between physical ports at the layer-2 (data link, MAC address) level.
  • PPPoE/PPTP interfaces support Point-to-Point Protocols (PPP). ISP accounts are required for PPPoE/PPTP interfaces.
  • VLAN interfaces recognize tagged frames. The ZyWALL automatically adds or removes the tags as needed. Each VLAN can only be associated with one Ethernet interface.
  • Bridge interfaces create a software connection between Ethernet or VLAN interfaces at the layer-2 (data link, MAC address) level. Then, you can configure the IP address and subnet mask of the bridge. It is also possible to configure zone-level security between the member interfaces in the bridge.
  • Virtual interfaces increase the amount of routing information in the ZyWALL. There are three types: virtual Ethernet interfaces (also known as IP alias), virtual VLAN interfaces, and virtual bridge interfaces.
  • The auxiliary interface, along with an external modem, provides an interface the ZyWALL can use to dial out. This interface can be used as a backup WAN interface, for example. The auxiliary interface controls the AUX port.

5.2.2 Default Interface and Zone Configuration

This section explains the ZyWALL's factory default zone and interface configuration. The following figure uses letters to denote public IP addresses or part of a private IP address.

Figure 50 Default Network Topology
ZYXEL ZYWALL USG 2000 - Default Interface and Zone Configuration - 1

flowchart
graph TD
    A["Zyxel"] -->|GE1: 192.168.1.1| B["LAN"]
    B --> C["192.168.1.x"]
    C --> D["INTERNET WAN"]
    D --> E["GE3: e.f.g.h"]
    E --> F["SECURITY EXTENSION MODULE"]
    F --> G["HDB SLOT"]
    G --> H["CARD SLOT"]
    H --> I["USB"]
    F --> J["GE4: 192.168.2.1"]
    F --> K["GE5: 192.168.3.1"]
    F --> L["GE6: 192.168.4.1"]
    M["DMZ"] --> N["192.168.2.x"]
    M --> O["192.168.3.x"]
    M --> P["192.168.4.x"]

Table 23 Default Port, Interface, and Zone Configuration

PORTINTERFACEZONEIP ADDRESS AND DHCP SETTINGSSUGGESTED USE WITH DEFAULT SETTINGS
P1ge1LAN192.168.1.1, DHCP server enabledProtected LAN
P2, P3ge2, ge3WANDHCP clientsConnections to the Internet
P4~P6ge4, ge5, ge6DMZ192.168.2.1, 192.168.3.1, 192.168.4.1, DHCP server disabledPublic servers (such as web, e-mail and FTP)
P7, P8ge7, ge8NoneNone, DHCP server disabledConfigure and use these interfaces according to your requirements. Add them to existing zones or create new zones for them.
AUXauxNoneNoneAuxiliary modem
CONSOLEN/ANoneNoneLocal management

- The LAN zone contains the ge1 interface. The LAN zone is a protected zone. The ge1 interface uses 192.168.1.1.

- The WAN zone contains the ge2 and ge3 interfaces (physical ports P2 and P3). They use public IP addresses to connect to the Internet.

- The DMZ zone contains the ge4, ge5, and ge6 interfaces (physical ports P4, P5, and P6). The DMZ zone has servers that are available to the public. These interface uses private IP addresses 192.168.2.1, 192.168.3.1, and 192.168.4.1.

- Interfaces ge7 and ge8 interfaces (physical ports P7 and P8) are not part of a zone by default. Add them to zones to apply security policies.

5.3 Terminology in the ZyWALL

This section highlights some differences in terminology or organization between the ZyWALL and other routers, particularly ZyNOS routers.

Table 24 ZyWALL Terminology That is Different Than ZyNOS

ZYNOS FEATURE / TERMZYWALL FEATURE / TERM
Port forwardingVirtual server
IP aliasVirtual interface
Gateway policyVPN gateway
Network policy (IPSec SA)VPN connection
Hub-and-spoke VPN(VPN) concentrator

Table 25 ZyWALL Terminology That Might Be Different Than Other Products

FEATURE / TERMZYWALL FEATURE / TERM
Destination NAT (DNAT)Virtual server
Source NAT (SNAT)Policy route

Table 26 NAT: Differences Between the ZyWALL and ZyNOS

ZYNOS FEATURE / SCREENZYWALL FEATURE / SCREEN
Port forwardingVirtual server
Trigger port, port triggeringPolicy route
Address mappingPolicy route
Address mapping (VPN)IPSec VPN

Table 27 Bandwidth Management: Differences Between the ZyWALL and ZyNOS

ZYNOS FEATURE / SCREENZYWALL FEATURE / SCREEN
Interface bandwidth management(outbound)Interface
OSI level-7 bandwidth managementApplication patrol
General bandwidth managementPolicy route

5.4 Feature Configuration Overview

This section provides information about configuring the main features in the ZyWALL. The features are listed in the same sequence as the menu item(s) in the web configurator. Each feature is organized as shown below.

5.4.1 Feature

This provides a brief description. See the appropriate chapter(s) in this User's Guide for more information about any feature.

MENU ITEM(S)This shows you the sequence of menu items and tabs you should click to find the main screen(s) for this feature. See the web help or the related User's Guide chapter for information about each screen.
PREREQUISITESThese are other features you should configure before you configure the main screen(s) for this feature.If you did not configure one of the prerequisites first, you can often select an option to create a new object. After you create the object you return to the main screen to finish configuring the feature.You may not have to configure everything in the list of prerequisites. For example, you do not have to create a schedule for a policy route unless time is one of the criterion.
WHERE USEDThere are two uses for this.These are other features you should usually configure or check right after you configure the main screen(s) for this feature. For example, you should usually create a policy route for a VPN tunnel.You have to delete the references to this feature before you can delete any settings. For example, you have to delete (or modify) all the policy routes that refer to a VPN tunnel before you can delete the VPN tunnel.

Example: This provides a simple example to show you how to configure this feature. The example is usually based on the network topology in Figure 50 on page 103.

Note: PREQUISITES or WHERE USED does not appear if there are no prerequisites or references in other features to this one. For example, no other features reference DDNS entries, so there is no WHERE USED entry.

5.4.2 Interface

See Section 5.2 on page 102 for background information.

Note: When you create an interface, there is no security applied on it until you assign it to a zone.

Most of the features that use interfaces support Ethernet, PPPoE/PPTP, VLAN, and bridge interfaces.

MENU ITEM(S)Network > Interface (except Network > Interface > Trunk)
PREREQUISITESPort groups (configured in the Interface > Port Grouping screen)
WHERE USEDZones, trunks, IPSec VPN, device HA, DDNS, policy routes, static routes, HTTP redirect, virtual server, application patrol

Example: Interface ge1 is in the LAN zone and uses a private IP address. To configure ge1's settings, click Network > Interface > Ethernet and then ge1's Edit icon.

5.4.3 Trunks

Use trunks to set up load balancing using two or more interfaces.

MENU ITEM(S)Network > Interface > Trunk
PREREQUISITESInterfaces
WHERE USEDPolicy routes

Example: See Chapter 6 on page 119.

5.4.4 IPSec VPN

Use IPSec VPN to provide secure communication between two sites over the Internet or any insecure network that uses TCP/IP for communication. The ZyWALL also offers hub-and-spoke VPN.

MENU ITEM(S)VPN > IPSec VPN; you can also use the VPN Setup Wizard, which handles most of the prerequisites for you.
PREREQUISITESInterfaces, certificates (authentication), authentication methods (extended authentication), addresses (local network, remote network, NAT), to-ZyWALL firewall, firewall
WHERE USEDPolicy routes, zones, L2TP VPN

Example: See Chapter 6 on page 119.

5.4.5 SSL VPN

Use SSL VPN to provide secure network access to remote users.

MENU ITEM(S)VPN > SSL VPN
PREREQUISITESInterfaces, SSL application, users, user groups, addresses (network list, IP pool for assigning to clients, DNS and WINS server addresses), to-ZyWALL firewall, firewall
WHERE USEDPolicy routes, zones

Example: See Chapter 6 on page 119.

5.4.6 L2TP VPN

Use L2TP VPN to let remote users use the L2TP and IPSec client software included with their computers' operating systems to securely connect to the network behind the ZyWALL.

MENU ITEM(S)VPN > L2TP VPN
PREREQUISITESInterfaces, IPSec VPN connection, certificates (authentication), authentication methods (extended authentication), addresses (local network, remote network, NAT, IP pool for assigning to clients, DNS and WINS server addresses), to-ZyWALL firewall, firewall
WHERE USEDThe IPSec VPN connection used for L2TP VPN can be used in policy routes and zones

Example: See Chapter 27 on page 415.

5.4.7 Zones

See Section 5.2 on page 102 for background information. A zone is a group of interfaces and VPN tunnels. The ZyWALL uses zones, not interfaces, in many security settings, such as firewall rules and remote management.

Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most one zone. Virtual interfaces are automatically assigned to the same zone as the interface on which they run.

When you create a zone, the ZyWALL does not create any firewall rules, assign an IDP profile, or configure remote management for the new zone.

MENU ITEM(S)Network > Zone
PREREQUISITESInterfaces, IPSec VPN, SSL VPN
WHERE USEDFirewall, IDP, remote management, anti-virus, ADP, application patrol

Example: For example, to create the DMZ-2 zone and add ge7, click Network >Zone and then the Add icon.

5.4.8 Device HA

To increase network reliability, device HA lets a backup ZyWALL automatically take over if a master ZyWALL fails.

MENU ITEM(S)Device HA
PREREQUISITESInterfaces (with a static IP address), to-ZyWALL firewall

Example: See Chapter 6 on page 119.

5.4.9 DDNS

Dynamic DNS maps a domain name to a dynamic IP address. The ZyWALL helps maintain this mapping.

MENU ITEM(S)Network > DDNS
PREREQUISITESInterface

5.4.10 Policy Routes

Use policy routes to control the routing of packets through the ZyWALL's interfaces, trunks, and send traffic through VPN connections. You also use policy routes for bandwidth management (out of the ZyWALL), port triggering, and

general NAT on the source address. You have to set up the criteria, next-hops, and NAT settings in other screens first.

MENU ITEM(S)Network > Routing > Policy Route
PREREQUISITESCriteria: users, user groups, interfaces (incoming), IPSec VPN (incoming), addresses (source, destination), address groups (source, destination), schedules, services, service groupsNext-hop: addresses (HOST gateway), IPSec VPN, SSL VPN, trunks, interfacesNAT: addresses (translated address), services and service groups (port triggering)

Example: You have an FTP server connected to ge4 (in the DMZ zone). You want to limit the amount of FTP traffic that goes out from the FTP server through your WAN connection.

1 Create an address object for the FTP server (Object > Address).
2 Click Network > Routing > Policy Route to go to the policy route configuration screen. Add a policy route.
3 Name the policy route.
4 Select the interface that the traffic comes in through (ge4 in this example).
5 Select the FTP server's address as the source address.
6 You don't need to specify the destination address or the schedule.
7 For the service, select FTP.
8 For the Next Hop fields, select Interface as the Type if you have a single WAN connection or Trunk if you have multiple WAN connections.
9 Select the interface that you are using for your WAN connection (ge2 and ge3 are the default WAN interfaces). If you have multiple WAN connections, select the trunk.
10 Specify the amount of bandwidth FTP traffic can use. You may also want to set a low priority for FTP traffic.

Note: The ZyWALL checks the policy routes in the order that they are listed. So make sure that your custom policy route comes before any other routes that would also match the FTP traffic.

5.4.11 Static Routes

Use static routes to tell the ZyWALL about networks not directly connected to the ZyWALL.

MENU ITEM(S)Network > Routing > Static Route
PREREQUISITESInterfaces

5.4.12 Firewall

The firewall controls the travel of traffic between or within zones. You can also configure the firewall to control traffic for virtual server (port forwarding) and policy routes (NAT). You can configure firewall rules based on schedules, specific users (or user groups), source or destination addresses (or address groups) and services (or service groups). Each of these objects must be configured in a different screen.

To-ZyWALL firewall rules control access to the ZyWALL. Configure to-ZyWALL firewall rules for remote management. By default, the firewall allows any computer from the LAN zone to access or manage the ZyWALL. The ZyWALL drops packets from the WAN or DMZ zone to the ZyWALL itself, except for Device HA and VPN traffic.

MENU ITEM(S)Firewall
PREREQUISITESZones, schedules, users, user groups, addresses (source, destination), address groups (source, destination), services, service groups

Example: Suppose you have a SIP proxy server connected to the DMZ zone for VoIP calls. You could configure a firewall rule to allow VoIP sessions from the SIP proxy server on DMZ to the LAN so VoIP users on the LAN can receive calls.

1 Create a VoIP service object for UDP port 5060 traffic (Object > Service).
2 Create an address object for the VoIP server (Object > Address).
3 Click Firewall to go to the firewall configuration.
4 Select from the DMZ zone to the LAN zone, and add a firewall rule using the items you have configured.

  • You don't need to specify the schedule or the user.
  • In the Source field, select the address object of the VoIP server.
  • You don't need to specify the destination address.
  • Leave the Access field set to Allow and the Log field set to No.

Note: The ZyWALL checks the firewall rules in order. Make sure each rule is in the correct place in the sequence.

5.4.13 Application Patrol

Use application patrol to control which individuals can use which services through the ZyWALL (and when they can do so). You can also specify allowed amounts of bandwidth and priorities. You must subscribe to use application patrol. You can subscribe using the Licensing > Registration screens or one of the wizards.

MENU ITEM(S)AppPatrol
PREREQUISITESRegistration, zones, Schedules, users, user groups, addresses (source, destination), address groups (source, destination). These are only used as criteria in exceptions and conditions.

Example: Suppose you want to allow vice president Bob to use BitTorrent and block everyone else from using it.

1 Create a user account for Bob (User/Group).
2 Click AppPatrol > Peer to Peer to go to the application patrol configuration screen. Click the BitTorrent application patrol entry's Edit icon.

  • Set the default policy's access to Drop.
  • Add another policy.
  • Select the user account that you created for Bob.
  • You can leave the source, destination and log settings at the default.

Note: With this example, Bob would have to log in using his account. If you do not want him to have to log in, you might create an exception policy with Bob's computer IP address as the source.

5.4.14 Anti-Virus

Use anti-virus to detect and take action on viruses. You must subscribe to use anti-virus. You can subscribe using the Licensing > Registration screens or one of the wizards.

MENU ITEM(S)Anti-X > AV
PREREQUISITESRegistration, zones

5.4.15 IDP

Use IDP to detect and take action on malicious or suspicious packets. You must subscribe to use IDP. You can subscribe using the Licensing > Registration screens or one of the wizards.

MENU ITEM(S)Anti-X > IDP
PREREQUISITESRegistration, zones

5.4.16 ADP

Use ADP to detect and take action on traffic and protocol anomalies.

Use content filtering to block or allow access to specific categories of web site content, individual web sites and web features (such as cookies). You can define which user accounts (or groups) can access what content and at what times. You must have a subscription in order to use the category-based content filtering. You can subscribe using the menu item or one of the wizards.

MENU ITEM(S)Anti-X > Content Filter
PREREQUISITESRegistration, addresses (source), schedules, users, user groups

Example: You can configure a policy that blocks Bill's access to arts and entertainment web pages during the workday. You must have already subscribed to the content filter service.

1 Create a user account for Bill if you have not done so already (User/Group).
2 Create a schedule for the work day (Object > Schedule).
3 Click Anti-X > Content Filter > Filter Profile. Click the Add icon to go to the screen where you can configure a category-based profile.
4 Name the profile and enable it.
5 Enable the external web filter service.

6 Decide what to do for matched web sites (Block in this example), unrated web sites and what to do when the category-based content filtering service is not available.
7 Select the Arts/Entertainment category (you need to click Advanced to display it).
8 Click OK.
9 Click General to go to the content filter general configuration screen.
10 Enable the content filter.
11 Add a policy that uses the schedule, the filtering profile and the user that you created.

5.4.18 Anti-Spam

Use anti-spam to detect and take action on spam mail.

MENU ITEM(S)Anti-X > Anti-Spam
PREREQUISITESZones

5.4.19 Virtual Server (Port Forwarding)

Use this to change the address and/or port number of packets coming in from a specified interface. This is also known as port forwarding.

The ZyWALL does not check to-ZyWALL firewall rules for packets that are redirected by virtual server. It does check regular (through-ZyWALL) firewall rules.

MENU ITEM(S)Network > Virtual Server
PREREQUISITESInterfaces, addresses (HOST)

Example: Suppose you have an FTP server with a private IP address connected to a DMZ port. You could configure a virtual server rule to forwards FTP sessions from the WAN to the DMZ.

1 Click Network > Virtual Server to configure the virtual server. Add an entry.
2 Name the entry.
3 Select the WAN interface that the FTP traffic is to come in through (in this example, ge2 or ge3.)

4 Specify the public WAN IP address where the ZyWALL will receive the FTP packets.
5 In the Mapped IP field, list the IP address of the FTP server. The ZyWALL will forward the packets received for the original IP address.
6 In Mapping Type, select Port.
7 Enter 21 in both the Original and the Mapped Port fields.

5.4.20 HTTP Redirect

Configure this feature to have the ZyWALL transparently forward HTTP (web) traffic to a proxy server. This can speed up web browsing because the proxy server keeps copies of the web pages that have been accessed so they are readily available the next time one of your users needs to access that page.

The ZyWALL does not check to-ZyWALL firewall rules for packets that are redirected by HTTP redirect. It does check regular (through-ZyWALL) firewall rules.

MENU ITEM(S)Network > HTTP Redirect
PREREQUISITESInterfaces

Example: Suppose you want HTTP requests from your LAN to go to a HTTP proxy server at IP address 192.168.3.80.

1 Click Network > HTTP Redirect.
2 Add an entry.
3 Name the entry.
4 Select the interface from which you want to redirect incoming HTTP requests (ge1).
5 Specify the IP address of the HTTP proxy server.
6 Specify the port number to use for the HTTP traffic that you forward to the proxy server.

5.4.21 ALG

The ZyWALL's Application Layer Gateway (ALG) allows VoIP and FTP applications to go through NAT on the ZyWALL. You can also specify additional signaling port numbers.

MENU ITEM(S)Network > ALG

5.5 Objects

Objects store information and are referenced by other features. If you update this information in response to changes, the ZyWALL automatically propagates the change through the features that use the object.

The following table introduces the objects. You can also use this table when you want to delete an object because you have to delete references to the object first.

Table 28 Objects Overview

OBJECTWHERE USED
user/groupSee the User/Group section for details on users and user groups.
addressVPN connections (local / remote network, NAT), policy routes (criteria, next-hop [HOST], NAT), firewall, application patrol (source, destination), content filter, virtual server (HOST), user settings (force user authentication), address groups, remote management (System)
address groupPolicy routes (criteria), firewall, application patrol (source, destination), content filter, user settings (force user authentication), address groups, remote management (System)
service, service groupPolicy routes (criteria, port triggering), firewall, service groups, log (criteria)
schedulePolicy routes (criteria), firewall, application patrol, content filter, user settings (force user authentication)
AAA serverAuthentication methods
authentication methodsVPN gateways (extended authentication), WWW (client authentication), L2TP VPN
certificatesVPN gateways, WWW, SSH, FTP
SSL ApplicationSSL VPN

5.5.1 User/Group

Use these screens to configure the ZyWALL's administrator and user accounts. The ZyWALL provides the following user types.

Table 29 User Types

TYPEABILITIES
AdminChange ZyWALL configuration (web, CLI)
Limited-AdminLook at ZyWALL configuration (web)
UserAccess network services, browse user-mode commands (CLI)
GuestAccess network services
Ext-UserThe same as a User or a Guest. The ZyWALL looks for the specific type in an external authentication server. If the type is not available, the ZyWALL applies default settings.

If you want to force users to log in to the ZyWALL before the ZyWALL routes traffic for them, you might have to configure prerequisites first.

MENU ITEM(S)Object > User/Group
PREREQUISITESAddresses, address groups, schedules. The prerequisites are only used in policies to force user authentication
WHERE USEDPolicy routes, firewall, application patrol, content filter, user groups, VPN

5.6 System Management and Maintenance

This section introduces some of the management and maintenance features in the ZyWALL. Use Host Name to configure the system and domain name for the ZyWALL. Use Date/Time to configure the current date, time, and time zone in the ZyWALL. Use Console Speed to set the console speed. Use Language to select a language for the web configurator screens.

5.6.1 DNS, WWW, SSH, TELNET, FTP, SNMP, Dial-in Mgmt, Vantage CNM

Use these screens to set which services or protocols can be used to access the ZyWALL through which zone and from which addresses (address objects) the access can come. Use Dial-in Mgmt for a remote management connection through an external serial modem connected to the AUX port.

MENU ITEM(S)System > DNS, WWW, SSH, TELNET, FTP, SNMP, Dial-in Mgmt, Vantage CNM, Language
PREREQUISITESTo-ZyWALL firewall, zones, addresses, address groups, certificates (WWW, SSH, FTP, Vantage CNM), authentication methods (WWW)

Example: Suppose you want to allow an administrator to use HTTPS to manage the ZyWALL from the WAN.

1 Create an administrator account (User/Group).
2 Create an address object for the administrator's computer (Object > Address).
3 Click System > WWW to configure the HTTP management access. Enable HTTPS and add an administrator service control entry.
- Select the address object for the administrator's computer.
- Select the WAN zone.
- Set the action to Accept.

5.6.2 File Manager

Use these screens to upload, download, delete, or run scripts of CLI commands. You can manage

  • Configuration files. Use configuration files to back up and restore the complete configuration of the ZyWALL. You can store multiple configuration files in the ZyWALL and switch between them without restarting.
  • Shell scripts. Use shell scripts to run a series of CLI commands. These are useful for large, repetitive configuration changes (for example, creating a lot of VPN tunnels) and for troubleshooting.

You can edit configuration files and shell scripts in any text editor.

MENU ITEM(S)Maintenance > File Manager

5.6.3 Licensing Registration

Use these screens to register your ZyWALL and subscribe to services like antivirus, IDP and application patrol, more SSL VPN tunnels, and content filtering. You must have Internet access to myZyXEL.com.

MENU ITEM(S)Licensing > Registration
PREREQUISITESInternet access to myZyXEL.com

5.6.4 Licensing Update

Use these screens to update the ZyWALL's signature packages for the anti-virus, IDP and application patrol, and system protect features. You must have a valid subscription to update the anti-virus and IDP/application patrol signatures You must have Internet access to myZyXEL.com.

MENU ITEM(S)Licensing > Update
PREREQUISITESRegistration (for anti-virus and IDP/application patrol), Internet access to myZyXEL.com

5.6.5 Logs and Reports

The ZyWALL provides a system log, offers two e-mail profiles to which to send log messages, and sends information to four syslog servers. It also provides statistical reports to track user activity, web site hits, virus traffic and intrusions and can e-mail them to you on a daily basis.

MENU ITEM(S)Maintenance > Log, Report

5.6.6 Diagnostics

The ZyWALL can generate a file containing the ZyWALL's configuration and diagnostic information.

MENU ITEM(S)Maintenance > Diagnostics

Tutorials

This chapter provides some examples of using the web configurator to set up features in the ZyWALL. See also Chapter 27 on page 415 for an example of configuring L2TP.

6.1 How to Configure Interfaces, Port Grouping, and Zones

This tutorial shows how to configure Ethernet interfaces, port grouping, and zones for the following example configuration (see Section 5.2.2 on page 103 for the default configuration).

  • Interface ge8 uses a static IP address of 1.2.3.4 and is in the WAN zone.
  • This example uses a limited number of DMZ servers that need full wire speed communication with each other, so ports P4, P5, and P6 are combined into a ge4 interface port group. It uses IP address 192.168.2.1.

Figure 51 Ethernet Interface, Port Grouping, and Zone Configuration Example
ZYXEL ZYWALL USG 2000 - How to Configure Interfaces, Port Grouping, and Zones - 1

flowchart
graph TD
    A["ZyxEL<br>ZyWALL USG 2000<br>UNIFIED SECURITY GATEWAY"] -->|P1: 192.168.1.1| B["LAN"]
    B --> C["192.168.1.x"]
    B --> D["192.168.2.x"]
    A --> E["DMZ<br>192.168.2.x"]
    A --> F["INTERNET WAN"]
    F --> G["P3: e.f.g.h"]
    F --> H["P8: 1.2.3.4"]
    A --> I["SECURITY EXTENSING MODULE"]
    I --> J["10/100/000"]
    I --> K["10/100/000"]
    I --> L["10/100/000"]
    I --> M["10/100/000"]
    I --> N["10/100/000"]
    I --> O["10/100/000"]
    I --> P["10/100/000"]
    I --> Q["10/100/000"]
    I --> R["10/100/000"]
    I --> S["10/100/000"]
    I --> T["10/100/000"]
    I --> U["10/100/000"]
    I --> V["10/100/000"]
    I --> W["10/100/000"]
    I --> X["10/100/000"]
    I --> Y["10/100/000"]
    I --> Z["10/100/000"]
    I --> AA["10/100/000"]
    I --> AB["10/100/000"]
    I --> AC["10/100/000"]
    I --> AD["10/100/000"]
    I --> AE["10/100/000"]
    I --> AF["10/100/000"]
    I --> AG["10/100/000"]
    I --> AH["10/100/000"]
    I --> AI["10/100/000"]
    I --> AJ["10/100/000"]
    I --> AK["10/100/000"]
    I --> AL["10/100/000"]
    I --> AM["10/100/000"]
    I --> AN["10/100/000"]
    I --> AO["10/100/000"]
    I --> AP["10/100/000"]
    I --> AQ["10/100/000"]
    I --> AR["10/100/000"]
    I --> AS["15/168.2.x"]

6.1.1 Configure a WAN Ethernet Interface

You need to assign the ZyWALL's ge8 interface a static IP address of 1.2.3.4.

Click Network > Interface > Ethernet and the ge8 interface's Edit icon. Configure the IP address, subnet mask, and default gateway settings as follows and click OK.

Figure 52 Network > Interface > Ethernet > Edit ge8
ZYXEL ZYWALL USG 2000 - Configure a WAN Ethernet Interface - 1

text_image General Settings Enable Interface Interface Properties Interface Name ge8 MAC Address 00:00:AA:77:98:6D Description (Optional) IP Address Assignment Set Automatically Use Fixed IP Address IP Address 1.2.3.4 Subnet Mask 255.255.0.0 Gateway (Optional) Metric 0 (0-13)

6.1.2 Configure Zones

Do the following to add ge8 to the WAN zone.

1 Click Network > Zone and then the WAN zone Edit icon.
2 Select ge8 in the Available list and use the right arrow to move it to the Member list (as shown here). Click OK.

Figure 53 Network > Zone > WAN Edit
ZYXEL ZYWALL USG 2000 - Configure Zones - 1

text_image Group Members Name WAN ✓ Block Intra-zone Traffic Member List Available INTERFACE / ge7 INTERFACE / aux IPSEC / Default_L2TP_VPN_Connection >>> << Member INTERFACE / ge2 INTERFACE / ge3 INTERFACE / ge8 OK Cancel

6.1.3 Configure Port Grouping

Here is how to combine physical ports P4, P5, and P6 into the ge4 interface port group.

1 Click Network > Interface > Port Grouping.
2 Drag physical port 5 onto representative interface ge4, as shown next.

Figure 54 Network > Interface > Port Grouping, Drag-and-Drop (P5 to ge4)
ZYXEL ZYWALL USG 2000 - Configure Port Grouping - 1

text_image Configuration ge1 ge2 ge3 ge4 ge5 ge6 Representative Interface 10/100/1000 5 6 Physical Port Apply Reset

3 Drag physical port 6 onto representative interface ge4, as shown next.

Figure 55 Network > Interface > Port Grouping, Drag-and-Drop (P6 to ge4)
ZYXEL ZYWALL USG 2000 - Configure Port Grouping - 2

text_image Configuration ge1 ge2 ge3 ge4 ge5 ge6 Representative Interface 1 2 3 4 5 6 10/100/1000 Physical Port Apply Reset

4 Click Apply.

5 Click Status, and look at the Interface Status Summary as shown next. Ethernet interface ge4 has a status of Port Group Up, and Ethernet interfaces ge5 and ge6 are disabled and have a Status of Port Group Inactive.

Figure 56 Status: Interface Status Summary After Port Grouping
ZYXEL ZYWALL USG 2000 - Configure Port Grouping - 3

text_image Interface Status Summary Name Status HA Status Zone/IP Address Animation ge1 1000M/Full n/a LAN 192.168.1.1 n/a ge2 Down n/a WAN 0.0.0.0 Renew ge3 Down n/a WAN 0.0.0.0 Renew ge4 Port Group Up n/a DMZ 192.168.2.1 n/a ge5 Port Group Inactive n/a DMZ 192.168.3.1 n/a ge6 Port Group Inactive n/a DMZ 192.168.4.1 n/a

6.2 How to Configure Load Balancing

With the topology in Figure 51 on page 119, suppose interface ge8 has a high bandwidth Internet connection (100 Mbps) while ge2 and ge3 just have 1 Mbps each. Here is how to have the ZyWALL use ge8 for most Internet traffic and only use interfaces ge2 and ge3 for any traffic that exceeds what ge8 can handle. Here is how to use load balancing to have the ZyWALL mainly use ge8 when sending traffic to the Internet.

Figure 57 Trunk Example
ZYXEL ZYWALL USG 2000 - How to Configure Load Balancing - 1

flowchart
graph LR
    A["Router"] -->|ge2: 1 Mbps| B["INTERNET"]
    A -->|ge3: 1 Mbps| B
    A -->|ge8: 100 Mbps| B

You need to set up the outgoing bandwidth on each of the three interfaces and configure the WAN_TRUNK trunk's load balancing settings.

6.2.1 Set Up Available Bandwidth on Ethernet Interfaces

1 Click Network > Interface > Ethernet and the ge8 Edit icon. Enter the available bandwidth (100000 kbps) in the Egress Bandwidth field. Click OK.

Figure 58 Network > Interface > Ethernet > Edit (ge8)
ZYXEL ZYWALL USG 2000 - Set Up Available Bandwidth on Ethernet Interfaces - 1

text_image General Settings Enable Interface Interface Properties Interface Name ge8 MAC Address 00:00:AA:77:98:6D Description (Optional) IP Address Assignment Get Automatically Use Fixed IP Address IP Address 1.2.3.4 Subnet Mask 255.255.0.0 Gateway (Optional) Metric 0 (0-15) Interface Parameters Egress Bandwidth 100000 Kbps

2 Repeat the process to set the available bandwidth for ge2 and ge3 to (1000 kbps) in the Egress Bandwidth field. Click OK.

6.2.2 Configure the WAN Trunk

1 Click Network > Interface > Trunk. Click WAN_TRUNK's Edit icon.
2 In the Load Balancing Algorithm field, select Spillover. After the screen refreshes, click the Add icon at the top of the right-hand column.

Figure 59 Network > Interface > Trunk > WAN_TRUNK > Edit
ZYXEL ZYWALL USG 2000 - Configure the WAN Trunk - 1

text_image Trunk Members Name WAN_TRUNK Load Balancing Algorithm Spillover

Member Mode Egress Bandwidth Spillover

1.ge2 Active 1048576 Kbps 1048576 Kbps 2.ge3 Active 1048576 Kbps 1048576 Kbps 3(aux Passive 56 Kbps 56 Kbps OK Cancel

3 Select ge8 in the list on the left and use the right arrow to move it to the list on the right as shown. Click OK.

Figure 60 Network > Interface > Trunk > WAN_TRUNK > Edit > Add
ZYXEL ZYWALL USG 2000 - Member  Mode    Egress Bandwidth    Spillover - 1

text_image Member List Please select member. ge1 ge4 ge5 ge6 ge7 aux ge2 ge3 ge6 << OK Cancel

4 Click OK.

Figure 61 Network > Interface > Trunk > WAN_TRUNK > Edit (Done)
ZYXEL ZYWALL USG 2000 - Member  Mode    Egress Bandwidth    Spillover - 2

text_image Trunk Members Name Load Balancing Algorithm WAN_TRUNK Spillover # 1 ge8 Active 1048576 Kbps 1048576 Kbps 2 ge2 Active 1048576 Kbps 1048576 Kbps 3 ge3 Active 1048576 Kbps 1048576 Kbps 4 aux Passive 56 Kbps 56 Kbps OK Cancel

6.3 How to Set Up an IPSec VPN Tunnel

This example shows how to create the following VPN tunnel.

Figure 62 VPN Example
ZYXEL ZYWALL USG 2000 - How to Set Up an IPSec VPN Tunnel - 1

flowchart
graph LR
    subgraph LAN
        A["Computer"] --> B["Switch"]
        C["Computer"] --> B
        D["Computer"] --> B
        B --> E["Router"]
        E --> F["Internet"]
        F --> G["VPN Tunnel"]
        G --> H["Router"]
        H --> I["Router"]
    end
    subgraph IP address
        J["192.168.1.0/24"] --> K["X"]
        L["192.168.1.0/24"] --> M["2.2.3.4"]
        N["192.168.1.0/24"] --> O["2.2.2.2"]
    end
    subgraph IP address
        P["192.168.1.0/24"] --> Q["X"]
        R["192.168.1.0/24"] --> S["2.2.2.2"]
        T["192.168.1.0/24"] --> U["2.2.2.2"]
    end
    subgraph IP address
        V["192.168.1.0/24"] --> W["X"]
        X["192.168.1.0/24"] --> Y["2.2.3.4"]
        Z["192.168.1.0/24"] --> AA["2.2.2.2"]
        AB["192.168.1.0/24"] --> AC["2.2.2.2"]
    end
    subgraph IP address
        AD["192.168.1.0/24"] --> AE["X"]
        AF["192.168.1.0/24"] --> AG["2.2.3.4"]
        AH["192.168.1.0/24"] --> AI["2.2.2.2"]
        AJ["192.168.1.0/24"] --> AK["2.2.2.2"]
    end
    subgraph IP address
        AL["192.168.1.0/24"] --> AM["X"]
        AN["192.168.1.0/24"] --> AO["2.2.3.4"]
        AP["192.168.1.0/24"] --> AQ["2.2.2.2"]
        AR["192.168.1.0/24"] --> AS["2.2.2.2"]
    end
    subgraph IP address
        AT["192.168.1.0/24"] --> AU["X"]
        AV["192.168.1.0/24"] --> AW["2.2.3.4"]
        AX["192.168.1.0/24"] --> AY["2.2.3.4"]
        AZ["192.168.1.0/24"] --> BA["2.2.3.4"]
        BB["192.168.1.0/24"] --> BC["2.2.3.4"]
        BD["192.168.1.0/24"] --> BE["2.2.3.4"]
    end

In this example, the ZyWALL is router X (1.2.3.4), and the remote IPSec router is router Y (2.2.2.2). Create the VPN tunnel between ZyWALL X's LAN subnet

(192.168.1.0/24) and the LAN subnet behind peer IPSec router Y (172.16.1.0/24).

6.3.1 Set Up the VPN Gateway

The VPN gateway manages the IKE SA. You do not have to set up any other objects before you configure the VPN gateway because this VPN tunnel does not use any certificates or extended authentication.

1 Click VPN > IPSec VPN > VPN Gateway, and then click the Add icon.
2 Give the VPN gateway a name ("VPN_GW_EXAMPLE"). For My Address, select Interface and ge8. For the Peer Gateway Address, select Static Address and enter 2.2.2.2 in field 1. For the Authentication, Select Pre-Shared Key and enter 12345678. Click OK.

Figure 63 VPN > IPSec VPN > VPN Gateway > Add
ZYXEL ZYWALL USG 2000 - Set Up the VPN Gateway - 1

text_image General Settings VPN Gateway Name VPN_GW_EXAMPLE Gateway Settings My Address Interface ge8 Static -- 1.2.3.4/255.255.0.0 Domain Name / IP Peer Gateway Address Static Address 1. 2.2.2.2 2. 0.0.0.0 Dynamic Address Authentication Advanced Pre-Shared Key 12345678 Certificate default (See My Certificates) Phase 1 Settings Advanced SA Life Time 86400 (180 - 3000000 Seconds) More Settings OK Cancel

6.3.2 Set Up the VPN Connection

The VPN connection manages the IPSec SA. You have to set up the address objects for the local network and remote network before you can set up the VPN connection.

1 Click Object > Address. Click the Add icon.

2 Give the new address object a name ("VPN_REMOTE_SUBNET"), change the Address Type to SUBNET. Set up the Network field to 172.16.1.0 and the Netmask to 255.255.255.0. Click OK.

Figure 64 Object > Address > Add
ZYXEL ZYWALL USG 2000 - Set Up the VPN Connection - 1

text_image Configuration Name VPN_REMOTE_SUBNET Address Type SUBNET Network 172.16.1.0 Netmask 255.255.255.0 OK Cancel

3 Click VPN > IPSec VPN > VPN Connection. Click the Add icon.
4 Give the VPN connection a name ("VPN_CONN_EXAMPLE"). Under VPN Gateway select Static Site-to-site and the VPN gateway (VPN_GW_EXAMPLE). Under Policy, select LAN_SUBNET for the local network and VPN_REMOTE_SUBNET for the remote. Click OK.

Figure 65 VPN > IPSec VPN > VPN Connection > Add
ZYXEL ZYWALL USG 2000 - Set Up the VPN Connection - 2

text_image General Settings Connection Name VPN_CONN_EXAMPLE VPN Gateway Static Site-to-site VPN_GW_EXAMPLE ge8 Dynamic Site-to-site with Dynamic Peer Remote Access Policy Local policy LAN_SUBNET INTERFACE SUBNET, 192.168.1.0/24 Remote policy VPN_REMOTE_SUBNET SUBNET, 172.16.1.0/24 Phase 2 Settings SA Life Time 86400 (180 - 3000000 Seconds) More Settings OK Cancel Advanced Advanced

6.3.3 Set Up the Policy Route for the VPN Tunnel

Do the following to create a policy route to have the ZyWALL send traffic through the VPN tunnel.

1 Click Network > Routing > Policy Route. You want this policy route to have higher priority than the default policy route for the trunk, so click the Add icon at the top of the column, not the one next to the existing policy route.

Figure 66 Network > Routing > Policy Route
ZYXEL ZYWALL USG 2000 - Set Up the Policy Route for the VPN Tunnel - 1

text_image Policy Route Static Route RIP OSPF BWM Global Setting Enable BWM Configuration Total Connection:3 30 connection per page Page: 1 of 1

User Schedule Incoming Source Destination Service Next-Hop SNAT BWM

1 any none ge1 LAN_SUBNET any any WAN_TRUNK outgoing-interface 0 2 any none ge4 DMZ1_SUBNET any any WAN_TRUNK outgoing-interface 0 3 any none ge5 DMZ2_SUBNET any any WAN_TRUNK outgoing-interface 0 Apply Reset

2 Configure the policy route as shown next. This policy route applies to traffic from the LAN subnet. Use the VPN connection's local and remote objects as the source address and destination address objects here. The next-hop is the VPN connection that you created. Click OK.

Figure 67 Network > Routing > Policy Route > Add
ZYXEL ZYWALL USG 2000 - User Schedule Incoming Source Destination Service Next-Hop SNAT BWM - 1

text_image Configuration Enable Description (Optional) Criteria User any Incoming Interface / any Change... Source Address LAN_SUBNET Destination Address VPN_REMOTE_SUBNET Schedule none Service any Next-Hop Type VPN Tunnel VPN Tunnel VPN_CONN_EXAMPLE Bandwidth Shaping Maximum Bandwidth 0 Kbps Bandwidth Priority (1-7, 1 is highest priority) Maximize Bandwidth Usage OK Cancel

3 Now set up the VPN settings on the peer IPSec router and try to establish the VPN tunnel. To trigger the VPN, either try to connect to a device on the peer IPSec router's LAN or click VPN > IPSec VPN > VPN Connection and use the VPN connection screen's Connect icon.

6.3.4 Configure Security Policies for the VPN Tunnel

You configure security policies based on zones. Assign the new VPN connection to a zone to be able to apply security policies (firewall rules, IDP, and so on) to the VPN connection. Make sure all firewalls between the ZyWALL and remote IPSec router allow UDP port 500 (IKE) and IP protocol 50 (AH) or 51 (ESP). If you enable NAT traversal, all firewalls between the ZyWALL and remote IPSec router should also allow UDP port 4500.

6.4 How to Configure User-aware Access Control

You can configure many policies and security settings for specific users or groups of users. This is illustrated in the following example, where you will set up the following policies. This is a simple example that does not include priorities for different types of traffic. See Bandwidth Management on page 446 for more on bandwidth management.

Table 30 User-aware Access Control Example

GROUP (USER)WEB SURFINGWEB BANDWIDTHMSNLAN-TO-DMZ ACCESS
Finance (Leo)Yes200KNoYes
Engineer (Steven)Yes100KNoNo
Sales (Debbie)Yes100KYes (M-F, 08:30~18:00)Yes
Boss (Andy)Yes100KYesYes
Guest (guest)Yes50KNoNo
OthersNo---NoNo

The users are authenticated by an external RADIUS server at 192.168.1.200.

First, set up the user accounts and user groups in the ZyWALL. Then, set up user authentication using the RADIUS server. Finally, set up the policies in the table above.

The ZyWALL has its default settings.

6.4.1 Set Up User Accounts

Set up one user account for each user account in the RADIUS server. If it is possible to export user names from the RADIUS server to a text file, then you might create a script to create the user accounts instead. This example uses the web configurator.

1 Click Object > User/Group > User. Click the Add icon.
2 Enter the same user name that is used in the RADIUS server, and set the User Type to Ext-User because this user account is authenticated by an external server. Click OK.

Figure 68 Object > User/Group > User > Add
ZYXEL ZYWALL USG 2000 - Set Up User Accounts - 1

text_image User Configuration User Name Leo Ext-User User Type External User Description Authentication Timeout Settings Lease Time Use Default Settings Use Manual Settings 1440 minutes Reauthentication Time 1440 minutes OK Cancel

3 Repeat this process to set up the remaining user accounts.

6.4.2 Set Up User Groups

Set up the user groups and assign the users to the user groups.

1 Click Object > User/Group > Group. Click the Add icon.
2 Enter the name of the group that is used in Table 30 on page 128. In this example, it is "Finance". Then, select User/Leo and click the right arrow to move him to the Member list. This example only has one member in this group, so click OK. Of course you could add more members later.

Figure 69 Object > User/Group > Group > Add
ZYXEL ZYWALL USG 2000 - Set Up User Groups - 1

text_image Configuration Name Finance Description (Optional) Member List Available === User === Andy Debbie Steven ad-users Member === User === Leo === Group === OK Cancel

3 Repeat this process to set up the remaining user groups.

6.4.3 Set Up User Authentication Using the RADIUS Server

This step sets up user authentication using the RADIUS server. First, configure the settings for the RADIUS server. Then, set up the authentication method, and

configure the ZyWALL to use the authentication method. Finally, force users to log in to the ZyWALL before it routes traffic for them.

1 Click Object > AAA Server > RADIUS > Default. Configure the RADIUS server, and click Apply.

Figure 70 Object > AAA Server > RADIUS > Default
ZYXEL ZYWALL USG 2000 - Set Up User Authentication Using the RADIUS Server - 1

text_image Active Directory LDAP RADIUS Default Group General Settings Host 192.168.1.200 (IP or FQDN) Authentication Port 1812 Key **** Timeout 5 (1-300) Apply Reset

2 Click Object > Auth. Method. Click the Add icon.
3 Give the new authentication method object a descriptive name, and click the Add icon. Select group radius because the ZyWALL should use the specified RADIUS server for authentication. Click OK.

Figure 71 Object > Auth. Method > Add
ZYXEL ZYWALL USG 2000 - Set Up User Authentication Using the RADIUS Server - 2

text_image General Settings Name RADIUS-only

Method List

1 group radius OK Cancel

4 Click System > WWW. In the Authentication section, select the new authentication method in the Client Authentication Method field. Click Apply.

Figure 72 System > WWW (Authentication)
ZYXEL ZYWALL USG 2000 - Method List - 1

text_image Authentication Client Authentication Method RADIUS-only Apply Reset

5 Click Object > User/Group > Setting. In the Force User Authentication Policy section, click the Add icon.
6 Set up a default policy that forces every user to log in to the ZyWALL before the ZyWALL routes traffic for them. Select Enable. Then, select force in the Authentication field. Keep the rest of the default settings, and click OK.

Note: The users will have to log in using the web configurator login screen before they can use HTTP or MSN.

Figure 73 Object > User/Group > Setting > Add (Force User Authentication Policy)
ZYXEL ZYWALL USG 2000 - Method List - 2

text_image Configuration Enable Description default_policy (Optional) Authentication force Criteria Source Address any Destination Address any Schedule none OK Cancel

When the users try to browse the web (or use any HTTP/HTTPS application), the Login screen appears. They have to log in using the user name and password in the RADIUS server.

6.4.4 Set Up Web Surfing Policies With Bandwidth Restrictions

Use application patrol (AppPatrol) to enforce the web surfing and MSN policies. You must have already subscribed for the application patrol service. You can subscribe using the Licensing > Registration screens or using one of the wizards.

1 Click AppPatrol. If application patrol and bandwidth management are not enabled, enable them, and click Apply.

Figure 74 AppPatrol > General
ZYXEL ZYWALL USG 2000 - Set Up Web Surfing Policies With Bandwidth Restrictions - 1

text_image General Common Instant Messenger Peer to Peer VoIP Streaming General Settings Enable Application Patrol BWM Global Setting Enable BWM Enable Highest Bandwidth Priority for SIP Traffic License License Status: Licensed License Type: Standard Signature Information Current Version: 2.063 Released Date: 2008/02/20 22:48:25 Update Signatures Apply Reset

2 Click the Common tab and then the Edit icon next to the default http service.

Figure 75 AppPatrol > Common
ZYXEL ZYWALL USG 2000 - Set Up Web Surfing Policies With Bandwidth Restrictions - 2

text_image General Common Instant Messenger Peer to Peer YoIP Streaming Other Statistics Configuration

Service Default Access Modify

1 irc forward 2 http forward 3 ftp forward 4 pop3 forward 5 smtp forward Apply Reset

3 Click the Default policy's Edit icon.

Figure 76 AppPatrol > Common > http
ZYXEL ZYWALL USG 2000 - Service Default Access Modify - 1

text_image Service Enable Service Service Identification Name http Classification Auto Service Ports Policy

Port Schedule User From To Source Destination Access BWM In/Out/Pri Log

Default 0 any any any any any any forward no/no/1 no OK Cancel

4 Change the access to Drop because you do not want anyone except authorized user groups to browse the web. Click OK.

Figure 77 AppPatrol > Common > http > Edit Default
ZYXEL ZYWALL USG 2000 - Port Schedule User From To Source Destination Access BWM In/Out/Pri Log - 1

text_image Configuration Access Bandwidth Management Drop Inbound: 0 kbps Outbound: 0 kbps (0 : disabled) Priority 1 Maximize Bandwidth Usage Log no OK Cancel

5 Click the Add icon in the policy list. In the new policy, select one of the user groups that is allowed to browse the web and set the corresponding bandwidth restriction in the Inbound and Outbound fields. Click OK. Repeat this process to add exceptions for all the other user groups that are allowed to browse the web.

Figure 78 AppPatrol > Common> http > Edit Default
ZYXEL ZYWALL USG 2000 - Port Schedule User From To Source Destination Access BWM In/Out/Pri Log - 2

text_image Configuration Enable Policy Port 0 (0 : any) Schedule any User Finance From any To any Source any Destination any Access.forward Bandwidth Management Inbound: 200 kbps Outbound: 200 kbps (0 : disabled) Priority1 Maximize Bandwidth Usage Log=no OK Cancel

6.4.5 Set Up MSN Policies

Set up a recurring schedule object first because Sales can only use MSN during specified times on specified days.

1 Click Object > Schedule. Click the Add icon for recurring schedules.
2 Give the schedule a descriptive name. Set up the days (Monday through Friday) and the times (8:30 - 18:00) when Sales is allowed to use MSN. Click OK.

Figure 79 Object > Schedule > Add (Recurring)
ZYXEL ZYWALL USG 2000 - Set Up MSN Policies - 1

text_image Configuration Name WORKHOURS Day Time Item # Date Time Year Month Day Hour minute Start 8 30 Stop 18 0 Weekly Week Days Monday Tuesday Wednesday Thursday Friday Saturday Sunday OK Cancel

3 Follow the steps in Section 6.4.4 on page 131 to set up the appropriate policies for MSN in application patrol. Make sure to specify the schedule when you configure the policy for the Sales group's MSN access.

6.4.6 Set Up Firewall Rules

Use the firewall to control access from LAN to the DMZ.

1 Click Firewall and then click the Add icon.

Figure 80 Firewall (Default)
ZYXEL ZYWALL USG 2000 - Set Up Firewall Rules - 1

text_image Global Setting Enable Firewall Allow Asymmetrical Route Firewall rule From Zone any To Zone any Refresh Total rules: 6 30 entries per page Page: 1 of 1

Priority From To Schedule User Source Destination Service Access Log

1 1 WAN ZyWALL none any any any Default_Allow_WAN_To_ZyWALL allow no 2 2 WAN ZyWALL none any any any any deny no 3 3 WAN LAN none any any any any deny log 4 4 DMZ LAN none any any any any deny no 5 5 DMZ ZyWALL none any any any Default_Allow_DMZ_To_ZyWALL allow no 6 6 DMZ ZyWALL none any any any any deny log - Default any any any any any any any allow no Apply Reset

2 Set From as LAN and To as DMZ. Change the Access field to deny, and click OK.

Figure 81 Firewall > LAN to DMZ > Add
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 1

text_image Configuration Enable From LAN To DMZ Description (Optional) Schedule none User any Source any Destination any Service any Access deny Log no OK Cancel

3 Click the Add icon at the top of the rule list to create a rule for one of the user groups that is allowed to access the DMZ.

4 Set From as LAN and To as DMZ. Select one of the user groups that is allowed to access the DMZ, and click OK.

Figure 82 Firewall > Add
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 2

text_image Configuration Enable From LAN To DMZ (Optional) Description Schedule none User Finance Source any Destination any Service any Access allow Log no OK Cancel

5 Repeat this process to set up firewall rules for the other user groups that are allowed to access the DMZ.

6.5 How to Configure Service Control

Service control lets you configure rules that control HTTP and HTTPS management access (to the web configurator) and separate rules that control HTTP and HTTPS user access (logging into SSL VPN for example). See Chapter 45 on page 697 for more on service control.

The To-ZyWALL firewall rules apply to any kind of HTTP or HTTPS connection to the ZyWALL. They do not distinguish between administrator management access and user access. If you configure service control to allow management or user HTTP or HTTPS access, make sure the firewall is not configured to block that access.

6.5.1 Allow HTTPS Administrator Access Only From the LAN

This example configures service control to block administrator HTTPS access from all zones except the LAN.

1 Click System > WWW.

2 In HTTPS Admin Service Control, click the Add icon.

Figure 83 System > WWW
ZYXEL ZYWALL USG 2000 - In HTTPS Admin Service Control, click the Add icon. - 1

text_image HTTPS Enable Server Port 443 Authenticate Client Certificates (See Trusted CAs) Server Certificate default Redirect HTTP to HTTPS Admin Service Control

Zone Address Action

- ALL ALL Accept User Service Control

Zone Address Action

- ALL ALL Accept HTTP Enable Server Port 80 Admin Service Control

Zone Address Action

- ALL ALL Accept User Service Control

Zone Address Action

- ALL ALL Accept Authentication Client Authentication Method default Apply Reset

3 In the Zone field select LAN and click OK.

Figure 84 System > WWW > Service Control Rule Edit
ZYXEL ZYWALL USG 2000 - In the Zone field select LAN and click OK. - 1

text_image Admin Service Control Address Object ALL Zone LAN Action Accept OK Cancel

4 Click the new rule's Add icon.

Figure 85 System > WWW (First Example Admin Service Rule Configured)
ZYXEL ZYWALL USG 2000 - Click the new rule's Add icon. - 1

text_image HTTPS Enable Server Port 443 Authenticate Client Certificates (See Trusted CAs) Server Certificate default Redirect HTTP to HTTPS Admin Service Control

Zone Address Action

1 LAN ALL Accept - ALL ALL Accept User Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept HTTP Enable Server Port 80 Admin Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept User Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept Authentication Client Authentication Method default Apply Reset

5 In the Zone field select ALL and set the Action to Deny. Click OK.

Figure 86 System > WWW > Service Control Rule Edit
ZYXEL ZYWALL USG 2000 - In the Zone field select ALL and set the Action to Deny. Click OK. - 1

text_image Admin Service Control Address Object ALL Zone ALL Action Deny OK Cancel

6 Click Apply.

Figure 87 System > WWW (Second Example Admin Service Rule Configured)
ZYXEL ZYWALL USG 2000 - Click Apply. - 1

text_image HTTPS Enable Server Port 443 Authenticate Client Certificates (See Trusted CAs) Server Certificate default Redirect HTTP to HTTPS Admin Service Control

Zone Address Action

1 LAN ALL Accept 2 ALL ALL Deny - ALL ALL Accept User Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept HTTP Enable Server Port 80 Admin Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept User Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept Authentication Client Authentication Method default Apply Reset

Now administrator access to the web configurator can only come from the LAN zone. Non-admin users can still use HTTPS to log into the ZyWALL from any of the ZyWALL's zones (to use SSL VPN for example).

6.6 How to Allow Incoming H.323 Peer-to-peer Calls

Suppose you have a H.323 device on the LAN for VoIP calls and you want it to be able to receive peer-to-peer calls from the WAN. Here is an example of how to configure virtual server (port forwarding) and firewall rules to have the ZyWALL

forward H.323 traffic destined for ge2 IP address 10.0.0.8 to a H.323 device located on the LAN and using IP address 192.168.1.56.

Figure 88 WAN to LAN H.323 Peer-to-peer Calls Example
ZYXEL ZYWALL USG 2000 - How to Allow Incoming H.323 Peer-to-peer Calls - 1

flowchart
graph LR
    A["Telephone 192.168.1.56"] --> B["Switch"]
    B --> C["Internet"]

6.6.1 Turn On the ALG

Click Network > ALG. Select Enable H.323 transformations and click Apply.

Figure 89 Network > ALG
ZYXEL ZYWALL USG 2000 - Turn On the ALG - 1

text_image SIP Setting Enable SIP Transformations SIP Media inactivity time out : 120 (seconds) SIP Signaling inactivity time out : 1800 (seconds) SIP Signaling Port : 5060 H.323 Setting Enable H.323 Transformations H.323 Signaling Port : 1720 (1025-65535) Additional H.323 Signaling port for transformations :(Optional) (1025-65535) FTP Setting Enable FTP Transformations FTP Signaling Port : 21 (1-65535) Additional FTP Signaling port for transformations :(Optional) (1-65535) Apply Reset

6.6.2 Set Up a Virtual Server Policy For H.323

In this example, you need a virtual server policy to forward H.323 (TCP port 1720) traffic received on the ZyWALL's 10.0.0.8 WAN IP address to LAN IP address 192.168.1.56.

1 Use Object > Address > Add to create address objects for the private and public IP addresses (WAN_IP-for-H323 and LAN_H323) as shown next.

Figure 90 Create Address Objects
ZYXEL ZYWALL USG 2000 - Set Up a Virtual Server Policy For H.323 - 1

text_image Configuration Name WAN_IP-for-H323 Address Type HOST IP Address 10.0.0.8 OK Cancel

ZYXEL ZYWALL USG 2000 - Set Up a Virtual Server Policy For H.323 - 2

text_image Configuration Name LAN_H323 Address Type HOST IP Address 192.168.1.56 OK Cancel

2 Click Network > Virtual Server > Add.
3 Configure the screen as follows and click OK.

Figure 91 Network > Virtual Server > Add
ZYXEL ZYWALL USG 2000 - Set Up a Virtual Server Policy For H.323 - 3

text_image General Settings Enable Rule Rule Name WAN-LAN_H323 Mapping Rule Incoming Interface ge2 Original IP WAN_IP-for-H323 Mapped IP LAN_H323 Port Mapping Type Port Protocol Type TCP Original Port 1720 Mapped Port 1720 Related Settings Add corresponding Policy Route rule for NAT 1:1 mapping. Add corresponding Policy Route rule for NAT Loopback. Configure Firewall OK Cancel

6.6.3 Set Up a Firewall Rule For H.323

Here is how to configure a firewall rule to allow H.323 (TCP port 1720) traffic received on the WAN_IP-for-H323 IP address to go to LAN IP address 192.168.1.56.

1 Click Firewall. In From Zone, select WAN; in To Zone, select LAN.

2 The default rule for WAN-to-LAN traffic drops all traffic. You want to allow H.323 access through IP address 10.0.0.8, so add a rule before the default rule. Click the Add icon at the top of the column.

Figure 92 Firewall: WAN to LAN
ZYXEL ZYWALL USG 2000 - Set Up a Firewall Rule For H.323 - 1

text_image Global Setting Enable Firewall Allow Asymmetrical Route Maximum session per Host (1-8192) Firewall rule From Zone WAN To Zone LAN Refresh Total rules:1 30 entries per page Page: 1 of 1

Priority From To Schedule User Source Destination Service Access Log

1 5 WAN LAN none any any any any deny log - Default WAN LAN any any any any any allow no Apply Reset

3 Configure the screen as follows and click OK. LAN_H323 is the destination because the ZyWALL applies the virtual server to traffic before applying the firewall rule.

Figure 93 Firewall > Add
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 1

text_image Configuration Enable From vWAN To LAN Description wAN-to-LAN_H323 (Optional) Schedule none User any Source any Destination LAN_H323 Service any Access allow Log no OK Cancel

6.7 How to Use Active-Passive Device HA

Here is an example of using device HA (High Availability) to backup ZyWALL A (the master) with ZyWALL B. ZyWALL B automatically takes over all of A's functions if A fails or loses its ge1 or ge2 connection.

An Ethernet switch connects both ZyWALLs' ge1 interfaces to the LAN. Whichever ZyWALL is functioning as the master uses the default gateway IP address of the LAN computers (192.168.1.1) for its ge1 interface and the static public IP address (1.1.1.1) for its ge2 interface. If ZyWALL A recovers (has both its ge1 and ge2

interfaces connected), it resumes its role as the master and takes over all of its functions again.

Figure 94 Device HA: Master Fails and Backup Takes Over
ZYXEL ZYWALL USG 2000 - How to Use Active-Passive Device HA - 1

flowchart
graph TD
    subgraph LAN
        A["Computer 1"] --> R["Router"]
        B["Computer 2"] --> R
        C["Computer 3"] --> R
        D["Computer 4"] --> R
    end
    R --> E["Router"]
    E --> F["Switch"]
    F --> G["Internet"]
    style LAN fill:#f9f,stroke:#333
    style E fill:#ccf,stroke:#333
    style F fill:#cfc,stroke:#333
    style G fill:#fcc,stroke:#333

Each ZyWALL's ge1 interface also has a separate management IP address that stays the same whether the ZyWALL functions as the master or a backup. ZyWALL A's management IP address is 192.168.1.3 and ZyWALL B's is 192.168.1.5.

Figure 95 Device HA: Management IP Addresses
ZYXEL ZYWALL USG 2000 - How to Use Active-Passive Device HA - 2

flowchart
graph TD
    A["Server 1"] --> R["Router"]
    B["Server 2"] --> R
    C["Server 3"] --> R
    R --> D["Router"]
    E["Server 4"] --> D
    D --> F["INTERNET"]
    style R fill:#f9f,stroke:#333
    style D fill:#ccf,stroke:#333

6.7.1 Before You Start

ZyWALL A should already be configured. You will use device HA to copy ZyWALL A's settings to B later (in Section 6.7.3 on page 144). To avoid an IP address conflict, do not connect ZyWALL B to the LAN subnet until after you configure its device HA settings and the instructions tell you to deploy it (in Section 6.7.4 on page 145).

6.7.2 Configure Device HA on the Master ZyWALL

1 Log into ZyWALL A (the master) and click Device HA > Active-Passive Mode. Click ge1's Edit icon.
2 Configure 192.168.1.3 as the Management IP and 255.255.255.0 as the Subnet Mask. Click OK.

Figure 96 Device HA > Active-Passive Mode > Edit: Master ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure Device HA on the Master ZyWALL - 1

text_image Monitored Interface Configuration Enable Monitored Interface Interface Name ge1 Virtual Router IP(VRIP) / 192.168.1.1 / 255.255.255.0 Subnet Mask Management IP 192.168.1.3 Subnet Mask 255.255.255.0 OK Cancel

3 Set the Device Role to Master. This example focuses on the connection from the LAN (ge1) to the Internet through the ge2 interface, so turn on monitoring for the ge1 and ge2 interfaces. Enter a Synchronization Password ("mySyncPassword" in this example) and click Apply.

Figure 97 Device HA > Active-Passive Mode: Master ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure Device HA on the Master ZyWALL - 2

text_image General Active-Passive Mode Legacy Mode General Settings Device Role Master Backup Cluster Settings Advanced Cluster ID 1 (1-16) Monitored Interface Summary Interface Virtual Router IP/Netmask Management IP/Netmask Link Status Modify ge1 192.168.1.1 / 255.255.255.0 192.168.1.3 / 255.255.255.0 Down ge2 1.1.1.1 / 255.255.255.0 / Down ge3 / / Up ge4 192.168.2.1 / 255.255.255.0 / Down ge5 192.168.3.1 / 255.255.255.0 / Down ge6 192.168.4.1 / 255.255.255.0 / Down ge7 / / Down ge8 / / Down Synchronization Server 192.168.1.1, 1.1.1.1, 172.23.37.159, 192.168.2.1, 192.168.3.1, 192.168.4.1 Address Server Port Password 21 (Configure) Password ********** Note: Backup device's configuration can synchronize with master device's. Apply Reset

4 Click the General tab. Turn on device HA and click Apply.

Figure 98 Device HA > General: Master ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure Device HA on the Master ZyWALL - 3

text_image General Active-Passive Mode Legacy Mode General Settings Enable Device HA Device HA Mode Active-Passive Mode (Switch to Legacy Mode page) Monitored Interface Summary Interface Virtual Router IP / Netmask Management IP / Netmask Link Status HA Status Apply Reset

6.7.3 Configure the Backup ZyWALL

1 Connect a computer to ZyWALL B's ge1 interface and log into its web configurator. Connect ZyWALL B to the Internet and subscribe it to the same subscription services (like content filtering and anti-virus) to which ZyWALL A is subscribed. See Chapter 8 on page 165 for more on the subscription services.
2 In ZyWALL B click Device HA > Active-Passive Mode. Click ge1's Edit icon.
3 Configure 192.168.1.5 as the Management IP and 255.255.255.0 as the Subnet Mask. Click OK.

Figure 99 Device HA > Active-Passive Mode > Edit: Backup ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure the Backup ZyWALL - 1

text_image Monitored Interface Configuration Enable Monitored Interface Interface Name ge1 Virtual Router IP(VRIP) / Subnet Mask 192.168.1.1 / 255.255.255.0 Management IP 192.168.1.5 Subnet Mask 255.255.255.0 OK Cancel

4 Set the Device Role to Backup. Turn on monitoring for the ge1 and ge2 interfaces. Set the Synchronization Server Address to 192.168.1.1, the Port to 21, and the Password to "mySyncPassword". Select Auto Synchronize and set the Interval to 60. Click Apply.

Figure 100 Device HA > Active-Passive Mode: Backup ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure the Backup ZyWALL - 2

text_image General Active-Passive Mode Legacy Mode General Settings Device Role Master Backup Priority 1 (1-254) Enable Preemption Cluster Settings Advanced Cluster ID 1 (1-16) Monitored Interface Summary Interface Virtual Router IP/Netmask Management IP/Netmask Link Status Modify ge1 192.168.1.1 / 255.255.255.0 192.168.1.5 / 255.255.255.0 Down ge2 1.1.1.1 / 255.255.255.0 / Down ge3 / / Up ge4 192.168.2.1 / 255.255.255.0 / Down ge5 192.168.3.1 / 255.255.255.0 / Down ge6 192.168.4.1 / 255.255.255.0 / Down ge7 / / Down ge8 / / Down Synchronization Server Address 192.168.1.1 (IP or FQDN) Server Port 80 Password ********** ✓ Auto Synchronize Interval 60 minutes (1-1440) Synchronization takes place only when backup device is standby Apply Reset

5 Click the General tab. Turn on device HA and click Apply.

Figure 101 Device HA > General: Master ZyWALL Example
ZYXEL ZYWALL USG 2000 - Configure the Backup ZyWALL - 3

text_image General Active-Passive Mode Legacy Mode General Settings Enable Device HA Device HA Mode Active-Passive Mode (Switch to Legacy Mode page) Monitored Interface Summary Interface Virtual Router IP / Netmask Management IP / Netmask Link Status HA Status Apply Reset

6.7.4 Deploy the Backup ZyWALL

Connect ZyWALL B's ge1 interface to the LAN network. Connect ZyWALL B's ge2 interface to the same router that ZyWALL A's ge2 interface uses for Internet access. ZyWALL B copies A's configuration (and re-synchronizes with A every

hour). If ZyWALL A fails or loses its ge1 or ge2 connection, ZyWALL B functions as the master.

6.7.5 Check Your Device HA Setup

1 To make sure ZyWALL B copied ZyWALL A's settings, you can log into ZyWALL B's management IP address (192.168.1.5) and check the configuration. You can use the Maintenance > File Manager > Configuration File screen to save copies of the ZyWALLs' configuration files that you can compare.
2 To test your device HA configuration, disconnect ZyWALL A's ge1 or ge2 interface. Computers on LAN should still be able to access the Internet. If they cannot, check your connections and device HA configuration.

Congratulations! Now that you have configured device HA for LAN, you can use the same process for any of the ZyWALL's other local networks. For example, enable device HA monitoring on the DMZ interfaces and use an Ethernet switch to connect both ZyWALLs' DMZ interfaces to your publicly available servers.

6.8 How to Allow Public Access to a Server

This is an example of making an HTTP (web) server in the DMZ zone accessible from the Internet (the WAN zone). You will use a public IP address of 1.1.1.2 on the ge3 interface and map it to the HTTP server's private IP address of 192.168.3.7.

Figure 102 Public Server Example Network Topology
ZYXEL ZYWALL USG 2000 - How to Allow Public Access to a Server - 1

flowchart
graph LR
    A["192.168.3.7"] --> B["Router"]
    B --> C["1.1.1.2"]
    C --> D["INTERNET"]

6.8.1 Create the Address Objects

Use Object > Address > Add to create the address objects.

1 Create an address object named DMZ_HTTP for the HTTP server's private IP address of 192.168.3.7.

Figure 103 Creating the Address Object for the HTTP Server's Private IP Address
ZYXEL ZYWALL USG 2000 - Create the Address Objects - 1

text_image Configuration Name DMZ_HTTP Address Type HOST IP Address 192.168.3.7 OK Cancel

2 Create an address object named ge3_HTTP for the ge3 public IP address of 1.1.1.2.

Figure 104 Creating the Address Object for the ge3 Public IP Address
ZYXEL ZYWALL USG 2000 - Create the Address Objects - 2

text_image Configuration Name WAN2_HTTP Address Type HOST IP Address 1.1.1.2 OK Cancel

6.8.2 Configure a Virtual Server

You need a virtual server to send HTTP traffic coming to IP address 1.1.1.2 on ge3 to the HTTP server's private IP address of 192.168.3.7. In the Network > Virtual Server screen, click the + symbol and create a new virtual server entry as shown next.

  • This virtual server is for traffic coming in on ge3 to IP address 1.1.1.2 (defined in the ge3_HTTP object).
  • The virtual server sends this traffic to the HTTP server's private IP address of 192.168.3.7 (defined in the DMZ_HTTP object).
  • HTTP traffic and the HTTP server in this example both use TCP port 80. So you set the Port Mapping Type to Port, the Protocol Type to TCP, and the original and mapped ports to 80.
  • In this example 1.1.1.2 is not the default IP address for sessions going out through ge3. Select Add corresponding Policy Route rule for NAT 1:1 mapping to send the HTTP server's outgoing sessions through ge3 and use 1.1.1.2 as the source IP address (to match the IP address for accessing it). See NAT 1:1 Example on page 292 for details.

- Select Add corresponding Policy Route rule for NAT Loopback to allow local users to use a domain name to access the HTTP server. See NAT Loopback Example on page 297 for details.

Figure 105 Creating the Virtual Server
ZYXEL ZYWALL USG 2000 - Configure a Virtual Server - 1

text_image General Settings Enable Rule Rule Name DMZ_HTTP Mapping Rule Incoming Interface ge2 Original IP VANZ_HTTP Mapped IP DMZ_HTTP Port Mapping Type Port Protocol Type TCP Original Port 80 Mapped Port 80 Related Settings Add corresponding Policy Route rule for NAT 1:1 mapping. Add corresponding Policy Route rule for NAT Loopback. Configure Firewall OK Cancel

The firewall allows traffic from the WAN zone to the DMZ zone by default so your configuration is done. Now the public can go to IP address 1.1.1.2 to access the HTTP server. If a domain name is registered for IP address 1.1.1.2, users can just go to the domain name to access the web server.

7.1 Overview

Use the Status screens to check status information about the ZyWALL.

7.1.1 What You Can Do in the Status Screens

Use the Status screens for the following.

  • Use the main Status screen (see Section 7.2 on page 150) to see the ZyWALL's general device information, system status, system resource usage, licensed service status, and interface status. You can also go to the other status screens for more information.
  • Use the VPN status screen (see Section 7.2.4 on page 158) to look at the VPN tunnels that are currently established.
  • Use the DHCP Table screen (see Section 7.2.5 on page 159) to look at the IP addresses currently assigned to DHCP clients and the IP addresses reserved for specific MAC addresses.
  • Use the Port Statistics screen (see Section 7.2.6 on page 160) to look at packet statistics for each physical port. To access this screen, click Port Statistics in the Status screen.
  • Use the Port Statistics Graph screen (see Section 7.2.6 on page 160) to look at a line graph of packet statistics for each physical port.
  • Use the Current Users screen (see Section 7.2.8 on page 162) to look at a list of the users currently logged into the ZyWALL.
  • Use the SEM Status Detail screen (see Section 7.2.9 on page 162) to look at detailed status information for an installed SEM (Security Extension Module) card.

7.2 The Status Screen

The Status screen displays when you log into the ZyWALL or click Status. Use this screen to look at the ZyWALL's general device information, system status, system resource usage, licensed service status, and interface status.

Figure 106 Status
ZYXEL ZYWALL USG 2000 - The Status Screen - 1

text_image Refresh Interval: None Refresh Now Device Information System Name: zywall-usg-2000 Model Name: ZyWALL USG 2000 Serial Number: Z34131340 80-009-011001AA MAC Address Range: 00:00:AA:77:98:66 ~ 6D Firmware Version: 2.11(AQW.0)Preb4-20081029 |20 System Resources CPU Usage: 2 % Memory Usage: 27 % Flash Usage: 22 % Active Sessions: 0/1000000 Licensed Service Status IDP - License Status/Remaining days: Not Licensed / 0 - Signature Version: V2.026 |2007-06-20 17:08:10 - Last Update Time: n/a - Total Signature Number: 2020 Anti-Virus - License Status/Remaining days: Not Licensed / 0 - Anti-Virus Engine Type: ZyXEL - Signature Version: V1.055 |2007-07-05 20:58:13 - Last Update Time: n/a - Total Signature Number: 5936 Content Filter - License Status/Remaining days: Not Licensed / 0 Top 5 Intrusion & Virus Detection Rank Intrusion Detected Virus Detected Interface Status Summary Name Status HA Status Zone IP Address Action ge1 100M/Full n/a LAN 192.168.1.1 n/a ge2 Down n/a WAN 0.0.0.0 Renew ge3 Down n/a WAN 0.0.0.0 Renew ge4 Down n/a DMZ 192.168.2.1 n/a ge5 Down n/a DMZ 192.168.3.1 n/a ge6 Down n/a DMZ 192.168.4.1 n/a ge7 Down n/a n/a 0.0.0.0 n/a ge8 Down n/a n/a 0.0.0.0 n/a aux Inactive n/a n/a 0.0.0.0 n/a Extension Slot Slot Device Status PC Card none USB 1 none USB 2 none SEM Card SEM-DUAL

The following table describes the labels in this screen.

Table 31 Status

LABELDESCRIPTION
Refresh IntervalSelect how often you want the screen to automatically refresh.
Refresh NowClick this to update the screen immediately.
Device Information
System NameThis field displays the name used to identify the ZyWALL on any network. Click the icon to open the screen where you can change it. See Section 45.2 on page 698.
Model NameThis field displays the model name of this ZyWALL.
Serial NumberThis field displays the serial number of this ZyWALL.
MAC Address RangeThis field displays the MAC addresses used by the ZyWALL. Each physical port has one MAC address. The first MAC address is assigned to physical port 1, the second MAC address is assigned to physical port 2, and so on.
Firmware VersionThis field displays the version number and date of the firmware the ZyWALL is currently running. Click the icon to open the screen where you can upload firmware. See Section 46.3 on page 756.
System Resources
CPU UsageThis field displays what percentage of the ZyWALL's processing capability is currently being used. Click the icon to display a chart of the ZyWALL's recent CPU usage.
Memory UsageThis field displays what percentage of the ZyWALL's RAM is currently being used. Click the icon to display a chart of the ZyWALL's recent memory usage.
Flash UsageThis field displays what percentage of the ZyWALL's onboard flash memory is currently being used. Click the icon to display a chart of the ZyWALL's recent flash usage.
Active SessionsThis field displays how many traffic sessions are currently open on the ZyWALL. These are the sessions that are traversing the ZyWALL. Click the icon to display a chart of ZyWALL's recent session usage.
Interface Status SummaryIf an Ethernet interface does not have any physical ports associated with it, its entry is displayed in light gray text. Click the Detail icon to go to a (more detailed) summary screen of interface statistics.
NameThis field displays the name of each interface.
StatusThis field displays the current status of each interface. The possible values depend on what type of interface it is.For Ethernet interfaces:Inactive - The Ethernet interface is disabled.Down - The Ethernet interface does not have any physical ports associated with it or the Ethernet interface is enabled but not connected.Speed / Duplex - The Ethernet interface is enabled and connected. This field displays the port speed and duplex setting (Full or Half).For the auxiliary interface:Inactive - The auxiliary interface is disabled-connected - The auxiliary interface is enabled and connected.Disconnected - The auxiliary interface is not connected.
HA StatusThis field displays the status of the interface in the virtual router.Active- This interface is the master interface in the virtual router.Stand-By- This interface is a backup interface in the virtual router.Fault- This VRRP group is not functioning in the virtual router right now. For example, this might happen if the interface is down.n/a- Device HA is not active on the interface.
ZoneThis field displays the zone to which the interface is currently assigned.
IP AddressThis field displays the current IP address assigned to the interface. If the IP address is 0.0.0.0, the interface is disabled or did not receive an IP address and subnet mask via DHCP.If this interface is a member of an active virtual router, this field displays the IP address it is currently using. This is either the static IP address of the interface (if it is the master) or the management IP address (if it is a backup).
ActionUse this field to get or to update the IP address for the interface.ClickRenewto send a new DHCP request to a DHCP server.Click theConnecticon to have the ZyWALL try to connect a PPPoE/PPTP interface or the auxiliary interface. If the interface cannot use one of these ways to get or to update its IP address, this field displaysn/a.Click theDisconnecticon to stop a PPPoE/PPTP or auxiliary interface's connection.
Extension SlotThis section of the screen displays the status of the extension card slot and the USB ports.
SlotThis field displays the name of each extension slot.
DeviceThis field displays the name of the device connected to the extension slot (ornoneif no device is detected).
StatusFor installed SEM (Security Extension Module) cards, this field displays aDetailicon that you can click to see detailed card status information.
System Status
System UptimeThis field displays how long the ZyWALL has been running since it last restarted or was turned on.
Current Date/TimeThis field displays the current date and time in the ZyWALL. The format is yyyy-mm-dd hh:mm:ss.
VPN StatusClick this to look at the VPN tunnels that are currently established. SeeSection 7.2.4 on page 158.
DHCP TableClick this to look at the IP addresses currently assigned to the ZyWALL's DHCP clients and the IP addresses reserved for specific MAC addresses.SeeSection 7.2.5 on page 159.
Port StatisticsClick this to look at packet statistics for each Gigabit Ethernet port. SeeSection 7.2.6 on page 160.
Current Login UserThis field displays the user name used to log in to the current session, the amount of reauthentication time remaining, and the amount of lease time remaining. SeeChapter 36 on page 613.
Number of Login UsersThis field displays the number of users currently logged in to the ZyWALL. Click the icon to pop-open a list of the users who are currently logged in to the ZyWALL. See Section 7.2.8 on page 162.
Boot StatusThis field displays details about the ZyWALL's startup state.OK - The ZyWALL started up successfully.Firmware update OK - A firmware update was successful.Problematic configuration after firmware update - The application of the configuration failed after a firmware upgrade.System default configuration - The ZyWALL successfully applied the system default configuration. This occurs when the ZyWALL starts for the first time or you intentionally reset the ZyWALL to the system default settings.Fallback to lastgood configuration - The ZyWALL was unable to apply the startup-config.conf configuration file and fell back to the lastgood.conf configuration file.Fallback to system default configuration - The ZyWALL was unable to apply the lastgood.conf configuration file and fell back to the system default configuration file (system-default.conf).Booting in progress - The ZyWALL is still applying the system configuration.
Power Module 1, 2These fields display the status of the ZyWALL's power modules. The ZyWALL has two power modules. It can continue operating on a single power module if one fails.ready - The power module is connected and working properly.fail - Check the power module's connection or replace the module. See Section 51.2 on page 800 for how to change a power module.
Licensed Service Status
IDP
License Status / Remaining daysThis field displays the current status of the license and how many days longer it is still valid. If it displays 0 days, the license has expired. If the status is not Licensed, click this to open the screen where you can activate or extend the license. See Section 8.2 on page 167.
Signature VersionThis field displays the version number, date, and time of the current set of signatures the ZyWALL is using.
Last Update TimeThis field displays the last time the ZyWALL received updated signatures.
Total Signature NumberThis field displays the total number of signatures in the current signature version.
Anti-Virus
License Status / Remaining daysThis field displays the current status of the license and how many days longer it is still valid. If it displays 0 days, the license has expired. If the status is not Licensed, click this to open the screen where you can activate or extend the license. See Section 8.2 on page 167.
Anti-Virus Engine TypeThis field displays whether the ZyWALL is set to use ZyXEL's anti-virus engine or the one powered by Kaspersky.Upgrading the ZyWALL to firmware version 2.11 and updating the anti-virus signatures automatically upgrades the ZyXEL anti-virus engine to v2.0. v2.0 has more virus signatures and offers improved non-executable file scan throughput.
Signature VersionThis field displays the version number, date, and time of the current set of signatures the ZyWALL is using.
Last Update TimeThis field displays the last time the ZyWALL received updated signatures.
Total Signature NumberThis field displays the total number of signatures in the current signature version.
Content Filter
License Status / Remaining DaysThis field displays the current status of the license and how many days longer it is still valid. If it displays 0 days, the license has expired. If the status is not Licensed, click this to open the screen where you can activate or extend the license. See Section 8.2 on page 167.
Top 5 Intrusion & Virus DetectionThe following is a list of the five intrusions or viruses that the ZyWALL has most frequently detected since it last started up.
RankThis is the ranking number of an intrusion or virus. This is an intrusion's or virus's place in the list of most common intrusions or viruses.
Intrusion DetectedThis is the name of a signature for which the ZyWALL has detected matching packets. The number in brackets indicates how many times the signature has been matched.Click the hyperlink for more detailed information on the intrusion.
Virus DetectedThis is the name of the virus that the ZyWALL has detected.

7.2.1 The CPU Usage Screen

Use this screen to look at a chart of the ZyWALL's recent CPU usage. To access this screen, click CPU Usage in the Status screen.

Figure 107 Status > CPU Usage
ZYXEL ZYWALL USG 2000 - The CPU Usage Screen - 1

line | Time | CPU Usage | | -------- | --------- | | 00:00 | ~15 | | 04:17 | ~10 | | 14:17 | ~15 | | 18:17 | ~5 | | 22:17 | ~5 | | 02:17 | ~5 | | 06:17 | ~28 | | 13:16 | ~5 |

The following table describes the labels in this screen.

Table 32 Status > CPU Usage

LABELDESCRIPTION
100 %The y-axis represents the percentage of CPU usage.
timeThe x-axis shows the time period over which the CPU usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.

7.2.2 The Memory Usage Screen

Use this screen to look at a chart of the ZyWALL's recent memory (RAM) usage. To access this screen, click Memory Usage in the Status screen.

Figure 108 Status > Memory Usage
ZYXEL ZYWALL USG 2000 - The Memory Usage Screen - 1

line | Time | Memory Usage (%) | | -------- | ---------------- | | 06:58 | 42 | | 11:14 | 42 |

The following table describes the labels in this screen.

Table 33 Status > Memory Usage

LABELDESCRIPTION
100 %The y-axis represents the percentage of RAM usage.
timeThe x-axis shows the time period over which the RAM usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.

7.2.3 The Session Usage Screen

Use this screen to look at a chart of the ZyWALL's recent traffic session usage. To access this screen, click Session Usage in the Status screen.

Figure 109 Status > Session Usage
ZYXEL ZYWALL USG 2000 - The Session Usage Screen - 1

line | Time | Sessions | | -------- | -------- | | 15:04 | 90 | | 19:04 | 90 | | 23:04 | 90 | | 03:04 | 90 | | 07:04 | 90 |

The following table describes the labels in this screen.

Table 34 Status > Session Usage

LABELDESCRIPTION
SessionsThe y-axis represents the number of session.
timeThe x-axis shows the time period over which the session usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.

7.2.4 The VPN Status Screen

Use this screen to look at the VPN tunnels that are currently established. To access this screen, click VPN Status in the Status screen.

Figure 110 Status > VPN Status
ZYXEL ZYWALL USG 2000 - The VPN Status Screen - 1

text_image VPN Table

Name Encapsulation IPSec Algorithm

Poll Interval (1-60 seconds): 5 Set Interval Stop

The following table describes the labels in this screen.

Table 35 Status > VPN Status

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific SA.
NameThis field displays the name of the IPSec SA.
EncapsulationThis field displays how the IPSec SA is encapsulated.
IPSec AlgorithmThis field displays the encryption and authentication algorithms used in the SA.
Poll IntervalEnter how often you want this window to be updated automatically, and click Set Interval.
Set IntervalClick this to set the Poll Interval the screen uses.
StopClick this to stop the window from updating automatically. You can start it again by setting the Poll Interval and clicking Set Interval.

7.2.5 The DHCP Table Screen

Use this screen to look at the IP addresses currently assigned to DHCP clients and the IP addresses reserved for specific MAC addresses. To access this screen, click the icon beside DHCP Table in the Status screen.

Figure 111 Status > DHCP Table
ZYXEL ZYWALL USG 2000 - The DHCP Table Screen - 1

text_image DHCP Table Interface ge1

IP Address Host Name MAC Address Description Reserve

1 192.168.1.34 "twpc13477" 00:0F:FE:32:B4:12 Apply Refresh

The following table describes the labels in this screen.

Table 36 Status > DHCP Table

LABELDESCRIPTION
InterfaceSelect for which interface you want to look at the IP addresses currently assigned to DHCP clients and the IP addresses reserved for specific MAC addresses.
#This field is a sequential value, and it is not associated with a specific entry.
IP AddressThis field displays the IP address currently assigned to a DHCP client or reserved for a specific MAC address.
Host NameThis field displays the name used to identify this device on the network (the computer name). The ZyWALL learns these from the DHCP client requests. You can use CLI commands to set this value for static DHCP entries.
MAC AddressThis field displays the MAC address to which the IP address is currently assigned or for which the IP address is reserved.
DescriptionFor a static DHCP entry, the host name or the description you configured shows here. This field is blank for dynamic DHCP entries.
ReserveIf this field is selected, this entry is a static DHCP entry. The IP address is reserved for the MAC address.If this field is clear, this entry is a dynamic DHCP entry. The IP address is assigned to a DHCP client.To create a static DHCP entry using an existing dynamic DHCP entry, select this field, and then clickApply.To remove a static DHCP entry, clear this field, and then clickApply.
ApplyClick this to save your settings to the ZyWALL.
RefreshClick this to update the screen immediately.

7.2.6 The Port Statistics Screen

Use this screen to look at packet statistics for each Gigabit Ethernet port. To access this screen, click Port Statistics in the Status screen.

Figure 112 Status > Port Statistics

PortStatusTxPktsRxPktsCollisionsTx B/sRx B/sUp Time
11000M/Full194920520765134900:28:18
2Down234100000:00:00
3Down0000000:00:00
4Down0000000:00:00
5Down0000000:00:00
6Down0000000:00:00
7Down0000000:00:00
8Down2000000:00:00

The following table describes the labels in this screen.

Table 37 Status > Port Statistics

LABELDESCRIPTION
Switch to Graphic ViewClick this to display the port statistics as a line graph.
PortThis field displays the physical port number.
StatusThis field displays the current status of the physical port. Down - The physical port is not connected. Speed / Duplex - The physical port is connected. This field displays the port speed and duplex setting (Full or Half).
TxPktsThis field displays the number of packets transmitted from the ZyWALL on the physical port since it was last connected.
RxPktsThis field displays the number of packets received by the ZyWALL on the physical port since it was last connected.
CollisionsThis field displays the number of collisions on the physical port since it was last connected.
Tx B/sThis field displays the transmission speed, in bytes per second, on the physical port in the one-second interval before the screen updated.
Rx B/sThis field displays the reception speed, in bytes per second, on the physical port in the one-second interval before the screen updated.
Up TimeThis field displays how long the physical port has been connected.
System Up TimeThis field displays how long the ZyWALL has been running since it last restarted or was turned on.
Poll IntervalEnter how often you want this window to be updated automatically, and click Set Interval.
Set IntervalClick this to set the Poll Interval the screen uses.
StopClick this to stop the window from updating automatically. You can start it again by setting the Poll Interval and clicking Set Interval.

7.2.7 The Port Statistics Graph Screen

Use this screen to look at a line graph of packet statistics for each physical port. To access this screen, click Port Statistics in the Status screen and then the Switch to Graphic View Button.

Figure 113 Status > Port Statistics > Switch to Graphic View
ZYXEL ZYWALL USG 2000 - The Port Statistics Graph Screen - 1

line | Time | TX | RX | | -------- | -------- | -------- | | 08:19 | 3639.3 | 3639.3 | | 04:21 | 29114.4 | 29114.4 | | 00:21 | 18196.5 | 18196.5 | | 12:21 | 7278.6 | 7278.6 | | 16:21 | 3639.3 | 3639.3 | | 20:21 | 3639.3 | 3639.3 | | 08:19 | 3639.3 | 3639.3 |

The following table describes the labels in this screen.

Table 38 Status > Port Statistics > Switch to Graphic View

LABELDESCRIPTION
PortSelect the number of the physical port for which you want to display graphics.
Switch to Table ViewClick this to display the port statistics as a table.
bpsThe y-axis represents the speed of transmission or reception.
timeThe x-axis shows the time period over which the transmission or reception occurred
TxThis line represents traffic transmitted from the ZyWALL on the physical port since it was last connected.
RxThis line represents the traffic received by the ZyWALL on the physical port since it was last connected.
Last UpdateThis field displays the date and time the information in the window was last updated.
System Up TimeThis field displays how long the ZyWALL has been running since it last restarted or was turned on.
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.

7.2.8 The Current Users Screen

Use this screen to look at a list of the users currently logged into the ZyWALL. To access this screen, click the Number of Login Users Detail icon in the Status screen.

Figure 114 Status > Current Users
ZYXEL ZYWALL USG 2000 - The Current Users Screen - 1

text_image Current User List

User ID Reauth Lease T. Type IP address Force Logout

1 admin unlimited/03:19:59 http/https 192.168.1.33

The following table describes the labels in this screen.

Table 39 Status > Current Users

LABELDESCRIPTION
#This field is a sequential value and is not associated with any entry.
User IDThis field displays the user name of each user who is currently logged in to the ZyWALL.
Reauth Lease T.This field displays the amount of reauthentication time remaining and the amount of lease time remaining for each user. See Chapter 36 on page 613.
TypeThis field displays the way the user logged in to the ZyWALL.
IP addressThis field displays the IP address of the computer used to log in to the ZyWALL.
Force LogoutClick this icon to end a user's session.

7.2.9 The SEM Status Detail Screen

Use this screen to look at detailed status information for an installed SEM (Security Extension Module) card. An SEM enhances the ZyWALL's VPN and/or

UTM performance. See the SEM User's Guide for how to install an SEM. To access this screen, click the SEM card's Detail icon in the Status screen.

Figure 115 Status > SEM Detail
ZYXEL ZYWALL USG 2000 - The SEM Status Detail Screen - 1

text_image Security Extension Module Status Item Value Extension Slot SEM Card Device Type SEM-DUAL Status Active

The following table describes the labels in this screen.

Table 40 Status > SEM Detail

LABELDESCRIPTION
Extension SlotThis shows to which slot the SEM card is connected.
Device TypeThis displays what kind of SEM card is installed.SEM-VPN - The VPN accelerator. The SEM-VPN provides 500 Mbps VPN throughput, 2,000 IPSec VPN tunnels, and 750 SSL VPN users.SEM-UTM - UTM accelerator. The SEM-UTM provides 400 Mbps anti-virus and IDP throughput.SEM-DUAL - accelerator for both VPN and UTM. The SEM-DUAL provides the benefits of both the ZyWALL-UTM and ZyWALL-VPN.
StatusThis field displays one of the following.Active - The SEM card is working properly.Ready to activate - The SEM was inserted while the ZyWALL was operating. Restart the ZyWALL to use the SEM.Driver load failed - An error occurred during the ZyWALL's attempt to activate the SEM card. Make sure the SEM is installed properly and the thumbscrews are tightened. If this status still displays, contact your vendor.

Registration

8.1 Overview

Use the Licensing > Registration screens to register your ZyWALL and manage its service subscriptions.

8.1.1 What You Can Do in the Registration Screens

  • Use the Registration screen (see Section 8.2 on page 167) to register your ZyWALL with myZyXEL.com and activate a service, such as content filtering.
  • Use the Service screen (see Section 8.3 on page 169) to display the status of your service registrations and upgrade licenses.

8.1.2 What you Need to Know About Service Registration

This section introduces the topics covered in this chapter.

myZyXEL.com

myZyXEL.com is ZyXEL's online services center where you can register your ZyWALL and manage subscription services available for the ZyWALL. To update signature files or use a subscription service, you have to register the ZyWALL and activate the corresponding service at myZyXEL.com (through the ZyWALL).

Note: You need to create a myZyXEL.com account before you can register your device and activate the services at myZyXEL.com.

You can directly create a myZyXEL.com account, register your ZyWALL and activate a service using the Registration screen. Alternatively, go to http://www.myZyXEL.com with the ZyWALL's serial number and LAN MAC address to register it. Refer to the web site's on-line help for details.

Note: To activate a service on a ZyWALL, you need to access myZyXEL.com via that ZyWALL.

Subscription Services Available on the ZyWALL

You can have the ZyWALL use anti-virus, IDP/AppPatrol (Intrusion Detection and Prevention and application patrol), and content filtering subscription services. You can also purchase and enter a license key to have the ZyWALL use more SSL VPN tunnels. See the respective User's Guide chapters for more information about these features.

Anti-Virus Engines

Subscribe to signature files for ZyXEL's anti-virus engine or one powered by Kaspersky.

- When using the trial, you can switch from one engine to the other in the Registration screen. There is no limit on the number of times you can change the anti-virus engine selection during the trial, but you only get a total of one anti-virus trial period (not a separate trial period for each anti-virus engine).

- After the trial expires, you need to purchase an iCard for the anti-virus engine you want to use and enter the PIN number (license key) in the Registration > Service screen. You must use the ZyXEL anti-virus iCard for the ZyXEL anti-virus engine and the Kaspersky anti-virus iCard for the Kaspersky anti-virus engine. If you were already using an iCard anti-virus subscription, any remaining time on your earlier subscription is automatically added to the new subscription. Even if the earlier iCard anti-virus subscription was for a different anti-virus engine. For example, suppose you purchase a one-year Kaspersky engine anti-virus service subscription and use it for six months. Then you purchase a one-year ZyXEL engine anti-virus service subscription and enter the iCard's PIN number (license key) in the Registration > Service screen. The one-year ZyXEL engine anti-virus service subscription is automatically extended to 18 months.

8.2 The Registration Screen

Use this screen to register your ZyWALL with myZyXEL.com and activate a service, such as content filtering. Click Licensing > Registration in the navigation panel to open the screen as shown next.

Figure 116 Licensing > Registration
ZYXEL ZYWALL USG 2000 - The Registration Screen - 1

text_image Registration Service General Settings This device is not registered to myZyXEL.com. Please enter information below to register your device. If you don't have myZyXEL.com account, please select "new myZyXEL.com account" below. If you have a myZyXEL.com account, but you forget your User Name or Password, please go to www.myZyXEL.com for help. ○ new myZyXEL.com account ○ existing myZyXEL.com account User Name Check you can click to check if username exists Password Confirm Password E-Mail Address Country Code ---- Select ---- Trial Service Activation ✓ Anti-Virus Signature Service ● ZyXEL Anti-Virus Engine ○ Kaspersky Anti-Virus Engine □ IDP/AppPatrol Signature Service □ Content Filter Category Service Apply

The following table describes the labels in this screen.

Table 41 Licensing > Registration

LABELDESCRIPTION
General SettingsIf you select existing myZyXEL.com account, only the User Name and Password fields are available.
new myZyXEL.com accountIf you haven't created an account at myZyXEL.com, select this option and configure the following fields to create an account and register your ZyWALL.
existing myZyXEL.com accountIf you already have an account at myZyXEL.com, select this option and enter your user name and password in the fields below to register your ZyWALL.
User NameEnter a user name for your myZyXEL.com account. The name should be from six to 20 alphanumeric characters (and the underscore). Spaces are not allowed.
CheckClick this button to check with the myZyXEL.com database to verify the user name you entered has not been used.
PasswordEnter a password of between six and 20 alphanumeric characters (and the underscore). Spaces are not allowed.
Confirm PasswordEnter the password again for confirmation.
E-Mail AddressEnter your e-mail address. You can use up to 80 alphanumeric characters (periods and the underscore are also allowed) without spaces.
Country CodeSelect your country from the drop-down box list.
Trial Service ActivationSelect the check box to activate a trial service subscription. The trial period starts the day you activate the trial. After the trial expires, you can buy an iCard and enter the license key in the Registration Service screen to extend the service.
Anti-Virus Signature ServiceThe ZyWALL's anti-virus packet scanner uses the signature files on the ZyWALL to detect virus files.Select ZyXEL's anti-virus engine or the Kaspersky anti-virus engine. During the trial you can use these fields to change from one anti-virus engine to the other.After the service is activated, the ZyWALL can download the up-to-date signature files for the selected anti-virus engine from the update server (http://myupdate.zywall.zyxel.com).
IDP/AppPatrol Signature ServiceThe IDP and application patrol features use the IDP/AppPatrol signature files on the ZyWALL. IDP detects malicious or suspicious packets and responds immediately. Application patrol conveniently manages the use of various applications on the network. After the service is activated, the ZyWALL can download the up-to-date signature files from the update server (http://myupdate.zywall.zyxel.com).You will get automatic e-mail notification of new signature releases from mySecurityZone after you activate the IDP/AppPatrol service. You can also check for new signatures at http://mysecurity.zyxel.com.
Content Filter Category ServiceThe content filter allows or blocks access to web sites. Subscribe to category-based content filtering to block access to categories of web sites based on content. Your ZyWALL accesses an external database that has millions of web sites categorized based on content. You can have the ZyWALL block, block and/or log access to web sites based on these categories.
ApplyClick Apply to save your changes back to the ZyWALL.

Note: If the ZyWALL is registered already, this screen is read-only and indicates whether trial services are activated (if any). You can still select the unchecked trial service(s) to activate it after registration. Use the Service screen to update your service subscription status.

Figure 117 Licensing > Registration: Registered Device
ZYXEL ZYWALL USG 2000 - The Registration Screen - 2

text_image Registration Service General Setup User Name zld_tester Password ******** Trial Service Activation Anti-Virus Signature Service ZyXEL Anti-Virus Engine Kaspersky Anti-Virus Engine IDP/AppPatrol Signature Service Content Filter Category Service Apply

8.3 The Service Screen

Use this screen to display the status of your service registrations and upgrade licenses. To activate or extend a standard service subscription, purchase an iCard and enter the iCard's PIN number (license key) in this screen. Click Licensing > Registration > Service to open the screen as shown next.

Figure 118 Licensing > Registration > Service
ZYXEL ZYWALL USG 2000 - The Service Screen - 1

text_image Registration Service Service Management Service Status Registration Type Expiration date Count IDP/AppPatrol Signature Service Not Licensed N/A Anti-Virus Signature Service Not Licensed N/A SSL VPN Not Licensed 2 Content Filter Category Service Not Licensed N/A License Upgrade License Key Update Service License Refresh Note: Sync with myZyXEL.com to download license Info

The following table describes the labels in this screen.

Table 42 Licensing > Registration > Service

LABELDESCRIPTION
Service Management
ServiceThis lists the services that available on the ZyWALL.
StatusThis field displays whether a service is activated (Licensed) or not (Not Licensed) or expired (Expired).
Registration TypeThis field displays whether you applied for a trial application (Trial) or registered a service with your iCard's PIN number (Standard). This field is blank when a service is not activated. For an anti-virus service subscription this field also displays the type of anti-virus engine.
Expiration dateThis field displays the date your service expires.You can continue to use IDP/AppPatrol or Anti-Virus after the registration expires, you just won't receive updated signatures.
CountThis field displays how many VPN tunnels you can use with your current license. This field does not apply to the other services.
License Upgrade
License KeyEnter your iCard's PIN number and clickUpdateto activate or extend a standard service subscription. If a standard service subscription runs out, you need to buy a new iCard (specific to your ZyWALL) and enter the new PIN number to extend the service.
Service License RefreshClick this button to renew service license information (such as the registration status and expiration day).

Signature Update

9.1 Overview

This chapter shows you how to update the ZyWALL's signature packages.

9.1.1 What You Can Do in the Update Screens

  • Use the Licensing > Update > Anti-virus screen (Section 9.2 on page 172) to update the anti-virus signatures. See Chapter 29 on page 473 for details on anti-virus.
  • Use the Licensing > Update > IDP/AppPatrol screen (Section 9.3 on page 173) to update the signatures used for IDP and application patrol. See Chapter 30 on page 489 for details on IDP. See Chapter 28 on page 445 for details on application patrol.
  • Use the Licensing > Update > System Protect screen (Section 9.4 on page 175) to update the system-protection signatures.

9.1.2 What you Need to Know About Signature Updates

  • You need a valid service registration to update the anti-virus signatures and the IDP/AppPatrol signatures.
  • You do not need a service registration to update the system-protection signatures.
  • Schedule signature updates for a day and time when your network is least busy to minimize disruption to your network.
  • Your custom signature configurations are not over-written when you download new signatures.

Note: The ZyWALL does not have to reboot when you upload new signatures.

9.2 The Antivirus Update Screen

Click Licensing > Update > Anti-Virus to display the following screen.

Figure 119 Licensing > Update > Anti-Virus
ZYXEL ZYWALL USG 2000 - The Antivirus Update Screen - 1

text_image Anti-Virus IDP/AppPatrol System Protect Signature Information Anti-Virus Engine Type: ZyXEL Current Version: 1.153 Signature Number: 8348 Released Date: 2008-02-14 09:07:04 Remote Update Synchronize the Anti-Virus Signature Package to the latest version with online update server. (myZyXEL.com activation required) Update Now ✓ Auto Update ○ Hourly ● Daily 0 (Hour) ○ Weekly Sunday (Day) 0 (Hour) Apply Reset

The following table describes the labels in this screen.

LABELDESCRIPTION
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Anti-Virus Engine TypeThis field displays whether the ZyWALL is set to use ZyXEL's anti-virus engine or the one powered by Kaspersky.
Current VersionThis field displays the anti-virus signatures version number currently used by the ZyWALL. This number is defined by the ZyXEL Security Response Team (ZSRT) who maintain and update them.This number gets larger as new signatures are added, so you should refer to this number regularly. Go to https://mysecurity.zyxel.com/mysecurity/ to see what the latest version number is. You can also subscribe to signature update e-mail notifications.
Signature NumberThis field displays the number of signatures in this set.
Released DateThis field displays the date and time the set was released.
Remote UpdateUse these fields to have the ZyWALL check for new signatures at myZyXEL.com. If new signatures are found, they are then downloaded to the ZyWALL.
Update NowClick this button to have the ZyWALL check for new signatures immediately. If there are new ones, the ZyWALL will then download them.
Auto UpdateSelect this check box to have the ZyWALL automatically check for new signatures regularly at the time and day specified.You should select a time when your network is not busy for minimal interruption.
HourlySelect this option to have the ZyWALL check for new signatures every hour.
DailySelect this option to have the ZyWALL check for new signatures every day at the specified time. The time format is the 24 hour clock, so '23' means 11PM for example.
WeeklySelect this option to have the ZyWALL check for new signatures once a week on the day and at the time specified.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

9.3 The IDP/AppPatrol Update Screen

Click Licensing > Update > IDP/AppPatrol to display the following screen.

The ZyWALL comes with signatures for the IDP and application patrol features. These signatures are continually updated as new attack types evolve. New signatures can be downloaded to the ZyWALL periodically if you have subscribed for the IDP/AppPatrol signatures service.

You need to create an account at myZyXEL.com, register your ZyWALL and then subscribe for IDP service in order to be able to download new packet inspection signatures from myZyXEL.com (see the Registration screens). Use the Update IDP /AppPatrol screen to schedule or immediately download IDP signatures.

Figure 120 Licensing > Update > IDP/AppPatrol
ZYXEL ZYWALL USG 2000 - The IDP/AppPatrol Update Screen - 1

text_image Anti-Virus IDP/AppPatrol System Protect Signature Information Current Version: 2.008 Signature Number: 2256 Released Date: 2007/02/02 14:02:33 Remote Update Synchronize the IDP Signature Package to the latest version with online update server. (myZyXEL.com activation required) Update Now ✓ Auto Update ○ Hourly ● Daily 1 (Hour) ○ Weekly Sunday (Day) 0 (Hour) Apply Reset

The following table describes the fields in this screen.

Table 43 Licensing > Update > IDP/AppPatrol

LABELDESCRIPTION
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Current VersionThis field displays the IDP signature and anomaly rule set version number. This number gets larger as the set is enhanced.
Signature NumberThis field displays the number of IDP signatures in this set. This number usually gets larger as the set is enhanced. Older signatures and rules may be removed if they are no longer applicable or have been supplanted by newer ones.
Released DateThis field displays the date and time the set was released.
Remote UpdateUse these fields to have the ZyWALL check for new IDP signatures at myZyXEL.com. If new signatures are found, they are then downloaded to the ZyWALL.
Update NowClick this button to have the ZyWALL check for new IDP signatures immediately. If there are new ones, the ZyWALL will then download them.
Auto UpdateSelect this check box to have the ZyWALL automatically check for new IDP signatures regularly at the time and day specified.You should select a time when your network is not busy for minimal interruption.
HourlySelect this option to have the ZyWALL check for new IDP signatures every hour.
DailySelect this option to have the ZyWALL check for new IDP signatures everyday at the specified time. The time format is the 24 hour clock, so '23' means 11PM for example.
WeeklySelect this option to have the ZyWALL check for new IDP signatures once a week on the day and at the time specified.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

Figure 121 Downloading IDP Signatures
ZYXEL ZYWALL USG 2000 - The IDP/AppPatrol Update Screen - 2

text_image ZyXEL ZyWALL online Update Server Rendering... Close

Figure 122 Successful IDP Signature Download
ZYXEL ZYWALL USG 2000 - The IDP/AppPatrol Update Screen - 3

text_image ZyXEL ZyWALL online Update Server Signature download has succeeded. at Tue May 23 13:27:24 2006 Close

9.4 The System Protect Update Screen

Click Licensing > Update > System Protect to display the following screen.

Use this screen to schedule or immediately download system-protection signatures. The ZyWALL comes with signatures that it uses to protect itself from intrusions. These signatures are continually updated as new attack types evolve. These system protection signature updates are free and can be downloaded to the ZyWALL periodically. The system-protection function is part of the IDP feature. The system-protection feature is enabled by default and can only be disabled via the commands. You do not need an IDP subscription to use the system-protection feature or to download updated system-protection signatures.

Figure 123 Licensing > Update > System Protect
ZYXEL ZYWALL USG 2000 - The System Protect Update Screen - 1

text_image Anti-Virus IDP/AppPatrol System Protect Signature Information Current Version: 1.004 Signature Number: 18 Released Date: 2007/11/09 15:31:00 Remote Update Synchronize the System Protect Signature Package to the latest version with online update server. Update Now ✓ Auto Update ○ Hourly 0 (Hour) ○ Daily 0 (Hour) ● Weekly Sunday (Day) 0 (Hour) Apply Reset

The following table describes the fields in this screen.

Table 44 Licensing > Update > System Protect

LABELDESCRIPTION
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Current VersionThis field displays the system protect signature and anomaly rule set version number. This number gets larger as the set is enhanced.
Signature NumberThis field displays the number of signatures in this set. This number usually gets larger as the set is enhanced. Older signatures and rules may be removed if they are no longer applicable or have been supplanted by newer ones.
Released DateThis field displays the date and time the set was released.
Remote UpdateUse these fields to have the ZyWALL check for new signatures at myZyXEL.com. If new signatures are found, they are then downloaded to the ZyWALL.
Update NowClick this button to have the ZyWALL check for new signatures immediately. If there are new ones, the ZyWALL will then download them.
Auto UpdateSelect this check box to have the ZyWALL automatically check for new signatures regularly at the time and day specified.You should select a time when your network is not busy for minimal interruption.
HourlySelect this option to have the ZyWALL check for new signatures every hour.
DailySelect this option to have the ZyWALL check for new signatures every day at the specified time. The time format is the 24 hour clock, so '23' means 11PM for example.
WeeklySelect this option to have the ZyWALL check for new signatures once a week on the day and at the time specified.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

Figure 124 Downloading System Protect Signatures
ZYXEL ZYWALL USG 2000 - The System Protect Update Screen - 2

text_image ZyXEL ZyWALL online Update Server Rendering... Close

Figure 125 Successful System Protect Signature Download
ZYXEL ZYWALL USG 2000 - The System Protect Update Screen - 3

text_image ZyXEL ZyWALL online Update Server Signature download has succeeded. at Tue May 23 13:27:24 2006 Close

PART II

Network

Interface (181)

Trunks (239)

Policy and Static Routes (249)

Routing Protocols (263)

Zones (275)

DDNS (279)

Virtual Servers (287)

HTTP Redirect (301)

ALG (305)

IP/MAC Binding (313)

10.1 Interface Overview

Use the Interface screens to configure the ZyWALL's interfaces. You can also create interfaces on top of other interfaces.

  • Ports are the physical ports to which you connect cables.
  • Interfaces are used within the system operationally. You use them in configuring various features. An interface also describes a network that is directly connected to the ZyWALL. For example, You connect the LAN network to the ge1 interface.
  • Zones are groups of interfaces used to ease security policy configuration.

10.1.1 What You Can Do in the Interface Screens

  • Use the Interface Status screen (Section 10.2 on page 185) to see all of the ZyWALL's interfaces and their packet statistics.
  • Use the Port Grouping screens (Section 10.3 on page 188) to create port groups and to assign physical ports and port groups to Ethernet interfaces.
  • Use the Ethernet screens (Section 10.4 on page 190) to configure the Ethernet interfaces. Ethernet interfaces are the foundation for defining other interfaces and network policies. RIP and OSPF are also configured in these interfaces.
  • Use the PPP screens (Section 10.6 on page 198) for PPPoE or PPTP Internet connections.
  • Use the Cellular screens (Section 10.7 on page 205) to configure settings for interfaces for Internet connections through an installed 3G card.
  • Use the VLAN screens (Section 10.9 on page 214) to divide the physical network into multiple logical networks. VLAN interfaces receive and send tagged frames. The ZyWALL automatically adds or removes the tags as needed. Each VLAN can only be associated with one Ethernet interface.
  • Use the Bridge screens (Section 10.10 on page 222) to combine two or more network segments into a single network.
  • Use the Auxiliary screens (Section 10.11 on page 230) to configure the ZyWALL's auxiliary interface to use an external modem.

  • Use the Virtual Interface screen (Section 10.12 on page 233) to create virtual interfaces on top of Ethernet interfaces to tell the ZyWALL where to route packets. You can create virtual Ethernet interfaces, virtual VLAN interfaces, and virtual bridge interfaces.

  • Use the Trunks screens (Chapter 11 on page 239) to configure load balancing.

10.1.2 What You Need to Know About Interfaces

Interface Characteristics

Interfaces generally have the following characteristics (although not all characteristics apply to each type of interface).

  • An interface is a logical entity through which (layer-3) packets pass.
  • An interface is bound to a physical port or another interface.
  • Many interfaces can share the same physical port.
  • An interface belongs to at most one zone.
  • Many interfaces can belong to the same zone.
  • Layer-3 virtualization (IP alias, for example) is a kind of interface.

Types of Interfaces

You can create several types of interfaces in the ZyWALL.

  • Port groups create a hardware connection between physical ports at the layer-2 (data link, MAC address) level.
  • Ethernet interfaces are the foundation for defining other interfaces and network policies. RIP and OSPF are also configured in these interfaces.
  • VLAN interfaces receive and send tagged frames. The ZyWALL automatically adds or removes the tags as needed. Each VLAN can only be associated with one Ethernet interface.
  • Bridge interfaces create a software connection between Ethernet or VLAN interfaces at the layer-2 (data link, MAC address) level. Unlike port groups, bridge interfaces can take advantage of some security features in the ZyWALL. You can also assign an IP address and subnet mask to the bridge.
  • PPPoE/PPTP interfaces support Point-to-Point Protocols (PPP). ISP accounts are required for PPPoE/PPTP interfaces.
  • Virtual interfaces provide additional routing information in the ZyWALL. There are three types: virtual Ethernet interfaces, virtual VLAN interfaces, and virtual bridge interfaces.
  • The auxiliary interface, along with an external modem, provides an interface the ZyWALL can use to dial out. This interface can be used as a backup WAN interface, for example. The auxiliary interface controls the AUX port.
  • Trunks manage load balancing between interfaces.

Port groups, trunks, and the auxiliary interface have a lot of characteristics that are specific to each type of interface. See Section 10.3 on page 188, Chapter 11 on page 239, and Section 10.11 on page 230 for details. The other types of interfaces--Ethernet, VLAN, bridge, PPPoE/PPTP, and virtual--have a lot of similar characteristics. These characteristics are listed in the following table and discussed in more detail below.

Table 45 Ethernet, VLAN, Bridge, PPPoE/PPTP, and Virtual Interfaces Characteristics

CHARACTERISTICSETHERNETVLANBRIDGEPPPOE/PPTPVIRTUAL
Name*gexvlanxbrxpppx**
IP Address Assignment
static IP addressYesYesYesYesYes
DHCP clientYesYesYesYesNo
routing metricYesYesYesYesYes
Interface Parameters
bandwidth restrictionsYesYesYesYesYes
packet size (MTU)YesYesYesYesNo
DHCP
DHCP serverYesYesYesNoNo
DHCP relayYesYesYesNoNo
Ping CheckYesYesYesYesNo

* - The format of interface names is strict. Each name consists of 2-4 letters (interface type), followed by a number (x, limited by the maximum number of each type of interface). For example, Ethernet interface names are ge1, ge2, ge3, ...; VLAN interfaces are vlan0, vlan1, vlan2, ...; and so on.

** - The names of virtual interfaces are derived from the interfaces on which they are created. For example, virtual interfaces created on Ethernet interface ge1 are called ge1:1, ge1:2, and so on. Virtual interfaces created on VLAN interface vlan2 are called vlan2:1, vlan2:2, and so on. You cannot specify the number after the colon(:) in the web configurator; it is a sequential number. You can specify the number after the colon if you use the CLI to set up a virtual interface.

Relationships Between Interfaces

In the ZyWALL, interfaces are usually created on top of other interfaces. Only Ethernet interfaces are created directly on top of the physical ports or port groups. The relationships between interfaces are explained in the following table.

* - You cannot set up a PPPoE/PPTP interface, virtual Ethernet interface or virtual VLAN interface if the underlying interface is a member of a bridge. You also cannot add an Ethernet interface or VLAN interface to a bridge if the member interface has a virtual interface or PPPoE/PPTP interface on top of it.
Table 46 Relationships Between Different Types of Interfaces

INTERFACEREQUIRED PORT / INTERFACE
auxiliary interfaceauxiliary port
port groupphysical port
Ethernet interfacephysical portport group
VLAN interfaceEthernet interface
bridge interfaceEthernet interface*VLAN interface*
PPPoE/PPTP interfaceEthernet interface*VLAN interface*bridge interface
virtual interface(virtual Ethernet interface)(virtual VLAN interface)(virtual bridge interface)Ethernet interface*VLAN interface*bridge interface
trunkEthernet interfaceVLAN interfacebridge interfacePPPoE/PPTP interfaceauxiliary interface

Finding Out More

  • See Section 5.2 on page 102 details on the differences between physical ports, interfaces, and zones in the ZyWALL.
    • See Section 5.4.2 on page 106 for related information about the Interface screens.
    • See Section 10.13 on page 235 for background information on interfaces.
  • See Section 6.1 on page 119 for an example of configuring Ethernet interfaces and port groups.
    • See Chapter 11 on page 239 to configure load balancing using trunks.

10.2 Interface Status Screen

This screen lists all of the ZyWALL's interfaces and gives packet statistics for them. Click Network > Interface to access this screen.

Figure 126 Network > Interface > Interface Status

Interface Status
NameStatusHA StatusZoneIP Addr/NetmaskIP AssignmentServicesAction
ge1100M/Fulln/aLAN192.168.1.1 / 255.255.255.0StaticDHCP servern/a
ge2Downn/aWAN0.0.0.0 / 0.0.0.0DHCP clientn/aRenew
ge3Downn/aWAN0.0.0.0 / 0.0.0.0DHCP clientn/aRenew
ge4Downn/aDMZ192.168.2.1 / 255.255.255.0Staticn/an/a
ge5Downn/aDMZ192.168.3.1 / 255.255.255.0Staticn/an/a
ge6Downn/aDMZ192.168.4.1 / 255.255.255.0Staticn/an/a
ge7Downn/an/a0.0.0.0 / 0.0.0.0Staticn/an/a
ge8Downn/an/a0.0.0.0 / 0.0.0.0Staticn/an/a
auxInactiven/an/a0.0.0.0 / 0.0.0.0Dynamicn/an/a
Interface Statistics
Refresh
NameStatusTxPktsRxPktsCollisionTx B/sRx B/s
ge1100M/Full2381517260042112825838
ge2Down19720000
ge3Down19720000
ge4Down00000
ge5Down00000
ge6Down00000
ge7Down00000
ge8Down20000
auxInactive00000

Each field is described in the following table.

Table 47 Network > Interface > Interface Status

LABELDESCRIPTION
Interface StatusIf an Ethernet interface does not have any physical ports associated with it, its entry is displayed in light gray text.
NameThis field displays the name of each interface. If there is a Expand icon (plus-sign) next to the name, click this to look at the status of virtual interfaces on top of this interface.
StatusThis field displays the current status of each interface. The possible values depend on what type of interface it is.For port groups:Inactive- The port group is disabled.Port Group Down- The port group is enabled but not connected.Port Group Up- The port group is enabled, and at least one of the physical ports associated with it is connected.For Ethernet interfaces:Port Group Inactive- The Ethernet interface does not have any physical ports associated with it.Inactive- The Ethernet interface is disabled.Down- The Ethernet interface is enabled but not connected.Speed / Duplex- The Ethernet interface is enabled and connected. This field displays the port speed and duplex setting (Full or Half).For the auxiliary interface:Inactive- The auxiliary interface is disabled-connected- The auxiliary interface is enabled and connected.Disconnected- The auxiliary interface is not connected.For virtual interfaces, this field always displays Up. If the virtual interface is disabled, it does not appear in the list.For VLAN and bridge interfaces, this field always displays Up. If the VLAN or bridge interface is disabled, it does not appear in the list.For PPPoE/PPTP interfaces:Connected- The PPPoE/PPTP interface is connected.Disconnected- The PPPoE/PPTP interface is not connected.If the PPPoE/PPTP interface is disabled, it does not appear in the list.
HA StatusThis field displays the status of the interface in the virtual router.Active- This interface is the master interface in the virtual router.Stand-By- This interface is a backup interface in the virtual router.Fault- This VRRP group is not functioning in the virtual router right now. For example, this might happen if the interface is down.n/a- Device HA is not active on the interface.
ZoneThis field displays the zone to which the interface is currently assigned.
IP Addr/NetmaskThis field displays the current IP address and subnet mask assigned to the interface. If the IP address and subnet mask are 0.0.0.0, the interface is disabled or did not receive an IP address and subnet mask via DHCP.If this interface is a member of an active virtual router, this field displays the IP address it is currently using. This is either the static IP address of the interface (if it is the master) or the management IP address (if it is a backup).
IP AssignmentThis field displays how the interface gets its IP address.Static - This interface has a static IP address.DHCP Client - This interface gets its IP address from a DHCP server.Dynamic - This is the auxiliary interface.
ServicesThis field lists which services the interface provides to the network. Examples include DHCP relay, DHCP server, DDNS, RIP, and OSPF. This field displays n/a if the interface does not provide any services to the network.
ActionUse this field to get or to update the IP address for the interface. Click Renew to send a new DHCP request to a DHCP server. Click the Connect icon to try to connect the auxiliary interface or a PPPoE/PPTP interface. If the interface cannot use one of these ways to get or to update its IP address, this field displays n/a.
Interface StatisticsThis table provides packet statistics for each interface.
RefreshClick this button to update the information in the screen.
NameThis field displays the name of each interface. If there is a Expand icon (plus-sign) next to the name, click this to look at the statistics for virtual interfaces on top of this interface.
StatusThis field displays the current status of the interface.Down - The interface is not connected.Speed / Duplex - The interface is connected. This field displays the port speed and duplex setting (Full or Half).
TxPktsThis field displays the number of packets transmitted from the ZyWALL on the interface since it was last connected.
RxPktsThis field displays the number of packets received by the ZyWALL on the interface since it was last connected.
CollisionThis field displays the number of collisions on the interface since it was last connected.
Tx B/sThis field displays the transmission speed, in bytes per second, on the interface in the one-second interval before the screen updated.
Rx B/sThis field displays the reception speed, in bytes per second, on the interface in the one-second interval before the screen updated.

10.3 Port Grouping

This section introduces port groups and then explains the screen for port groups.

10.3.1 Port Grouping Overview

Use port grouping to create port groups and to assign physical ports and port groups to Ethernet interfaces.

Each physical port is assigned to one Ethernet interface. In port grouping, the Ethernet interfaces are called representative interfaces. If you assign more than one physical port to a representative interface, you create a port group. Port groups have the following characteristics:

  • There is a layer-2 Ethernet switch between physical ports in the port group. This provides wire-speed throughput but no security.
  • It can increase the bandwidth between the port group and other interfaces.

In the example below, you might combine physical ports 3 and 4 into port group ge3.

Figure 127 Port Grouping Example: Network
ZYXEL ZYWALL USG 2000 - Port Grouping Overview - 1

flowchart
graph TD
    A["ge1"] --> B["ZyWALL"]
    C["ge2"] --> B
    D["ge3"] --> B
    E["ge5"] --> B
    B --> F["Internet"]
    style A fill:#f9f,stroke:#333
    style C fill:#f9f,stroke:#333
    style D fill:#f9f,stroke:#333
    style E fill:#f9f,stroke:#333
    style F fill:#ccf,stroke:#333

In this case, click Network > Interface > Port Grouping, and set up the screen like this.

Figure 128 Port Grouping Example: Screen
ZYXEL ZYWALL USG 2000 - Port Grouping Overview - 2

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk Configuration ge1 ge2 ge3 ge4 ge5 ge6 Representative Interface 10/100/1000 Physical Port Apply Reset

There are no ports assigned to ge4. If you do not assign any physical ports to a representative interface, you cannot use this interface to create other interfaces or create IPSec VPN tunnels. The Ethernet interface is still displayed in the screen, however, and the existing configuration remains.

10.3.2 Port Grouping Screen

Define the relationship between physical ports, port groups, and Ethernet interfaces in the Port Grouping screen. Port grouping does not apply to ports 7 and 8 (the dual-personality Ethernet port and SFP slot pairs). The are always assigned to interfaces ge7 and ge8, respectively. To access this screen, click Network > Interface > Port Grouping.

Figure 129 Network > Interface > Port Grouping
ZYXEL ZYWALL USG 2000 - Port Grouping Screen - 1

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk Configuration ge1 ge2 ge3 ge4 ge5 ge6 Representative Interface 10/100/1000 1 2 3 4 5 6 Physical Port Apply Reset

Each section in this screen is described below.

Table 48 Network > Interface > Port Grouping

LABELDESCRIPTION
Representative Interface (ge1, ge2, ge3, ge4, ge5, ge6)These are Ethernet interfaces. To add a physical port to a representative interface, drag the physical port onto the corresponding representative interface.
Physical Port (1, 2, 3, 4, 5, 6)These are the physical ports as they appear on the front panel of the ZyWALL. To add a physical port to a representative interface, drag the physical port onto the corresponding representative interface.
ApplyClick this button to save your changes and apply them to the ZyWALL.
ResetClick this button to change the port groups to their current configuration (last-saved values).

10.4 Ethernet Summary Screen

This screen lists every Ethernet interface and virtual interface created on top of Ethernet interfaces. To access this screen, click Network > Interface.

Figure 130 Network > Interface > Ethernet
ZYXEL ZYWALL USG 2000 - Ethernet Summary Screen - 1

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk Configuration

Name IP Address Mask Modify

1 ge1 SSTATIC -- 192.168.1.1 255.255.255.0 2 ge2 DHCP -- 0.0.0.0 0.0.0.0 3 ge3 DHCP -- 0.0.0.0 0.0.0.0 4 ge4 SSTATIC -- 192.168.2.1 255.255.255.0 5 ge5 SSTATIC -- 192.168.3.1 255.255.255.0 6 ge6 SSTATIC -- 192.168.4.1 255.255.255.0 7 ge7 SATIC -- 0.0.0.0 0.0.0.0 8 ge8 SATIC -- 0.0.0.0 0.0.0.0 Apply Reset

Each field is described in the following table.

Table 49 Network > Interface > Ethernet

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with any interface.
NameThis field displays the name of the interface.
IP AddressThis field displays the current IP address of the interface. If the IP address is 0.0.0.0, the interface does not have an IP address yet.This screen also shows whether the IP address is a static IP address (STATIC) or dynamically assigned (DHCP). IP addresses are always static in virtual interfaces.
MaskThis field displays the interface's subnet mask in dot decimal notation.
ModifyThis column lets you create, edit, remove, activate, and deactivate interfaces. You cannot add or remove Ethernet interfaces, however.To create a virtual Ethernet interface, click the Add icon next to the corresponding Ethernet interface. The Virtual Interface Add/Edit screen appears. See Section 10.12 on page 233.To edit an interface, click the Edit icon next to it. The Ethernet Edit screen or Virtual Interface Add/Edit screen appears accordingly.To remove a virtual interface, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To activate or deactivate an interface, click the Active icon next to it. Make sure you click Apply to save and apply the change.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.4.1 Ethernet Edit

The Ethernet Edit screen lets you configure IP address assignment, interface parameters, RIP settings, OSPF settings, DHCP settings, and ping check settings. To access this screen, click an Edit icon in the Ethernet Summary screen. (See Section 10.4 on page 190.)

Figure 131 Network > Interface > Ethernet > Edit
ZYXEL ZYWALL USG 2000 - Ethernet Edit - 1

text_image General Settings Enable Interface Interface Properties Interface Name ge1 MAC Address 00:00:AA:77:98:66 (Optional) Description IP Address Assignment Get Automatically Use Fixed IP Address IP Address 192.168.1.1 Subnet Mask 255.255.255.0 (Optional) Gateway Metric 0 (0-15) Interface Parameters Basic Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps MTU 1500 Bytes Connectivity Check Enable Connectivity Check Check Method icmp Check Period 30 (5-30 seconds) Check Timeout 5 (1-10 seconds) Check Fail Tolerance 5 (1-10) Check Default Gateway 0.0.0.0 (Domain Name or IP Address) Check this address DHCP Setting DHCP DHCP Relay Relay Server 1 (IP Address) Relay Server 2 (IP Address) Enable IP/MAC Binding Enable Logs for IP/MAC Binding Violation Static DHCP Table Edit static DHCP table Related Setting Configure PPPoE/PPTP Configure VLAN Configure WAN TRUNK Configure Policy Route Less Settings RIP Setting Enable RIP Direction BiDir Send Version 2 Receive Version 2 V2-Broadcast OSPF Setting Area None Priority 1 (0-255) Link Cost 10 (1-65535) Passive Interface Authentication Text Text Authentication Key MAC Address Setting Use Default MAC Address 00:00:AA:77:98:66 Overwrite Default MAC Address 00:00:00:00:00 Clone by host OK Cancel

Each field is described in the table below.

Table 50 Network > Interface > Ethernet > Edit

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this to enable this interface. Clear this to disable this interface.
Interface Properties
Interface NameThis field is read-only. This is the name of the Ethernet interface.
MAC AddressThis field is read-only. This is the MAC address that the Ethernet interface uses.
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( ) + / : = ? ! * #@$ _% - characters, and it can be up to 60 characters long.
IP Address AssignmentThese IP address fields configure an IP address on the interface itself. If you change this IP address on the interface, you may also need to change a related address object for the network connected to the interface. For example, if you use this screen to change the IP address of your LAN interface, you should also change the corresponding LAN subnet address object.
Get AutomaticallySelect this to make the interface a DHCP client and automatically get the IP address, subnet mask, and gateway address from a DHCP server.You should not select this if the interface is assigned to a VRRP group.See Chapter 35 on page 593.
Use Fixed IP AddressSelect this if you want to specify the IP address, subnet mask, and gateway manually.
IP AddressThis field is enabled if you select Use Fixed IP Address.Enter the IP address for this interface.
Subnet MaskThis field is enabled if you select Use Fixed IP Address.Enter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network.
GatewayThis field is enabled if you select Use Fixed IP Address.Enter the IP address of the gateway. The ZyWALL sends packets to the gateway when it does not know how to route the packet to its destination. The gateway should be on the same network as the interface.
MetricEnter the priority of the gateway (if any) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Interface Parameters
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
MTUMaximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the ZyWALL divides it into smaller fragments. Allowed values are 576 - 1500. Usually, this value is 1500.
Connectivity CheckThe interface can regularly check the connection to the gateway you specified to make sure it is still available. You specify how often the interface checks the connection, how long to wait for a response before the attempt is a failure, and how many consecutive failures are required before the ZyWALL stops routing to the gateway. The ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity check.
Enable Connectivity CheckSelect this to turn on the connection check.
Check MethodSelect the method that the gateway allows.Select icmp to have the ZyWALL regularly ping the gateway you specify to make sure it is still available.Select tcp to have the ZyWALL regularly perform a TCP handshake with the gateway you specify to make sure it is still available.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures before the ZyWALL stops routing through the gateway.
Check Default GatewaySelect this to use the default gateway for the connectivity check.
Check this addressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check PortThis field only displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
DHCP Setting
DHCPSelect what type of DHCP service the ZyWALL provides to the network. Choices are:None- the ZyWALL does not provide any DHCP services. There is already a DHCP server on the network.DHCP Relay- the ZyWALL routes DHCP requests to one or more DHCP servers you specify. The DHCP server(s) may be on another network.DHCP Server- the ZyWALL assigns IP addresses and provides subnet mask, gateway, and DNS server information to the network. The ZyWALL is the DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Relay.
Relay Server 1Enter the IP address of a DHCP server for the network.
Relay Server 2This field is optional. Enter the IP address of another DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Server.
IP Pool Start AddressEnter the IP address from which the ZyWALL begins allocating IP addresses. If you want to assign a static IP address to a specific computer, click Edit static DHCP table.If this field is blank, the Pool Size must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
Pool SizeEnter the number of IP addresses to allocate. This number must be at least one and is limited by the interface's Subnet Mask. For example, if the Subnet Mask is 255.255.255.0 and IP Pool Start Address is 10.10.10.10, the ZyWALL can allocate 10.10.10.10 to 10.10.10.254, or 245 IP addresses.If this field is blank, the IP Pool Start Address must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
First DNS Server, Second DNS Server, Third DNS ServerSpecify the IP addresses up to three DNS servers for the DHCP clients to use. Use one of the following ways to specify these IP addresses.Custom Defined - enter a static IP address.From ISP - select the DNS server that another interface received from its DHCP server.ZyWALL - the DHCP clients use the IP address of this interface and the ZyWALL works as a DNS relay.
First WINS Server, Second WINS ServerType the IP address of the WINS (Windows Internet Naming Service) server that you want to send to the DHCP clients. The WINS server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using.
Lease timeSpecify how long each computer can use the information (especially the IP address) before it has to request the information again.Choices are:infinite- select this if IP addresses never expire.days, hours, and minutes- select this to enter how long IP addresses are valid.
Enable IP/MAC BindingSelect this option to have this interface enforce links between specific IP addresses and specific MAC addresses. This stops anyone else from manually using a bound IP address on another device connected to this interface. Use this to make use only the intended users get to use specific IP addresses.
Enable Logs for IP/MAC BindingViolationSelect this option to have the ZyWALL generate a log if a device connected to this interface attempts to use an IP address that is bound to another device's MAC address.
Edit static DHCP tableClick this to configure static IP addresses for the ZyWALL to assign to computers connected to this interface. See Section 10.5 on page 198.
Related Setting
Configure PPPoE/PPTPClick PPPoE/PPTP if this interface's Internet connection uses PPPoE or PPTP.
Configure VLANClick VLAN if you want to configure a VLAN interface for this Ethernet interface.
Configure WAN TRUNKClick WAN TRUNK to go to a screen where you can set this interface to be part of a WAN trunk for load balancing.
Configure Policy RouteClick Policy Route to go to the screen where you can manually configure a policy route to associate traffic with this interface.
More Settings/Less SettingsClick this button to display a greater or lesser number of configuration fields.
RIP SettingSee Section 13.2 on page 264 for more information about RIP.
Enable RIPSelect this to enable RIP in this interface.
DirectionThis field is effective when RIP is enabled. Select the RIP direction from the drop-down list box.BiDir - This interface sends and receives routing information.In-Only - This interface receives routing information.Out-Only - This interface sends routing information.
Send VersionThis field is effective when RIP is enabled. Select the RIP version(s) used for sending RIP packets. Choices are 1, 2, and 1 and 2.
Receive VersionThis field is effective when RIP is enabled. Select the RIP version(s) used for receiving RIP packets. Choices are 1, 2, and 1 and 2.
V2-BroadcastThis field is effective when RIP is enabled. Select this to send RIP-2 packets using subnet broadcasting; otherwise, the ZyWALL uses multicasting.
OSPF SettingSee Section 13.3 on page 265 for more information about OSPF.
AreaSelect the area in which this interface belongs. Select None to disable OSPF in this interface.
PriorityEnter the priority (between 0 and 255) of this interface when the area is looking for a Designated Router (DR) or Backup Designated Router (BDR). The highest-priority interface identifies the DR, and the second-highest-priority interface identifies the BDR. Set the priority to zero if the interface can not be the DR or BDR.
Link CostEnter the cost (between 1 and 65,535) to route packets through this interface.
Passive InterfaceSelect this to stop forwarding OSPF routing information from the selected interface. As a result, this interface only receives routing information.
AuthenticationSelect an authentication method, or disable authentication. To exchange OSPF routing information with peer border routers, you must use the same authentication method that they use. Choices are: Same-as-Area - use the default authentication method in the area None - disable authentication Text - authenticate OSPF routing information using a plain-text password MD5 - authenticate OSPF routing information using MD5 encryption
Text Authentication KeyThis field is available if the Authentication is Text. Type the password for text authentication. The key can consist of alphanumeric characters and the underscore, and it can be up to eight characters long.
MD5 Authentication IDThis field is available if the Authentication is MD5. Type the ID for MD5 authentication. The ID can be between 1 and 255.
MD5 Authentication KeyThis field is available if the Authentication is MD5. Type the password for MD5 authentication. The password can consist of alphanumeric characters and the underscore, and it can be up to 16 characters long.
MAC Address SettingHave the interface use either the factory assigned default MAC address, a manually specified MAC address, or clone the MAC address of another device or computer.
Use Default MAC AddressSelect this option to have the interface use the factory assigned default MAC address. By default, the ZyWALL uses the factory assigned MAC address to identify itself.
Overwrite Default MAC AddressSelect this option to have the interface use a different MAC address. Either enter the MAC address in the fields or click Clone by host and enter the IP address of the device or computer whose MAC you are cloning. Once it is successfully configured, the address will be copied to the configuration file. It will not change unless you change the setting or upload a different configuration file.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.5 The Static DHCP Screen

In an interface add or edit screen, click Edit static DHCP table to open the Static DHCP screen. Use this screen to configure the list of static IP addresses the ZyWALL assigns to computers connected to the interface. If a computer's MAC address is in the interface's static DHCP table, the ZyWALL assigns the corresponding IP address. Otherwise, the ZyWALL assigns an IP address dynamically using the interface's IP Pool Start Address and Pool Size.

You must click OK in the Static DHCP screen and then click OK in the interface add or edit screen to save your changes.

Figure 132 Static DHCP
ZYXEL ZYWALL USG 2000 - The Static DHCP Screen - 1

text_image Static DHCP

IP Address MAC Description

1 192.168.1.21 05:01:0D:1F:1C:D2 example 2 OK Cancel

The following table describes this screen.

Table 51 Static DHCP

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific entry.
IP AddressEnter the IP address to assign to a device with this entry's MAC address.
MAC AddressEnter the MAC address to which to assign this entry's IP address.
DescriptionEnter a description to help identify this static DHCP entry. You can use alphanumeric and ( )+/:=?!*#@$_%- characters, and it can be up to 60 characters long.
Add iconThis column lets you create and remove static DHCP entries.To add an entry, click the Add icon.To remove an entry, click it's Remove icon.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.6 The PPP Interfaces

This section introduces PPPoE, PPTP, and PPPoE/PPTP interfaces and then explains the screens for PPPoE/PPTP interfaces.

10.6.1 PPPoE/PPTP Overview

Point-to-Point Protocol over Ethernet (PPPoE, RFC 2516) and Point-to-Point Tunneling Protocol (PPTP, RFC 2637) are usually used to connect two computers over phone lines or broadband connections.

PPPoE is often used with cable modems and DSL connections. It provides the following advantages:

  • The access and authentication method works with existing systems, including RADIUS.
  • You can access one of several network services. This makes it easier for the service provider to offer the service
  • PPPoE does not usually require any special configuration of the modem.

PPTP is used to set up virtual private networks (VPN) in unsecure TCP/IP environments. It sets up two sessions.

1 The first one runs on TCP port 1723. It is used to start and manage the second one.
2 The second one uses Generic Routing Encapsulation (GRE, RFC 2890) to transfer information between the computers.

PPTP is convenient and easy-to-use, but you have to make sure that firewalls support both PPTP sessions.

10.6.2 PPPoE/PPTP Interfaces Overview

In the ZyWALL, you may use PPPoE/PPTP interfaces to connect to your ISP. This way, you do not have to install or manage PPPoE/PPTP software on each computer in the network.

Figure 133 Example: PPPoE/PPTP Interfaces
ZYXEL ZYWALL USG 2000 - PPPoE/PPTP Interfaces Overview - 1

flowchart
graph LR
    A["Router"] <--> B["INTERNET"]
    B <--> C["ISP"]

PPPoE/PPTP interfaces are similar to other interfaces in some ways. They have an IP address, subnet mask, and gateway used to make routing decisions; they restrict bandwidth and packet size; and they can verify the gateway is available. There are two main differences between PPPoE/PPTP interfaces and other interfaces.

1 You must set up an ISP account before you create a PPPoE/PPTP interface.

Each ISP account specifies the protocol (PPPoE or PPTP), as well as your ISP account information. If you change ISPs later, you only have to create a new ISP account, not a new PPPoE/PPTP interface. You should not have to change any network policies.

2 You do not set up the subnet mask or gateway.

PPPoE/PPTP interfaces are interfaces between the ZyWALL and only one computer. Therefore, the subnet mask is always 255.255.255.255. In addition, the ZyWALL always treats the ISP as a gateway.

At the time of writing, it is possible to set up the IP address of the gateway (ISP) using CLI commands but not in the web configurator.

10.6.3 PPP Interface Summary

Note: You have to set up an ISP account before you create a PPPoE/PPTP interface.

This screen lists every PPPoE/PPTP interface. To access this screen, click Network > Interface > PPP.

Figure 134 Network > Interface > PPP
ZYXEL ZYWALL USG 2000 - PPP Interface Summary - 1

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk Configuration

Name Base Interface Account Profile

Apply Reset

Each field is described in the table below.

Table 52 Network > Interface > PPP

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with any interface.
NameThis field displays the name of the interface.
Base InterfaceThis field displays the interface on the top of which the PPPoE/PPTP interface is.
Account ProfileThis field displays the ISP account used by this PPPoE/PPTP interface.
Add iconThis column lets you create, edit, remove, activate, deactivate, connect and disconnect interfaces.To create an interface, click the Add icon at the top of the column. The PPPoE/PPTP Interface Add/Edit screen appears.To edit an interface, click the Edit icon next to it. The PPPoE/PPTP Interface Add/Edit screen appears.To remove an interface, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To activate or deactivate an interface, click the Active icon next to it. Make sure you click Apply to save and apply the change.To connect or disconnect an interface, click the Connect icon next to it. You might use this icon to test the interface or to manually establish the connection for a Dial-on-Demand PPPoE/PPTP interface.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.6.4 PPP Interface Add/Edit

Note: You have to set up an ISP account before you create a PPPoE/PPTP interface.

This screen lets you configure new or existing PPPoE/PPTP interfaces. To access this screen, click the Add icon or an Edit icon in the PPP Interface screen.

Figure 135 Network > Interface > PPP > Edit
ZYXEL ZYWALL USG 2000 - PPP Interface Add/Edit - 1

text_image General Settings Enable Interface Interface Properties Interface Name ppp Base Interface ge1 (Optional) Description Connectivity Nailed-Up Dial-on-Demand ISP Setting Account Profile ---- Create Object ---- Protocol User Name Service Name IP Address Assignment Get Automatically Use Fixed IP Address IP Address Metric 0 (0-15) Interface Parameters Basic Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps MTU 1492 Bytes Connectivity Check Enable Connectivity Check Check Method tcp Check Period 30 (5-30 seconds) Check Timeout 5 (1-10 seconds) Check Fail Tolerance 5 (1-10) Check Default Gateway Check this address (Domain Name or IP Address) Check Port (1-65535) Related Setting Configure WAN TRUNK Configure Policy Route OK Cancel

Each field is explained in the following table.

Table 53 Network > Interface > PPP > Edit > Configuration

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this to enable this interface. Clear this to disable this interface.
Interface Properties
Interface NameThis field is read-only and displays the name of the PPP interface. The format is the name of the physical port followed by "ppp". For example, "wan1_pppoe".
Base InterfaceThis field is read-only and displays the name of the interface upon which this PPP interface is built.
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( )+/:=?!*#@$_%- characters, and it can be up to 60 characters long.
Connectivity
Nailed-UpSelect this if the PPPoE/PPTP connection should always be up. Clear this to have the ZyWALL establish the PPPoE/PPTP connection only when there is traffic. You might use this option if a lot of traffic needs to go through the interface or it does not cost extra to keep the connection up all the time.
Dial-on-DemandSelect this to have the ZyWALL establish the PPPoE/PPTP connection only when there is traffic. You might use this option if there is little traffic through the interface or if it costs money to keep the connection available.
ISP Setting
Account ProfileSelect the ISP account that this PPPoE/PPTP interface uses. The drop-down box lists ISP accounts by name. Select Create Object to create a new ISP account (see Chapter 43 on page 685 for details).
ProtocolThis field is read-only. It displays the protocol specified in the ISP account.
User NameThis field is read-only. It displays the user name for the ISP account.
Service NameThis field is read-only. It displays the PPPoE service name specified in the ISP account. This field is blank if the ISP account uses PPTP.
IP Address AssignmentClick Advanced to display more settings. Click Basic to display fewer settings.
Get AutomaticallySelect this if this interface is a DHCP client. In this case, the DHCP server configures the IP address automatically. The subnet mask and gateway are always defined automatically in PPPoE/PPTP interfaces.
Use Fixed IP AddressSelect this if you want to specify the IP address manually.
IP AddressThis field is enabled if you select Use Fixed IP Address.Enter the IP address for this interface.
MetricEnter the priority of the gateway (the ISP) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Interface Parameters
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
MTUMaximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the ZyWALL divides it into smaller fragments. Allowed values are 576 - 1492. Usually, this value is 1492.
Connectivity CheckThe interface can regularly check the connection to the gateway you specified to make sure it is still available. You specify how often the interface checks the connection, how long to wait for a response before the attempt is a failure, and how many consecutive failures are required before the ZyWALL stops routing to the gateway. The ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity check.
Enable Connectivity CheckSelect this to turn on the connection check.
Check MethodSelect the method that the gateway allows.Select icmp to have the ZyWALL regularly ping the gateway you specify to make sure it is still available.Select tcp to have the ZyWALL regularly perform a TCP handshake with the gateway you specify to make sure it is still available.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures before the ZyWALL stops routing through the gateway.
Check Default GatewaySelect this to use the default gateway for the connectivity check.
Check this addressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check PortThis field only displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
Related Setting
Configure WAN TRUNKClick WAN TRUNK to go to a screen where you can configure the interface as part of a WAN trunk for load balancing.
Configure Policy RouteClick Policy Route to go to the screen where you can manually configure a policy route to associate traffic with this interface.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.7 Cellular Configuration Screen (3G)

3G (Third Generation) is a digital, packet-switched wireless technology. Bandwidth usage is optimized as multiple users share the same channel and bandwidth is only allocated to users when they send data. It allows fast transfer of voice and non-voice data and provides broadband Internet access to mobile devices.

Note: The actual data rate you obtain varies depending the 3G card you use, the signal strength to the service provider's base station, and so on.

If the signal strength of a 3G network is too low, the 3G card may switch to an available 2.5G or 2.75G network. See the following table for a comparison between 2G, 2.5G, 2.75G and 3G of wireless technologies.

Table 54 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies

NAMETYPEMOBILE PHONE AND DATA STANDARDSDATA SPEED
GSM-BASEDCDMA-BASED
2GCircuit-switchedGSM (Global System for Mobile Communications), Personal Handy-phone System (PHS), etc.Interim Standard 95 (IS-95), the first CDMA-based digital cellular standard pioneered by Qualcomm. The brand name for IS-95 is cdmaOne. IS-95 is also known as TIA-EIA-95.Slow
2.5GPacket-switchedGPRS (General Packet Radio Services), High-Speed Circuit-Switched Data (HSCSD), etc.CDMA2000 is a hybrid 2.5G / 3G protocol of mobile telecommunications standards that use CDMA, a multiple access scheme for digital radio.
2.75GPacket-switchedEnhanced Data rates for GSM Evolution (EDGE), Enhanced GPRS (EGPRS), etc.CDMA2000 1xRTT (1 times Radio Transmission Technology) is the core CDMA2000 wireless air interface standard. It is also known as 1x, 1xRTT, or IS-2000 and considered to be a 2.5G or 2.75G technology.
3GPacket-switchedUMTS (Universal Mobile Telecommunications System), a third-generation (3G) wireless standard defined in ITU specification, is sometimes marketed as 3GSM. The UMTS uses GSM infrastructures and W-CDMA (Wideband Code Division Multiple Access) as the air interface.CDMA2000 EV-DO (Evolution-Data Optimized, originally 1x Evolution-Data Only), also referred to as EV-DO, EVDO, or just EV, is an evolution of CDMA2000 1xRTT and enables high-speed wireless connectivity. It is also denoted as IS-856 or High Data Rate (HDR).
3.5GPacket-switchedHSDPA (High-Speed Downlink Packet Access) is a mobile telephony protocol, used for UMTS-based 3G networks and allows for higher data transfer speeds.Fast

To change your 3G WAN settings, click Network > Interface > Cellular.

Note: Install (or connect) a compatible 3G card to use a cellular connection. See Chapter 52 on page 803 for details.

Note: The WAN IP addresses of a ZyWALL with multiple WAN interfaces must be on different subnets.

Figure 136 Network > Interface > Cellular
ZYXEL ZYWALL USG 2000 - Cellular Configuration Screen (3G) - 1

text_image Configuration Status Cellular Interface Summary #NAME Extension Slot Connected Device ISP Settings 1cellular1 PC Card Sierra Wireless AC850 Device Profile 1 2cellular2 USB 1 Huawei E220 Device Profile 1 3cellular3 USB 2 Chat none n/a Apply Reset

The following table describes the labels in this screen.

Table 55 Network > Interface > Cellular

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with any interface.
NameThis field displays the name of the interface.
Extension SlotThis field displays where the entry's cellular card is located.
Connected DeviceThis field displays the name of the cellular card.
ISP SettingsThis field displays the profile of ISP settings that this cellular interface is set to use.
Add iconThis column lets you create, edit, remove, activate, and deactivate cellular interfaces.To create an interface, click the Add icon at the top of the column. In the pop-up window that displays, select the slot that you want to configure.To activate or deactivate an interface, click the Active icon next to it.Make sure you click Apply to save and apply the change.To edit an interface, click the Edit icon next to it. The edit screen appears.To remove an interface, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To connect or disconnect an interface, click the Connect icon next to it.You might use this icon to test the interface or to manually establish the connection.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.7.1 Cellular Add/Edit Screen

To change your 3G settings, click Network > Interface > Cellular > Add (or Edit). In the pop-up window that displays, select the slot that you want to configure. The following screen displays.

Figure 137 Interface > Cellular > Add
ZYXEL ZYWALL USG 2000 - Cellular Add/Edit Screen - 1

text_image General Settings Enable Interface Interface Properties Interface Name cellular3 Zone WAN Extension Slot USB 1 Connected Device none (Optional) Description Connectivity Nailed-Up Idle timeout 0 (Seconds) ISP Settings Profile Selection Device Custom Profile 1 APN Dial String Authentication Type PAP User Name Password Retype to confirm SIM Card Setting PIN Code Interface Parameters Basic Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps MTU 1492 Bytes Connectivity Check Enable Connectivity Check Check Method icmp Check Period 30 (5-30 seconds) Check Timeout 5 (1-10 seconds) Check Fail Tolerance 5 (1-10) Check Default Gateway 0.0.0.0 (Domain Name or IP Address) Check this address Related Setting Configure WAN TRUNK Configure Policy Route Less Settings IP Address Assignment Get Automatically 0.0.0.0 Use Fixed IP Address IP Address Assignment Metric 0 (0-15) Device Settings Device Selection Sierra Wireless AC850 Band Selection auto OK Cancel

The following table describes the labels in this screen.

Table 56 Interface > Cellular > Add

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this option to turn on this interface.
Interface Properties
Interface NameThis field is read-only. This is the name of the cellular interface.
ZoneSelect the zone to which you want the cellular interface to belong. The zone determines the security settings the ZyWALL uses for the interface.
Extension SlotThis is the PCMCIA or USB slot that you are configuring for use with a 3G card.
Connected DeviceThis displays the manufacturer and model name of your 3G card if you inserted one in the ZyWALL. Otherwise, it displays none.
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( )+/:=?!*#@_%- characters, and it can be up to 60 characters long.
Connectivity
Nailed-UpSelect this if the connection should always be up. Clear this to have the ZyWALL to establish the connection only when there is traffic. You might not nail up the connection if there is little traffic through the interface or if it costs money to keep the connection available.
Idle timeoutThis value specifies the time in seconds (0~360) that elapses before the ZyWALL automatically disconnects from the ISP's server. Zero disables the idle timeout.
ISP Settings
Profile SelectionSelect Device to use one of the 3G device's profiles of device settings. Then select the profile (use Profile 1 unless your ISP instructed you to do otherwise).Select Custom to configure your device settings yourself.
APNThis field is read-only if you selected Device in the profile selection. Select Custom in the profile selection to be able to manually input the APN (Access Point Name) provided by your service provider. This field applies with a GSM or HSDPA 3G card. Enter the APN from your service provider. Connections with different APNs may provide different services (such as Internet access or MMS (Multi-Media Messaging Service)) and charge method.You can enter up to 63 ASCII printable characters. Spaces are allowed.
Dial StringEnter the dial string if your ISP provides a string, which would include the APN, to initialize the 3G card.You can enter up to 63 ASCII printable characters. Spaces are allowed.This field is available only when you insert a GSM 3G card.
Authentication TypeThe ZyWALL supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms.Use the drop-down list box to select an authentication protocol for outgoing calls. Options are:None: No authentication for outgoing calls.CHAP - Your ZyWALL accepts CHAP requests only.PAP - Your ZyWALL accepts PAP requests only.
User NameThis field displays when you select an authentication type other than None. This field is read-only if you selected Device in the profile selection. If this field is configurable, enter the user name for this 3G card exactly as the service provider gave it to you.You can use 1 ~ 64 alphanumeric and #:%-_@./ characters. The first character must be alphanumeric or -_@./. Spaces are not allowed.
PasswordThis field displays when you select an authentication type other than None. This field is read-only if you selected Device in the profile selection and the password is included in the 3G card's profile. If this field is configurable, enter the password for this SIM card exactly as the service provider gave it to you.You can use 0 ~ 63 alphanumeric and `~!@#%^&*()_-+={}|;:'<,>./ characters. Spaces are not allowed.
Retype to ConfirmThis field displays when you select an authentication type other than None. This field is read-only if you selected Device in the profile selection and the password is included in the 3G card's profile. If this field is configurable, re-enter the password for this SIM card exactly as the service provider gave it to you.
SIM Card Setting
PIN CodeThis field displays with a GSM or HSDPA 3G card. A PIN (Personal Identification Number) code is a key to a 3G card. Without the PIN code, you cannot use the 3G card.Enter the 4-digit PIN code (0000 for example) provided by your ISP. If you enter the PIN code incorrectly, the 3G card may be blocked by your ISP and you cannot use the account to access the Internet.If your ISP disabled PIN code authentication, enter an arbitrary number.
Interface ParametersClick Advanced to display more settings. Click Basic to display fewer settings.
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576. This setting is used in WAN load balancing and bandwidth management.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
MTUMaximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the ZyWALL divides it into smaller fragments. Allowed values are 576 - 1492. Usually, this value is 1492.
Connectivity CheckThe interface can regularly check the connection to the gateway you specified to make sure it is still available. You specify how often the interface checks the connection, how long to wait for a response before the attempt is a failure, and how many consecutive failures are required before the ZyWALL stops routing to the gateway. The ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity check.
Enable Connectivity CheckSelect this to turn on the connection check.
Check MethodSelect the method that the gateway allows.Select icmp to have the ZyWALL regularly ping the gateway you specify to make sure it is still available.Select tcp to have the ZyWALL regularly perform a TCP handshake with the gateway you specify to make sure it is still available.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures before the ZyWALL stops routing through the gateway.
Check Default GatewaySelect this to use the default gateway for the connectivity check.
Check this addressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check PortThis field only displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
Related Setting
Configure WAN TRUNKClick WAN TRUNK to go to a screen where you can configure the interface as part of a WAN trunk for load balancing.
Configure Policy RouteClick Policy Route to go to the screen where you can configure a policy route to associate traffic with this interface.
More Settings/ Less SettingsClick this button to display a greater or lesser number of configuration fields.
IP Address Assignment
Get AutomaticallySelect this option If your ISP did not assign you a fixed IP address. This is the default selection.
Use Fixed IP AddressSelect this option If the ISP assigned a fixed IP address.
IP AddressMetricEnter the cellular interface's WAN IP address in this field if you selected Use Fixed IP Address.Enter the priority of the gateway (if any) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Device Settings
Device SelectionSelect the 3G card to use with this entry or select auto to have the ZyWALL automatically detect the type of card.
Band SelectionThis field appears if you selected a 3G device that allows you to select the type of network to use. Select the type of 3G service for your 3G connection. If you are unsure what to select, check with your 3G service provider to find the 3G service available to you in your region.Select auto to have the card connect to an available network. Choose this option if you do not know what networks are available.You may want to manually specify the type of network to use if you are charged differently for different types of network or you only have one type of network available to you.Select GPRS / EDGE (GSM) only to have this interface only use a 2.5G or 2.75G network (respectively). If you only have a GSM network available to you, you may want to select this so the ZyWALL does not spend time looking for a WCDMA network.Select UMTS / HSDPA (WCDMA) only to have this interface only use a 3G or 3.5G network (respectively). You may want to do this if you want to make sure the interface does not use the GSM network.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.8 Cellular Status Screen

To check your 3G connection status, click Network > Interface > Cellular > Status. The following screen displays.

Figure 138 Interface > Cellular > Status
ZYXEL ZYWALL USG 2000 - Cellular Status Screen - 1

text_image Configuration Status Device Status Refresh

Extension Slot Connected Device Status Service Provider Cellular System Signal Quality More Info.

1 PC Card Sierra Wireless AC850 Device ready Far EasTone UMTS Fair 2 USB 1 Huawei E220 Device ready Chunghwa Telecom UMTS/HSDPA Poor

The following table describes the labels in this screen.

Table 57 Interface > Cellular > Status

LABELDESCRIPTION
RefreshClick this button to update the information in the screen.
#This field is a sequential value, and it is not associated with any interface.
Extension SlotThis field displays where the entry's cellular card is located.
Connected DeviceThis field displays the model name of the cellular card.
StatusNo device - no 3G device is connected to the ZyWALL.Device detected - displays when you connect a 3G device.Device error - a 3G device is connected but there is an error.Probe device fail - the ZyWALL's test of the 3G device failed.Probe device ok - the ZyWALL's test of the 3G device failed.Init device fail - the ZyWALL was not able to initialize the 3G device.Init device ok - the ZyWALL initialized the 3G card.Check lock fail - the ZyWALL's check of whether or not the 3G device is locked failed.Device locked - the 3G device is locked.SIM error - there is a SIM card error on the 3G device.SIM locked-PUK - the PUK is locked on the 3G device's SIM card.SIM locked-PIN - the PIN is locked on the 3G device's SIM card.Unlock PUK fail - Your attempt to unlock a WCDMA 3G device's PUK failed because you entered an incorrect PUK.Unlock PIN fail - Your attempt to unlock a WCDMA 3G device's PIN failed because you entered an incorrect PIN.Unlock device fail - Your attempt to unlock a CDMA2000 3G device failed because you entered an incorrect device code.Device unlocked - You entered the correct device code and unlocked a CDMA2000 3G device.Get dev-info fail - The ZyWALL cannot get cellular device information.Get dev-info ok - The ZyWALL succeeded in retrieving 3G device information.Searching network - The 3G device is searching for a network.Get signal fail - The 3G device cannot get a signal from a network.Network found - The 3G device found a network.Apply config - The ZyWALL is applying your configuration to the 3G device.Inactive - The 3G interface is disabled.Active - The 3G interface is enabled.Incorrect device - The connected 3G device is not compatible with the ZyWALL.Correct device - The ZyWALL detected a compatible 3G device.Set band fail - Applying your band selection was not successful.Set band ok - The ZyWALL successfully applied your band selection.Set profile fail - Applying your ISP settings was not successful.Set profile ok - The ZyWALL successfully applied your ISP settings.PPP fail - The ZyWALL failed to create a PPP connection for the cellular interface.Need auth-password - You need to enter the password for the 3G card in the cellular edit screen.Device ready - The ZyWALL successfully applied all of your configuration and you can use the 3G connection.
Service ProviderThis displays the name of your network service provider or Limited Service when the signal strength is too low.
Cellular SystemThis field displays what type of cellular network the 3G connection is using. The network type varies depending on the 3G card you inserted and could be UMTS, UMTS/HSDPA, GPRS or EDGE when you insert a GSM 3G card, or 1xRTT, EVDO Rev.0 or EVDO Rev.A when you insert a CDMA 3G card.
Signal QualityThis displays the strength of the signal. The signal strength mainly depends on the antenna output power and the distance between your ZyWALL and the service provider's base station.
More Info.This field displays other details about the 3G connection.

10.9 VLAN Interfaces

This section introduces VLAN and VLAN interfaces and then explains the screens for VLAN interfaces.

10.9.1 VLAN Overview

A Virtual Local Area Network (VLAN) divides a physical network into multiple logical networks. The standard is defined in IEEE 802.1q.

Figure 139 Example: Before VLAN
ZYXEL ZYWALL USG 2000 - VLAN Overview - 1

flowchart
graph TD
    A["Router"] --> B["Computer 1"]
    A --> C["Computer 2"]
    A --> D["Computer 3"]
    B --> E["Client 1"]
    B --> F["Client 2"]
    C --> G["Client 3"]
    D --> H["Client 4"]
    style A fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style C fill:#cfc,stroke:#333
    style D fill:#fcc,stroke:#333

In this example, there are two physical networks and three departments A, B, and C. The physical networks are connected to hubs, and the hubs are connected to the router.

Alternatively, you can divide the physical networks into three VLANs.

Figure 140 Example: After VLAN
ZYXEL ZYWALL USG 2000 - VLAN Overview - 2

flowchart
graph TD
    A["Router"] --> B["River"]
    B --> C["Router"]
    C --> D["VLAN ID = 1"]
    C --> E["VLAN ID = 2"]
    C --> F["VLAN ID = 3"]
    B --> G["Router"]
    G --> H["VLAN ID = 1"]
    G --> I["VLAN ID = 2"]
    G --> J["VLAN ID = 3"]

Each VLAN is a separate network with separate IP addresses, subnet masks, and gateways. Each VLAN also has a unique identification number (ID). The ID is a 12-bit value that is stored in the MAC header. The VLANs are connected to switches, and the switches are connected to the router. (If one switch has enough connections for the entire network, the network does not need switches A and B.)

  • Traffic inside each VLAN is layer-2 communication (data link layer, MAC addresses). It is handled by the switches. As a result, the new switch is required to handle traffic inside VLAN 2. Traffic is only broadcast inside each VLAN, not each physical network.
  • Traffic between VLANs (or between a VLAN and another type of network) is layer-3 communication (network layer, IP addresses). It is handled by the router.

This approach provides a few advantages.

  • Increased performance - In VLAN 2, the extra switch should route traffic inside the sales department faster than the router does. In addition, broadcasts are limited to smaller, more logical groups of users.
  • Higher security - If each computer has a separate physical connection to the switch, then broadcast traffic in each VLAN is never sent to computers in another VLAN.
  • Better manageability - You can align network policies more appropriately for users. For example, you can create different content filtering rules for each VLAN (each department in the example above), and you can set different bandwidth limits for each VLAN. These rules are also independent of the physical network, so you can change the physical network without changing policies.

In this example, the new switch handles the following types of traffic:

- Inside VLAN 2.

  • Between the router and VLAN 1.
  • Between the router and VLAN 2.
  • Between the router and VLAN 3.

10.9.2 VLAN Interfaces Overview

In the ZyWALL, each VLAN is called a VLAN interface. As a router, the ZyWALL routes traffic between VLAN interfaces, but it does not route traffic within a VLAN interface. All traffic for each VLAN interface can go through only one Ethernet interface, though each Ethernet interface can have one or more VLAN interfaces.

Note: Each VLAN interface is created on top of only one Ethernet interface.

Otherwise, VLAN interfaces are similar to other interfaces in many ways. They have an IP address, subnet mask, and gateway used to make routing decisions. They restrict bandwidth and packet size. They can provide DHCP services, and they can verify the gateway is available.

10.9.3 VLAN Summary Screen

This screen lists every VLAN interface and virtual interface created on top of VLAN interfaces. To access this screen, click Network > Interface > VLAN.

Figure 141 Network > Interface > VLAN
ZYXEL ZYWALL USG 2000 - VLAN Summary Screen - 1

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk Configuration

Name Port/VID IP Address Mask

Apply Reset

Each field is explained in the following table.

Table 58 Network > Interface > VLAN

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with any interface.
NameThis field displays the name of the interface.
Port/VIDFor VLAN interfaces, this field displaysthe Ethernet interface on which the VLAN interface is createdthe VLAN IDFor virtual interfaces, this field is blank.
IP AddressThis field displays the current IP address of the interface. If the IP address is 0.0.0.0, the interface does not have an IP address yet.This screen also shows whether the IP address is a static IP address (STATIC) or dynamically assigned (DHCP). IP addresses are always static in virtual interfaces.
MaskThis field displays the interface's subnet mask in dot decimal notation.
Add iconThis column lets you create, edit, remove, activate, and deactivate interfaces.To create a VLAN interface, click the Add icon at the top of the column. The VLAN Add/Edit screen appears.To create a virtual VLAN interface, click the Add icon next to the corresponding VLAN interface. The Virtual Interface Add/Edit screen appears. See Section 10.12 on page 233.To edit an interface, click the Edit icon next to it. The VLAN Add/Edit screen or Virtual Interface Add/Edit screen appears accordingly.To remove an interface, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To activate or deactivate an interface, click the Active icon next to it. Make sure you click Apply to save and apply the change.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.9.4 VLAN Add/Edit

This screen lets you configure IP address assignment, interface bandwidth parameters, DHCP settings, and ping check for each VLAN interface. To access this screen, click the Add icon at the top of the Add column or click an Edit icon next to a VLAN interface in the VLAN Summary screen. The following screen appears.

Figure 142 Network > Interface > VLAN > Edit
ZYXEL ZYWALL USG 2000 - VLAN Add/Edit - 1

text_image General Settings Enable Interface Interface Properties Interface Name vlan Base Port ge1 VLAN ID (1-4094) Description (Optional) IP Address Assignment Get Automatically Use Fixed IP Address IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Gateway (Optional) Metric 0 (0-15) Interface Parameters Basic Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps MTU 1500 Bytes Connectivity Check Enable Connectivity Check Check Method tcp Check Period 30 (5-30 seconds) Check Timeout 5 (1-10 seconds) Check Fail Tolerance 5 (1-10) Check Default Gateway 0.0.0.0 Check this address (Domain Name or IP Address) Check Port (1-65535) DHCP Setting DHCP Relay Relay Server 1 (IP Address) Relay Server 2 (IP Address) Enable IP/MAC Binding Enable Logs for IP/MAC Binding Violation Static DHCP Table Edit static DHCP table Related Setting Configure WAN TRUNK Configure Policy Route OK Cancel

Each field is explained in the following table.

Table 59 Network > Interface > VLAN > Edit

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this to turn this interface on. Clear this to disable this interface.
Interface Properties
Interface NameThis field is read-only if you are editing an existing VLAN interface. Enter the number of the VLAN interface. You can use a number from 0~4094. See Chapter 52 on page 803 the User's Guide for the total number of VLANs you can configure on the ZyWALL. For example, vlan0, vlan8, and so on.
Base PortSelect the Ethernet interface on which the VLAN interface runs.
VLAN IDEnter the VLAN ID. This 12-bit number uniquely identifies each VLAN. Allowed values are 1 - 4094. (0 and 4095 are reserved.)
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( ) + / : = ? ! * #@$ _% - characters, and it can be up to 60 characters long.
IP Address Assignment
Get AutomaticallySelect this if this interface is a DHCP client. In this case, the DHCP server configures the IP address, subnet mask, and gateway automatically.You should not select this if the interface is assigned to a VRRP group. See Chapter 35 on page 593.
Use Fixed IP AddressSelect this if you want to specify the IP address, subnet mask, and gateway manually.
IP AddressThis field is enabled if you select Use Fixed IP Address.Enter the IP address for this interface.
Subnet MaskThis field is enabled if you select Use Fixed IP Address.Enter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network.
GatewayThis field is enabled if you select Use Fixed IP Address.Enter the IP address of the gateway. The ZyWALL sends packets to the gateway when it does not know how to route the packet to its destination. The gateway should be on the same network as the interface.
MetricEnter the priority of the gateway (if any) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Interface Parameters
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
MTUMaximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the ZyWALL divides it into smaller fragments. Allowed values are 576 - 1500. Usually, this value is 1500.
Connectivity CheckThe ZyWALL can regularly check the connection to the gateway you specified to make sure it is still available. You specify how often to check the connection, how long to wait for a response before the attempt is a failure, and how many consecutive failures are required before the ZyWALL stops routing to the gateway. The ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity check.
Enable Connectivity CheckSelect this to turn on the connection check.
Check MethodSelect the method that the gateway allows.Select icmp to have the ZyWALL regularly ping the gateway you specify to make sure it is still available.Select tcp to have the ZyWALL regularly perform a TCP handshake with the gateway you specify to make sure it is still available.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures before the ZyWALL stops routing through the gateway.
Check Default GatewaySelect this to use the default gateway for the connectivity check.
Check this addressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check PortThis field only displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
DHCPSelect what type of DHCP service the ZyWALL provides to the network. Choices are:None - the ZyWALL does not provide any DHCP services. There is already a DHCP server on the network.DHCP Relay - the ZyWALL routes DHCP requests to one or more DHCP servers you specify. The DHCP server(s) may be on another network.DHCP Server - the ZyWALL assigns IP addresses and provides subnet mask, gateway, and DNS server information to the network. The ZyWALL is the DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Relay.
Relay Server 1Enter the IP address of a DHCP server for the network.
Relay Server 2This field is optional. Enter the IP address of another DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Server.
IP Pool Start AddressEnter the IP address from which the ZyWALL begins allocating IP addresses. If you want to assign a static IP address to a specific computer, click Add Static DHCP.If this field is blank, the Pool Size must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
Pool SizeEnter the number of IP addresses to allocate. This number must be at least one and is limited by the interface's Subnet Mask. For example, if the Subnet Mask is 255.255.255.0 and IP Pool Start Address is 10.10.10.10, the ZyWALL can allocate 10.10.10.10 to 10.10.10.254, or 245 IP addresses.If this field is blank, the IP Pool Start Address must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
First DNS Server Second DNS Server Third DNS ServerSpecify the IP addresses up to three DNS servers for the DHCP clients to use. Use one of the following ways to specify these IP addresses.Custom Defined - enter a static IP address.From ISP - select the DNS server that another interface received from its DHCP server.ZyWALL - the DHCP clients use the IP address of this interface and the ZyWALL works as a DNS relay.
First WINS Server, Second WINS ServerType the IP address of the WINS (Windows Internet Naming Service) server that you want to send to the DHCP clients. The WINS server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using.
Lease timeSpecify how long each computer can use the information (especially the IP address) before it has to request the information again.Choices are:infinite - select this if IP addresses never expiredays, hours, and minutes - select this to enter how long IP addresses are valid.
Enable IP/MAC BindingSelect this option to have the ZyWALL enforce links between specific IP addresses and specific MAC addresses for this VLAN. This stops anyone else from manually using a bound IP address on another device connected to this interface. Use this to make use only the intended users get to use specific IP addresses.
Enable Logs for IP/MAC Binding ViolationSelect this option to have the ZyWALL generate a log if a device connected to this VLAN attempts to use an IP address that is bound to another device's MAC address.
Edit static DHCP tableClick this to configure static IP addresses for the ZyWALL to assign to computers connected to this interface. See Section 10.5 on page 198.
Related Setting
Configure WAN TRUNKClick WAN TRUNK to go to a screen where you can set this VLAN to be part of a WAN trunk for load balancing.
Configure Policy RouteClick Policy Route to go to the screen where you can manually configure a policy route to associate traffic with this VLAN.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.10 Bridge Interfaces

This section introduces bridges and bridge interfaces and then explains the screens for bridge interfaces.

10.10.1 Bridge Overview

A bridge creates a connection between two or more network segments at the layer-2 (MAC address) level. In the following example, bridge X connects four network segments.

ZYXEL ZYWALL USG 2000 - Bridge Overview - 1

flowchart
graph TD
    A["Switch A"] -->|0A:0A:0A:0A:0A:0A| R["Router"]
    B["Switch B"] -->|0B:0B:0B:0B:0B:0B| R
    C["Switch C"] -->|1| R
    D["Switch D"] -->|2| R
    E["Switch E"] -->|3| R
    R -->|4| B
    R -->|5| A
    style R fill:#f9f,stroke:#333,stroke-width:2px

When the bridge receives a packet, the bridge records the source MAC address and the port on which it was received in a table. It also looks up the destination MAC address in the table. If the bridge knows on which port the destination MAC address is located, it sends the packet to that port. If the destination MAC address is not in the table, the bridge broadcasts the packet on every port (except the one on which it was received).

In the example above, computer A sends a packet to computer B. Bridge X records the source address 0A:0A:0A:0A:0A:0A and port 2 in the table. It also

looks up 0B:0B:0B:0B:0B:0B in the table. There is no entry yet, so the bridge broadcasts the packet on ports 1, 3, and 4.

Table 60 Example: Bridge Table After Computer A Sends a Packet to Computer B

MAC ADDRESSPORT
OA:OA:OA:OA:OA:OA2

If computer B responds to computer A, bridge X records the source address 0B:0B:0B:0B:0B:0B and port 4 in the table. It also looks up 0A:0A:0A:0A:0A:0A in the table and sends the packet to port 2 accordingly.

Table 61 Example: Bridge Table After Computer B Responds to Computer A

MAC ADDRESSPORT
0A:0A:0A:0A:0A:0A2
0B:0B:0B:0B:0B:0B4

10.10.2 Bridge Interface Overview

A bridge interface creates a software bridge between the members of the bridge interface. It also becomes the ZyWALL's interface for the resulting network.

Unlike the device-wide bridge mode in ZyNOS-based ZyWALLs, this ZyWALL can bridge traffic between some interfaces while it routes traffic for other interfaces. The bridge interfaces also support more functions, like interface bandwidth parameters, DHCP settings, and ping check. To use the whole ZyWALL as a transparent bridge, add all of the ZyWALL's interfaces to a bridge interface.

A bridge interface may consist of the following members:

  • Zero or one VLAN interfaces (and any associated virtual VLAN interfaces)
  • Any number of Ethernet interfaces (and any associated virtual Ethernet interfaces)

When you create a bridge interface, the ZyWALL removes the members' entries from the routing table and adds the bridge interface's entries to the routing table. For example, this table shows the routing table before and after you create bridge interface br0 (250.250.250.0/23) between ge1 and vlan1.

Table 62 Example: Routing Table Before and After Bridge Interface br0 Is Created

IP ADDRESS(ES)DESTINATION
210.210.210.0/24ge1
210.211.1.0/24ge1: 1
221.221.221.0/24vlan0
222.222.222.0/24vlan1
230.230.230.192/26ge3
IP ADDRESS(ES)DESTINATION
221.221.221.0/24vlan0
230.230.230.192/26ge3
241.241.241.241/32ge4
242.242.242.242/32ge5
250.250.250.0/23br0

Table 62 Example: Routing Table Before and After Bridge Interface br0 Is Created

IP ADDRESS(ES)DESTINATIONIP ADDRESS(ES)DESTINATION
241.241.241.241/32ge4
242.242.242.242/32ge5

In this example, virtual Ethernet interface ge1:1 is also removed from the routing table when ge1 is added to br0. Virtual interfaces are automatically added to or remove from a bridge interface when the underlying interface is added or removed.

10.10.3 Bridge Summary

This screen lists every bridge interface and virtual interface created on top of bridge interfaces. To access this screen, click Network > Interface > Bridge.

Figure 143 Network > Interface > Bridge
ZYXEL ZYWALL USG 2000 - Bridge Summary - 1

text_image Configuration

Name IP Address Member

1 br0 DHCP -- 0.0.0.0 ge5,vlan0 2 br0:1 155.111.100.1 Apply Reset

Each field is described in the following table.

Table 63 Network > Interface > Bridge

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with any interface.
NameThis field displays the name of the interface.
IP AddressThis field displays the current IP address of the interface. If the IP address is 0.0.0.0, the interface does not have an IP address yet.This screen also shows whether the IP address is a static IP address (STATIC) or dynamically assigned (DHCP). IP addresses are always static in virtual interfaces.
MemberThis field displays the Ethernet interfaces and VLAN interfaces in the bridge interface. It is blank for virtual interfaces.
Add iconThis column lets you create, edit, remove, activate, and deactivate interfaces.To create a bridge interface, click the Add icon at the top of the column. The Bridge Add/Edit screen appears.To create a virtual interface, click the Add icon next to the corresponding bridge interface. The Virtual Interface Add/Edit screen appears. See Section 10.12 on page 233.To edit an interface, click the Edit icon next to it. The Bridge Add/Edit screen or Virtual Interface Add/Edit screen appears accordingly.To remove an interface, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To activate or deactivate an interface, click the Active icon next to it. Make sure you click Apply to save and apply the change.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.10.4 Bridge Add/Edit

This screen lets you configure IP address assignment, interface bandwidth parameters, DHCP settings, and ping check for each bridge interface. To access this screen, click the Add icon at the top of the Add column in the Bridge Summary screen, or click an Edit icon in the Bridge Summary screen. The following screen appears.

Figure 144 Network > Interface > Bridge > Edit
ZYXEL ZYWALL USG 2000 - Bridge Add/Edit - 1

text_image General Settings Enable Interface Interface Properties Interface Name br Description (Optional) Member Configuration Available Member ge1 >> ge2 <> ge3 ge4 ge5 IP Address Assignment Get Automatically Use Fixed IP Address IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Gateway (Optional) Metric 0 (0-15) Related Setting Configure WAN TRUNK Configure Policy Route Less Settings Interface Parameters Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps MTU 1500 Bytes DHCP Setting DHCP DHCP Relay Relay Server 1 (IP Address) Relay Server 2 (IP Address) Enable IP/MAC Binding Enable Logs for IP/MAC Binding Violation Static DHCP Table Edit static DHCP table Connectivity Check Enable Connectivity Check Check Method tcp Check Period 30 (5-30 seconds) Check Timeout 5 (1-10 seconds) Check Fail Tolerance 5 (1-10) Check Default Gateway 0.0.0.0 Check this address (Domain Name or IP Address) Check Port (1-65535) OK Cancel

In this example, you are creating a new bridge. If you are editing a bridge, the Interface Name field is read-only. Each field is described in the table below.

Table 64 Network > Interface > Bridge > Edit

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this to enable this interface. Clear this to disable this interface.
Interface Properties
Interface NameThis field is read-only if you are editing the interface. Enter the name of the bridge interface. The format is brx, where x is 0 - 11. For example, br0, br3, and so on.
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( ) + / : = ? ! * #@$_% - characters, and it can be up to 60 characters long.
Member Configuration
AvailableThis field displays Ethernet interfaces and VLAN interfaces that can become part of the bridge interface. An interface is not available in the following situations:There is a virtual interface on top of itIt is already used in a different bridge interfaceSelect one, and click the >> arrow to add it to the bridge interface. Each bridge interface can only have one VLAN interface.
MemberThis field displays the interfaces that are part of the bridge interface. Select one, and click the << arrow to remove it from the bridge interface.
IP Address Assignment
Get AutomaticallySelect this if this interface is a DHCP client. In this case, the DHCP server configures the IP address, subnet mask, and gateway automatically.
Use Fixed IP AddressSelect this if you want to specify the IP address, subnet mask, and gateway manually.
IP AddressThis field is enabled if you select Use Fixed IP Address.Enter the IP address for this interface.
Subnet MaskThis field is enabled if you select Use Fixed IP Address.Enter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network.
GatewayThis field is enabled if you select Use Fixed IP Address.Enter the IP address of the gateway. The ZyWALL sends packets to the gateway when it does not know how to route the packet to its destination. The gateway should be on the same network as the interface.
MetricEnter the priority of the gateway (if any) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Related Setting
Configure WAN TRUNKClick WAN TRUNK to go to a screen where you can configure the interface as part of a WAN trunk for load balancing.
Configure Policy RouteClick Policy Route to go to the screen where you can manually configure a policy route to associate traffic with this interface.
More Settings/ Less SettingsClick this button to display a greater or lesser number of configuration fields.
Interface Parameters
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
MTUMaximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the ZyWALL divides it into smaller fragments. Allowed values are 576 - 1500. Usually, this value is 1500.
DHCP Settings
DHCPSelect what type of DHCP service the ZyWALL provides to the network. Choices are:None - the ZyWALL does not provide any DHCP services. There is already a DHCP server on the network.DHCP Relay - the ZyWALL routes DHCP requests to one or more DHCP servers you specify. The DHCP server(s) may be on another network.DHCP Server - the ZyWALL assigns IP addresses and provides subnet mask, gateway, and DNS server information to the network. The ZyWALL is the DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Relay.
Relay Server 1Enter the IP address of a DHCP server for the network.
Relay Server 2This field is optional. Enter the IP address of another DHCP server for the network.
These fields appear if the ZyWALL is a DHCP Server.
IP Pool Start AddressEnter the IP address from which the ZyWALL begins allocating IP addresses. If you want to assign a static IP address to a specific computer, click Add Static DHCP.If this field is blank, the Pool Size must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
Pool SizeEnter the number of IP addresses to allocate. This number must be at least one and is limited by the interface's Subnet Mask. For example, if the Subnet Mask is 255.255.255.0 and IP Pool Start Address is 10.10.10.10, the ZyWALL can allocate 10.10.10.10 to 10.10.10.254, or 245 IP addresses.If this field is blank, the IP Pool Start Address must also be blank. In this case, the ZyWALL can assign every IP address allowed by the interface's IP address and subnet mask, except for the first address (network address), last address (broadcast address) and the interface's IP address.
First DNS ServerSecond DNS ServerThird DNS ServerSpecify the IP addresses up to three DNS servers for the DHCP clients to use. Use one of the following ways to specify these IP addresses.Custom Defined - enter a static IP address.From ISP - select the DNS server that another interface received from its DHCP server.ZyWALL - the DHCP clients use the IP address of this interface and the ZyWALL works as a DNS relay.
First WINS Server, Second WINS ServerType the IP address of the WINS (Windows Internet Naming Service) server that you want to send to the DHCP clients. The WINS server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using.
Lease timeSpecify how long each computer can use the information (especially the IP address) before it has to request the information again.Choices are:infinite - select this if IP addresses never expiredays, hours, and minutes - select this to enter how long IP addresses are valid.
Enable IP/MAC BindingSelect this option to have this interface enforce links between specific IP addresses and specific MAC addresses. This stops anyone else from manually using a bound IP address on another device connected to this interface. Use this to make use only the intended users get to use specific IP addresses.
Enable Logs for IP/MAC BindingViolationSelect this option to have the ZyWALL generate a log if a device connected to this interface attempts to use an IP address that is bound to another device's MAC address.
Edit static DHCP tableClick this to configure static IP addresses for the ZyWALL to assign to computers connected to this interface. See Section 10.5 on page 198.
Connectivity CheckThe interface can regularly check the connection to the gateway you specified to make sure it is still available. You specify how often the interface checks the connection, how long to wait for a response before the attempt is a failure, and how many consecutive failures are required before the ZyWALL stops routing to the gateway. The ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity check.
Enable Connectivity CheckSelect this to turn on the connection check.
Check MethodSelect the method that the gateway allows.Select icmp to have the ZyWALL regularly ping the gateway you specify to make sure it is still available.Select tcp to have the ZyWALL regularly perform a TCP handshake with the gateway you specify to make sure it is still available.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures before the ZyWALL stops routing through the gateway.
Check Default GatewaySelect this to use the default gateway for the connectivity check.
Check this addressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check PortThis field only displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.11 Auxiliary Interface

This section introduces the auxiliary interface and then explains the screen for it.

10.11.1 Auxiliary Interface Overview

Use the auxiliary interface to dial out from the ZyWALL's auxiliary port. For example, you might use this interface as a backup WAN interface.

You have to connect an external modem to the ZyWALL's auxiliary port to use the auxiliary interface.

Note: You have to connect an external modem to the auxiliary port.

The ZyWALL uses the auxiliary interface to dial out in two situations.

1 You click the Connect icon on the ZyWALL Status screen.
2 The load auxiliary interface must connect to satisfy load-balancing requirements. You have to add the auxiliary interface to a trunk first.

When the ZyWALL hangs up the call, it drops the Data Terminal Ready (DTR) signal and issues the command ATH.

10.11.2 Auxiliary

Use the Auxiliary screen to configure the ZyWALL's auxiliary interface. Click Network > Interface > Auxiliary to open it.

Figure 145 Network > Interface > Auxiliary
ZYXEL ZYWALL USG 2000 - Auxiliary - 1

text_image Status Port Grouping Ethernet PPP Cellular VLAN Bridge Auxiliary Trunk General Settings Enable Interface Interface Properties Description (Optional) Port Speed 115200 Dialing Type Tone Pulse Initial String ATZ Auxiliary Configuration Phone Number User Name Password Retype to confirm Authentication Type Chap/PAP Timeout 30 (Seconds) Idle timeout 180 (Seconds) Apply Reset

Each field is described in the table below.

Table 65 Network > Interface > Auxiliary

LABELDESCRIPTION
General Settings
Enable InterfaceSelect this to turn on the auxiliary dial up interface. The interface does not dial out, however, unless it is part of a trunk and load-balancing conditions are satisfied.
Interface Properties
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( ) + / : = ? ! * #@$ _% - characters, and it can be up to 60 characters long.
Port SpeedSelect the speed of the connection between the ZyWALL and external computer.
Dialing TypeTone - select this if the telephone uses tone-based dialing.Pulse - select this if the telephone uses pulse-based dialing.
Initial StringEnter the AT command string to initialize the external modem. ATZ is the most common string, but you should check the manual for the external modem for additional commands.
Auxiliary Configuration
Phone NumberEnter the phone number to dial here. You can use 1-20 numbers, commas ( ), or plus signs (+). Use a comma to pause during dialing. Use a plus sign to tell the external modem to make an international call.
User NameEnter the user name required for authentication.
PasswordEnter the password required for authentication.
Retype to confirmEnter the password again to make sure you have not typed it incorrectly.
Authentication TypeSelect the authentication protocol to use for outgoing calls. Choices are:CHAP/PAP - Your ZyWALL accepts either CHAP (Challenge Handshake Authentication Protocol) or PAP (Password Authentication Protocol), as requested by the computer you are dialing.CHAP - Your ZyWALL accepts CHAP only.PAP - Your ZyWALL accepts PAP only.MSCHAP - Your ZyWALL accepts MSCHAP only.MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
TimeoutType the number of seconds the ZyWALL tries to set up a connection before it stops. Allowed values are 30 - 120.
Idle timeoutType the number of seconds the ZyWALL should wait for traffic before it automatically disconnects the connection. Set this field to zero to disable the idle timeout. Allowed values are 0 - 360.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

10.12 Virtual Interfaces

Use virtual interfaces to tell the ZyWALL where to route packets. Virtual interfaces can also be used in VPN gateways (see Chapter 21 on page 339) and VRRP groups (see Chapter 35 on page 593).

Virtual interfaces can be created on top of Ethernet interfaces, VLAN interfaces, or bridge interfaces. Virtual VLAN interfaces recognize and use the same VLAN ID. Otherwise, there is no difference between each type of virtual interface. Network policies (for example, firewall rules) that apply to the underlying interface automatically apply to the virtual interface as well.

Like other interfaces, virtual interfaces have an IP address, subnet mask, and gateway used to make routing decisions. However, you have to manually specify the IP address and subnet mask; virtual interfaces cannot be DHCP clients. Like other interfaces, you can restrict bandwidth through virtual interfaces, but you cannot change the MTU. The virtual interface uses the same MTU that the underlying interface uses. Unlike other interfaces, virtual interfaces do not provide DHCP services, and they do not verify that the gateway is available.

10.12.1 Virtual Interfaces Add/Edit

This screen lets you configure IP address assignment and interface parameters for virtual interfaces. To access this screen, click an Add icon next to an Ethernet interface, VLAN interface, or bridge interface in the respective interface summary screen.

Figure 146 Network > Interface > Add
ZYXEL ZYWALL USG 2000 - Virtual Interfaces Add/Edit - 1

text_image Interface Properties Interface Name ge1:1 Description (Optional) IP Address Assignment IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Gateway (Optional) Metric 0 (0..15) Interface Parameters Egress Bandwidth 1048576 Kbps Ingress Bandwidth 1048576 Kbps OK Cancel

Each field is described in the table below.

Table 66 Network > Interface > Add

LABELDESCRIPTION
Interface Properties
Interface NameThis field is read-only. It displays the name of the virtual interface, which is automatically derived from the underlying Ethernet interface, VLAN interface, or bridge interface.
DescriptionEnter a description of this interface. It is not used elsewhere. You can use alphanumeric and ( )+/:=?!*#@$_%- characters, and it can be up to 60 characters long.
IP Address Assignment
IP AddressEnter the IP address for this interface.
Subnet MaskEnter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network.
GatewayEnter the IP address of the gateway. The ZyWALL sends packets to the gateway when it does not know how to route the packet to its destination. The gateway should be on the same network as the interface.
MetricEnter the priority of the gateway (if any) on this interface. The ZyWALL decides which gateway to use based on this priority. The lower the number, the higher the priority. If two or more gateways have the same priority, the ZyWALL uses the one that was configured first.
Interface Parameters
Egress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ZyWALL can send through the interface to the network. Allowed values are 0 - 1048576.
Ingress BandwidthThis is reserved for future use.Enter the maximum amount of traffic, in kilobits per second, the ZyWALL can receive from the network through the interface. Allowed values are 0 - 1048576.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

10.13 Interface Technical Reference

Here is more detailed information about interfaces on the ZyWALL.

IP Address Assignment

Most interfaces have an IP address and a subnet mask. This information is used to create an entry in the routing table.

Figure 147 Example: Entry in the Routing Table Derived from Interfaces
ZYXEL ZYWALL USG 2000 - IP Address Assignment - 1

flowchart
graph LR
    subgraph Network 1
        A["Client 1"] --> B["Router"]
        C["Client 2"] --> B
        B -->|ge1 100.100.1.1/16| D["ZyWALL"]
    end
    subgraph Network 2
        E["Client 2"] --> F["Router"]
        G["Client 3"] --> F
        F -->|ge2 200.200.200.1/24| D
    end

Table 67 Example: Routing Table Entries for Interfaces

IP ADDRESS(ES)DESTINATION
100.100.1.1/16ge1
200.200.200.1/24ge2

For example, if the ZyWALL gets a packet with a destination address of 100.100.25.25, it routes the packet to interface ge1. If the ZyWALL gets a packet with a destination address of 200.200.200.200, it routes the packet to interface ge2.

In most interfaces, you can enter the IP address and subnet mask manually. In PPPoE/PPTP interfaces, however, the subnet mask is always 255.255.255.255 because it is a point-to-point interface. For these interfaces, you can only enter the IP address.

In many interfaces, you can also let the IP address and subnet mask be assigned by an external DHCP server on the network. In this case, the interface is a DHCP client. Virtual interfaces, however, cannot be DHCP clients. You have to assign the IP address and subnet mask manually.

In general, the IP address and subnet mask of each interface should not overlap, though it is possible for this to happen with DHCP clients.

In the example above, if the ZyWALL gets a packet with a destination address of 5.5.5.5, it might not find any entries in the routing table. In this case, the packet is dropped. However, if there is a default router to which the ZyWALL should send this packet, you can specify it as a gateway in one of the interfaces. For example,

if there is a default router at 200.200.200.100, you can create a gateway at 200.200.200.100 on ge2. In this case, the ZyWALL creates the following entry in the routing table.

Table 68 Example: Routing Table Entry for a Gateway

IP ADDRESS(ES)DESTINATION
0.0.0.0/0200.200.200.100

The gateway is an optional setting for each interface. If there is more than one gateway, the ZyWALL uses the gateway with the lowest metric, or cost. If two or more gateways have the same metric, the ZyWALL uses the one that was set up first (the first entry in the routing table). In PPPoE/PPTP interfaces, the other computer is the gateway for the interface by default. In this case, you should specify the metric.

If the interface gets its IP address and subnet mask from a DHCP server, the DHCP server also specifies the gateway, if any.

Interface Parameters

The ZyWALL restricts the amount of traffic into and out of the ZyWALL through each interface.

  • Egress bandwidth sets the amount of traffic the ZyWALL sends out through the interface to the network.
  • Ingress bandwidth sets the amount of traffic the ZyWALL allows in through the interface from the network. ^1

If you set the bandwidth restrictions very high, you effectively remove the restrictions.

The ZyWALL also restricts the size of each data packet. The maximum number of bytes in each packet is called the maximum transmission unit (MTU). If a packet is larger than the MTU, the ZyWALL divides it into smaller fragments. Each fragment is sent separately, and the original packet is re-assembled later. The smaller the MTU, the more fragments sent, and the more work required to re-assemble packets correctly. On the other hand, some communication channels, such as Ethernet over ATM, might not be able to handle large data packets.

DHCP Settings

Dynamic Host Configuration Protocol (DHCP, RFC 2131, RFC 2132) provides a way to automatically set up and maintain IP addresses, subnet masks, gateways, and some network information (such as the IP addresses of DNS servers) on

computers in the network. This reduces the amount of manual configuration you have to do and usually uses available IP addresses more efficiently.

In DHCP, every network has at least one DHCP server. When a computer (a DHCP client) joins the network, it submits a DHCP request. The DHCP servers get the request; assign an IP address; and provide the IP address, subnet mask, gateway, and available network information to the DHCP client. When the DHCP client leaves the network, the DHCP servers can assign its IP address to another DHCP client.

In the ZyWALL, some interfaces can provide DHCP services to the network. In this case, the interface can be a DHCP relay or a DHCP server.

As a DHCP relay, the interface routes DHCP requests to DHCP servers on different networks. You can specify more than one DHCP server. If you do, the interface routes DHCP requests to all of them. It is possible for an interface to be a DHCP relay and a DHCP client simultaneously.

As a DHCP server, the interface provides the following information to DHCP clients.

- IP address - If the DHCP client's MAC address is in the ZyWALL's static DHCP table, the interface assigns the corresponding IP address. If not, the interface assigns IP addresses from a pool, defined by the starting address of the pool and the pool size.

Table 69 Example: Assigning IP Addresses from a Pool

START IP ADDRESSPOOL SIZERANGE OF ASSIGNED IP ADDRESS
50.50.50.33550.50.50.33 - 50.50.50.37
75.75.75.120075.75.75.1 - 75.75.75.200
99.99.1.1102399.99.1.1 - 99.99.4.255
120.120.120.100100120.120.120.100 - 120.120.120.199

The ZyWALL cannot assign the first address (network address) or the last address (broadcast address) in the subnet defined by the interface's IP address and subnet mask. For example, in the first entry, if the subnet mask is 255.255.255.0, the ZyWALL cannot assign 50.50.50.0 or 50.50.50.255. If the subnet mask is 255.255.0.0, the ZyWALL cannot assign 50.50.0.0 or 50.50.255.255. Otherwise, it can assign every IP address in the range, except the interface's IP address.

If you do not specify the starting address or the pool size, the interface the maximum range of IP addresses allowed by the interface's IP address and subnet mask. For example, if the interface's IP address is 9.9.9.1 and subnet mask is 255.255.255.0, the starting IP address in the pool is 9.9.9.2, and the pool size is 253.

  • Subnet mask - The interface provides the same subnet mask you specify for the interface. See IP Address Assignment on page 235.
  • Gateway - The interface provides the same gateway you specify for the interface. See IP Address Assignment on page 235.

- DNS servers - The interface provides IP addresses for up to three DNS servers that provide DNS services for DHCP clients. You can specify each IP address manually (for example, a company's own DNS server), or you can refer to DNS servers that other interfaces received from DHCP servers (for example, a DNS server at an ISP). These other interfaces have to be DHCP clients.

It is not possible for an interface to be the DHCP server and a DHCP client simultaneously.

WINS

WINS (Windows Internet Naming Service) is a Windows implementation of NetBIOS Name Server (NBNS) on Windows. It keeps track of NetBIOS computer names. It stores a mapping table of your network's computer names and IP addresses. The table is dynamically updated for IP addresses assigned by DHCP. This helps reduce broadcast traffic since computers can query the server instead of broadcasting a request for a computer name's IP address. In this way WINS is similar to DNS, although WINS does not use a hierarchy (unlike DNS). A network can have more than one WINS server. Samba can also serve as a WINS server.

PPPoE/PPTP Overview

Point-to-Point Protocol over Ethernet (PPPoE, RFC 2516) and Point-to-Point Tunneling Protocol (PPTP, RFC 2637) are usually used to connect two computers over phone lines or broadband connections. PPPoE is often used with cable modems and DSL connections. It provides the following advantages:

  • The access and authentication method works with existing systems, including RADIUS.
  • You can access one of several network services. This makes it easier for the service provider to offer the service
  • PPPoE does not usually require any special configuration of the modem.

PPTP is used to set up virtual private networks (VPN) in unsecure TCP/IP environments. It sets up two sessions.

1 The first one runs on TCP port 1723. It is used to start and manage the second one.
2 The second one uses Generic Routing Encapsulation (GRE, RFC 2890) to transfer information between the computers.

PPTP is convenient and easy-to-use, but you have to make sure that firewalls support both PPTP sessions.

11.1 Overview

Use trunks for WAN traffic load balancing to increase overall network throughput and reliability. Load balancing divides traffic loads between multiple interfaces. This allows you to improve quality of service and maximize bandwidth utilization for multiple ISP links.

Maybe you have two Internet connections with different bandwidths. You could set up a trunk that uses spillover or weighted round robin load balancing so time-sensitive traffic (like video) usually goes through the higher-bandwidth interface. For other traffic, you might want to use least load first load balancing to even out the distribution of the traffic load.

Suppose ISP A has better connections to Europe while ISP B has better connections to Australia. You could use policy routes and trunks to have traffic for your European branch office primarily use ISP A and traffic for your Australian branch office primarily use ISP B.

Or maybe one of the ZyWALL's interfaces is connected to an ISP that is also your Voice over IP (VoIP) service provider. You can use policy routing to send the VoIP traffic through a trunk with the interface connected to the VoIP service provider set to active and another interface (connected to another ISP) set to passive. This way VoIP traffic goes through the interface connected to the VoIP service provider whenever the interface's connection is up.

11.1.1 What You Can Do in the Trunk Screens

  • Use the Trunk summary screen (Section 11.2 on page 243) to configure link sticking and view the list of configured trunks and which load balancing algorithm each trunk uses.
  • Use the Trunk Edit screen (Section 11.3 on page 245) to configure which interfaces belong to each trunk and the load balancing algorithm each trunk uses.

11.1.2 What You Need to Know About Trunks

  • Add WAN interfaces to trunks to have multiple connections share the traffic load.
  • If one WAN interface's connection goes down, the ZyWALL sends traffic through another member of the trunk.
  • For example, you connect one WAN interface to one ISP and connect a second WAN interface to a second ISP. The ZyWALL balances the WAN traffic load between the connections. If one interface's connection goes down, the ZyWALL can automatically send its traffic through another interface.

You can also use trunks with policy routing to send specific traffic types through the best WAN interface for that type of traffic.

- If that interface's connection goes down, the ZyWALL can still send its traffic through another interface.

- You can define multiple trunks for the same physical interfaces.

You can have the ZyWALL send each local computer's traffic through a single WAN interface for a specified period of time. This is useful when a redirect server forwards a user request for a file and informs the file server that a particular WAN IP address is requesting the file. If the user's subsequent sessions came from a different WAN IP address, the file server would deny the request. Here is an example.

Figure 148 Link Sticking
ZYXEL ZYWALL USG 2000 - Link Sticking - 1

flowchart
graph TD
    LAN -->|1| ge2["ge2"]
    ge2 -->|3| ge3["ge3"]
    ge3 -->|4| router["Router"]
    router -->|2| B["Server B"]
    B -->|2| C["Server C"]
    C -->|1| LAN
    ge2 -.->|dashed purple arrow| Internet

1 LAN user A tries to download a file from server B on the Internet. The ZyWALL uses ge2 to send the request to server B.

2 However remote server B is actually a redirect server. So server B sends a file list to LAN user A. The file list lets LAN user A's computer know that the desired file is actually on file server (C). At the same time, register server B informs file server C that a computer located at the ge2's IP address will download a file.
3 The ZyWALL is using active/active load balancing. So when LAN user A tries to retrieve the file from file server C, the request goes out through ge3.
4 File server C finds that the request comes from ge3's IP address instead of ge2's IP address and rejects the request.
5 If link sticking had been configured, the ZyWALL would have still used ge2 to send LAN user A's request to file server C and the file server would have given the file to A.

Load Balancing Algorithms

The following sections describe the load balancing algorithms the ZyWALL can use to decide which interface the traffic (from the LAN) should use for a session ^2 . The available bandwidth you configure on the ZyWALL refers to the actual bandwidth provided by the ISP and the measured bandwidth refers to the bandwidth an interface is currently using.

Least Load First

The least load first algorithm uses the current (or recent) outbound bandwidth utilization of each trunk member interface as the load balancing index(es) when making decisions about to which interface a new session is to be distributed. The outbound bandwidth utilization is defined as the measured outbound throughput over the available outbound bandwidth.

Here the ZyWALL has two WAN interfaces connected to the Internet. The configured available outbound bandwidths for WAN 1 and WAN 2 are 512K and 256K respectively.

Figure 149 Least Load First Example
ZYXEL ZYWALL USG 2000 - Least Load First - 1

flowchart
graph LR
    A["路由器"] -->|WAN1 512K| B["INTERNET"]
    A -->|WAN2 256K| B

The outbound bandwidth utilization is used as the load balancing index. In this example, the measured (current) outbound throughput of WAN 1 is 412K and WAN 2 is 198K. The ZyWALL calculates the load balancing index as shown in the table below.

Since WAN 2 has a smaller load balancing index (meaning that it is less utilized than WAN 1), the ZyWALL will send the subsequent new session traffic through WAN 2.

Table 70 Least Load First Example

INTERFACEOUTBOUNDLOAD BALANCING INDEX (M/A)
AVAILABLE (A)MEASURED (M)
WAN 1512 K412 K0.8
WAN 2256 K198 K0.77

Weighted Round Robin

The Weighted Round Robin (WRR) algorithm is best suited for situations when the bandwidths set for the two WAN interfaces are different. Similar to the Round Robin (RR) algorithm (see Section 11.4 on page 246), the Weighted Round Robin (WRR) algorithm sets the ZyWALL to send traffic through each WAN interface in turn. In addition, the WAN interfaces are assigned weights. An interface with a larger weight gets more of the traffic than an interface with a smaller weight.

For example, in the figure below, the configured available bandwidth of ge2 is 1M and ge3 is 512K. You can set the ZyWALL to distribute the network traffic between the two interfaces by setting the weight of ge2 and ge3 to 2 and 1 respectively. The ZyWALL assigns the traffic of two sessions to ge2 for every session's traffic assigned to ge3.

Figure 150 Weighted Round Robin Algorithm Example
ZYXEL ZYWALL USG 2000 - Weighted Round Robin - 1

flowchart
graph LR
    S6 --> S4
    S5 --> S4
    S2 -->|WAN1 1M| Internet
    S3 -->|WAN2 512K| Internet
    Internet -->|WAN1 1M| Internet

Spillover

The spillover load balancing algorithm sends network traffic to the first interface in the trunk member list until the interface's maximum allowable load is reached, then sends the excess network traffic of new sessions to the next interface in the trunk member list. This continues as long as there are more member interfaces and traffic to be sent through them.

Suppose the first trunk member interface uses an unlimited access Internet connection and the second is billed by usage. Spillover load balancing only uses the second interface when the traffic load exceeds the threshold on the first interface. This fully utilizes the bandwidth of the first interface to reduce Internet usage fees and avoid overloading the interface.

In this example figure, the upper threshold of the first interface is set to 800K. The ZyWALL sends network traffic of new sessions that exceed this limit to the secondary WAN interface.

Figure 151 Spillover Algorithm Example
ZYXEL ZYWALL USG 2000 - Spillover - 1

flowchart
graph LR
    A["1M"] --> B["交换机"]
    B --> C["WAN1 800K"]
    B --> D["WAN2"]
    C --> E["INTERNET"]
    D --> E

Finding Out More

• See Section 5.4.3 on page 106 for related information on the Trunk screens.
• See Section 11.4 on page 246 for more background information on trunks.
• See Section 6.2 on page 122 for an example of how to configure load balancing.

11.2 The Trunk Summary Screen

Click Network > Interface > Trunk to open the Trunk screen. This screen lists the configured trunks and the load balancing algorithm that each is configured to use.

Figure 152 Network > Interface > Trunk
ZYXEL ZYWALL USG 2000 - The Trunk Summary Screen - 1

text_image Interface Summary Ethernet Port Grouping VLAN Bridge PPPoE/PPTP Auxiliary Trunk General Settings Enable Link Sticking Timeout 300 (30-3600 seconds) Configuration Name Algorithm WAN_TRUNK If Apply Reset

The following table describes the items in this screen.

Table 71 Network > Interface > Trunk

LABELDESCRIPTION
General Settings
Enable Link StickingSelect this option to have the ZyWALL send all of each local computer's traffic through one WAN interface for the number of seconds that you specify.This is useful when a redirect server forwards a local user's request for a file and informs the file server that a particular WAN IP address is requesting the file. If the user's subsequent sessions came from a different WAN IP address, the file server would deny the request. See Link Sticking on page 240 for an example.This setting applies when you use load balancing and have multiple WAN interfaces set to active mode.
TimeoutSpecify for how long the ZyWALL is to send all of each local computer's traffic through one WAN interface.
Configuration
NameThis field displays the label that you specified to identify the trunk.
AlgorithmThis field displays the load balancing method that the trunk is set to use.
Add iconThis column lets you create, edit and remove trunks.To create a trunk, click the Add icon at the top of the column. The Trunk Members screen appears.To edit a trunk, click the Edit icon next to it. The Trunk Members screen appears.To remove a trunk, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

11.3 Configuring a Trunk

Click Network > Interface > Trunk and then the Add (or Edit) icon to open the Trunk Edit screen.

Figure 153 Network > Interface > Trunk > Add
ZYXEL ZYWALL USG 2000 - Configuring a Trunk - 1

text_image Trunk Members Name Load Balancing Algorithm WAN_TRUNK Spillover # Member Mode Egress Bandwidth Spillover 1 ge2 Active 1048576 Kbps 1048576 Kbps DN 2 ge3 Active 1048576 Kbps 1048576 Kbps DN 3 aux Passive 56 Kbps 56 Kbps DN OK Cancel

Each field is described in the table below.

Table 72 Network > Interface > Trunk > Add

LABELDESCRIPTION
NameThis is read-only if you are editing an existing trunk. When adding a new trunk, enter a descriptive name for this trunk. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Load Balancing AlgorithmSelect a load balancing method to use from the drop-down list box.SelectWeighted Round Robinto balance the traffic load between interfaces based on their respective weights. Weighted round robin is activated only when the first group member interface has more traffic than it can handle.SelectLeast Load Firstto send new session traffic through the least utilized trunk member.SelectSpilloverto send network traffic through the first interface in the group member list until there is enough traffic that the second interface needs to be used (and so on).
#This column displays the priorities of the group's interfaces. The order of the interfaces in the list is important since they are used in the order they are listed.
MemberClick this icon to open a screen where you can select an interface to be a group member.If you select an interface that is part of another Ethernet interface, the ZyWALL does not send traffic through the interface as part of the trunk. For example, if you have physical port 5 in the ge2 representative interface, you must select interface ge2 in order to send traffic through port 5 as part of the trunk. If you select interface ge5 as a member here, the ZyWALL will not send traffic through port 5 as part of the trunk.
ModeSelect Active to have the ZyWALL always attempt to use this connection.Select Passive to have the ZyWALL only use this connection when all of the connections set to active are down. You can only set one of a group's interfaces to passive mode.
WeightThis field displays with the weighted round robin load balancing algorithm. Specify the weight (1~10) for the interface. The weights of the different member interfaces form a ratio. This ratio determines how much traffic the ZyWALL sends through each member interface. The higher an interface's weight is (relative to the weights of the interfaces), the more traffic the ZyWALL sends through that interface.
Ingress BandwidthThis field displays with the least load first load balancing algorithm. It displays the maximum number of kilobits of data the ZyWALL is to allow to come in through the interface per second.
Egress BandwidthThis field displays with the least load first or spillover load balancing algorithm. It displays the maximum number of kilobits of data the ZyWALL is to send out through the interface per second.
SpilloverThis field displays with the spillover load balancing algorithm. Specify the maximum bandwidth of traffic in kilobits per second (1~1048576) to send out through the interface before using another interface. When this spillover bandwidth limit is exceeded, the ZyWALL sends new session traffic through the next interface. The traffic of existing sessions still goes through the interface on which they started.The ZyWALL uses the group member interfaces in the order that they are listed.
Add iconThis column lets you add, remove and move trunk members.To add an interface to the trunk, click an Add icon. The Trunk Member Select screen appears.To remove an interface from a trunk, click the Remove icon next to it. The ZyWALL confirms you want to remove it before doing so.To move an interface to a different number in the list, click the Move icon next to it. In the field that appears, specify the number to which you want to move the interface.

11.4 Trunk Technical Reference

Round Robin Load Balancing Algorithm

Round Robin scheduling services queues on a rotating basis and is activated only when an interface has more traffic than it can handle. A queue is given an amount of bandwidth irrespective of the incoming traffic on that interface. This queue then moves to the back of the list. The next queue is given an equal amount of bandwidth, and then moves to the end of the list; and so on, depending on the

number of queues being used. This works in a looping fashion until a queue is empty.

Policy and Static Routes

12.1 Policy and Static Routes Overview

Use policy routes and static routes to override the ZyWALL's default routing behavior in order to send packets through the appropriate the interface or VPN tunnel.

For example, the next figure shows a computer (A) connected to the ZyWALL's LAN interface. The ZyWALL routes most traffic from A to the Internet through the ZyWALL's default gateway (R1). You create one policy route to connect to services offered by your ISP behind router R2. You create another policy route to communicate with a separate network behind another router (R3) connected to the LAN.

Figure 154 Example of Policy Routing Topology
ZYXEL ZYWALL USG 2000 - Policy and Static Routes Overview - 1

flowchart
graph TD
    A["Router A"] --> LAN["LAN"]
    LAN --> WAN["WAN"]
    WAN --> R1["R1"]
    R1 --> INTERNET["INTERNET"]
    R2["R2"] --> LAN
    R3["R3"] --> LAN
    subgraph LAN
        R3
        R2
    end
    subgraph INTERNET
        R1
        R2
        R3
    end

You also use policy routes to send traffic through VPN tunnels. Using the VPN wizard automatically configures a corresponding policy route, but you must manually configure a policy route if you use the main VPN screens to configure a VPN connection.

Note: You can generally just use policy routes. You only need to use static routes if you have a large network with multiple routers where you use RIP or OSPF to propagate routing information to other routers.

12.1.1 What You Can Do in the Policy and Static Route Screens

  • Use the Policy Route screens (see Section 12.2 on page 251) to list and configure policy routes.
  • Use the Static Route screens (see Section 12.3 on page 257) to list and configure static routes.

12.1.2 What You Need to Know About Policy and Static Routing

Policy Routing

Traditionally, routing is based on the destination address only and the ZyWALL takes the shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator. Policy-based routing is applied to incoming packets on a per interface basis, prior to the normal routing.

How You Can Use Policy Routing

  • Source-Based Routing – Network administrators can use policy-based routing to direct traffic from different users through different connections.
  • Bandwidth Shaping – You can allocate bandwidth to traffic that matches routing policies and prioritize traffic (however the application patrol's bandwidth management is more flexible and recommended for TCP and UDP traffic). Use policy routes to manage other types of traffic (like ICMP traffic) and send traffic through VPN tunnels.

Note: Bandwidth management in policy routes has priority over application patrol bandwidth management.

  • Cost Savings – IPPR allows organizations to distribute interactive traffic on high-bandwidth, high-cost paths while using low-cost paths for batch traffic.
  • Load Sharing – Network administrators can use IPPR to distribute traffic among multiple paths.
  • NAT - The ZyWALL performs NAT by default for traffic going to or from the WAN interfaces. A routing policy's SNAT allows network administrators to have traffic received on a specified interface use a specified IP address as the source IP address.

- A NAT loopback policy route lets local users use a domain name to access a virtual server.

When creating a virtual server that local users will use a domain name to access, you can select an option to configure a NAT loopback policy route.

Static Routes

The ZyWALL usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the ZyWALL send data to devices not reachable through the default gateway, use static routes. Configure static routes if you need to use RIP or OSPF to propagate the routing information to other routers. See Chapter 13 on page 263 for more on RIP and OSPF.

Policy Routes Versus Static Routes

  • Policy routes are more flexible than static routes. You can select more criteria for the traffic to match and can also use schedules, NAT, and bandwidth management.
  • Policy routes are only used within the ZyWALL itself. Static routes can be propagated to other routers using RIP or OSPF.
  • Policy routes take priority over static routes. If you need to use a routing policy on the ZyWALL and propagate it to other routers, you could configure a policy route and an equivalent static route.

Finding Out More

• See Section 5.4.10 on page 108 for related information on the policy route screens.
- See Section 12.4 on page 259 for more background information on policy routing.
- See Section 6.3.3 on page 126 for an example of configuring a policy route for an IPSec VPN tunnel.

12.2 Policy Route Screen

Click Network > Routing to open the Policy Route screen. Use this screen to see the configured policy routes and turn policy routing based bandwidth management on or off.

A policy route defines the matching criteria and the action to take when a packet meets the criteria. The action is taken only when all the criteria are met. The criteria can include the user name, source address and incoming interface, destination address, schedule, IP protocol (ICMP, UDP, TCP, etc.) and port.

The actions that can be taken include:

  • Routing the packet to a different gateway, outgoing interface, VPN tunnel, or trunk.
  • Limiting the amount of bandwidth available and setting a priority for traffic.

IPPR follows the existing packet filtering facility of RAS in style and in implementation.

Figure 155 Network > Routing > Policy Route
ZYXEL ZYWALL USG 2000 - Policy Route Screen - 1

text_image Policy Route Static Route RIP OSPF BWM Global Setting Enable BWM Configuration Total Connection:3 30 connection per page Page: 1 of 1

User Schedule Incoming Source Destination Service Next-Hop SNAT BWM

1 any none ge1 LAN_SUBNET any any WAN_TRUNK outgoing-interface 0 2 any none ge4 DMZ1_SUBNET any any WAN_TRUNK outgoing-interface 0 3 any none ge5 DMZ2_SUBNET any any WAN_TRUNK outgoing-interface 0 Apply Reset

The following table describes the labels in this screen.

Table 73 Network > Routing > Policy Route

LABELDESCRIPTION
BWM Global Setting
Enable BWMThis is a global setting for enabling or disabling bandwidth management on the ZyWALL. You must enable this setting to have individual policy routes or application patrol policies apply bandwidth management.This same setting also appears in the AppPatrol > General screen. Enabling or disabling it in one screen also enables or disables it in the other screen.
Configuration
Total ConnectionThis field displays the total number of policy routes.
connection per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the number of an individual policy route.
UserThis is the name of the user (group) object from which the packets are sent.anymeans all users.
ScheduleThis is the name of the schedule object. none means the route is active at all times if enabled.
IncomingThis is the interface on which the packets are received.
SourceThis is the name of the source IP address (group) object. any means all IP addresses.
DestinationThis is the name of the destination IP address (group) object. any means all IP addresses.
ServiceThis is the name of the service object. any means all services.
Next-HopThis is the next hop to which packets are directed. It helps forward packets to their destinations and can be a router, VPN tunnel, outgoing interface or trunk.
SNATThis is the source IP address that the route uses.It displays none if the ZyWALL does not perform NAT for this route.
BWMThis is the maximum bandwidth allotted to the policy. 0 means there is no bandwidth limitation for this route.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the rule is enabled or not. Click the Active icon to activate or deactivate the policy. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the routing policy on the ZyWALL.Click the Add icon in an entry to add a rule below the current entry.Click the Remove icon to delete an existing routing policy from the ZyWALL. A window displays asking you to confirm that you want to delete the routing policy.In a numbered list, click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.The ordering of your rules is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

12.2.1 Policy Route Edit Screen

Click Network > Routing to open the Policy Route screen. Then click the Add or Edit icon to open the Policy Route Edit screen. Use this screen to configure or edit a policy route.

See NAT Loopback Example on page 297 for an example of NAT loopback.

Figure 156 Network > Routing > Policy Route > Edit
ZYXEL ZYWALL USG 2000 - Policy Route Edit Screen - 1

text_image Configuration Enable Description (Optional) Criteria User any Incoming Interface / ge1 Change... Source Address LAN_SUBNET Destination Address any Schedule none Service any Next-Hop Type Trunk Trunk vWAN_TRUNK Address Translation Source Network Address Translation outgoing-interface Port Triggering

Incoming Service Trigger Service

1 ===== object ===== ===== object ===== Bandwidth Shaping Maximum Bandwidth 0 Kbps Bandwidth Priority 0 (1-7, 1 is highest priority) Maximize Bandwidth Usage OK Cancel

The following table describes the labels in this screen.

Table 74 Network > Routing > Policy Route > Edit

LABELDESCRIPTION
Configuration
EnableSelect this to activate the policy.
DescriptionEnter a descriptive name of up to 31 printable ASCII characters for the policy.
Criteria
UserSelect a user name or user group from which the packets are sent.SelectCreate Objectto configure a new user account (see Section 36.2.1 on page 616 for details).
Incoming InterfaceClickChange... to select an interface or VPN tunnel through which the incoming packets are received.
Source AddressSelect a source IP address object or selectCreate Objectto configure a new one.
Destination AddressSelect a destination IP address object or selectCreate Objectto configure a new one. If the next hop is a dynamic VPN tunnel and you enableAuto Destination Address, the ZyWALL uses the local network of the peer router that initiated an incoming dynamic IPSec tunnel as the destination address of the policy instead of your configuration here.
ScheduleSelect a schedule or selectCreate Objectto configure a new one (see Chapter 39 on page 641 for details).nonemeans the route is active at all times if enabled.
ServiceSelect a service or service group from the drop-down list box. SelectCreate Objectto add a new service. SeeSection 38.2.1 on page 638 for more information.
Next-Hop
TypeSelectAutoto have the ZyWALL use the routing table to find a next-hop and forward the matched packets automatically.SelectGatewayto route the matched packets to the next-hop router or switch you specified in theGatewayfield. You have to set up the next-hop router or switch as a HOST address object first.SelectVPN Tunnelto route the matched packets via the specified VPN tunnel.SelectTrunkto route the matched packets through the interfaces in the trunk group based on the load balancing algorithm.SelectInterfaceto route the matched packets through the specified outgoing interface to a gateway (which is connected to the interface).
GatewayThis field displays when you selectGatewayin the Typefield. Select a HOST address object. The gateway is an immediate neighbor of your ZyWALL that will forward the packet to the destination. The gateway must be a router or switch on the same segment as your ZyWALL's interface(s).
VPN TunnelThis field displays when you selectVPN Tunnelin the Typefield. Select a VPN tunnel through which the packets are sent to the remote network that is connected to the ZyWALL directly.
Auto Destination AddressThis field displays when you selectVPN Tunnelin the Typefield. Select this to have the ZyWALL use the local network of the peer router that initiated an incoming dynamic IPSec tunnel as the destination address of the policy.Leave this cleared if you want to manually specify the destination address.
TrunkThis field displays when you selectTrunkin the Typefield. Select a trunk group to have the ZyWALL send the packets via the interfaces in the group.
InterfaceThis field displays when you selectInterfacein the Typefield. Select an interface to have the ZyWALL send traffic that matches the policy route through the specified interface.
Address TranslationUse this section to configure NAT for the policy route. This section does not apply to policy routes that use a VPN tunnel as the next hop.
Source Network Address TranslationSelectnoneto not use NAT for the route.Selectoutgoing-interfaceto use the IP address of the outgoing interface as the source IP address of the packets that matches this route. If you selectoutgoing-interfaceto, you can also configure port trigger settings for this interface.Otherwise, select a pre-defined address (group) to use as the source IP address(es) of the packets that match this route.SelectCreate Objectto configure a new address (group) to use as the source IP address(es) of the packets that match this route.
Port TriggeringConfigure trigger port forwarding to allow computers on the LAN to dynamically take turns using a service that uses a dedicated range of ports on the client side and a dedicated range of ports on the server side.Note: You need to create a firewall rule to allow an incoming service before using a port triggering rule.
#This is the rule index number.
Incoming ServiceSelect the service that the client computer sends to a remote server.The incoming service should have the same service or protocol type as what you configured in theServicefield.
Trigger ServiceSelect a service that a remote server sends. It causes (triggers) the ZyWALL to forward the traffic (received on theoutgoing interface) to the client computer that requested the service.
Add iconClick theAddicon in the heading row to add a new first entry.Click theAddicon in an entry to add a rule below the current entry.Click theRemoveicon to delete an existing rule from the ZyWALL. A window displays asking you to confirm that you want to delete the rule.In a numbered list, click theMove to Nicon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.The ordering of your rules is important as they are applied in order of their numbering.
Bandwidth ShapingThis allows you to allocate bandwidth to a route and prioritize traffic that matches the routing policy.You must also enable bandwidth management in the main policy route screen (Network >Routing >Policy Route) in order to apply bandwidth shaping.
Maximum BandwidthSpecify the maximum bandwidth (from 1 to 1048576) allowed for the route in kbps. If you enter O here, there is no bandwidth limitation for the route.If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.To reserve bandwidth for traffic that does not match any of the policy routes, leave some of the interface's bandwidth unbudgeted and do not enableMaximize Bandwidth Usage.
Bandwidth PriorityEnter a number between 1 and 7 to set the priority for traffic. The smaller the number, the higher the priority. If you set the maximum bandwidth to O , the bandwidth priority will be changed to O after you click OK. That means the route has the highest priority and will get all the bandwidth it needs up to the maximum available.A route with higher priority is given bandwidth before a route with lower priority.If you set routes to have the same priority, then bandwidth is divided equally amongst those routes.
Maximize Bandwidth UsageSelect this check box to have the ZyWALL divide up all of the interface's unallocated and/or unused bandwidth among the policy routes that require bandwidth. Do not select this if you want to reserve bandwidth for traffic that does not match any of the policy routes.
OKClick OKto save your changes back to the ZyWALL.
CancelClick Cancelto exit this screen without saving.

12.3 IP Static Route Screen

Click Network > Routing > Static Route to open the Static Route screen. This screen displays the configured static routes. Configure static routes to be able to use RIP or OSPF to propagate the routing information to other routers.

Figure 157 Network > Routing > Static Route
ZYXEL ZYWALL USG 2000 - IP Static Route Screen - 1

text_image Policy Route Static Route RIP OSPF Configuration

Destination Subnet Mask Next-Hop Metric

1 10.2.1.0 255.255.255.0 ge5 0

The following table describes the labels in this screen.

Table 75 Network > Routing > Static Route

LABELDESCRIPTION
#This is the number of an individual static route.
DestinationThis is the destination IP address.
Subnet MaskThis is the IP subnet mask.
Next-HopThis is the IP address of the next-hop gateway or the interface through which the traffic is routed. The gateway is a router or switch on the same segment as your ZyWALL's interface(s). The gateway helps forward packets to their destinations.
MetricThis is the route's priority among the ZyWALL's routes. The smaller the number, the higher priority the route has.
Add iconClick the Add icon to go to the screen where you can set up a static route on the ZyWALL.Click the Edit icon to go to the screen where you can edit the static route on the ZyWALL.Click the Remove icon to delete an existing static route from the ZyWALL. A window displays asking you to confirm that you want to delete the routing policy.

12.3.1 Static Route Add/Edit Screen

Select a static route index number and click Add or Edit. The screen shown next appears. Use this screen to configure the required information for a static route.

Figure 158 Network > Routing > Static Route > Add
ZYXEL ZYWALL USG 2000 - Static Route Add/Edit Screen - 1

text_image Static Route Setting Destination IP Subnet Mask Gateway IP Interface Metric ge1 0 OK Cancel

The following table describes the labels in this screen.

Table 76 Network > Routing > Static Route > Add

LABELDESCRIPTION
Destination IPThis parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
Subnet MaskEnter the IP subnet mask here.
Gateway IPSelect the radio button and enter the IP address of the next-hop gateway. The gateway is a router or switch on the same segment as your ZyWALL's interface(s). The gateway helps forward packets to their destinations.
InterfaceSelect the radio button and a predefined interface through which the traffic is sent.
MetricMetric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link. The number need not be precise, but it must be from 0~127. In practice, 2 or 3 is usually a good number.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

12.4 Policy Routing Technical Reference

Here is more detailed information about some of the features you can configure in policy routing.

NAT and SNAT

NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address in a packet in one network to a different IP address in another network. Use SNAT (Source NAT) to change the source IP address in one network to a different IP address in another network.

Port Triggering

Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding, you set the port(s) and IP address to forward a service (coming in from the remote server) to a client computer. The problem is that port forwarding only forwards a service to a single IP address. In order to use the same service on a different computer, you have to manually replace the client computer's IP address with another client computer's IP address.

Port triggering allows the client computer to take turns using a service dynamically. Whenever a client computer's packets match the routing policy, it can use the pre-defined port triggering setting to connect to the remote server without manually configuring a port forwarding rule for each client computer.

Port triggering is used especially when the remote server responses using a different port from the port the client computer used to request a service. The ZyWALL records the IP address of a client computer that sends traffic to a remote server to request a service (incoming service). When the ZyWALL receives a new connection (trigger service) from the remote server, the ZyWALL forwards the traffic to the IP address of the client computer that sent the request.

In the following example, you configure two services for port triggering:

Incoming service: Game (UDP: 1234)

Trigger service: Game-1 (UDP: 5670-5678)

1 Computer A wants to play a multiplayer online game and tries to connect to game server 1 using port 1234. The ZyWALL records the IP address of computer A when the packets match a policy with SNAT configured.
2 Game server 1 responds using a port number ranging between 5670 - 5678. The ZyWALL allows and forwards the traffic to computer A.
3 Computer A and game server 1 are connected to each other until the connection is closed or times out. Any other computers (such as B or C) cannot connect to remote server 1 using the same port triggering rule as computer A unless they are using a different next hop (gateway, outgoing interface, VPN tunnel or trunk) from computer A or until the connection is closed or times out.

Figure 159 Trigger Port Forwarding Example
ZYXEL ZYWALL USG 2000 - Port Triggering - 1

flowchart
graph TD
    A["Client A"] --> R["Router"]
    B["Client B"] --> R
    C["Client C"] --> R
    R --> I["Internet"]
    I --> J["Server 1"]
    style A fill:#f9f,stroke:#333
    style B fill:#f9f,stroke:#333
    style C fill:#f9f,stroke:#333
    style I fill:#ccf,stroke:#333
    style J fill:#ccf,stroke:#333

Maximize Bandwidth Usage

The maximize bandwidth usage option allows the ZyWALL to divide up any available bandwidth on the interface (including unallocated bandwidth and any allocated bandwidth that a policy route is not using) among the policy routes that require more bandwidth.

When you enable maximize bandwidth usage, the ZyWALL first makes sure that each policy route gets up to its bandwidth allotment. Next, the ZyWALL divides up

an interface's available bandwidth (bandwidth that is unbudgeted or unused by the policy routes) depending on how many policy routes require more bandwidth and on their priority levels. When only one policy route requires more bandwidth, the ZyWALL gives the extra bandwidth to that policy route.

When multiple policy routes require more bandwidth, the ZyWALL gives the highest priority policy routes the available bandwidth first (as much as they require, if there is enough available bandwidth), and then to lower priority policy routes if there is still bandwidth available. The ZyWALL distributes the available bandwidth equally among policy routes with the same priority level.

Routing Protocols

13.1 Routing Protocols Overview

Routing protocols give the ZyWALL routing information about the network from other routers. The ZyWALL stores this routing information in the routing table it uses to make routing decisions. In turn, the ZyWALL can also use routing protocols to propagate routing information to other routers. See Section 5.5 on page 115 for related information on the RIP and OSPF screens.

Routing protocols are usually only used in networks using multiple routers like campuses or large enterprises.

13.1.1 What You Can Do in the RIP and OSPF Screens

  • Use the RIP screen (see Section 13.2 on page 264) to configure the ZyWALL to use RIP to receive and/or send routing information.
  • Use the OSPF screen (see Section 13.3 on page 265) to configure general OSPF settings and manage OSPF areas.
  • Use the OSPF Area Add/Edit screen (see Section 13.3.2 on page 271) to create or edit an OSPF area.

13.1.2 What You Need to Know About Routing Protocols

The ZyWALL supports two standards, RIP and OSPF, for routing protocols. RIP and OSPF are compared here and discussed further in the rest of the chapter.

Table 77 RIP vs. OSPF

RIPOSPF
Network SizeSmall (with up to 15 routers)Large
MetricHop countBandwidth, hop count, throughput, round trip time and reliability.
ConvergenceSlowFast

Finding Out More

See Section 13.4 on page 273 for background information on routing protocols.

13.2 The RIP Screen

RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a device to exchange routing information with other routers. RIP is a vector-space routing protocol, and, like most such protocols, it uses hop count to decide which route is the shortest. Unfortunately, it also broadcasts its routes asynchronously to the network and converges slowly. Therefore, RIP is more suitable for small networks (up to 15 routers).

  • In the ZyWALL, you can configure two sets of RIP settings before you can use it in an interface.
  • First, the Authentication field specifies how to verify that the routing information that is received is the same routing information that is sent. This is discussed in more detail in Authentication Types on page 273.
  • Second, the ZyWALL can also redistribute routing information from non-RIP networks, specifically OSPF networks and static routes, to the RIP network. Costs might be calculated differently, however, so you use the Metric field to specify the cost in RIP terms.
  • RIP uses UDP port 520.

Use the RIP screen to specify the authentication method and maintain the policies for redistribution.

To access this screen, login to the web configurator. When the main screen appears, click Network > Routing > RIP to open the following screen.

Figure 160 Network > Routing > RIP
ZYXEL ZYWALL USG 2000 - The RIP Screen - 1

text_image Policy Route Static Route RIP OSPF General Settings Authentication MD5 MD5 Authentication ID (1..255) MD5 Authentication Key Redistribute Active Name Metric (0-16) OSPF 0 Static Route 0 Apply Reset

The following table describes the labels in this screen.

Table 78 Network > Routing Protocol > RIP

LABELDESCRIPTION
General Settings
AuthenticationSelect the authentication method used in the RIP network. This authentication protects the integrity, but not the confidentiality, of routing updates.None uses no authentication.Text uses a plain text password that is sent over the network (not very secure).MD5 uses an MD5 password and authentication ID (most secure).
Text Authentication KeyThis field is available if the Authentication is Text. Type the password for text authentication. The key can consist of alphanumeric characters and the underscore, and it can be up to 8 characters long.
MD5 Authentication IDThis field is available if the Authentication is MD5. Type the ID for MD5 authentication. The ID can be between 1 and 255.
MD5 Authentication KeyThis field is available if the Authentication is MD5. Type the password for MD5 authentication. The password can consist of alphanumeric characters and the underscore, and it can be up to 16 characters long.
Redistribute
ActiveSelect this check box to advertise routes that were learned from the indicated Name.
NameThis field displays other sources of routing information that the ZyWALL can advertise in the RIP network.
MetricType the cost for routes provided by the indicated source. The metric represents the “cost” of transmission for routing purposes. RIP routing uses hop count as the measurement of cost, with 1 usually used for directly connected networks. The number does not have to be precise, but it must be between 0 and 16. In practice, 2 or 3 is usually used.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

13.3 The OSPF Screen

OSPF (Open Shortest Path First, RFC 2328) is a link-state protocol designed to distribute routing information within a group of networks, called an Autonomous System (AS). OSPF offers some advantages over vector-space routing protocols like RIP.

- OSPF supports variable-length subnet masks, which can be set up to use available IP addresses more efficiently.

  • OSPF filters and summarizes routing information, which reduces the size of routing tables throughout the network.
  • OSPF responds to changes in the network, such as the loss of a router, more quickly.
  • OSPF considers several factors, including bandwidth, hop count, throughput, round trip time, and reliability, when it calculates the shortest path.
  • OSPF converges more quickly than RIP.

Naturally, OSPF is also more complicated than RIP, so OSPF is usually more suitable for large networks.

OSPF uses IP protocol 89.

OSPF Areas

An OSPF Autonomous System (AS) is divided into one or more areas. Each area represents a group of adjacent networks and is identified by a 32-bit ID. In OSPF, this number may be expressed as an integer or as an IP address.

There are several types of areas.

  • The backbone is the transit area that routes packets between other areas. All other areas are connected to the backbone.
  • A normal area is a group of adjacent networks. A normal area has routing information about the OSPF AS, any networks outside the OSPF AS to which it is directly connected, and any networks outside the OSPF AS that provide routing information to any area in the OSPF AS.
  • A stub area has routing information about the OSPF AS. It does not have any routing information about any networks outside the OSPF AS, including networks to which it is directly connected. It relies on a default route to send information outside the OSPF AS.
  • A Not So Stubby Area (NSSA, RFC 1587) has routing information about the OSPF AS and networks outside the OSPF AS to which the NSSA is directly connected. It does not have any routing information about other networks outside the OSPF AS.

Each type of area is illustrated in the following figure.

Figure 161 OSPF: Types of Areas
ZYXEL ZYWALL USG 2000 - OSPF Areas - 1

flowchart
graph TD
    A["Router 1"] --> B["Router X"]
    C["Router 2"] --> D["Router 0"]
    E["Router 3"] --> F["Router Y"]

This OSPF AS consists of four areas, areas 0-3. Area 0 is always the backbone. In this example, areas 1, 2, and 3 are all connected to it. Area 1 is a normal area. It has routing information about the OSPF AS and networks X and Y. Area 2 is a stub area. It has routing information about the OSPF AS, but it depends on a default route to send information to networks X and Y. Area 3 is a NSSA. It has routing information about the OSPF AS and network Y but not about network X.

OSPF Routers

Every router in the same area has the same routing information. They do this by exchanging Hello messages to confirm which neighbor (layer-3) devices exist, and then they exchange database descriptions (DDs) to create a synchronized link-state database. The link-state database contains records of router IDs, their associated links and path costs. The link-state database is then constantly updated through Link State Advertisements (LSA). Each router uses the link state database and the Dijkstra algorithm to compute the least cost paths to network destinations.

Like areas, each router has a unique 32-bit ID in the OSPF AS, and there are several types of routers. Each type is really just a different role, and it is possible for one router to play multiple roles at one time.

  • An internal router (IR) only exchanges routing information with other routers in the same area.
  • An Area Border Router (ABR) connects two or more areas. It is a member of all the areas to which it is connected, and it filters, summarizes, and exchanges routing information between them.

- An Autonomous System Boundary Router (ASBR) exchanges routing information with routers in networks outside the OSPF AS. This is called redistribution in OSPF.

Table 79 OSPF: Redistribution from Other Sources to Each Type of Area

SOURCE \ TYPE OF AREANORMALNSSASTUB
Static routesYesYesNo
RIPYesYesYes

- A backbone router (BR) has at least one interface with area 0. By default, every router in area 0 is a backbone router, and so is every ABR.

Each type of router is illustrated in the following example.

Figure 162 OSPF: Types of Routers
ZYXEL ZYWALL USG 2000 - OSPF Routers - 1

flowchart
graph TD
    subgraph Terminal 1
        A["IR"] --> B["1"]
        B --> C["ASBR"]
        C --> D["X"]
        E["ABR"] --> F["2"]
        F --> G["IR"]
        H["0"] --> I["ABR"]
        I --> J["BR"]
        K["3"] --> L["ASBR"]
        L --> M["Y"]
    end
    subgraph Terminal 2
        N["IR"] --> O["2"]
        O --> P["ABR"]
        P --> Q["BR"]
        R["0"] --> S["ABR"]
        S --> T["BR"]
        U["3"] --> V["IR"]
        W["ASBR"] --> X["3"]
        Y["ASBR"] --> Z["Y"]

In order to reduce the amount of traffic between routers, a group of routers that are directly connected to each other selects a designated router (DR) and a backup designated router (BDR). All of the routers only exchange information with the DR and the BDR, instead of exchanging information with all of the other routers in the group. The DR and BDR are selected by priority; if two routers have the same priority, the highest router ID is used.

The DR and BDR are selected in each group of routers that are directly connected to each other. If a router is directly connected to several groups, it might be a DR in one group, a BDR in another group, and neither in a third group all at the same time.

In some OSPF AS, it is not possible for an area to be directly connected to the backbone. In this case, you can create a virtual link through an intermediate area

to logically connect the area to the backbone. This is illustrated in the following example.

Figure 163 OSPF: Virtual Link
ZYXEL ZYWALL USG 2000 - Virtual Links - 1

flowchart
graph LR
    A["Router"] -->|100| B["Router"]
    B <-->|10| C["Router"]
    C -->|0| D["Router"]
    style A fill:#cce5ff,stroke:#333
    style B fill:#cce5ff,stroke:#333
    style C fill:#cce5ff,stroke:#333
    style D fill:#cce5ff,stroke:#333

In this example, area 100 does not have a direct connection to the backbone. As a result, you should set up a virtual link on both ABR in area 10. The virtual link becomes the connection between area 100 and the backbone.

You cannot create a virtual link to a router in a different area.

OSPF Configuration

Follow these steps when you configure OSPF on the ZyWALL.

1 Enable OSPF.
2 Set up the OSPF areas.
3 Configure the appropriate interfaces. See Section 10.4.1 on page 191.
4 Set up virtual links, as needed.

13.3.1 Configuring the OSPF Screen

Use the first OSPF screen to specify the OSPF router the ZyWALL uses in the OSPF AS and maintain the policies for redistribution. In addition, it provides a summary of OSPF areas, allows you to remove them, and opens the OSPF Add/Edit screen to add or edit them.

To access this screen, login to the web configurator. When the main screen appears, click once on Network > Routing > OSPF to open the following screen.

Figure 164 Network > Routing > OSPF
ZYXEL ZYWALL USG 2000 - Configuring the OSPF Screen - 1

text_image Policy Route Static Route RIP OSPF General Settings OSPF Router ID (IP Address) User Defined Redistribute Active Route Type Metric(0-16777214) ✓ RIP Way 1 □ Static Route Way 1 Area

Area Way Type Authentication

Apply Reset

The following table describes the labels in this screen. See Section 13.3.2 on page 271 for more information as well.

Table 80 Network > Routing Protocol > OSPF

LABELDESCRIPTION
General Settings
OSPF Router IDSelect the 32-bit ID the ZyWALL uses in the OSPF AS.Default - the highest available IP address assigned to the interfaces is the ZyWALL's ID.User Define - enter the ID (in IP address format) in the field that appears when you select User Define.
Redistribute
ActiveSelect this check box to advertise routes that were learned from the indicated source.If you select this for RIP, the ZyWALL advertises routes learned from RIP to Normal and NSSA areas but not to Stub areas.If you select this for static routes, the ZyWALL advertises routes learned from static routes to all types of areas.
RouteThis field displays other sources of routing information that the ZyWALL can advertise in the OSPF AS.
TypeSelect how OSPF calculates the cost associated with routing information from the indicated source. Choices are: Type 1 and Type 2.Type 1 - cost = OSPF AS cost + external cost (Metric)Type 2 - cost = external cost (Metric); the OSPF AS cost is ignored.
MetricType the external cost for routes provided by the indicated source. The metric represents the “cost” of transmission for routing purposes. The way this is used depends on the Type field. This value is usually the average cost in the OSPF AS, and it can be between 1 and 16777214.
AreaThis section displays information about OSPF areas in the ZyWALL.
#This field is a sequential value, and it is not associated with a specific area.
AreaThis field displays the 32-bit ID for each area in IP address format.
TypeThis field displays the type of area. This type is different from the Type field above.
AuthenticationThis field displays the default authentication method in the area.
Add iconThis column provides icons to add, edit, and remove areas.To add an area, click the Add icon at the top of the column. The OSPF Area Add/Edit screen appears.To edit an area, click the Edit icon next to the area. The Area Add/Edit screen appears.To delete an area, click on the Remove icon next to the area. The web configurator confirms that you want to delete the area before doing so.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

13.3.2 OSPF Area Add/Edit Screen

The OSPF Area Add/Edit screen allows you to create a new area or edit an existing one. To access this screen, go to the OSPF summary screen (see Section 13.3 on page 265), and click either the Add icon or an Edit icon.

Figure 165 Network > Routing > OSPF > Edit
ZYXEL ZYWALL USG 2000 - OSPF Area Add/Edit Screen - 1

text_image Area Setting Area ID Type Authentication MD5 Authentication ID MD5 Authentication Key 1 (1-255) 0 Virtual Link

Peer Router ID Authentication

1 MD5 Authentication ID MD5 Authentication Key OK Cancel

The following table describes the labels in this screen.

Table 81 Network > Routing > OSPF > Edit

LABELDESCRIPTION
Area IDType the unique, 32-bit identifier for the area in IP address format.
TypeSelect the type of area.Normal- This area is a normal area. It has routing information about the OSPF AS and about networks outside the OSPF AS.Stub- This area is an stub area. It has routing information about the OSPF AS but not about networks outside the OSPF AS. It depends on a default route to send information outside the OSPF AS.NSSA- This area is a Not So Stubby Area (NSSA), per RFC 1587. It has routing information about the OSPF AS and networks that are outside the OSPF AS and are directly connected to the NSSA. It does not have information about other networks outside the OSPF AS.
AuthenticationSelect the default authentication method used in the area. This authentication protects the integrity, but not the confidentiality, of routing updates.Noneuses no authentication.Textuses a plain text password that is sent over the network (not very secure).MD5uses an MD5 password and authentication ID (most secure).
Text Authentication KeyThis field is available if the Authentication is Text. Type the password for text authentication. The key can consist of alphanumeric characters and the underscore, and it can be up to 8 characters long.
MD5 Authentication IDThis field is available if the Authentication is MD5. Type the default ID for MD5 authentication in the area. The ID can be between 1 and 255.
MD5 Authentication KeyThis field is available if the Authentication is MD5. Type the default password for MD5 authentication in the area. The password can consist of alphanumeric characters and the underscore, and it can be up to 16 characters long.
Virtual LinkThis section is displayed if the Type is Normal. Create a virtual link if you want to connect a different area (that does not have a direct connection to the backbone) to the backbone. You should set up the virtual link on the ABR that is connected to the other area and on the ABR that is connected to the backbone.
#This field is a sequential value, and it is not associated with a specific area.
Peer Router IDType the 32-bit ID (in IP address format) of the other ABR in the virtual link.
AuthenticationSelect which authentication method to use in the virtual link. This authentication protects the integrity, but not the confidentiality, of routing updates.None uses no authentication.Text uses a plain text password that is sent over the network (not very secure).MD5 uses an MD5 password and authentication ID (most secure).Same as Area has the virtual link also use the Authentication settings above.
Text Authentication KeyThis field is available if the Authentication is Text. Type the password for text authentication. The key can consist of alphanumeric characters and the underscore, and it can be up to 8 characters long.
MD5 Authentication IDThis field is available if the Authentication is MD5. Type the default ID for MD5 authentication in the area. The ID can be between 1 and 255.
MD5 Authentication KeyThis field is available if the Authentication is MD5. Type the default password for MD5 authentication in the area. The password can consist of alphanumeric characters and the underscore, and it can be up to 16 characters long.
Add iconThis column provides icons to add and remove virtual links.To add a virtual link, click the Add icon at the top of the column. A new record appears in the virtual link list.To delete a virtual link, click on the Remove icon next to the virtual link. The web configurator confirms that you want to delete the virtual link.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

13.4 Routing Protocol Technical Reference

Here is more detailed information about RIP and OSPF.

Authentication Types

Authentication is used to guarantee the integrity, but not the confidentiality, of routing updates. The transmitting router uses its key to encrypt the original message into a smaller message, and the smaller message is transmitted with the original message. The receiving router uses its key to encrypt the received message and then verifies that it matches the smaller message sent with it. If the received message is verified, then the receiving router accepts the updated routing information. The transmitting and receiving routers must have the same key.

The ZyWALL supports three types of authentication for RIP and OSPF routing protocols:

  • None - no authentication is used.
  • Text – authentication using a plain text password, and the (unencrypted) password is sent over the network. This method is usually used temporarily to prevent network problems.
  • MD5 – authentication using an MD5 password and authentication ID.

MD5 is an authentication method that produces a 128-bit checksum, called a message-digest, for each packet. It also includes an authentication ID, which can be set to any value between 1 and 255. The ZyWALL only accepts packets if these conditions are satisfied.

  • The packet's authentication ID is the same as the authentication ID of the interface that received it.
  • The packet's message-digest is the same as the one the ZyWALL calculates using the MD5 password.

For RIP, authentication is not available in RIP version 1. In RIP version 2, you can only select one authentication type for all interfaces. For OSPF, the ZyWALL supports a default authentication type by area. If you want to use this default in an interface or virtual link, you set the associated Authentication Type field to Same as Area. As a result, you only have to update the authentication information for the area to update the authentication type used by these interfaces and virtual links. Alternatively, you can override the default in any interface or virtual link by selecting a specific authentication method. Please see the respective interface sections for more information.

14.1 Zones Overview

Set up zones to configure network security and network policies in the ZyWALL. A zone is a group of interfaces and VPN tunnels. The ZyWALL uses zones, not interfaces, in many security and policy settings, such as firewall rules and remote management.

Zones cannot overlap. Each Ethernet interface, VLAN interface, bridge interface, PPPoE/PPTP interface, auxiliary interface, and VPN tunnel can be assigned to at most one zone. Virtual interfaces are automatically assigned to the same zone as the interface on which they run.

Figure 166 Example: Zones
ZYXEL ZYWALL USG 2000 - Zones Overview - 1

flowchart
graph TD
    subgraph LAN1
        A["VLAN 1"] --> B["Router"]
        C["VLAN 2"] --> D["Router"]
        E["Ethernet"] --> F["Router"]
    end

    subgraph LAN2
        G["VLAN 1"] --> H["ZyWALL"]
        I["VLAN 2"] --> H
        J["Ethernet"] --> H
    end

    subgraph DMZ
        K["VLAN 1"] --> L["Router"]
        M["VLAN 2"] --> N["Router"]
        O["VLAN 3"] --> P["Router"]
        Q["VLAN 4"] --> R["Router"]
    end

    subgraph WAN
        S["VAN 1"] --> T["ISP 1"]
        U["VAN 2"] --> V["ISP 2"]
        W["INTERNET"] --> X["Cloud"]
    end

    A --> H
    C --> H
    D --> H
    E --> H
    F --> H
    G --> H
    H --> L
    H --> N
    H --> P
    H --> R

14.1.1 What You Can Do in the Zones Screens

Use the Zone screens (see Section 14.2 on page 277) to view, add, and edit the ZyWALL's zones.

14.1.2 What You Need to Know About Zones

Effects of Zones on Different Types of Traffic

Zones effectively divide traffic into three types--intra-zone traffic, inter-zone traffic, and extra-zone traffic--which are affected differently by zone-based security and policy settings.

Intra-zone Traffic

  • Intra-zone traffic is traffic between interfaces or VPN tunnels in the same zone. For example, in Figure 166 on page 275, traffic between VLAN 2 and the Ethernet is intra-zone traffic.
  • In each zone, you can either allow or prohibit all intra-zone traffic. For example, in Figure 166 on page 275, you might allow intra-zone traffic in the LAN zone but prohibit it in the WAN zone.
  • You can also set up firewall rules to control intra-zone traffic (for example, DMZ-to-DMZ), but many other types of zone-based security and policy settings do not affect intra-zone traffic.

Inter-zone Traffic

Inter-zone traffic is traffic between interfaces or VPN tunnels in different zones. For example, in Figure 166 on page 275, traffic between VLAN 1 and the Internet is inter-zone traffic. This is the normal case when zone-based security and policy settings apply.

Extra-zone Traffic

  • Extra-zone traffic is traffic to or from any interface or VPN tunnel that is not assigned to a zone. For example, in Figure 166 on page 275, traffic to or from computer C is extra-zone traffic.
  • Some zone-based security and policy settings may apply to extra-zone traffic, especially if you can set the zone attribute in them to Any or All. See the specific feature for more information.

Finding Out More

See Section 5.4.7 on page 108 for related information on these screens.

14.2 The Zone Screen

The Zone screen provides a summary of all zones. In addition, this screen allows you to add, edit, and zones. To access this screen, click Network > Zone.

Figure 167 Network > Zone

Configuration
NameBlock Intra-zoneMember
LANNoge1
WANYesge2, ge3
DMZYesge4, ge5, ge6

The following table describes the labels in this screen.

Table 82 Network > Zone

LABELDESCRIPTION
NameThis field displays the name of the zone.
Block Intra-zoneThis field indicates whether or not the ZyWALL blocks network traffic between members in the zone.
MemberThis field displays the names of the interfaces that belong to each zone.
Add iconThis column provides icons to add, edit, and remove zones.To add a zone, click the Add icon at the top of the column. The Zone Add/Edit screen appears.To edit a zone, click the Edit icon next to the zone. The Zone Add/Edit screen appears.To delete a zone, click the Remove icon next to the zone. The web configurator confirms that you want to delete the zone before doing so.

14.3 Zone Add/Edit

The Zone Add/Edit screen allows you to define a zone or edit an existing one. To access this screen, go to the Zone screen (see Section 14.2 on page 277), and click either the Add icon or an Edit icon.

Figure 168 Network > Zone > Edit
ZYXEL ZYWALL USG 2000 - Zone Add/Edit - 1

text_image Group Members Name LAN Block Intra-zone Traffic Member List Available INTERFACE / ge6 INTERFACE / ge7 INTERFACE / ge8 INTERFACE / aux INTERFACE / vlan1 Member INTERFACE / ge1 OK Cancel

The following table describes the labels in this screen.

Table 83 Network > Zone > Edit

LABELDESCRIPTION
NameType the name used to refer to the zone. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Block Intra-zone TrafficSelect this check box to block network traffic between members in the zone.
Member ListAvailablelists the interfaces that do not belong to any zone. The word in front of the name indicates whether this member is an interface or a VPN tunnel.INTERFACE- this member is an interface.IPSEC- this member is a VPN tunnel.Select any interfaces that you want to add to the zone you are editing, and click the right arrow button to add them.Memberlists the interfaces that belong to the zone. Select any interfaces that you want to remove from the zone, and click the left arrow button to remove them.

15.1 DDNS Overview

Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address.

15.1.1 What You Can Do in the DDNS Screens

  • Use the DDNS screen (see Section 15.2 on page 280) to view a list of the configured DDNS domain names and their details.
  • Use the DDNS Add/Edit screen (see Section 15.2.1 on page 282) to add a domain name to the ZyWALL or to edit the configuration of an existing domain name.
  • Use the DDNS Status screen (see Section 15.2 on page 280) to view the status of the ZyWALL's DDNS domain names.

15.1.2 What You Need to Know About DDNS

DNS maps a domain name to a corresponding IP address and vice versa. Similarly, dynamic DNS maps a domain name to a dynamic IP address. As a result, anyone can use the domain name to contact you (in NetMeeting, CU-SeeMe, etc.) or to access your FTP server or Web site, regardless of the current IP address.

Note: You must have a public WAN IP address to use Dynamic DNS.

You must set up a dynamic DNS account with a supported DNS service provider before you can use Dynamic DNS services with the ZyWALL. When registration is complete, the DNS service provider gives you a password or key. At the time of

writing, the ZyWALL supports the following DNS service providers. See the listed websites for details about the DNS services offered by each.

Table 84 Network > DDNS

DDNS SERVICE PROVIDERSERVICE TYPES SUPPORTEDWEBSITENOTES
DynDNSDynamic DNS, Static DNS, and Custom DNSwww.dyndns.com
DynuBasic, Premiumwww.dynu.com
No-IPNo-IPwww.no-ip.com
Peanut HullPeanut Hullwww.oray.cnChinese website

Note: Record your DDNS account's user name, password, and domain name to use to configure the ZyWALL.

After, you configure the ZyWALL, it automatically sends updated IP addresses to the DDNS service provider, which helps redirect traffic accordingly.

Finding Out More

See Section 5.4.9 on page 108 for related information on these screens.

15.2 The DDNS Screen

The DDNS screen provides a summary of all DDNS domain names and their configuration. In addition, this screen allows you to add new domain names, edit the configuration for existing domain names, and delete domain names. To access this screen, login to the web configurator. When the main screen appears, click Network > DDNS. The following screen appears, providing a summary of the existing domain names.

Figure 169 Network > DDNS
ZYXEL ZYWALL USG 2000 - The DDNS Screen - 1

text_image Profile Status Profile Summary Profile Name DDNS Type Domain Name Primary Interface/IP Backup Interface/IP Example DynDNS example.dyndns.org wan1/from interface Chat these IP Apply Reset

The following table describes the labels in this screen.

Table 85 Network > DDNS

LABELDESCRIPTION
Profile NameThis field displays the descriptive profile name for this entry.
DDNS TypeThis field displays which DDNS service you are using.
Domain NameThis field displays each domain name the ZyWALL can route.
Primary Interface/IPThis field displays the interface to use for updating the IP address mapped to the domain name followed by how the ZyWALL determines the IP address for the domain name.from interface - The IP address comes from the specified interface.auto detected -The DDNS server checks the source IP address of the packets from the ZyWALL for the IP address to use for the domain name.custom - The IP address is static.
Backup Interface/IPThis field displays the alternate interface to use for updating the IP address mapped to the domain name followed by how the ZyWALL determines the IP address for the domain name. The ZyWALL uses the backup interface and IP address when the primary interface is disabled, its link is down or its ping check fails.from interface - The IP address comes from the specified interface.auto detected -The DDNS server checks the source IP address of the packets from the ZyWALL for the IP address to use for the domain name.custom - The IP address is static.
Add iconThis column provides icons to add, edit, and remove domain names.To add a domain name, click the Add icon at the top of the column. The DDNS Add/Edit screen appears.To activate or deactivate a domain name entry, click the entry's Active icon. Make sure you click Apply to save and apply the change.To edit a domain name, click the Edit icon next to the domain name. The DDNS Add/Edit screen appears.To delete a domain name, click on the Remove icon next to the ISP account. The web configurator confirms that you want to delete the account before doing so.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

15.2.1 The Dynamic DNS Add/Edit Screen

The DDNS Add/Edit screen allows you to add a domain name to the ZyWALL or to edit the configuration of an existing domain name. Click Network > DDNS and then an Add or Edit icon to open this screen.

Figure 170 Network > DDNS > Add
ZYXEL ZYWALL USG 2000 - The Dynamic DNS Add/Edit Screen - 1

text_image General Settings Enable DDNS Profile Profile Name DDNS Type DynDNS DDNS Account Username Password DDNS Settings Domain name Primary Binding Address Interface ge1 IP Address Interface Backup Binding Address Interface ge2 IP Address Auto Enable Wildcard Mail Exchanger (Optional) Backup Mail Exchanger OK Cancel Basic

The following table describes the labels in this screen.

Table 86 Network > DDNS > Add

LABELDESCRIPTION
General Settings
Enable DDNS ProfileSelect this check box to use this DDNS entry.
Profile NameWhen you are adding a DDNS entry, type a descriptive name for this DDNS entry in the ZyWALL. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.This field is read-only when you are editing an entry.
DDNS TypeSelect the type of DDNS service you are using.
DDNS Account
UsernameType the user name used when you registered your domain name. You can use up to 31 alphanumeric characters and the underscore. Spaces are not allowed.For a Dynu DDNS entry, this user name is the one you use for logging into the service, not the name recorded in your personal information in the Dynu website.
PasswordType the password provided by the DDNS provider. You can use up to 64 alphanumeric characters and the underscore. Spaces are not allowed.
DDNS SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
Domain nameType the domain name you registered. You can use up to 255 characters.
Primary Binding AddressUse these fields to set how the ZyWALL determines the IP address that is mapped to your domain name in the DDNS server. The ZyWALL uses the Backup Binding Address if the interface specified by these settings is not available.
InterfaceSelect the interface to use for updating the IP address mapped to the domain name. Select Any to let the domain name be used with any interface.
IP AddressThe options available in this field vary by DDNS provider.Interface -The ZyWALL uses the IP address of the specified interface. This option appears when you select a specific interface in the Primary Binding Address Interface field.Auto - If the interface has a dynamic IP address, the DDNS server checks the source IP address of the packets from the ZyWALL for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the ZyWALL and the DDNS server.Note: The ZyWALL may not determine the proper IP address if there is an HTTP proxy server between the ZyWALL and the DDNS server.Custom - If you have a static IP address, you can select this to use it for the domain name. The ZyWALL still sends the static IP address to the DDNS server.
Custom IPThis field is only available when the IP Address is Custom. Type the IP address to use for the domain name.
Backup Binding AddressUse these fields to set an alternate interface to map the domain name to when the interface specified by the Primary Binding Interface settings is not available.
InterfaceSelect the interface to use for updating the IP address mapped to the domain name. Select Any to let the domain name be used with any interface. Select None to not use a backup address.
IP AddressThe options available in this field vary by DDNS provider.Interface-The ZyWALL uses the IP address of the specified interface. This option appears when you select a specific interface in the Backup Binding Address Interface field.Auto-The DDNS server checks the source IP address of the packets from the ZyWALL for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the ZyWALL and the DDNS server.Note: The ZyWALL may not determine the proper IP address if there is an HTTP proxy server between the ZyWALL and the DDNS server.Custom- If you have a static IP address, you can select this to use it for the domain name. The ZyWALL still sends the static IP address to the DDNS server.
Custom IPThis field is only available when the IP Address is Custom. Type the IP address to use for the domain name.
Enable WildcardThis option is only available with a DynDNS account.Enable the wildcard feature to alias subdomains to be aliased to the same IP address as your (dynamic) domain name. This feature is useful if you want to be able to use, for example, www.yourhost.dyndns.org and still reach your hostname.
Mail ExchangerThis option is only available with a DynDNS account.DynDNS can route e-mail for your domain name to a mail server (called a mail exchanger). For example, DynDNS routes e-mail for john-doe@yourhost.dyndns.org to the host record specified as the mail exchanger.If you are using this service, type the host record of your mail server here. Otherwise leave the field blank.See www.dyndns.org for more information about mail exchangers.
Backup Mail ExchangerThis option is only available with a DynDNS account.Select this check box if you are using DynDNS's backup service for e-mail. With this service, DynDNS holds onto your e-mail if your mail server is not available. Once your mail server is available again, the DynDNS server delivers the mail to you. See www.dyndns.org for more information about this service.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

15.3 The DDNS Status Screen

The DDNS Status screen shows the status of the ZyWALL's DDNS domain names. To access this screen, login to the web configurator. When the main screen appears, click Network > DDNS > Status. The following screen appears.

Figure 171 Network > DDNS > Status
ZYXEL ZYWALL USG 2000 - The DDNS Status Screen - 1

text_image Profile Status DDNS Status Profile Name Domain name Effective IP Last Update Status Last Update Time Update Example example.dyndns.org Updating 2007-11-16 05:50:22 Update Refresh

The following table describes the labels in this screen.

Table 87 Network > DDNS > Status

LABELDESCRIPTION
Profile NameThis field displays the descriptive profile name for this entry.
Domain NameThis field displays each domain name the ZyWALL can route.
Effective IPThis is the (resolved) IP address of the domain name.
Last Update StatusThis shows whether the last attempt to resolve the IP address for the domain name was successful or not. Updating means the ZyWALL is currently attempting to resolve the IP address for the domain name.
Last Update TimeThis shows when the last attempt to resolve the IP address for the domain name occurred (in year-month-day hour:minute:second format).
UpdateClick this to have the ZyWALL update the profile to the DDNS server. The ZyWALL attempts to resolve the IP address for the domain name.
RefreshClick this to update the information displayed in the screen.

Virtual Servers

16.1 Virtual Servers Overview

Virtual servers are computers on a private network behind the ZyWALL that you make available outside the private network. If the ZyWALL has only one public IP address, you can make the computers in the private network available by using ports to forward packets to the appropriate private IP address.

Suppose you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet.

Figure 172 Multiple Servers Behind NAT Example
ZYXEL ZYWALL USG 2000 - Virtual Servers Overview - 1

flowchart
graph TD
    A["Router"] -->|LAN| B["Router"]
    C["Client 1: 192.168.1.34"] --> D["Client 1: 192.168.1.35"]
    E["Client 2: 192.168.1.36"] --> F["Client 2: 192.168.1.37"]
    G["Client 3: 192.168.1.33"] --> H["Client 3: 192.168.1.1"]
    I["Internet"] --> J["Server"]

16.1.1 What You Can Do in the Virtual Server Screens

Use the Virtual Server screens (see Section 16.2 on page 288) to view and manage the list of virtual servers and see their configuration details. You can also create new virtual servers and edit or delete existing ones.

16.1.2 What You Need to Know About Virtual Servers

Virtual server is also known as port forwarding or port translation.

Note: The virtual server changes the destination address of packets. This is also known as Destination NAT (DNAT).

Finding Out More

• See Section 5.4.19 on page 113 for related information on these screens.
- See Section 6.6.2 on page 139 for an example of how to configure a virtual server to allow H.323 traffic from the WAN to the LAN.
- See Section 16.3 on page 292 for examples of manually configuring NAT 1:1 mapping and manually configuring a policy route rule for NAT loopback. (Although you can have the ZyWALL automatically configure these for you instead.)

16.2 The Virtual Server Screen

The Virtual Server summary screen provides a summary of all virtual servers and their configuration. In addition, this screen allows you to create new virtual servers and edit and delete existing virtual servers. To access this screen, login to the web configurator and click Network > Virtual Server. The following screen appears, providing a summary of the existing virtual servers.

Figure 173 Network > Virtual Server
ZYXEL ZYWALL USG 2000 - The Virtual Server Screen - 1

text_image Configuration Total Virtual Servers: 1 30 entries per page Page: 1 of 1

Name Interface Original IP Mapped IP Protocol Original Port Mapped Port

1 Example ge2 any LAN-server any Apply Reset

The following table describes the labels in this screen.

Table 88 Network > Virtual Server

LABELDESCRIPTION
Total Virtual ServersThis is how many virtual server entries are configured in the ZyWALL.
entries per pageSelect how many virtual server entries to display per page in the screen.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific virtual server.
NameThis field displays the name of the virtual server.
InterfaceThis field displays the interface on which packets for the virtual server were received.
Original IPThis field displays the original destination IP address (or address object) of packets for the virtual server. It displays any if there is no restriction on the original destination IP address.
Mapped IPThis field displays the new destination IP address for the packet.
ProtocolThis field displays the service used by the packets for this virtual server. It displays any if there is no restriction on the services.
Original PortThis field displays the original destination port(s) of packets for the virtual server. This field is blank if there is no restriction on the original destination port.
Mapped PortThis field displays the new destination port(s) for the packet. This field is blank if there is no restriction on the original destination port.
Add iconThis column provides icons to add, edit, and remove virtual servers. In addition, you can activate and deactivate virtual servers.To add a virtual server, click the Add icon at the top of the column. The Virtual Server Add/Edit screen appears.To activate / deactivate a virtual server, click the Active icon next to the virtual server.To edit a virtual server, click the Edit icon next to the virtual server. The Virtual Server Add/Edit screen appears.To delete a virtual server, click on the Remove icon next to the virtual server. The web configurator confirms that you want to delete it before doing so.
ApplyClick this button to save your changes to the ZyWALL.
ResetClick this button to return the screen to its last-saved settings.

16.2.1 The Virtual Server Add/Edit Screen

The Virtual Server Add/Edit screen lets you create new virtual servers and edit existing ones. To open this window, open the Virtual Server summary screen.

(See Section 16.2 on page 288.) Then, click on an Add icon or Edit icon to open the following screen.

Figure 174 Network > Virtual Server > Edit
ZYXEL ZYWALL USG 2000 - The Virtual Server Add/Edit Screen - 1

text_image General Settings Enable Rule Rule Name Mapping Rule Incoming Interface ge1 Original IP User Defined User-Defined Original IP (IP Address) Mapped IP User Defined User-Defined Mapped IP (IP Address) Port Mapping Type Any Related Settings Add corresponding Policy Route rule for NAT 1:1 mapping. Add corresponding Policy Route rule for NAT Loopback. Configure Firewall OK Cancel

The following table describes the labels in this screen.

Table 89 Network > Virtual Server > Edit

LABELDESCRIPTION
General Settings
Enable RuleUse this option to turn the virtual server on or off.
Rule NameType in the name of the virtual server. The name is used to refer to the virtual server. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Mapping Rule
Incoming InterfaceSelect the interface on which packets for the virtual server must be received. It can be an Ethernet, VLAN, bridge, or PPPoE/PPTP interface.
Original IPUse the drop-down list box to indicate which destination IP address this virtual server supports. Choices are:Any - this virtual server supports the IP address of the selected interface.User Defined - this virtual server supports a specific IP address, specified in the User Defined field.HOST address - the drop-down box lists all the HOST address objects in the ZyWALL. If you select one of them, this virtual server supports the IP address specified by the address object.Select Create Object to configure a new IP address object.
User-Defined Original IPThis field is available if Original IP is User Defined. Type the destination IP address that this virtual server supports.
Mapped IPUse the drop-down list box to indicate to which translated destination IP address this virtual server forwards the packet. Choices are:User Defined - this virtual server supports a specific IP address, specified in the User Defined field.HOST address - the drop-down box lists all the HOST address objects in the ZyWALL. If you select one of them, this virtual server supports the IP address specified by the address object.Select Create Object to configure a new IP address object.
User-Defined Original IPThis field is available if Mapped IP is User Defined. Type the translated destination IP address that this virtual server supports.
Port Mapping TypeUse the drop-down list box to select how many original destination ports this virtual server supports for the selected destination IP address (Original IP). Choices are:Any - this virtual server supports all the destination ports.Port - this virtual server supports one destination port.Ports - this virtual server supports a range of destination ports. You might use a range of destination ports for unknown services or when one server supports more than one service.See Appendix B on page 871 for some common port numbers.
Original ServiceThis field is available if Mapping Type is Service. Select the original service this virtual server supports.
Mapped ServiceThis field is available if Mapping Type is Service. Select the translated service if this virtual server forwards the packet.
Protocol TypeThis field is available if Mapping Type is Port or Ports. Select the protocol (TCP, UDP, or Any) used by the service requesting the connection.
Original PortThis field is available if Mapping Type is Port. Enter the original destination port this virtual server supports.
Mapped PortThis field is available if Mapping Type is Port. Enter the translated destination port if this virtual server forwards the packet.
Original Start PortThis field is available if Mapping Type is Ports. Enter the beginning of the range of original destination ports this virtual server supports.
Original End PortThis field is available if Mapping Type is Ports. Enter the end of the range of original destination ports this virtual server supports.
Mapped Start PortThis field is available if Mapping Type is Ports. Enter the beginning of the range of translated destination ports if this virtual server forwards the packet.
Mapped End PortThis field is available if Mapping Type is Ports. Enter the end of the range of translated destination ports if this virtual server forwards the packet. The original port range and the mapped port range must be the same size.
Add corresponding Policy Route rule for NAT 1:1 mapping.If the server will initiate sessions to the clients, select this check box to create a corresponding policy route so the ZyWALL uses the same public IP address as the traffic's source address. This is called NAT 1:1.Or you can clickPolicy Routeto go to the screens where you can manually configure a NAT 1:1 policy route for this virtual server.SeeNAT 1:1 Example on page 292for an example of NAT 1:1.
Add corresponding Policy Route rule for NAT Loopback.Select this to allow local users to use a domain name to access this virtual server. By default this virtual server entry only applies this address mapping to packets coming in from the WAN.Or you can clickPolicy Routeto go to the screens where you can manually configure a NAT loopback policy route for this virtual server.SeeNAT Loopback Example on page 297for an example of NAT loopback.
Configure FirewallBy default the firewall blocks incoming connections from external addresses. After you configure your virtual server rule settings, click theFirewalllink to configure a firewall rule to allow the virtual server's traffic to come in.The ZyWALL checks virtual servers before it applies To-ZyWALL firewall rules, so To-ZyWALL firewall rules do not apply to traffic that is forwarded by virtual servers. The ZyWALL still checks other firewall rules according to the source IP address and mapped IP address.
OKClickOKto save your changes back to the ZyWALL.
CancelClickCancelto return to theVirtual Serversummary screen without creating the virtual server (if it is new) or saving any changes (if it already exists).

16.3 NAT 1:1 and NAT Loopback Examples

The following sections provide examples of manually configuring NAT 1:1 mapping and a policy route rule for NAT loopback. These are provided for your reference, you can select options in the Virtual Server Add/Edit screen to have the ZyWALL automatically configure these for you instead of configuring them manually.

NAT 1:1 Example

In this example, there is an SMTP mail server in the LAN zone. It has a private IP address of 192.168.1.21. The public IP address for the server is 1.1.1.1 and is on the ge3 interface.

In order for the server to be accessible to people from the Internet (WAN zone), you need to create a 1:1 NAT mapping from the public IP address to the server's private one.

The firewall is enabled, so you also need to create a rule to allow traffic in from the WAN zone.

Figure 175 NAT 1:1 Example Network Topology
ZYXEL ZYWALL USG 2000 - NAT 1:1 Example - 1

flowchart
graph LR
    A["LAN"] --> B["Router"]
    B --> C["Internet"]

NAT 1:1 Address Objects

Use Object > Address > Add to create address objects for the private and public IP addresses (LAN_SMTP and WAN_EG) as shown next.

Figure 176 Create Address Objects
ZYXEL ZYWALL USG 2000 - NAT 1:1 Address Objects - 1

text_image Configuration Name LAN_SMTP Address Type HOST IP Address 192.168.1.21 OK Cancel

ZYXEL ZYWALL USG 2000 - NAT 1:1 Address Objects - 2

text_image Configuration Name WAN_EG Address Type HOST IP Address 1.1.1.1 OK Cancel

NAT 1:1 Virtual Server

This section sets up a virtual server rule that changes the destination of SMTP traffic coming to IP address 1.1.1.1 at the ZyWALL's ge3 interface, to the LAN

SMTP server's IP address (192.168.1.21). This is also called Destination NAT (DNAT)

Figure 177 NAT 1:1 Example Virtual Server
ZYXEL ZYWALL USG 2000 - NAT 1:1 Virtual Server - 1

flowchart
graph LR
    A["LAN"] -->|192.168.1.21| B["NAT"]
    B -->|SMTP| C["Destination 192.168.1.21"]
    C -->|SMTP| D["Destination 1.1.1.1"]
    D --> E["INTERNET"]

The ge3 interface has a different IP address than 1.1.1.1, so in order for the ZyWALL gateway to be able to do ARP resolution correctly, you need to create a ge3 virtual server entry. In the Network > Virtual Server screen, click the + symbol and create a new virtual server entry as shown next. This entry maps TCP port 25 (SMTP) traffic coming to IP address 1.1.1.1 on ge3 to the IP address of the SMTP server (192.168.1.21 defined in the LAN_SMTP object). In this example the SMTP server also uses port 25, so the Mapped Port is set to 25. The following sections describe how to manually configure corresponding policy routes for NAT 1:1 mapping and loopback so the options to have the ZyWALL automatically create them are not selected here.

Figure 178 Create a Virtual Server
ZYXEL ZYWALL USG 2000 - NAT 1:1 Virtual Server - 2

text_image General Settings Enable Rule Rule Name NAT1-1_EG Mapping Rule Incoming Interface ge3 Original IP WAN_EG Mapped IP LAN_SMTP Port Mapping Type Port Protocol Type TCP Original Port 25 Mapped Port 25 Related Settings Add corresponding Policy Route rule for NAT 1:1 mapping. Add corresponding Policy Route rule for NAT Loopback. Configure Firewall OK Cancel

NAT 1:1 Policy Route

This section sets up a policy route for the traffic coming from the LAN SMTP server to the ZyWALL's ge1 interface. It changes the source address from 192.168.1.21 to 1.1.1.1. This is also called Source NAT (SNAT). It sends the traffic out through the ge3 interface.

Figure 179 NAT 1:1 Example Policy Route
ZYXEL ZYWALL USG 2000 - NAT 1:1 Policy Route - 1

flowchart
graph LR
    A["LAN 192.168.1.21"] --> B["Switch"]
    B --> C["NAT"]
    C --> D["INTERNET"]
    E["Source 192.168.1.1"] --> F["SMTP"]
    G["Source 1.1.1.1"] --> H["SMTP"]

Click Network > Routing > Policy Route > Add and configure the screen as shown next. Be careful of where you create the route as routes are ordered in descending priority.

Figure 180 Create a Policy Route
ZYXEL ZYWALL USG 2000 - NAT 1:1 Policy Route - 2

text_image Configuration Enable Description NAT_1:1_EG (Optional) Criteria User any Incoming Interface / ge1 Change... LAN_SMTP Destination Address any Schedule none Service any Next-Hop Type Interface ge3 Address Translation Source Network Address Translation WAN_EG Bandwidth Shaping Maximum Bandwidth 0 Kbps Bandwidth Priority (1-7, 1 is highest priority) Maximize Bandwidth Usage OK Cancel

NAT 1:1 Firewall Rule

Create a firewall rule to allow access from the WAN zone to the mail server in the LAN zone. Be careful of where you create the rule as firewall rules are ordered in descending priority.

Figure 181 Create a Firewall Rule
ZYXEL ZYWALL USG 2000 - NAT 1:1 Firewall Rule - 1

text_image Configuration Enable From WAN To LAN Description to_LAN_SMTP_server (Optional) Schedule none User any Source any Destination LAN_SMTP Service SMTP Access allow Log no OK Cancel

NAT Loopback Example

The NAT 1:1 Example on page 292 maps a public IP address to the private IP address of a LAN SMTP mail server to allow users to access the SMTP mail server from the WAN. LAN users can also use an IP address to access the mail server. However, you need to configure NAT loopback for LAN users to use a domain name to access the server.

Figure 182 LAN Computer Queries the DNS Server
ZYXEL ZYWALL USG 2000 - NAT Loopback Example - 1

flowchart
graph TD
    A["Internet"] --> B["DNS"]
    B --> C["xxx.LAN-SMTP.com = ?"]
    C --> D["1.1.1.1"]
    D --> E["LAN"]
    E --> F["192.168.1.21"]
    E --> G["192.168.1.89"]
    H["www.xxx.LAN-SMTP.com"] --> I["www.xbox.com"]
    I --> J["www.xbox.com"]
    style A fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style C fill:#cfc,stroke:#333
    style D fill:#fcc,stroke:#333
    style E fill:#cff,stroke:#333
    style F fill:#ffc,stroke:#333
    style G fill:#cfc,stroke:#333

A LAN user computer at IP address 192.168.1.89 queries the domain name (xxx.LAN-SMTP.com in this example) from a public DNS server and gets the SMTP server's 1-1 NAT mapped public IP address of 1.1.1.1.

NAT Loopback Virtual Server

When a LAN user sends SMTP traffic to IP address 1.1.1.1, the traffic comes into the ZyWALL through the LAN interface, thus it does not match the NAT 1:1 mapping's virtual server rule for SMTP traffic coming to IP 1.1.1.1 from WAN2. So you must configure a similar virtual server rule for WAN2.

Figure 183 NAT Loopback Virtual Server
ZYXEL ZYWALL USG 2000 - NAT Loopback Virtual Server - 1

flowchart
graph TD
    A["NAT 1.1.1.1"] -->|Destination 192.168.1.21| B["LAN 192.168.1.21"]
    A -->|Destination 1.1.1.1| C["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| D["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| E["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| F["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| G["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| H["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| I["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| J["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| K["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| L["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| M["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| N["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| O["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| P["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| Q["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| R["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| S["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| T["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| U["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| V["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| W["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| X["Destination 192.168.1.21"]
    A -->|Destination 1.1.1.1| Y["Destination 192.168.1.21"]
    A -->|Destination 0| Z["Destination 0"]

Click Network > Virtual Server and the + symbol and create the virtual server rule as shown next. This virtual server rule is the same as in NAT 1:1 Virtual Server on page 293, except you use the LAN interface instead of the WAN2 interface. This rule maps TCP port 25 (SMTP) traffic destined for IP address 1.1.1.1 and coming in on WAN2 to the SMTP server (IP address 192.168.1.21). In this example the SMTP server also uses port 25, so the Mapped Port is set to 25.

Figure 184 Create a Virtual Server
ZYXEL ZYWALL USG 2000 - NAT Loopback Virtual Server - 2

text_image General Settings Enable Rule Rule Name NAT_Loopback_EG Mapping Rule Incoming Interface ge1 Original IP VAN_EG Mapped IP LAN_SMTP Port Mapping Type Port Protocol Type Any Original Port 25 Mapped Port 25 Related Settings Add corresponding Policy Route rule for NAT 1:1 mapping. Add corresponding Policy Route rule for NAT Loopback. Configure Firewall OK Cancel

NAT Loopback Policy Route

Without a NAT loopback policy route, the LAN user SMTP traffic goes to the LAN SMTP server with the LAN computer's IP address as the source. The source address is in the same subnet, so the LAN SMTP server replies directly. The return traffic uses the SMTP server's LAN IP address as the source address ^3 . This creates

a triangle route since the source does not match the original destination address (1.1.1.1). The user's computer shuts down the session.

Figure 185 Triangle Route
ZYXEL ZYWALL USG 2000 - NAT Loopback Policy Route - 1

flowchart
graph TD
    A["LAN 192.168.1.21"] -->|Source 192.168.1.21| B["Router"]
    B -->|SMTP| C["Server 192.168.1.89"]

Configure a policy route to use the IP address of the ZyWALL's ge1 interface, 192.168.1.1 as the source address of the traffic going to the LAN SMTP server from the LAN users. This way the LAN SMTP server replies to the ZyWALL and the ZyWALL applies NAT.

Figure 186 NAT Loopback Policy Route
ZYXEL ZYWALL USG 2000 - NAT Loopback Policy Route - 2

flowchart
graph TD
    A["NAT"] -->|Source 192.168.1.1| B["LAN"]
    A -->|Source 192.168.1.89| C["Router"]
    B -->|192.168.1.21| C
    C -->|192.168.1.89| D["Computer"]

Click Network > Routing > Policy Route > Add and create the policy route as shown next. Be careful of where you create the route as routes are ordered in descending priority. This policy route applies source NAT to traffic sent from LAN to the SMTP server.

Figure 187 Create a Policy Route
ZYXEL ZYWALL USG 2000 - NAT Loopback Policy Route - 3

text_image Configuration Enable Description NAT_Loopback_EG (Optional) Criteria User any Incoming Interface / any Change... Source Address LAN_SUBNET Destination Address LAN_SMTP Schedule none Service SMTP Next-Hop Type Interface Interface ge1 Address Translation Source Network Address Translation outgoing-interface Port Triggering # Incoming Service Trigger Service Bandwidth Shaping Maximum Bandwidth 0 Kbps Bandwidth Priority (1-7, 1 is highest priority) Maximize Bandwidth Usage OK Cancel

Now the LAN SMTP server replies to the ZyWALL's LAN IP address and the ZyWALL changes the source address to 1.1.1.1 before sending it to the LAN user's computer. The source in the return traffic matches the original destination address (1.1.1.1) and the LAN user can use the LAN SMTP server.

Figure 188 NAT Loopback Successful
ZYXEL ZYWALL USG 2000 - NAT Loopback Policy Route - 4

flowchart
graph TD
    A["NAT"] -->|Source 192.168.1.21| B["LAN"]
    A -->|Source 1.1.1| C["Server"]
    B -->|192.168.1.21| D["Router"]
    C -->|192.168.1.89| E["Computer"]

HTTP Redirect

17.1 Overview

HTTP redirect forwards the client's HTTP request (except HTTP traffic destined for the ZyWALL) to a web proxy server. In the following example, proxy server A is connected to the DMZ interface. When a client connected to the LAN zone wants to open a web page, its HTTP request is redirected to proxy server A first. If proxy server A cannot find the web page in its cache, a policy route allows it to access the Internet to get them from a server. Proxy server A then forwards the response to the client.

Figure 189 HTTP Redirect Example
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph TD
    subgraph LAN1
        A["LAN1"] --> B["lan1"]
        C["Computer"] --> B
    end
    subgraph WAN
        D["Internet"] --> E["LAN1"]
        F["LAN1"] --> G["LAN1"]
        H["LAN1"] --> I["LAN1"]
    end
    subgraph DMZ
        J["DMZ"] --> K["A"]
        L["DMZ"] --> M["dmz"]
    end
    B --> I
    I --> J
    style LAN1 fill:#FFD700,stroke:#333
    style WAN fill:#B2C4A2,stroke:#333
    style DMZ fill:#B2C4A2,stroke:#333
    style LAN1 fill:#FFD700,stroke:#333
    style WAN fill:#B2C4A2,stroke:#333
    style DMZ fill:#B2C4A2,stroke:#333

17.1.1 What You Can Do in the HTTP Redirect Screens

Use the HTTP Redirect screens (see Section 17.2 on page 303) to display and edit the HTTP redirect rules.

17.1.2 What You Need to Know About HTTP Redirect

Web Proxy Server

A proxy server helps client devices make indirect requests to access the Internet or outside network resources/services. A proxy server can act as a firewall or an ALG (application layer gateway) between the private network and the Internet or other networks. It also keeps hackers from knowing internal IP addresses.

A client connects to a web proxy server each time he/she wants to access the Internet. The web proxy provides caching service to allow quick access and reduce network usage. The proxy checks its local cache for the requested web resource first. If it is not found, the proxy gets it from the specified server and forwards the response to the client.

HTTP Redirect, Firewall and Policy Route

With HTTP redirect, the relevant packet flow for HTTP traffic is:

1 Firewall
2 Application Patrol
3 HTTP Redirect
4 Policy Route

Even if you set a policy route to the same incoming interface and service as a HTTP redirect rule, the ZyWALL checks the HTTP redirect rules first and forwards HTTP traffic to a proxy server if matched. You need to make sure there is no firewall rule(s) blocking the HTTP requests from the client to the proxy server.

You also need to manually configure a policy route to forward the HTTP traffic from the proxy server to the Internet. To make the example in Figure 189 on page 301 work, make sure you have the following settings.

For HTTP traffic between ge1 and ge4:

  • a from LAN to WAN through-ZyWALL rule (default) to allow HTTP request from ge1 to ge4. Responses to this request are allowed automatically.
  • a application patrol rule to allow HTTP traffic between ge1 and ge4.
  • a HTTP redirect rule to forward HTTP traffic from ge1 to proxy server A.

For HTTP traffic between ge4 and ge2:

- a from DMZ to WAN through-ZyWALL rule (default) to allow HTTP request from ge4 to ge2. Responses to this request are allowed automatically.

  • a application patrol rule to allow HTTP traffic between ge4 and ge2.
  • a policy route to forward HTTP traffic from proxy server A to the Internet.

Finding Out More

See Section 5.4.20 on page 114 for related information on these screens.

17.2 The HTTP Redirect Screen

To configure redirection of a HTTP request to a proxy server, click Network > HTTP Redirect. This screen displays the summary of the HTTP redirect rules.

Note: You can configure up to one HTTP redirect rule for each (incoming) interface.

Figure 190 Network > HTTP Redirect
ZYXEL ZYWALL USG 2000 - The HTTP Redirect Screen - 1

text_image Configuration Name Interface Proxy Server Port HTTP-Redirect_example ge1 192.168.1.7 80 Apply Reset

The following table describes the labels in this screen.

Table 90 Network > HTTP Redirect

LABELDESCRIPTION
NameThis is the descriptive name (up to 31 printable characters) of a rule.
InterfaceThis is the interface on which the request must be received.
Proxy ServerThis is the IP address of the proxy server.
PortThis is the service port number used by the proxy server.
Add iconClick the Add icon in the heading row to add a new entry.The Active icon displays whether the rule is enabled or not. Click the Active icon to activate or deactivate the rule. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the rule on the ZyWALL.Click the Remove icon to delete an existing rule from the ZyWALL. A window displays asking you to confirm that you want to delete the rule.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

17.2.1 The HTTP Redirect Edit Screen

Click Network > HTTP Redirect to open the HTTP Redirect screen. Then click the Add or Edit icon to open the HTTP Redirect Edit screen where you can configure the rule.

Figure 191 Network > HTTP Redirect > Edit
ZYXEL ZYWALL USG 2000 - The HTTP Redirect Edit Screen - 1

text_image Enable Name Interface ge1 Proxy server 0.0.0.0 Port OK Cancel

The following table describes the labels in this screen.

Table 91 Network > HTTP Redirect > Edit

LABELDESCRIPTION
EnableUse this option to turn the HTTP redirect rule on or off.
NameEnter a name to identify this rule. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
InterfaceSelect the interface on which the HTTP request must be received for the ZyWALL to forward it to the specified proxy server.
Proxy ServerEnter the IP address of the proxy server.
PortEnter the port number that the proxy server uses.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

18.1 ALG Overview

Application Layer Gateway (ALG) allows the following applications to operate properly through the ZyWALL's NAT.

  • FTP - File Transfer Protocol (FTP) is an Internet file transfer service.
  • SIP - Session Initiation Protocol (SIP) is an application-layer protocol that can be used to create voice and multimedia sessions over Internet.
  • H.323 - This is a teleconferencing protocol suite that provides audio, data and video conferencing.

The following example shows SIP signaling (1) and audio (2) sessions between SIP clients A and B and the SIP server.

Figure 192 SIP ALG Example
ZYXEL ZYWALL USG 2000 - ALG Overview - 1

flowchart
graph TD
    A["Client A"] --> B["Server"]
    B --> C["Internet Cloud"]
    C --> D["Client B"]
    D --> E["Client B"]
    style C fill:#cccccc,stroke:#333
    style D fill:#ffffff,stroke:#333

The ZyWALL only needs to use the ALG feature for traffic that goes through the ZyWALL's NAT.

18.1.1 What You Can Do in the ALG Screen

Use the ALG screen (Section 18.2 on page 308) to set up SIP, H.323, and FTP ALG settings.

18.1.2 What You Need to Know About ALG

Application Layer Gateway (ALG), NAT and Firewall

The ZyWALL can function as an Application Layer Gateway (ALG) to allow certain NAT un-friendly applications (such as SIP) to operate properly through the ZyWALL's NAT and firewall. The ZyWALL dynamically creates an implicit NAT session and firewall session for the application's traffic from the WAN to the LAN. The ALG on the ZyWALL supports all of the ZyWALL's NAT mapping types.

FTP ALG

The FTP ALG allows TCP packets with a specified port destination to pass through. If the FTP server is located on the LAN, you must also configure NAT port forwarding and firewall rules if you want to allow access to the server from the WAN.

H.323 ALG

• The H.323 ALG supports peer-to-peer H.323 calls.
- The H.323 ALG handles H.323 calls that go through NAT or that the ZyWALL routes. You can also make other H.323 calls that do not go through NAT or routing. Examples would be calls between LAN IP addresses that are on the same subnet.
- The H.323 ALG allows calls to go out through NAT. For example, you could make a call from a private IP address on the LAN to a peer device on the WAN.
- The H.323 ALG operates on TCP packets with a specified port destination.
- The ZyWALL allows H.323 audio connections.
- The ZyWALL can also apply bandwidth management to traffic that goes through the H.323 ALG.

The following example shows H.323 signaling (1) and audio (2) sessions between H.323 devices A and B.

Figure 193 H.323 ALG Example
ZYXEL ZYWALL USG 2000 - H.323 ALG - 1

flowchart
graph LR
    A["Phone A"] --> R["Router"]
    R --> 1["Internet"]
    1 --> 2["Router"]
    2 --> 1
    1 --> B["Phone B"]

SIP ALG

- SIP clients can be connected to the LAN or DMZ. A SIP server must be on the WAN.

  • Using the SIP ALG allows you to use bandwidth management on SIP traffic.
  • The SIP ALG handles SIP calls that go through NAT or that the ZyWALL routes. You can also make other SIP calls that do not go through NAT or routing. Examples would be calls between LAN IP addresses that are on the same subnet.
  • The SIP ALG supports peer-to-peer SIP calls. The firewall (by default) allows peer to peer calls from the LAN zone to go to the WAN zone and blocks peer to peer calls from the WAN zone to the LAN zone.
  • The SIP ALG allows UDP packets with a specified port destination to pass through.
  • The ZyWALL allows SIP audio connections.
  • You do not need to use STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) for VoIP devices behind the ZyWALL when you enable the SIP ALG.

Peer-to-Peer Calls and the ZyWALL

The ZyWALL ALG can allow peer-to-peer VoIP calls for both H.323 and SIP. You must configure the firewall and virtual server (port forwarding) to allow incoming (peer-to-peer) calls from the WAN to a private IP address on the LAN (or DMZ).

VoIP Calls from the WAN with Multiple Outgoing Calls

When you configure the firewall and virtual server (port forwarding) to allow calls from the WAN to a specific IP address on the LAN, you can also use policy routing to have H.323 (or SIP) calls from other LAN or DMZ IP addresses go out through a different WAN IP address. The policy routing lets the ZyWALL correctly forward the return traffic for the calls initiated from the LAN IP addresses.

For example, you configure the firewall and virtual server to allow LAN IP address A to receive calls from the Internet through WAN IP address 1. You also use a policy route to have LAN IP address A make calls out through WAN IP address 1. Configure another policy route to have H.323 (or SIP) calls from LAN IP addresses B and C go out through WAN IP address 2. Even though only LAN IP address A can receive incoming calls from the Internet, LAN IP addresses B and C can still make calls out to the Internet.

Figure 194 VoIP Calls from the WAN with Multiple Outgoing Calls
ZYXEL ZYWALL USG 2000 - VoIP Calls from the WAN with Multiple Outgoing Calls - 1

flowchart
graph LR
    A["Phone A"] <--> R["Router"]
    B["Phone B"] <--> R
    C["Phone C"] <--> R
    R --> 1["Internet"]
    R --> 2["Internet"]

VoIP with Multiple WAN IP Addresses

With multiple WAN IP addresses on the ZyWALL, you can configure different firewall and virtual server (port forwarding) rules to allow incoming calls from each WAN IP address to go to a specific IP address on the LAN (or DMZ). Use policy routing to have the H.323 (or SIP) calls from each of those LAN or DMZ IP addresses go out through the same WAN IP address that calls come in on. The policy routing lets the ZyWALL correctly forward the return traffic for the calls initiated from the LAN IP addresses.

For example, you configure firewall and virtual server rules to allow LAN IP address A to receive calls through public WAN IP address 1. You configure different firewall and port forwarding rules to allow LAN IP address B to receive calls through public WAN IP address 2. You configure corresponding policy routes to have calls from LAN IP address A go out through WAN IP address 1 and calls from LAN IP address B go out through WAN IP address 2.

Figure 195 VoIP with Multiple WAN IP Addresses
ZYXEL ZYWALL USG 2000 - VoIP with Multiple WAN IP Addresses - 1

flowchart
graph LR
    A["Phone A"] <--> Server
    B["Phone B"] <--> Server
    Server -->|1| Internet
    Server -->|2| Internet

Finding Out More

• See Section 5.4.21 on page 115 for related information on these screens.
- See Section 6.6 on page 138 for a tutorial showing how to use the ALG for peer-to-peer H.323 traffic.
• See Section 18.3 on page 310 for ALG background/technical information.

18.1.3 Before You Begin

Configure and enable NAT in the ZyWALL before you use the ALG.

18.2 The ALG Screen

Click Network > ALG to open the ALG screen. Use this screen to turn ALGs off or on, configure the port numbers to which they apply, and configure SIP ALG time outs.

Note: If the ZyWALL provides an ALG for a service, you must enable the ALG in order to perform bandwidth management on that service's traffic.

Figure 196 Network > ALG
ZYXEL ZYWALL USG 2000 - The ALG Screen - 1

text_image SIP Setting Enable SIP Transformations SIP Media inactivity time out : 120 (seconds) SIP Signaling inactivity time out : 1800 (seconds) SIP Signaling Port : 5060 H.323 Setting Enable H.323 Transformations H.323 Signaling Port : 1720 (1025-65535) Additional H.323 Signaling port for transformations :(Optional) (1025-65535) FTP Setting Enable FTP Transformations FTP Signaling Port : 21 (1-65535) Additional FTP Signaling port for transformations :(Optional) (1-65535) Apply Reset

The following table describes the labels in this screen.

Table 92 Network > ALG

LABELDESCRIPTION
SIP Setting
Enable SIP TransformationsTurn on the SIP ALG to allow SIP sessions to pass through the ZyWALL. SIP is a signaling protocol used in VoIP (Voice over IP), the sending of voice signals over Internet Protocol. Enabling the SIP ALG allows you to use bandwidth management on SIP traffic.
SIP Media inactivity time outUse this field to set how many seconds (1~86400) the ZyWALL will allow a SIP session to remain idle (without voice traffic) before dropping it.If no voice packets go through the SIP ALG before the timeout period expires, the ZyWALL deletes the audio session. You cannot hear anything and you will need to make a new call to continue your conversation.
SIP Signaling inactivity time outMost SIP clients have an “expire” mechanism indicating the lifetime of signaling sessions. The SIP user agent sends registration packets to the SIP server periodically and keeps the session alive in the ZyWALL.If the SIP client does not have this mechanism and makes no calls during the ZyWALL SIP timeout, the ZyWALL deletes the signaling session after the timeout period. Enter the SIP signaling session timeout value (1~86400).
SIP Signaling PortIf you are using a custom UDP port number (not 5060) for SIP traffic, enter it here.Configuring port numbers for SIP traffic here also configures the application patrol feature to use the same port numbers for SIP traffic.Click the Add icon to add another custom UDP port number for SIP traffic. You can have a total of up to eight.Click the Remove icon to delete a custom UDP port number for SIP traffic.
H.323 Setting
Enable H.323 transformationsTurn on the H.323 ALG to allow H.323 sessions (used for audio communications) to pass through the ZyWALL. Enabling the H.323 ALG allows you to use bandwidth management on H.323 traffic.
H.323 Signaling PortIf you are using a custom TCP port number (not 1720) for H.323 traffic, enter it here.
Additional H.323 Signaling port for transformationsIf you are also using H.323 on an additional TCP port number, enter it here.
FTP Setting
Enable FTP TransformationsTurn on the FTP ALG to allow FTP sessions to pass through the ZyWALL. FTP (File Transfer Program) enables fast transfer of files, including large files that may not be possible by e-mail.Using the FTP ALG allows you to use bandwidth management on FTP traffic.
FTP Signaling PortIf you are using a custom TCP port number (not 21) for FTP traffic, enter it here.
Additional FTP Signaling port for transformationsIf you are also using FTP on an additional TCP port number, enter it here.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

18.3 ALG Technical Reference

Here is more detailed information about the Application Layer Gateway.

ALG

Some applications cannot operate through NAT (are NAT un-friendly) because they embed IP addresses and port numbers in their packets' data payload. The ZyWALL examines and uses IP address and port number information embedded in the VoIP traffic's data stream. When a device behind the ZyWALL uses an application for which the ZyWALL has VoIP pass through enabled, the ZyWALL translates the device's private IP address inside the data stream to a public IP address. It also records session port numbers and allows the related sessions to go through the firewall so the application's traffic can come in from the WAN to the LAN.

ALG and Trunks

If you send your ALG-managed traffic through an interface trunk and all of the interfaces are set to active, you can configure routing policies to specify which interface the ALG-managed traffic uses.

You could also have a trunk with one interface set to active and a second interface set to passive. The ZyWALL does not automatically change ALG-managed connections to the second (passive) interface when the active interface's connection goes down. When the active interface's connection fails, the client needs to re-initialize the connection through the second interface (that was set to passive) in order to have the connection go through the second interface. VoIP clients usually re-register automatically at set intervals or the users can manually force them to re-register.

FTP

File Transfer Protocol (FTP) is an Internet file transfer service that operates on the Internet and over TCP/IP networks. A system running the FTP server accepts commands from a system running an FTP client. The service allows users to send commands to the server for uploading and downloading files.

H.323

H.323 is a standard teleconferencing protocol suite that provides audio, data and video conferencing. It allows for real-time point-to-point and multipoint communication between client computers over a packet-based network that does not provide a guaranteed quality of service. NetMeeting uses H.323.

SIP

The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol that handles the setting up, altering and tearing down of voice and

multimedia sessions over the Internet. SIP is used in VoIP (Voice over IP), the sending of voice signals over the Internet Protocol.

SIP signaling is separate from the media for which it handles sessions. The media that is exchanged during the session can use a different path from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched telephone networks.

RTP

When you make a VoIP call using H.323 or SIP, the RTP (Real time Transport Protocol) is used to handle voice data transfer. See RFC 1889 for details on RTP.

IP/MAC Binding

19.1 IP/MAC Binding Overview

IP address to MAC address binding helps ensure that only the intended devices get to use privileged IP addresses. The ZyWALL uses DHCP to assign IP addresses and records to MAC address it assigned each IP address. The ZyWALL then checks incoming connection attempts against this list. A user cannot manually assign another IP to his computer and use it to connect to the ZyWALL.

Suppose you configure access privileges for IP address 192.168.1.27 and use static DHCP to assign it to Tim's computer's MAC address of 12:34:56:78:90:AB. IP/MAC binding drops traffic from any computer trying to use IP address 192.168.1.27 with another MAC address.

Figure 197 IP/MAC Binding Example
ZYXEL ZYWALL USG 2000 - IP/MAC Binding Overview - 1

flowchart
graph TD
    Bob["Bob"] -->|MAC: 12:34:56:78:90:AB\nIP: 192.168.1.27| Router["Router"]
    Jim["Jim"] -->|MAC: AB:CD:EF:12:34:56\nIP: 192.168.1.27| Router

19.1.1 What You Can Do in the IP/MAC Binding Screens

  • Use the Summary and Edit screens (Section 19.2 on page 314) to bind IP addresses to MAC addresses.
  • Use the Exempt List screen (Section 19.3 on page 317) to configure ranges of IP addresses to which the ZyWALL does not apply IP/MAC binding.
  • The Monitor screen (Section 19.4 on page 317) lists the devices that have received an IP address from ZyWALL interfaces with IP/MAC binding enabled.

19.1.2 What You Need to Know About IP/MAC Binding

DHCP

IP/MAC address bindings are based on the ZyWALL's dynamic and static DHCP entries.

Interfaces Used With IP/MAC Binding

IP/MAC address bindings are grouped by interface. You can use IP/MAC binding with Ethernet, bridge, VLAN, and WLAN interfaces. You can also enable or disable IP/MAC binding and logging in an interface's configuration screen.

19.2 IP/MAC Binding Summary

Click Network > IP/MAC Binding to open the IP/MAC Binding Summary screen. This screen lists the total number of IP to MAC address bindings for devices connected to each supported interface.

Figure 198 Network > IP/MAC Binding > Summary

#InterfaceNumber of BindingModify
1ge11
2ge20
3ge30
4ge40
5ge50
Apply

The following table describes the labels in this screen.

Table 93 Network > IP/MAC Binding > Summary

LABELDESCRIPTION
#This is the index number of the interface.
InterfaceThis is the name of an interface that supports IP/MAC binding.
Number of BindingModifyThis field displays the interface's total number of IP/MAC bindings and IP addresses that the interface has assigned by DHCP.The Active icon displays whether or not IP/MAC binding is enabled for an interface. Click it to activate or deactivate IP/MAC binding on an interface. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit an interface's IP/MAC binding settings.
ApplyClick Apply to save your changes back to the ZyWALL.

19.2.1 IP/MAC Binding Edit

Click Network > IP/MAC Binding > Edit to open the IP/MAC Binding Edit screen. Use this screen to configure an interface's IP to MAC address binding settings.

Figure 199 Network > IP/MAC Binding > Edit
ZYXEL ZYWALL USG 2000 - IP/MAC Binding Edit - 1

text_image IP/MAC Binding Settings Interface Name: ge4 192.168.2.1/255.255.255.0 Enable IP/MAC Binding Enable Logs for IP/MAC Binding Violation Static DHCP Bindings

IP Address MAC Address Description

1 192.168.2.30 00:0F:FE:1D:4B:E0 example OK Cancel

The following table describes the labels in this screen.

Table 94 Network > IP/MAC Binding > Edit

LABELDESCRIPTION
IP/MACBindingSettings
Interface NameThis field displays the name of the interface within the ZyWALL and the interface's IP address and subnet mask.
Enable IP/MACBindingSelect this option to have this interface enforce links between specific IP addresses and specific MAC addresses. This stops anyone else from manually using a bound IP address on another device connected to this interface. Use this to make use only the intended users get to use specific IP addresses.
Enable Logs for IP/MACBindingViolationSelect this option to have the ZyWALL generate a log if a device connected to this interface attempts to use an IP address not assigned by the ZyWALL.
Static DHCP Bindings#This table lists the bound IP and MAC addresses. The ZyWALL checks this table when it assigns IP addresses. If the computer's MAC address is in the table, the ZyWALL assigns the corresponding IP address. You can also access this table from the interface's edit screen.This is the index number of the static DHCP entry.
IP AddressThis is the IP address that the ZyWALL assigns to a device with the entry's MAC address.
MAC AddressThis is the MAC address of the device to which the ZyWALL assigns the entry's IP address.
DescriptionThis helps identify the entry.
Add iconClick the Add icon to add a new entry.Click the Edit icon to go to the screen where you can edit the entry.Click the Remove icon to delete an entry. A window displays asking you to confirm that you want to delete it.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

19.2.2 Static DHCP Edit

Click Network > IP/MAC Binding > Edit to open the IP/MAC Binding Edit screen. Click the Add or Edit icon to open the following screen. Use this screen to configure an interface's IP to MAC address binding settings.

Figure 200 Network > IP/MAC Binding > Edit > Add
ZYXEL ZYWALL USG 2000 - Static DHCP Edit - 1

text_image Static DHCP Edit Interface Name: ge2 IP Address MAC Address Description 172.23.37.111/255.255.255.0 (Optional) OK Cancel

The following table describes the labels in this screen.

Table 95 Network > IP/MAC Binding > Edit > Add

LABELDESCRIPTION
Interface NameThis field displays the name of the interface within the ZyWALL and the interface's IP address and subnet mask.
IP AddressEnter the IP address that the ZyWALL is to assign to a device with the entry's MAC address.
MAC AddressEnter the MAC address of the device to which the ZyWALL assigns the entry's IP address.
DescriptionOKEnter up to 64 printable ASCII characters to help identify the entry. For example, you may want to list the computer's owner.Click OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving.

19.3 IP/MAC Binding Exempt List

Click Network > IP/MAC Binding > Exempt List to open the IP/MAC Binding Exempt List screen. Use this screen to configure ranges of IP addresses to which the ZyWALL does not apply IP/MAC binding.

Figure 201 Network > IP/MAC Binding > Exempt List
ZYXEL ZYWALL USG 2000 - IP/MAC Binding Exempt List - 1

text_image Summary Exempt List Monitor IP/MAC Binding Exempt List

Name Start IP End IP

1.example-list 192.168.2.12 192.168.2.25 Apply

The following table describes the labels in this screen.

Table 96 Network > IP/MAC Binding > Exempt List

LABELDESCRIPTION
#This is the index number of the IP/MAC binding list entry.
NameEnter a name to help identify this entry.
Start IPEnter the first IP address in a range of IP addresses for which the ZyWALL does not apply IP/MAC binding.
End IPEnter the last IP address in a range of IP addresses for which the ZyWALL does not apply IP/MAC binding.
Add iconClick the Add icon to add a new entry.Click the Remove icon to delete an entry. A window displays asking you to confirm that you want to delete it.
ApplyClick Apply to save your changes back to the ZyWALL.

19.4 IP/MAC Binding Monitor

Click Network > IP/MAC Binding > Monitor to open the IP/MAC Binding Monitor screen. This screen lists the devices that have received an IP address from ZyWALL interfaces with IP/MAC binding enabled and have ever established a

session with the ZyWALL. Devices that have never established a session with the ZyWALL do not display in the list.

Figure 202 Network > IP/MAC Binding > Monitor
ZYXEL ZYWALL USG 2000 - IP/MAC Binding Monitor - 1

text_image Summary Exempt List Monitor Monitor Table Interface ge1

IP Address Host Name MAC Address Last Access

1 192.168.1.33 1746 00:0F:FE:1E:4A:E0 Wed Aug 20 07:21:55 2008 Refresh

The following table describes the labels in this screen.

Table 97 Network > IP/MAC Binding > Monitor

LABELDESCRIPTION
InterfaceSelect a ZyWALL interface that has IP/MAC binding enabled to show to which devices it has assigned an IP address.
#This is the index number of an IP/MAC binding entry.
IP AddressThis is the IP address that the ZyWALL assigned to a device.
Host NameThis field displays the name used to identify this device on the network (the computer name). The ZyWALL learns these from the DHCP client requests.
MAC AddressThis field displays the MAC address to which the IP address is currently assigned.
Last AccessThis is when the device last established a session with the ZyWALL through this interface.
RefreshClick this button to update the information in the screen.

PART III Firewall

Firewall (321)

20.1 Overview

Use the firewall to block or allow services that use static port numbers. Use application patrol (see Chapter 28 on page 445) to control services using flexible/dynamic port numbers.

This figure shows the ZyWALL's default firewall rules in action and demonstrates how stateful inspection works. User 1 can initiate a Telnet session from within the LAN zone and responses to this request are allowed. However, other Telnet traffic initiated from the WAN or DMZ zone and destined for the LAN zone is blocked. Communications between the WAN and the DMZ zones are allowed. The firewall allows VPN traffic between any of the networks.

Figure 203 Default Firewall Action
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph TD
    subgraph LAN1
        A["Computer 1"] --> B["Fire"]
        C["Computer 1"] --> D["Fire"]
        E["Computer 1"] --> F["Fire"]
        G["Computer 1"] --> H["Fire"]
    end

    subgraph WAN
        I["Internet"] --> J["Computer 1"]
        K["Internet"] --> L["Computer 1"]
        M["Internet"] --> N["Computer 1"]
        O["Internet"] --> P["Computer 1"]
    end

    subgraph DMZ
        Q["Computer 1"] --> R["Switch"]
        S["Computer 1"] --> R
        T["Computer 1"] --> R
        U["Computer 1"] --> R
        V["Computer 1"] --> R
        W["Computer 1"] --> R
    end

    LAN1 <--> WAN
    LAN1 <--> DMZ
    LAN1 <--> WAN
    LAN1 <--> DMZ
    LAN1 <--> WAN
    LAN1 <--> DMZ
    LAN1 <--> WAN
    LAN1 <--> DMZ
    LAN1 <--> WAN
    LAN1 <--> DMZ
    LAN1 <--> WAN
    LAN1 <--> DMZ

20.1.1 What You Can Do in the Firewall Screens

- Use the Firewall screen (Section 20.2 on page 328) to enable or disable the firewall and asymmetrical routes, set a maximum number of sessions per host, and display the configured firewall rules.

- Use the Session Limit screens (see Section 20.3 on page 334) to limit the number of concurrent NAT/firewall sessions a client can use.

20.1.2 What You Need to Know About the Firewall

Stateful Inspection

The ZyWALL has a stateful inspection firewall. The ZyWALL restricts access by screening data packets against defined access rules. It also inspects sessions. For example, traffic from one zone is not allowed unless it is initiated by a computer in another zone first.

Zones

A zone is a group of interfaces or VPN tunnels. Group the ZyWALL's interfaces into different zones based on your needs. You can configure firewall rules for data passing between zones or even between interfaces and/or VPN tunnels in a zone.

Default Firewall Behavior

Firewall rules are grouped based on the direction of travel of packets to which they apply. Here are the default firewall behavior for traffic going through the ZyWALL.

Table 98 Default Firewall Rules

FROM ZONE TO ZONESTATEFUL PACKET INSPECTION
From ANY to ANYTraffic that does not match any firewall rule is allowed. This includes traffic to or from interfaces or VPN tunnels that are not assigned to any zone (extra-zone traffic).
From WAN to LANTraffic from the WAN to the LAN is denied.
From WAN to ZyWALLTraffic from the WAN to the ZyWALL itself is denied except for the traffic types described in To-ZyWALL Rules on page 322.
From DMZ to LANTraffic from the DMZ to the LAN is denied.
From DMZ to ZyWALLTraffic from the DMZ to the ZyWALL itself is denied except for the traffic types described in To-ZyWALL Rules on page 322.

To-ZyWALL Rules

Rules with ZyWALL as the To Zone apply to traffic going to the ZyWALL itself. By default:

  • The firewall allows only LAN computers to access or manage the ZyWALL.
  • The ZyWALL drops most packets from the WAN zone to the ZyWALL itself, except for VRRP traffic for Device HA and ESP/AH/IKE/NATT/HTTPS services for VPN tunnels, and generates a log.

- The ZyWALL drops most packets from the DMZ zone to the ZyWALL itself, except for DNS and NetBIOS traffic, and generates a log.

When you configure a firewall rule for packets destined for the ZyWALL itself, make sure it does not conflict with your service control rule. See Chapter 45 on page 697 for more information about service control (remote management). The ZyWALL checks the firewall rules before the service control rules for traffic destined for the ZyWALL.

You can configure a To-ZyWALL firewall rule (with From Any To ZyWALL direction) for traffic from an interface which is not in a zone.

Global Firewall Rules

Firewall rules with from any and/or to any as the packet direction are called global firewall rules. The global firewall rules are the only firewall rules that apply to an interface or VPN tunnel that is not included in a zone. The from any rules apply to traffic coming from the interface and the to any rules apply to traffic going to the interface.

Firewall Rule Criteria

The ZyWALL checks the schedule, user name (user's login name on the ZyWALL), source IP address, destination IP address and IP protocol type of network traffic against the firewall rules (in the order you list them). When the traffic matches a rule, the ZyWALL takes the action specified in the rule.

User Specific Firewall Rules

You can specify users or user groups in firewall rules. For example, to allow a specific user from any computer to access a zone by logging in to the ZyWALL, you can set up a rule based on the user name only. If you also apply a schedule to the firewall rule, the user can only access the network at the scheduled time. A user-aware firewall rule is activated whenever the user logs in to the ZyWALL and will be disabled after the user logs out of the ZyWALL.

Firewall and Application Patrol

To use a service, make sure both the firewall and application patrol allow the service's packets to go through the ZyWALL. The ZyWALL checks the firewall rules before the application patrol rules for traffic going through the ZyWALL.

Firewall and VPN Traffic

After you create a VPN tunnel and add it to a zone, you can set the firewall rules applied to VPN traffic. If you add a VPN tunnel to an existing zone (the LAN zone for example), you can configure a new LAN to LAN firewall rule or use intra-zone

traffic blocking to allow or block VPN traffic transmitting between the VPN tunnel and other interfaces in the LAN zone. If you add the VPN tunnel to a new zone (the VPN zone for example), you can configure rules for VPN traffic between the VPN zone and other zones or From VPN To-ZyWALL rules for VPN traffic destined for the ZyWALL.

Finding Out More

  • See Section 5.4.12 on page 110 for related information on the Firewall screens.
  • See Section 6.4.6 on page 134 for an example of creating firewall rules as part of configuring user-aware access control (Section 6.4 on page 128).
  • See Section 6.6.3 on page 140 for an example of creating a firewall rule to allow H.323 traffic from the WAN to the LAN.

20.1.3 Firewall Rule Example Applications

Suppose that your company decides to block all of the LAN users from using IRC (Internet Relay Chat) through the Internet. To do this, you would configure a LAN to WAN firewall rule that blocks IRC traffic from any source IP address from going to any destination address. You do not need to specify a schedule since you need the firewall rule to always be in effect. The following figure shows the results of this rule.

Figure 204 Blocking All LAN to WAN IRC Traffic Example
ZYXEL ZYWALL USG 2000 - Firewall Rule Example Applications - 1

flowchart
graph LR
    A["LAN"] --> B["LAN"]
    A --> C["LAN"]
    A --> D["LAN"]
    A --> E["LAN"]
    B --> F["LAN"]
    C --> G["LAN"]
    D --> H["LAN"]
    E --> I["LAN"]
    F --> J["WAN"]
    G --> J
    H --> J
    I --> J
    J --> K["IRC"]
    J --> L["INTERNET"]

Your firewall would have the following configuration.

Table 99 Blocking All LAN to WAN IRC Traffic Example

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1AnyAnyAnyAnyIRCDeny
DefaultAnyAnyAnyAnyAnyAllow
  • The first row blocks LAN access to the IRC service on the WAN.
  • The second row is the firewall's default policy that allows all traffic from the LAN to go to the WAN.

The ZyWALL applies the firewall rules in order. So for this example, when the ZyWALL receives traffic from LAN, it checks it against the first rule. If the traffic matches (if it is IRC traffic) the firewall takes the action in the rule (drop) and stops checking the firewall rules. Any traffic that does not match the first firewall rule will match the default rule and the ZyWALL forwards it.

Now suppose that your company wants to let the CEO use IRC. You can configure a LAN to WAN firewall rule that allows IRC traffic from the IP address of the CEO's computer. You can also configure a LAN to WAN rule that allows IRC traffic from any computer through which the CEO logs into the ZyWALL with his/her user name. In order to make sure that the CEO's computer always uses the same IP address, make sure it either:

- Has a static IP address,

or

- You configure a static DHCP entry for it so the ZyWALL always assigns it the same IP address (see DHCP Settings on page 236 for information on DHCP).

Now you configure a LAN to WAN firewall rule that allows IRC traffic from the IP address of the CEO's computer (192.168.1.7 for example) to go to any destination address. You do not need to specify a schedule since you want the firewall rule to always be in effect. The following figure shows the results of your two custom rules.

Figure 205 Limited LAN to WAN IRC Traffic Example
ZYXEL ZYWALL USG 2000 - Firewall Rule Example Applications - 2

flowchart
graph TD
    A["LAN 192.168.1.7"] --> B["CEO"]
    A --> C["Client 1"]
    A --> D["Client 2"]
    A --> E["Client 3"]
    A --> F["Client 4"]
    B --> G["WAN"]
    C --> G
    D --> G
    E --> G
    F --> G
    G --> H["IRC"]
    G --> I["INTERNET"]

Your firewall would have the following configuration.

Table 100 Limited LAN to WAN IRC Traffic Example 1

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1Any192.168.1.7AnyAnyIRCAllow
2AnyAnyAnyAnyIRCDeny
DefaultAnyAnyAnyAnyAnyAllow
  • The first row allows the LAN computer at IP address 192.168.1.7 to access the IRC service on the WAN.
  • The second row blocks LAN access to the IRC service on the WAN.
  • The third row is (still) the firewall's default policy of allowing all traffic from the LAN to go to the WAN.

Alternatively, you configure a LAN to WAN rule with the CEO's user name (say CEO) to allow IRC traffic from any source IP address to go to any destination address.

Your firewall would have the following configuration.

Table 101 Limited LAN to WAN IRC Traffic Example 2

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1CEOAnyAnyAnyIRCAllow
2AnyAnyAnyAnyIRCDeny
DefaultAnyAnyAnyAnyAnyAllow
  • The first row allows any LAN computer to access the IRC service on the WAN by logging into the ZyWALL with the CEO's user name.
  • The second row blocks LAN access to the IRC service on the WAN.
  • The third row is (still) the firewall's default policy of allowing all traffic from the LAN to go to the WAN.

The rule for the CEO must come before the rule that blocks all LAN to WAN IRC traffic. If the rule that blocks all LAN to WAN IRC traffic came first, the CEO's IRC traffic would match that rule and the ZyWALL would drop it and not check any other firewall rules.

20.1.4 Firewall Rule Configuration Example

The following Internet firewall rule example allows a hypothetical MyService from the WAN to IP addresses 192.168.1.10 through 192.168.1.15 (Dest_1) on the LAN.

1 Click Firewall. Click the Add icon (⊕) in the heading row to configure a new first entry. Remember the sequence (priority) of the rules is important since they are applied in order.

Figure 206 Firewall Example: Select the Traffic Direction of Travel
ZYXEL ZYWALL USG 2000 - Firewall Rule Configuration Example - 1

text_image Firewall Session Limit Global Setting Enable Firewall Allow Asymmetrical Route Firewall rule From Zone any To Zone any Refresh Total rules: 6 30 entries per page Page: 1 of 1

Priority From To Schedule User Source Destination Service Access Log

1 1 WAN ZyWALL none any any any Default_Allow_WAN_To_ZyWALL allow no 2 2 WAN ZyWALL none any any any any deny no 3 3 WAN LAN none any any any any deny log 4 4 DMZ LAN none any any any any deny no 5 5 DMZ ZyWALL none any any any Default_Allow_DMZ_To_ZyWALL allow no 6 6 DMZ ZyWALL none any any any any deny log - Default any any any any any any any allow no Apply Reset

2 Select Create Object in the Destination drop-down list box.
3 The screen for configuring an address object opens. Configure it as follows and click OK.

Figure 207 Firewall Example: Create an Address Object
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 1

text_image Configuration Name Dest_1 Address Type RANGE Starting IP Address 192.168.1.10 End IP Address 192.168.1.15 OK Cancel

4 Select Create Object in the Service drop-down list box.
5 The screen for configuring a service object opens. Configure it as follows and click OK.

Figure 208 Firewall Example: Create a Service Object
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 2

text_image Configuration Name MyService IP Protocol TCP Starting Port 12345 (1..65535) Ending Port (1..65535) OK Cancel

6 Select From WAN and To LAN.

7 Enter the name of the firewall rule.
8 Make sure Dest_1 is selected for the Destination and MyService is selected as the Service. Enter a description and configure the rest of the screen as follows. Click OK when you are done.

Figure 209 Firewall Example: Edit a Firewall Rule
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 3

text_image Configuration Enable From WAN To LAN Description MyServiceExample (Optional) Schedule none User any Source any Destination Dest_1 Service MyService Access allow Log no OK Cancel

9 The firewall rule appears in the firewall rule summary.

Figure 210 Firewall Example: MyService Example Rule in Summary
ZYXEL ZYWALL USG 2000 - Priority From To Schedule User Source Destination Service Access Log - 4

text_image Firewall Session Limit Global Setting Enable Firewall Allow Asymmetrical Route Firewall rule From Zone any To Zone any Refresh Total rules: 6 30 entries per page Page: 1 of 1

Density Form To Schedule House Source Destination Service Access Log

1 1 WAN ZyWALL none any any any Default_Allow_WAN_To_ZyWALL allow no 2 2 WAN ZyWALL none any any any any deny no 3 3 WAN LAN none any any any any deny log 4 4 DMZ LAN none any any any any deny no 5 5 DMZ ZyWALL none any any any Default_Allow_DMZ_To_ZyWALL allow no 6 6 DMZ ZyWALL none any any any any deny log - Default any any any any any any allow no Apply Reset

20.2 The Firewall Screen

Asymmetrical Routes

If an alternate gateway on the LAN has an IP address in the same subnet as the ZyWALL's LAN IP address, return traffic may not go through the ZyWALL. This is called an asymmetrical or "triangle" route. This causes the ZyWALL to reset the connection, as the connection has not been acknowledged.

You can have the ZyWALL permit the use of asymmetrical route topology on the network (not reset the connection). However, allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without passing through the ZyWALL. A better solution is to use virtual interfaces to put the ZyWALL and the backup gateway on separate subnets. Virtual interfaces allow you to partition your network into logical sections over the same interface. See the chapter about interfaces for more information.

By putting LAN 1 and the alternate gateway (A in the figure) in different subnets, all returning network traffic must pass through the ZyWALL to the LAN. The following steps and figure describe such a scenario.

1 A computer on the LAN initiates a connection by sending a SYN packet to a receiving server on the WAN.
2 The ZyWALL reroutes the packet to gateway A, which is in Subnet 2.
3 The reply from the WAN goes to the ZyWALL.
4 The ZyWALL then sends it to the computer on the LAN in Subnet 1.

Figure 211 Using Virtual Interfaces to Avoid Asymmetrical Routes
ZYXEL ZYWALL USG 2000 - Asymmetrical Routes - 1

flowchart
graph TD
    LAN1["LAN1"] -->|1| Subnet1["Subnet 1"]
    Subnet1 -->|4| LAN1
    LAN1 -->|2| Subnet2["Subnet 2"]
    Subnet2 -->|3| LAN2["LAN 2"]
    LAN2 -->|ISP 1| WAN["WAN"]
    LAN2 -->|ISP 2| LAN3["Internet"]
    LAN1 -->|ISP 1| LAN4["ISP 1"]
    LAN4 -->|ISP 2| LAN5["ISP 2"]

20.2.1 Configuring the Firewall Screen

Click Firewall to open the Firewall screen. Use this screen to enable or disable the firewall and asymmetrical routes, set a maximum number of sessions per host, and display the configured firewall rules. Specify from which zone packets come and to which zone packets travel to display only the rules specific to the selected direction. Note the following.

- If you enable intra-zone traffic blocking (see the chapter about zones), the firewall automatically creates (implicit) rules to deny packet passage between the interfaces in the specified zone.

  • Besides configuring the firewall, you also need to configure virtual servers (NAT port forwarding) to allow computers on the WAN to access LAN devices. See Chapter 16 on page 287 for more information.
  • The ZyWALL applies virtual server (Destination NAT) settings before applying the firewall rules. So for example, if you configure a virtual server that sends WAN traffic to a LAN IP address, when you configure a corresponding firewall rule to allow the traffic, you need to set the LAN IP address as the destination. See Section 6.6 on page 138 for an example.
  • The ordering of your rules is very important as rules are applied in sequence.

Figure 212 Firewall
ZYXEL ZYWALL USG 2000 - Configuring the Firewall Screen - 1

text_image Firewall Session Limit Global Setting Enable Firewall Allow Asymmetrical Route Firewall rule From Zone any To Zone any Refresh Total rules: 6 30 entries per page Page: 1 of 1

Priority From To Schedule User Source Destination Service Access Log

1 1 WAN ZyWALL none any any any Default_Allow_WAN_To_ZyWALL allow no 2 2 WAN ZyWALL none any any any any deny no 3 3 WAN LAN none any any any any deny log 4 4 DMZ LAN none any any any any deny no 5 5 DMZ ZyWALL none any any any Default_Allow_DMZ_To_ZyWALL allow no 6 6 DMZ ZyWALL none any any any any deny log - Default any any any any any any any allow no Apply Reset

The following table describes the labels in this screen.

Table 102 Firewall

LABELDESCRIPTION
Global Setting
Enable FirewallSelect this check box to activate the firewall. The ZyWALL performs access control when the firewall is activated.
Allow Asymmetrical RouteIf an alternate gateway on the LAN has an IP address in the same subnet as the ZyWALL's LAN IP address, return traffic may not go through the ZyWALL. This is called an asymmetrical or “triangle” route. This causes the ZyWALL to reset the connection, as the connection has not been acknowledged.Select this check box to have the ZyWALL permit the use of asymmetrical route topology on the network (not reset the connection).Note: Allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without passing through the ZyWALL. A better solution is to use virtual interfaces to put the ZyWALL and the backup gateway on separate subnets.
From ZoneTo ZoneThis is the direction of travel of packets. Select from which zone the packets come and to which zone they go.Firewall rules are grouped based on the direction of travel of packets to which they apply. For example, from LAN to LAN means packets traveling from a computer or subnet on the LAN to either another computer or subnet on the LAN.From any displays all the firewall rules for traffic going to the selected To Zone.To any displays all the firewall rules for traffic coming from the selected From Zone.From any to any displays all of the firewall rules.To ZyWALL rules are for traffic that is destined for the ZyWALL and control which computers can manage the ZyWALL.
The following read-only fields summarize the rules you have created that apply to traffic traveling in the selected packet direction.
Total rulesThis field displays the total number of firewall rules.
entries per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the index number of your firewall rule. It is not associated with a specific rule.The entry with a hyphen (-) instead of a number is the default firewall behavior that the ZyWALL performs on traffic that does not match any other traffic direction. Only the access right and log alert are configurable for the default firewall rule. To apply other behavior, configure a firewall rule that traffic will match so the ZyWALL will not have to use it's default behavior.
PriorityThis is the position of your firewall rule in the global rule list (including all through-ZyWALL and to-ZyWALL rules). The ordering of your rules is important as rules are applied in sequence. Default displays for the default firewall behavior that the ZyWALL performs on traffic that does not match any other traffic direction. The ZyWALL checks the traffic against any other applicable rules before applying this default behavior.
FromThis is the direction of travel of packets to which the rule applies.any means all interfaces or VPN tunnels.ZyWALL means packets destined for the ZyWALL itself.
ToThis is the direction of travel of packets to which the rule applies.any means all interfaces or VPN tunnels.ZyWALL means packets destined for the ZyWALL itself.
ScheduleThis field tells you the schedule object that the rule uses. none means the rule is active at all times if enabled.
UserThis is the user name or user group name to which this firewall rule applies.
SourceThis displays the source address object to which this firewall rule applies.
DestinationThis displays the destination address object to which this firewall rule applies.
ServiceThis displays the service object to which this firewall rule applies.
AccessThis field displays whether the firewall silently discards packets (deny), discards packets and sends a TCP reset packet to the sender (reject) or permits the passage of packets (allow).
LogThis field shows you whether a log (and alert) is created when packets match this rule or not.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the rule is enabled or not. Click it to activate or deactivate the rule. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the rule on the ZyWALL.Click the Add icon in an entry to add a rule below the current entry.Click the Remove icon to delete an existing rule from the ZyWALL. A window displays asking you to confirm that you want to delete the rule. Note that subsequent firewall rules move up by one when you take this action.In a numbered list, click the Move to N icon to display a field to type an index number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed. For example, if you type 6, the rule you are moving becomes number 6 and the previous rule 6 (if there is one) gets pushed up (or down) one.The ordering of your rules is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

20.2.2 The Firewall Edit Screen

In the Firewall screen, click the Edit or Add icon to display the Firewall Rule Edit screen. Refer to the following table for information on the labels.

Figure 213 Firewall > Edit
ZYXEL ZYWALL USG 2000 - The Firewall Edit Screen - 1

text_image Configuration Enable From any To any (Excluding ZyWALL) Description (Optional) Schedule None User any Source any Destination any Service any Access allow Log=no OK Cancel

The following table describes the labels in this screen.

Table 103 Firewall > Edit

LABELDESCRIPTION
EnableSelect this check box to activate the firewall rule.
FromToFor through-ZyWALL rules, select the direction of travel of packets to which the rule applies.any means all interfaces or VPN tunnels.ZyWALL means packets destined for the ZyWALL itself.
DescriptionEnter a descriptive name of up to 60 printable ASCII characters for the firewall rule. Spaces are allowed.
ScheduleSelect a schedule that defines when the rule applies or selectCreate Objectto configure a new one (seeChapter 39 on page 641for details). Otherwise, selectnoneand the rule is always effective.
UserThis field is not available when you are configuring a to-ZyWALL rule.Select a user name or user group to which to apply the rule. SelectCreate Objectto configure a new user account (seeSection 36.2.1 on page 616for details). The firewall rule is activated only when the specified user logs into the system and the rule will be disabled when the user logs out.Otherwise, selectanyand there is no need for user logging.Note: If you specified a source IP address (group) instead ofanyin the field below, the user’s IP address should be within the IP address range.
SourceSelect a source address or address group for whom this rule applies.SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every source.
DestinationSelect a destination address or address group for whom this rule applies. SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every destination.
ServiceSelect a service or service group from the drop-down list box. SelectCreate Objectto add a new service. SeeChapter 38 on page 635for more information.
AccessUse the drop-down list box to select what the firewall is to do with packets that match this rule.Selectdenyto silently discard the packets without sending a TCP reset packet or an ICMP destination-unreachable message to the sender.Selectrejectto deny the packets and send a TCP reset packet to the sender. Any UDP packets are dropped without sending a response packet.Selectallowto permit the passage of the packets.
LogSelect whether to have the ZyWALL generate a log (log), log and alert (log alert) or not (no) when the rule is matched. SeeChapter 47 on page 761for more on logs.
OKClickOKto save your customized settings and exit this screen.
CancelClickCancelto exit this screen without saving.

20.3 The Session Limit Screen

Click Firewall > Session Limit to display the Firewall Session Limit screen. Use this screen to limit the number of concurrent NAT/firewall sessions a client can use. You can apply a default limit for all users and individual limits for specific users, addresses, or both. The individual limit takes priority if you apply both.

Figure 214 Firewall > Session Limit
ZYXEL ZYWALL USG 2000 - The Session Limit Screen - 1

text_image Firewall Session Limit General Settings Enable Session limit Default Session per Host 0 (0-8192, 0 is unlimited) Rule Summary

User Address Description Limit

Apply Reset

The following table describes the labels in this screen.

Table 104 Firewall > Session Limit

LABELDESCRIPTION
General Settings
Enable Session limitSelect this check box to control the number of concurrent sessions hosts can have.
Default Session per HostUse this field to set a common limit to the number of concurrent NAT/firewall sessions each client computer can have.If only a few clients use peer to peer applications, you can raise this number to improve their performance. With heavy peer to peer application use, lower this number to ensure no single client uses too many of the available NAT sessions.Create rules below to apply other limits for specific users or addresses.
Rule SummaryThis table lists the rules for limiting the number of concurrent sessions hosts can have.
#This is the index number of a session limit rule. It is not associated with a specific rule.
UserThis is the user name or user group name to which this session limit rule applies.
AddressThis is the address object to which this session limit rule applies.
LimitThis is how many concurrent sessions this user or address is allowed to have.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the rule is enabled or not. Click it to activate or deactivate the rule. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the rule on the ZyWALL.Click the Add icon in an entry to add a rule below the current entry.Click the Remove icon to delete an existing rule from the ZyWALL. A window displays asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.In a numbered list, click the Move to N icon to display a field to type an index number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed. For example, if you type 6, the rule you are moving becomes number 6 and the previous rule 6 (if there is one) gets pushed up (or down) one.The ordering of your rules is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

20.3.1 The Session Limit Edit Screen

Click Firewall > Session Limit and the Add or Edit icon to display the Firewall Session Limit Edit screen. Use this screen to configure rules that define a session limit for specific users or addresses.

Figure 215 Firewall > Session Limit > Edit
ZYXEL ZYWALL USG 2000 - The Session Limit Edit Screen - 1

text_image Configuration Enable Rule Description User Address Session Limit per Host (Optional) any any 0 (0-8192, 0 is unlimited) OK Cancel

The following table describes the labels in this screen.

Table 105 Firewall > Session Limit > Edit

LABELDESCRIPTION
Enable RuleSelect this check box to turn on this session limit rule.
DescriptionEnter information to help you identify this rule. Use up to 64 printable ASCII characters. Spaces are allowed.
UserSelect a user name or user group to which to apply the rule. SelectCreate Objectto configure a new user account (see Chapter 36 on page 613 for details). The rule is activated only when the specified user logs into the system and the rule will be disabled when the user logs out.Otherwise, select anyand there is no need for user logging.Note: If you specified an IP address (or address group) instead of anyin the field below, the user's IP address should be within the IP address range.
AddressSelect a source address or address group for whom this rule applies. SelectCreate Objectto configure a new one. Select anyif the policy is effective for every source address.
Session Limit per HostUse this field to set a limit to the number of concurrent NAT/firewall sessions this rule's users or addresses can have.For this rule's users and addresses, this setting overrides theDefault Session per Hostsetting in the generalFirewall Session Limit screen.
OKClick OKto save your customized settings and exit this screen.
CancelClick Cancelto exit this screen without saving.

PART IV

VPN

IPSec VPN (339)

SSL VPN (379)

SSL User Screens (391)

SSL User Application Screens (399)

SSL User File Sharing (401)

L2TP VPN (409)

L2TP VPN Example (415)

21.1 IPSec VPN Overview

A virtual private network (VPN) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing. It is used to transport traffic over the Internet or any insecure network that uses TCP/IP for communication.

Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for secure data communications across a public network like the Internet. IPSec is built around a number of standardized cryptographic techniques to provide confidentiality, data integrity and authentication at the IP layer. The following figure is an example of an IPSec VPN tunnel.

Figure 216 IPSec VPN Example
ZYXEL ZYWALL USG 2000 - IPSec VPN Overview - 1

flowchart
graph LR
    subgraph A
        A1["Computer"] --> X
        A2["Computer"] --> X
        A3["Computer"] --> X
        A4["Computer"] --> X
    end
    subgraph X
        X --> R["Router"]
        R --> S["Internet VPN Tunnel"]
        S --> Y
    end
    subgraph Y
        Y --> R
        Y --> S
    end
    style A fill:#f9f,stroke:#333
    style B fill:#f9f,stroke:#333

The VPN tunnel connects the ZyWALL (X) and the remote (peer) IPSec router (Y). These routers then connect the local network (A) and remote network (B).

21.1.1 What You Can Do in the IPSec VPN Screens

  • Use the VPN Connection screens (see Section 21.2 on page 341) to specify which VPN gateway a VPN connection policy uses and which devices (behind the IPSec routers) can use the VPN tunnel and the IPSec SA settings (phase 2 settings). You can also activate / deactivate and connect / disconnect each VPN connection (each IPSec SA).
  • Use the VPN Gateway screens (see Section 21.2.1 on page 343) to manage the ZyWALL's VPN gateways. A VPN gateway specifies the IPSec routers at either end of a VPN tunnel and the IKE SA settings (phase 1 settings). You can also activate and deactivate each VPN gateway.
  • Use the VPN Concentrator screens (see Section 21.4 on page 363) to combine several IPSec VPN connections into a single secure network.
  • Use the SA Monitor screen (see Section 21.5 on page 366) to display and manage the active IPSec SAs.

21.1.2 What You Need to Know About IPSec VPN

An IPSec VPN tunnel is usually established in two phases. Each phase establishes a security association (SA), a contract indicating what security parameters the ZyWALL and the remote IPSec router will use. The first phase establishes an Internet Key Exchange (IKE) SA between the ZyWALL and remote IPSec router. The second phase uses the IKE SA to securely establish an IPSec SA through which the ZyWALL and remote IPSec router can send data between computers on the local network and remote network. This is illustrated in the following figure.

Figure 217 VPN: IKE SA and IPSec SA
ZYXEL ZYWALL USG 2000 - What You Need to Know About IPSec VPN - 1

flowchart
graph LR
    subgraph_Host_A["Host A"]
        A1["Computer"] --> X["X"]
        A2["Computer"] --> X
        A3["Computer"] --> X
        A4["Computer"] --> X
        A5["Computer"] --> X
    end

    subgraph_Host_B["Host B"]
        B1["Computer"] --> X2["X"]
        B2["Computer"] --> X2
        B3["Computer"] --> X2
        B4["Computer"] --> X2
        B5["Computer"] --> X2

    end

    X -->|IPSec SA| Internet["Internet"]
    X2 -->|IKE SA| Internet
    Internet -->|IPSec SA| Node1["Node"]
    Node1 -->|IKE SA| Node2["Node"]
    Node2 -->|IPSec SA| Node3["Node"]
    Node3 -->|IKE SA| Node4["Node"]
    Node4 -->|IPSec SA| Node5["Node"]
    Node5 -->|IKE SA| Node6["Node"]
    Node6 -->|IPSec SA| Node7["Node"]
    Node7 -->|IKE SA| Node8["Node"]
    Node8 -->|IPSec SA| Node9["Node"]
    Node9 -->|IKE SA| Node10["Node"]
    Node10 -->|IPSec SA| Node11["Node"]
    Node11 -->|IKE SA| Node12["Node"]
    Node12 -->|IPSec SA| Node13["Node"]
    Node13 -->|IKE SA| Node14["Node"]
    Node14 -->|IPSec SA| Node15["Node"]
    Node15 -->|IKE SA| Node16["Node"]
    Node16 -->|IPSec SA| Node17["Node"]
    Node17 -->|IKE SA| Node18["Node"]
    Node18 -->|IPSec SA| Node19["Node"]
    Node19 -->|IKE SA| Node20["Node"]
    Node20 -->|IPSec SA| Node21["Node"]
    Node21 -->|IKE SA| Node22["Node"]
    Node22 -->|IPSec SA| Node23["Node"]
    Node23 -->|IKE SA| Node24["Node"]
    Node24 -->|IPSec SA| Node25["Node"]
    Node25 -->|IKE SA| Node26["Node"]
    Node26 -->|IPSec SA| Node27["Node"]
    Node27 -->|IKE SA| Node28["Node"]
    Node28 -->|IPSec SA| Node29["Node"]
    Node29 -->|IKE SA| Node30["Node"]
    Node30 -->|IPSec SA| Node31["Node"]
    Node31 -->|IKE SA| Node32["Node"]
    Node32 -->|IPSec SA| Node33["Node"]
    Node33 -->|IKE SA| Node34["Node"]
    Node34 -->|IPSec SA| Node35["Node"]
    Node35 -->|IKE SA| Node36["Node"]
    Node36 -->|IPSec SA| Node37["Node"]
    Node37 -->|IKE SA| Node38["Node"]
    Node38 -->|IPSec SA| Node39["Node"]
    Node39 -->|IKE SA| Node40["Node"]

In this example, a computer in network A is exchanging data with a computer in network B. Inside networks A and B, the data is transmitted the same way data is normally transmitted in the networks. Between routers X and Y, the data is protected by tunneling, encryption, authentication, and other security features of the IPSec SA. The IPSec SA is secure because routers X and Y established the IKE SA first.

Dynamic IPSec VPN Rules

A dynamic IPSec VPN rule does not specify the remote IPSec router's IP address or domain name. So a remote IPSec router with a dynamic IP address can initiate a VPN tunnel to the ZyWALL. Only the remote IPSec router can initiate a dynamic VPN tunnel.

Finding Out More

• See Section 5.4.4 on page 107 for related information on these screens.
• See Section 21.6 on page 367 for IPSec VPN background information.
• See Section 6.3 on page 124 for an example of configuring IPSec VPN.

21.1.3 Before You Begin

This section briefly explains the relationship between VPN tunnels and other features. It also gives some basic suggestions for troubleshooting.

You should set up the following features before you set up the VPN tunnel.

  • In any VPN connection, you have to select address objects to specify the local policy and remote policy. You should set up the address objects first.
  • In a VPN gateway, you can select an Ethernet interface, virtual Ethernet interface, VLAN interface, or virtual VLAN interface to specify what address the ZyWALL uses as its IP address when it establishes the IKE SA. You should set up the interface first. See Chapter 10 on page 181.
  • In a VPN gateway, you can enable extended authentication. If the ZyWALL is in server mode, you should set up the authentication method (AAA server) first. The authentication method specifies how the ZyWALL authenticates the remote IPSec router. See Chapter 40 on page 647.
  • In a VPN gateway, the ZyWALL and remote IPSec router can use certificates to authenticate each other. Make sure the ZyWALL and the remote IPSec router will trust each other's certificates. See Chapter 42 on page 663.

21.2 The VPN Connection Screen

The VPN Connection screen lists the VPN connection policies and their associated VPN gateway(s), and various settings. In addition, it also lets you activate / deactivate and connect / disconnect each VPN connection (each IPSec SA).

To access this screen, click VPN > IPSec VPN. The following screen appears.

Note: Except for dynamic IPSec VPN rules, each VPN connection requires a corresponding policy route.

Dynamic IPSec VPN rules only require a corresponding policy route if you select Use Policy Route to control dynamic IPSec rules.

The VPN wizard automatically creates a corresponding policy route. If you create the VPN connection in the VPN > IPSec VPN screens, you need to manually create a corresponding policy route.

Figure 218 VPN > IPSec VPN > VPN Connection
ZYXEL ZYWALL USG 2000 - The VPN Connection Screen - 1

text_image VPN Connection VPN Gateway Concentrator SA Monitor Global Setting Use Policy Route to control dynamic IPSec rules "Ignore ""Don't Fragment"" setting in packet header" Configuration Total Connection:1 30 connection per page Page: 1 of 1

Name VPN Gateway Encapsulation Algorithm Policy

1 Default_L2TP_VPN_Connection Default_L2TP_VPN_GW TRANSPORT 3DES/SHA 3DES/MD5 DES/SHA / Apply Reset

Each field is discussed in the following table. See Section 21.2.2 on page 350 and Section 21.2.1 on page 343 for more information.

Table 106 VPN > IPSec VPN > VPN Connection

LABELDESCRIPTION
Global Setting
Use Policy Route to control dynamic IPSec rulesLeave this cleared to have the ZyWALL automatically obtain source and destination addresses for dynamic IPSec rules. When you leave this option's check box cleared, you do not need to configure policy routes for the dynamic IPSec tunnels.Only select this if you want to use policy routes to manually specify the destination addresses of dynamic IPSec rules. You must configure a policy route for each dynamic IPSec tunnel.
Ignore "Don't Fragment" setting in packet headerSelect this to fragment packets larger than the MTU (Maximum Transmission Unit) that have the "don't" fragment" bit in the header turned on. When you clear this the ZyWALL drops packets larger than the MTU that have the "don't" fragment" bit in the header turned on.
Configuration
Total ConnectionThis field displays the total number of VPN connection policies.
connection per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific connection.
NameThis field displays the name of the IPSec SA.
VPN GatewayThis field displays the associated VPN gateway(s). If there is no VPN gateway, this field displays “manual key”.
EncapsulationThis field displays what encapsulation the IPSec SA uses.
AlgorithmThis field displays what encryption and authentication methods, respectively, the IPSec SA uses.
PolicyThis field displays the local policy and the remote policy, respectively.
Add iconThis column provides icons to add, edit, and remove VPN connections, as well as to activate / deactivate and connect / disconnect VPN connections.To add a VPN connection, click the Add icon at the top of the column. The VPN Connection Add/Edit Manual screen appears.To edit a VPN connection, click the Edit icon next to the connection. The VPN Connection Add/Edit Manual or VPN Connection Add/Edit Gateway screen appears accordingly.To delete a VPN connection, click the Remove icon next to the connection. The web configurator confirms that you want to delete the VPN connection.To activate or deactivate an IPSec SA, click the Active icon next to the VPN connection. Make sure you click Apply to save and apply the change.To connect or disconnect an IPSec SA, click the Connect icon next to the VPN connection.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

21.2.1 The VPN Connection Add/Edit (IKE) Screen

The VPN Connection Add/Edit Gateway screen allows you to create a new VPN connection policy or edit an existing one. To access this screen, go to the VPN Connection screen (see Section 21.2 on page 341), and click either the Add icon or an Edit icon. If you click the Add icon, you have to select a specific VPN gateway in the VPN Gateway field before the following screen appears.

Figure 219 VPN > IPSec VPN > VPN Connection > Edit (IKE)
ZYXEL ZYWALL USG 2000 - The VPN Connection Add/Edit (IKE) Screen - 1

text_image General Settings Connection Name Nailed-Up Enable Replay Detection Enable NetBIOS broadcast over IPSec VPN Gateway Application Scenario Site-to-site Site-to-site with Dynamic Peer Remote Access (Server Role) Remote Access (Client Role) VPN Gateway Manual Key Manual Key My Address Secure Gateway Address SPI (256 - 4095) Encapsulation Mode Tunnel Active Protocol ESP Encryption Algorithm DES Authentication Algorithm SHA1 Authentication Key Authentication Key Policy Basic Local policy Remote policy Policy Enforcement Phase 2 Settings Basic SA Life Time 86400 (180 - 3000000 Seconds) Active Protocol ESP Encapsulation Tunnel Proposal

Encryption Authentication

1 DES SHA1 Perfect Forward Secrecy (PFS) none Connectivity Check Enable Connectivity Check Check Method icmp Check Period 5 (5-30 Seconds) Check Timeout 5 (1-10 Seconds) Check Fail Tolerance (1-10) Check This Address (Domain Name or IP Address) Check the First and Last IP Address in the Remote Policy Log Less Settings Inbound/Outbound traffic NAT Outbound Traffic Source NAT Source NONE Destination NONE SNAT NONE Inbound Traffic Source NAT Source NONE Destination NONE SNAT NONE Destination NAT

Original IP Mapped IP Protocol Original Port Mapped Port

OK Cancel

Each field is described in the following table.

Table 107 VPN > IPSec VPN > VPN Connection > Edit

LABELDESCRIPTION
General SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
Connection NameType the name used to identify this IPSec SA. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Nailed-UpSelect this if you want the ZyWALL to automatically renegotiate the IPSec SA when the SA life time expires.
Enable Replay DetectionSelect this check box to detect and reject old or duplicate packets to protect against Denial-of-Service attacks.
Enable NetBIOS Broadcast over IPSecSelect this check box if you the ZyWALL to send NetBIOS (Network Basic Input/Output System) packets through the IPSec SA.NetBIOS packets are TCP or UDP packets that enable a computer to connect to and communicate with a LAN. It may sometimes be necessary to allow NetBIOS packets to pass through IPSec SAs in order to allow local computers to find computers on the remote network and vice versa.
VPN GatewayClick Advanced to display more settings. Click Basic to display fewer settings.
Application ScenarioSelect the scenario that best describes your intended VPN connection.Site-to-site - Choose this if the remote IPSec router has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.Site-to-site with Dynamic Peer - Choose this if the remote IPSec router has a dynamic IP address. Only the remote IPSec router can initiate the VPN tunnel.Remote Access (Server Role) - Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.Remote Access (Client Role) - Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
VPN GatewaySelect the VPN gateway this VPN connection is to use or select Create Object to add another VPN gateway for this VPN connection to use.
Manual KeySelect this option to configure a VPN connection policy that uses a manual key instead of IKE key management. This may be useful if you have problems with IKE key management. See Section 21.2.2 on page 350 for how to configure the manual key fields.Note: Only use manual key as a temporary solution, because it is not as secure as a regular IPSec SA.
PolicyClick Advanced to display more settings. Click Basic to display fewer settings.
Local PolicySelect the address or address group corresponding to the local network. Select Create Object to configure a new one.
Remote PolicySelect the address or address group corresponding to the remote network. SelectCreate Objectto configure a new one.
Policy EnforcementClear this to allow traffic with source and destination IP addresses that do not match the local and remote policy to use the VPN tunnel. Leave this cleared for free access between the local and remote networks.Note: Clear this to use the IPSec SA in a VPN concentrator.Selecting this restricts who can use the VPN tunnel. The ZyWALL drops traffic with source and destination IP addresses that do not match the local and remote policy.
Phase 2 SettingsClickAdvancedto display more settings. ClickBasicto display fewer settings.
SA Life TimeType the maximum number of seconds the IPSec SA can last. Shorter life times provide better security. The ZyWALL automatically negotiates a new IPSec SA before the current one expires, if there are users who are accessing remote resources.
Active ProtocolSelect which protocol you want to use in the IPSec SA. Choices are:AH (RFC 2402) - provides integrity, authentication, sequence integrity (replay resistance), and non-repudiation but not encryption. If you selectAH, you must select anAuthenticationalgorithm.ESP (RFC 2406) - provides encryption and the same services offered byAH, but its authentication is weaker. If you selectESP, you must select anEncryptionalgorithm andAuthenticationalgorithm.BothAHandESPincrease processing requirements and latency (delay).The ZyWALL and remote IPSec router must use the same active protocol.
EncapsulationSelect which type of encapsulation the IPSec SA uses. Choices areTunnel- this mode encrypts the IP header information and the data.Transport- this mode only encrypts the data.The ZyWALL and remote IPSec router must use the same encapsulation.
Proposal
#This field is a sequential value, and it is not associated with a specific proposal. The sequence of proposals should not affect performance significantly.
EncryptionThis field is applicable when theActive Protocolis ESP. Select which key size and encryption algorithm to use in the IPSec SA. Choices are:NULL - no encryption key or algorithmDES - a 56-bit key with the DES encryption algorithm3DES - a 168-bit key with the DES encryption algorithmAES128 - a 128-bit key with the AES encryption algorithmAES192 - a 192-bit key with the AES encryption algorithmAES256 - a 256-bit key with the AES encryption algorithmThe ZyWALL and the remote IPSec router must both have at least one proposal that uses use the same encryption and the same key.Longer keys are more secure, but require more processing power, resulting in increased latency and decreased throughput.
AuthenticationSelect which hash algorithm to use to authenticate packet data in the IPSec SA. Choices areSHA1and MD5. SHA1is generally considered stronger thanMD5, but it is also slower.The ZyWALL and the remote IPSec router must both have a proposal that uses the same authentication algorithm.
Add iconThis column contains icons to add and remove proposals.To add a proposal, click theAddicon at the top of the column.To remove a proposal, click theremoveicon next to the proposal.The ZyWALL confirms that you want to delete it before doing so.
Perfect Forward Secrecy (PFS)Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if you do, which Diffie-Hellman key group to use for encryption. Choices are:none - disable PFSDH1 - enable PFS and use a 768-bit random numberDH2 - enable PFS and use a 1024-bit random numberDH5 - enable PFS and use a 1536-bit random numberPFS changes the root key that is used to generate encryption keys for each IPSec SA. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group.
Connectivity CheckThe ZyWALL can regularly check the VPN connection to the gateway you specified to make sure it is still available.
Enable Connectivity CheckSelect this to turn on the VPN connection check.
Check MethodSelect how the ZyWALL checks the connection. The peer must be configured to respond to the method you select.Select icmp to have the ZyWALL regularly ping the address you specify to make sure traffic can still go through the connection. You may need to configure the peer to respond to pings.Select tcp to have the ZyWALL regularly perform a TCP handshake with the address you specify to make sure traffic can still go through the connection. You may need to configure the peer to accept the TCP connection.
Check PortThis field displays when you set the Check Method to tcp. Specify the port number to use for a TCP connectivity check.
Check PeriodEnter the number of seconds between connection check attempts.
Check TimeoutEnter the number of seconds to wait for a response before the attempt is a failure.
Check Fail ToleranceEnter the number of consecutive failures allowed before the ZyWALL disconnects the VPN tunnel. The ZyWALL resumes using the first peer gateway address when the VPN connection passes the connectivity check.
Check this AddressSelect this to specify a domain name or IP address for the connectivity check. Enter that domain name or IP address in the field next to it.
Check the First and Last IP Address in the Remote PolicySelect this to have the ZyWALL check the connection to the first and last IP addresses in the connection's remote policy. Make sure one of these is the peer gateway's LAN IP address.
LogSelect this to have the ZyWALL generate a log every time it checks this VPN connection.
More Settings/ Less SettingsClick this button to show or hide the Inbound/Outbound traffic NAT fields.
Inbound/ Outbound traffic NAT
Outbound Traffic
Source NATThis translation hides the source address of computers in the local network. It may also be necessary if you want the ZyWALL to route packets from computers outside the local network through the IPSec SA.
SourceSelect the address object that represents the original source address (or select Create Object to configure a new one). This is the address object for the computer or network outside the local network. The size of the original source address range (Source) must be equal to the size of the translated source address range (SNAT).
DestinationSelect the address object that represents the original destination address (or select Create Object to configure a new one). This is the address object for the remote network.
SNATSelect the address object that represents the translated source address (or select Create Object to configure a new one). This is the address object for the local network. The size of the original source address range (Source) must be equal to the size of the translated source address range (SNAT).
Inbound Traffic
Source NATThis translation hides the source address of computers in the remote network.
SourceSelect the address object that represents the original source address (or select Create Object to configure a new one). This is the address object for the remote network. The size of the original source address range (Source) must be equal to the size of the translated source address range (SNAT).
DestinationSelect the address object that represents the original destination address (or select Create Object to configure a new one). This is the address object for the local network.
SNATSelect the address object that represents the translated source address (or select Create Object to configure a new one). This is the address that hides the original source address. The size of the original source address range (Source) must be equal to the size of the translated source address range (SNAT).
Destination NATThis translation forwards packets (for example, mail) from the remote network to a specific computer (for example, the mail server) in the local network.
#This field is a sequential value, and it is not associated with a specific NAT record. However, the order of records is the sequence in which conditions are checked and executed.
Original IPSelect the address object that represents the original destination address. This is the address object for the remote network.
Mapped IPSelect the address object that represents the desired destination address. For example, this is the address object for the mail server.
ProtocolSelect the protocol required to use this translation. Choices are: TCP, UDP, or All.
Original PortThese fields are available if the protocol is TCP or UDP. Enter the original destination port or range of original destination ports. The size of the original port range must be the same size as the size of the mapped port range.
Mapped PortThese fields are available if the protocol is TCP or UDP. Enter the translated destination port or range of translated destination ports. The size of the original port range must be the same size as the size of the mapped port range.
Add iconThis column contains icons to add, move, and remove NAT records.To add a NAT record, click the Add icon at the top of the column.To move a NAT record, click the Move to N icon next to the record, and then type the row number to which you want to move it. The records are renumbered automatically.To remove a NAT record, click the Remove icon next to the record. The ZyWALL confirms that you want to delete the NAT record before doing so.
OKClick OK to save the changes.
CancelClick Cancel to discard all changes and return to the main VPN screen.

21.2.2 The VPN Connection Add/Edit Manual Key Screen

The VPN Connection Add/Edit Manual Key screen allows you to create a new VPN connection or edit an existing one using a manual key. This is useful if you have problems with IKE key management. To access this screen, go to the VPN Connection summary screen (see Section 21.2 on page 341), and click either the Add icon or an existing manual key entry's Edit icon. In the VPN Gateway section of the screen, select Manual Key.

Note: Only use manual key as a temporary solution, because it is not as secure as a regular IPSec SA.

Figure 220 VPN > IPSec VPN > VPN Connection > Manual Key > Edit
ZYXEL ZYWALL USG 2000 - The VPN Connection Add/Edit Manual Key Screen - 1

text_image General Settings Connection Name Advanced VPN Gateway Application Scenario Site-to-site Site-to-site with Dynamic Peer Remote Access (Server Role) Remote Access (Client Role) Manual Key Manual Key My Address Secure Gateway Address SPI (256 - 4095) Encapsulation Mode Tunnel Active Protocol ESP Encryption Algorithm DES Authentication Algorithm SHA1 Encryption Key Authentication Key Policy Local Policy Remote Policy More Settings OK Cancel

This table describes labels specific to manual key configuration. See Section 21.2 on page 341 for descriptions of the other fields.

Table 108 VPN > IPSec VPN > VPN Connection > Manual Key > Edit

LABELDESCRIPTION
Manual Key
My AddressType the IP address of the ZyWALL in the IPSec SA. 0.0.0.0 is invalid.
Secure Gateway AddressType the IP address of the remote IPSec router in the IPSec SA.
SPIType a unique SPI (Security Parameter Index) between 256 and 4095. The SPI is used to identify the ZyWALL during authentication.The ZyWALL and remote IPSec router must use the same SPI.
Encapsulation ModeSelect which type of encapsulation the IPSec SA uses. Choices are Tunnel - this mode encrypts the IP header information and the data Transport - this mode only encrypts the data. You should only select this if the IPSec SA is used for communication between the ZyWALL and remote IPSec router.If you select Transport mode, the ZyWALL automatically switches to Tunnel mode if the IPSec SA is not used for communication between the ZyWALL and remote IPSec router. In this case, the ZyWALL generates a log message for this change.The ZyWALL and remote IPSec router must use the same encapsulation.
Active ProtocolSelect which protocol you want to use in the IPSec SA. Choices are:AH (RFC 2402) - provides integrity, authentication, sequence integrity (replay resistance), and non-repudiation but not encryption. If you select AH, you must select an Authentication Algorithm.ESP (RFC 2406) - provides encryption and the same services offered by AH, but its authentication is weaker. If you select ESP, you must select an Encryption Algorithm and Authentication Algorithm.The ZyWALL and remote IPSec router must use the same protocol.
Encryption AlgorithmThis field is applicable when the Active Protocol is ESP. Select which key size and encryption algorithm to use in the IPSec SA. Choices are:NULL - no encryption key or algorithmDES - a 56-bit key with the DES encryption algorithm3DES - a 168-bit key with the DES encryption algorithmAES128 - a 128-bit key with the AES encryption algorithmAES192 - a 192-bit key with the AES encryption algorithmAES256 - a 256-bit key with the AES encryption algorithmThe ZyWALL and the remote IPSec router must use the same algorithm and key. Longer keys require more processing power, resulting in increased latency and decreased throughput.
Authentication AlgorithmSelect which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also slower.The ZyWALL and remote IPSec router must use the same algorithm.
Encryption KeyThis field is applicable when you select an Encryption Algorithm.Enter the encryption key, which depends on the encryption algorithm.DES - type a unique key 8-32 characters long3DES - type a unique key 24-32 characters longAES128 - type a unique key 16-32 characters longAES192 - type a unique key 24-32 characters longAES256 - type a unique key 32 characters longYou can use any alphanumeric characters or; | ~ !@#%^&*()_+\':./<>=-.If you want to enter the key in hexadecimal, type "0x" at the beginning of the key. For example, "0x0123456789ABCDEF" is in hexadecimal format; in "0123456789ABCDEF" is in ASCII format. If you use hexadecimal, you must enter twice as many characters as listed above.The remote IPSec router must have the same encryption key.The ZyWALL ignores any characters above the minimum number of characters required by the algorithm. For example, if you enter 1234567890XYZ for a DES encryption key, the ZyWALL only uses 12345678. The ZyWALL still stores the longer key.
Authentication KeyEnter the authentication key, which depends on the authentication algorithm.MD5 - type a unique key 16-20 characters longSHA1 - type a unique key 20 characters longYou can use any alphanumeric characters or; | ~ !@#%^&*()_+\{}':./<>=-. If you want to enter the key in hexadecimal, type "0x" at the beginning of the key. For example, "0x0123456789ABCDEF" is in hexadecimal format; in "0123456789ABCDEF" is in ASCII format. If you use hexadecimal, you must enter twice as many characters as listed above.The remote IPSec router must have the same authentication key.The ZyWALL ignores any characters above the minimum number of characters required by the algorithm. For example, if you enter 12345678901234567890 for a MD5 authentication key, the ZyWALL only uses 1234567890123456. The ZyWALL still stores the longer key.
OKClick OK to save your settings and exit this screen.
CancelClick Cancel to exit this screen without saving.

21.3 The VPN Gateway Screen

The VPN Gateway summary screen displays the IPSec VPN gateway policies in the ZyWALL, as well as the ZyWALL's address, remote IPSec router's address, and associated VPN connections for each one. In addition, it also lets you activate and deactivate each VPN gateway.

To access this screen, click VPN > Network > IPSec VPN > VPN Gateway. The following screen appears.

Figure 221 VPN > IPSec VPN > VPN Gateway
ZYXEL ZYWALL USG 2000 - The VPN Gateway Screen - 1

text_image VPN Connection VPN Gateway Concentrator SA Monitor Configuration Total Connection:1 30 connection per page Page: 1 of 1

Name My address Secure Gateway VPN Connection

1 Default_L2TP_VPN_GW ge2 0.0.0.0, 0.0.0.0 Default_L2TP_VPN_Connection Apply Reset

Each field is discussed in the following table. See Section 21.3.1 on page 355 for more information.

Table 109 VPN > IPSec VPN > VPN Gateway

LABELDESCRIPTION
Total ConnectionThis field displays the total number of VPN gateway policies.
connection per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific VPN gateway.
NameThis field displays the name of the VPN gateway
My addressThis field displays the interface or a domain name the ZyWALL uses for the VPN gateway.
Secure GatewayThis field displays the IP address(es) of the remote IPSec routers.
VPN ConnectionThis field displays VPN connections that use this VPN gateway.
Add iconThis column provides icons to add, edit, and remove VPN gateways, as well as to activate / deactivate VPN gateways.To add a VPN gateway, click the Add icon at the top of the column. The VPN Gateway Add/Edit screen appears.To edit a VPN gateway, click the Edit icon next to the gateway. The VPN Gateway Add/Edit screen appears accordingly.To delete a VPN gateway, click on the Remove icon next to the gateway. The web configurator confirms that you want to delete the VPN gateway.To activate or deactivate a VPN gateway, click the Active icon next to the gateway. Make sure you click Apply to save and apply the change.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

21.3.1 The VPN Gateway Add/Edit Screen

The VPN Gateway Add/Edit screen allows you to create a new VPN gateway policy or edit an existing one. To access this screen, go to the VPN Gateway summary screen (see Section 21.3 on page 354), and click either the Add icon or an Edit icon.

Figure 222 VPN > IPSec VPN > VPN Gateway > Edit
ZYXEL ZYWALL USG 2000 - The VPN Gateway Add/Edit Screen - 1

text_image General Settings VPN Gateway Name Gateway Settings My Address Interface ge1 Static -- 192.168.1.1/255.255.255.0 Domain Name / IP Peer Gateway Address Static Address 1. 0.0.0.0 2. 0.0.0.0 Dynamic Address Authentication Basic Pre-Shared Key Certificate default (See My Certificates) Local ID Type IP Content 0.0.0.0 Peer ID Type Any Content Phase 1 Settings Basic SA Life Time 86400 (180 - 3000000 Seconds) Negotiation Mode Main Proposal

Encryption Authentication

1 DES MD5 Key Group DH1 NAT Traversal Dead Peer Detection (DPD) Less Settings Extended Authentication Enable Extended Authentication Server Mode default Client Mode User Name Password OK Cancel

Each field is described in the following table.

Table 110 VPN > IPSec VPN > VPN Gateway > Edit

LABELDESCRIPTION
General Settings
VPN Gateway NameType the name used to identify this VPN gateway. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Gateway Settings
My AddressSelect how the IP address of the ZyWALL in the IKE SA is defined.If you selectInterface, select the Ethernet interface, VLAN interface, virtual Ethernet interface, virtual VLAN interface, PPPoE/PPTP interface, or auxiliary interface. The IP address of the ZyWALL in the IKE SA is the IP address of the interface.If you selectDomain Name / IP, enter the domain name or the IP address of the ZyWALL. The IP address of the ZyWALL in the IKE SA is the specified IP address or the IP address corresponding to the domain name. 0.0.0.0 is invalid.
Peer Gateway AddressSelect how the IP address of the remote IPSec router in the IKE SA is defined.SelectStatic Addressto enter the domain name or the IP address of the remote IPSec router. You can provide a second IP address or domain name for the ZyWALL to try if it cannot establish an IKE SA with the first one.SelectDynamic Addressif the remote IPSec router has a dynamic IP address (and does not use DDNS).
AuthenticationClickAdvancedto display more settings. ClickBasicto display fewer settings.Note: The ZyWALL and remote IPSec router must use the same authentication method to establish the IKE SA.
Pre-Shared KeySelect this to have the ZyWALL and remote IPSec router use a pre-shared key (password) to identify each other when they negotiate the IKE SA. Type the pre-shared key in the field to the right. The pre-shared key can be8 - 32 alphanumeric characters or ;; |` ~!@#$%^&*()_+{\}':./ <>=-.16 - 64 hexadecimal (0-9, A-F) characters, preceded by "0x".If you want to enter the key in hexadecimal, type "0x" at the beginning of the key. For example, "0x0123456789ABCDEF" is in hexadecimal format; in "0123456789ABCDEF" is in ASCII format. If you use hexadecimal, you must enter twice as many characters as listed above.The ZyWALL and remote IPSec router must use the same pre-shared key.
CertificateSelect this to have the ZyWALL and remote IPSec router use certificates to authenticate each other when they negotiate the IKE SA. Then select the certificate the ZyWALL uses to identify itself to the remote IPsec router.This certificate is one of the certificates in My Certificates. If this certificate is self-signed, import it into the remote IPsec router. If this certificate is signed by a CA, the remote IPsec router must trust that CA.Note: The IPSec routers must trust each other's certificates.The ZyWALL uses one of its Trusted Certificates to authenticate the remote IPSec router's certificate. The trusted certificate can be a self-signed certificate or that of a trusted CA that signed the remote IPSec router's certificate.
Local ID TypeThis field is read-only if the ZyWALL and remote IPSec router use certificates to identify each other. Select which type of identification is used to identify the ZyWALL during authentication. Choices are:IP - the ZyWALL is identified by an IP addressDNS - the ZyWALL is identified by a domain nameE-mail - the ZyWALL is identified by an e-mail address
ContentThis field is read-only if the ZyWALL and remote IPSec router use certificates to identify each other. Type the identity of the ZyWALL during authentication. The identity depends on the Local ID Type.IP - type an IP address; if you type 0.0.0.0, the ZyWALL uses the IP address specified in the My Address field. This is not recommended in the following situations:There is a NAT router between the ZyWALL and remote IPSec router.You want the remote IPSec router to be able to distinguish between IPSec SA requests that come from IPSec routers with dynamic WAN IP addresses.In these situations, use a different IP address, or use a different Local ID Type.DNS - type the domain name; you can use up to 31 ASCII characters including spaces, although trailing spaces are truncated. This value is only used for identification and can be any string.E-mail - the ZyWALL is identified by an e-mail address; you can use up to 31 ASCII characters including spaces, although trailing spaces are truncated. This value is only used for identification and can be any string.
Peer ID TypeSelect which type of identification is used to identify the remote IPSec router during authentication. Choices are:IP - the remote IPSec router is identified by an IP addressDNS - the remote IPSec router is identified by a domain nameE-mail - the remote IPSec router is identified by an e-mail addressAny - the ZyWALL does not check the identity of the remote IPSec routerIf the ZyWALL and remote IPSec router use certificates, there is one more choice.Subject Name - the remote IPSec router is identified by the subject name in the certificate
ContentThis field is disabled if the Peer ID Type is Any. Type the identity of the remote IPSec router during authentication. The identity depends on the Peer ID Type.If the ZyWALL and remote IPSec router do not use certificates,IP - type an IP address; see the note at the end of this description.DNS - type the domain name; you can use up to 31 ASCII characters including spaces, although trailing spaces are truncated. This value is only used for identification and can be any string.E-mail - the ZyWALL is identified by an e-mail address; you can use up to 31 ASCII characters including spaces, although trailing spaces are truncated. This value is only used for identification and can be any string.If the ZyWALL and remote IPSec router use certificates, type the following fields from the certificate used by the remote IPSec router.IP - subject alternative name field; see the note at the end of this description.DNS - subject alternative name fieldE-mail - subject alternative name fieldSubject Name - subject name (maximum 255 ASCII characters, including spaces)Note: If Peer ID Type is IP, please read the rest of this section.If you type 0.0.0.0, the ZyWALL uses the IP address specified in the Secure Gateway Address field. This is not recommended in the following situations:There is a NAT router between the ZyWALL and remote IPSec router.You want the remote IPSec router to be able to distinguish between IPSec SA requests that come from IPSec routers with dynamic WAN IP addresses.In these situations, use a different IP address, or use a different Peer ID Type.
Phase 1 SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
SA Life Time (Seconds)Type the maximum number of seconds the IKE SA can last. When this time has passed, the ZyWALL and remote IPSec router have to update the encryption and authentication keys and re-negotiate the IKE SA. This does not affect any existing IPSec SAs, however.
Negotiation ModeSelect the negotiation mode to use to negotiate the IKE SA. Choices areMain- this encrypts the ZyWALL's and remote IPSec router's identities but takes more time to establish the IKE SAAggressive- this is faster but does not encrypt the identitiesThe ZyWALL and the remote IPSec router must use the same negotiation mode.
Proposal
#This field is a sequential value, and it is not associated with a specific proposal. The sequence of proposals should not affect performance significantly.
EncryptionSelect which key size and encryption algorithm to use in the IKE SA.Choices are:DES- a 56-bit key with the DES encryption algorithm3DES- a 168-bit key with the DES encryption algorithmAES128- a 128-bit key with the AES encryption algorithmAES192- a 192-bit key with the AES encryption algorithmAES256- a 256-bit key with the AES encryption algorithmThe ZyWALL and the remote IPSec router must use the same key size and encryption algorithm. Longer keys require more processing power, resulting in increased latency and decreased throughput.
AuthenticationSelect which hash algorithm to use to authenticate packet data in the IPSec SA. Choices areSHA1andMD5.SHA1is generally considered stronger thanMD5, but it is also slower.The remote IPSec router must use the same authentication algorithm.
Add iconThis column contains icons to add and remove proposals.To add a proposal, click theAddicon at the top of the column.To remove a proposal, click theRemoveicon next to the proposal.The ZyWALL confirms that you want to delete the proposal before doing so.
Key GroupSelect which Diffie-Hellman key group (DHx) you want to use for encryption keys. Choices are:DH1- use a 768-bit random numberDH2- use a 1024-bit random numberDH5- use a 1536-bit random numberThe longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group.
NAT TraversalSelect this if any of these conditions are satisfied.This IKE SA might be used to negotiate IPSec SA that use active protocol AH.There are one or more NAT routers between the ZyWALL and remote IPSec router, and these routers do not support IPSec pass-thru or a similar feature.The remote IPSec router must also enable NAT traversal, and the NAT routers have to forward packets with UDP port 500 and UDP 4500 headers unchanged.
Dead Peer Detection (DPD)Select this check box if you want the ZyWALL to make sure the remote IPSec router is there before it transmits data through the IKE SA. If there has been no traffic for at least 15 seconds, the ZyWALL sends a message to the remote IPSec server. If the remote IPSec server responds, the ZyWALL transmits the data. If the remote IPSec server does not respond, the ZyWALL shuts down the IKE SA.
More Settings/Less SettingsClick this button to show or hide the Extended Authentication fields.
Extended AuthenticationWhen multiple IPSec routers use the same VPN tunnel to connect to a single VPN tunnel (telecommuters sharing a tunnel for example), use extended authentication to enforce a user name and password check. This way even though they all know the VPN tunnel's security settings, each still has to provide a unique user name and password.
Enable Extended AuthenticationSelect this if one of the routers (the ZyWALL or the remote IPSec router) verifies a user name and password from the other router using the local user database and/or an external server.
Server ModeSelect this if the ZyWALL authenticates the user name and password from the remote IPSec router. You also have to select the authentication method, which specifies how the ZyWALL authenticates this information.
Client ModeSelect this radio button if the ZyWALL provides a username and password to the remote IPSec router for authentication. You also have to provide the User Name and the Password.
User NameThis field is required if the ZyWALL is in Client Mode for extended authentication. Type the user name the ZyWALL sends to the remote IPSec router. The user name can be 1-31 ASCII characters. It is case-sensitive, but spaces are not allowed.
PasswordThis field is required if the ZyWALL is in Client Mode for extended authentication. Type the password the ZyWALL sends to the remote IPSec router. The password can be 1-31 ASCII characters. It is case-sensitive, but spaces are not allowed.
OKClick OK to save your settings and exit this screen.
CancelClick Cancel to exit this screen without saving.

21.4 The VPN Concentrator Screen

A VPN concentrator combines several IPSec VPN connections into one secure network.

Figure 223 VPN Topologies (Fully Meshed and Hub and Spoke)
ZYXEL ZYWALL USG 2000 - The VPN Concentrator Screen - 1

flowchart
graph TD
    subgraph 1
        A1["Router"] --> A2["A"]
        A2 --> A3["B"]
        A3 --> A4["D"]
        A4 --> A5["E"]
        A5 --> A6["C"]
    end
    subgraph 2
        A7["Router"] --> A8["A"]
        A8 --> A9["B"]
        A9 --> A10["D"]
        A10 --> A11["C"]
        A11 --> A12["E"]

In a fully-meshed VPN topology (1 in the figure), there is a VPN connection between every pair of routers. In a hub-and-spoke VPN topology (2 in the figure), there is a VPN connection between each spoke router (B, C, D, and E) and the hub router (A), which uses the VPN concentrator. The VPN concentrator routes VPN traffic between the spoke routers and itself.

A VPN concentrator reduces the number of VPN connections that you have to set up and maintain in the network. You might also be able to consolidate the policy routes in each spoke router, depending on the IP addresses and subnets of each spoke.

However a VPN concentrator is not for every situation. The hub router is a single failure point, so a VPN concentrator is not as appropriate if the connection between spoke routers cannot be down occasionally (maintenance, for example). There is also more burden on the hub router. It receives VPN traffic from one spoke, decrypts it, inspects it to find out to which spoke to route it, encrypts it, and sends it to the appropriate spoke. Therefore, a VPN concentrator is more suitable when there is a minimum amount of traffic between spoke routers.

The VPN Concentrator summary screen displays the VPN concentrators in the ZyWALL. To access this screen, click VPN > IPSec VPN > Concentrator. The following screen appears.

Figure 224 VPN > IPSec VPN > Concentrator
ZYXEL ZYWALL USG 2000 - The VPN Concentrator Screen - 2

text_image VPN Connection VPN Gateway Concentrator SA Monitor Configuration Name Example1

Each field is discussed in the following table. See Section 21.4.1 on page 364 for more information.

Table 111 VPN > IPSec VPN > Concentrator

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific concentrator.
NameThis field displays the name of the VPN concentrator.
Add iconThis column provides icons to add, edit, and remove VPN concentrators.To add a VPN concentrator, click the Add icon at the top of the column.The VPN Concentrator Add/Edit screen appears.To edit a VPN concentrator, click the Edit icon next to the concentrator.The VPN Concentrator Add/Edit screen appears accordingly.To delete a VPN concentrator, click on the Remove icon next to the concentrator. The web configurator confirms that you want to delete the VPN concentrator.

21.4.1 The VPN Concentrator Add/Edit Screen

The VPN Concentrator Add/Edit screen allows you to create a new VPN concentrator or edit an existing one. To access this screen, go to the VPN Concentrator summary screen (see Section 21.4 on page 363), and click either the Add icon or an Edit icon.

Figure 225 VPN > IPSec VPN > Concentrator > Edit
ZYXEL ZYWALL USG 2000 - The VPN Concentrator Add/Edit Screen - 1

text_image Group Members Name Example1 # Member 1 IPSEC / WIZ_VPN OK Cancel

Each field is described in the following table.

Table 112 VPN > IPSec VPN > Concentrator > Edit

LABELDESCRIPTION
NameEnter the name of the concentrator. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
#This field is a sequential value, and it is not associated with a specific member in the concentrator.
MemberThis field displays the name of each member in the concentrator.Note: You must disable policy enforcement in each member. See Section 21.2.1 on page 343.Click the Popup icon to change this member in the group. The following screen appears.IPSec VPN connection policies that do not belong to a VPN concentrator appear on the left. Select any VPN connection policies that you want to add to the VPN concentrator and click the right arrow button to add them.The VPN concentrator's member VPN connections appear on the right. Select any VPN connections that you want to remove from the VPN concentrator, and click the left arrow button to remove them.Figure 226 Network > IPSec VPN > Concentrator > Edit > MemberZYXEL ZYWALL USG 2000 - The VPN Concentrator Add/Edit Screen - 2
Add iconThis column provides icons to add members to and remove members from the concentrator.Click an Add icon at the top of the column to add a new member at the beginning of the list, or click the Add icon next to an existing member to add a new member after the existing one. The Member List screen appears. See the member Popup description for more details.To remove a member from the concentrator, click on the Remove icon next to the member. The web configurator confirms that you want to remove the member.
OKClick OK to save your changes in the ZyWALL.
CancelClick Cancel to exit this screen without saving.

21.5 The SA Monitor Screen

You can use the SA Monitor screen to display and to manage active IPSec SAs. To access this screen, click VPN > IPSec VPN > SA Monitor. The following screen appears.

Figure 227 VPN > IPSec VPN > SA Monitor
ZYXEL ZYWALL USG 2000 - The SA Monitor Screen - 1

text_image VPN Connection VPN Gateway Concentrator SA Monitor Current IPSec Security Associations Name Policy Search Total Connection : 0 30 connection per page Page : 1 of 1

Name Encapsulation Policy Algorithm Up Time Timeout Inbound(Bytes) Outbound(Bytes) Action

Refresh

Each field is described in the following table.

Table 113 VPN > IPSec VPN > SA Monitor

LABELDESCRIPTION
NameEnter the name of a IPSec SA here and click Search to find it (if it is associated). You can use a keyword or regular expression. Use up to 30 alphanumeric and _+-.()!^:?|[]<>/ characters. See Regular Expressions in Searching IPSec SAs on page 373 for more details.
PolicyEnter the IP address(es) or names of the local and remote policies for an IPSec SA and click Search to find it. You can use a keyword or regular expression. Use up to 30 alphanumeric and _+-.()!^:?|{}[]<>/ characters. See Regular Expressions in Searching IPSec SAs on page 373 for more details.
SearchClick this button to search for an IPSec SA that matches the information you specified above.
Total ConnectionThis field displays the total number of associated IPSec SAs.
connection per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific SA.
NameThis field displays the name of the IPSec SA.
EncapsulationThis field displays how the IPSec SA is encapsulated.
PolicyThis field displays the content of the local and remote policies for this IPSec SA. The IP addresses, not the address objects, are displayed.
AlgorithmThis field displays the encryption and authentication algorithms used in the SA.
Up TimeThis field displays how many seconds the IPSec SA has been active. This field displays N/A if the IPSec SA uses manual keys.
TimeoutThis field displays how many seconds remain in the SA life time, before the ZyWALL automatically disconnects the IPSec SA. This field displays N/A if the IPSec SA uses manual keys.
Inbound (Bytes)This field displays the amount of traffic that has gone through the IPSec SA from the remote IPSec router to the ZyWALL since the IPSec SA was established.
Outbound (Bytes)This field displays the amount of traffic that has gone through the IPSec SA from the ZyWALL to the remote IPSec router since the IPSec SA was established.
ActionThis field is displayed if the IPSec SA does not use manual keys.Click the Disconnect icon next to an IPSec SA to disconnect it.
RefreshClick Refresh to update the information in the display.

21.6 IPSec VPN Background Information

Here is some more detailed IPSec VPN background information.

IKE SA Overview

The IKE SA provides a secure connection between the ZyWALL and remote IPSec router.

It takes several steps to establish an IKE SA. The negotiation mode determines how many. There are two negotiation modes--main mode and aggressive mode. Main mode provides better security, while aggressive mode is faster.

Note: Both routers must use the same negotiation mode.

These modes are discussed in more detail in Negotiation Mode on page 371. Main mode is used in various examples in the rest of this section.

IP Addresses of the ZyWALL and Remote IPSec Router

To set up an IKE SA, you have to specify the IP addresses of the ZyWALL and remote IPSec router. You can usually enter a static IP address or a domain name for either or both IP addresses. Sometimes, your ZyWALL might offer another alternative, such as using the IP address of a port or interface, as well.

You can also specify the IP address of the remote IPSec router as 0.0.0.0. This means that the remote IPSec router can have any IP address. In this case, only the remote IPSec router can initiate an IKE SA because the ZyWALL does not

know the IP address of the remote IPSec router. This is often used for telecommuters.

IKE SA Proposal

The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm, and Diffie-Hellman (DH) key group that the ZyWALL and remote IPSec router use in the IKE SA. In main mode, this is done in steps 1 and 2, as illustrated next.

Figure 228 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal

One or more proposals, each one consisting of:

  • encryption algorithm
  • authentication algorithm
  • Diffie-Hellman key group

ZYXEL ZYWALL USG 2000 - IKE SA Proposal - 1

flowchart
graph LR
    X["Device X"] -->|1| Y["Device Y"]
    Y -->|2| X

The ZyWALL sends one or more proposals to the remote IPSec router. (In some devices, you can only set up one proposal.) Each proposal consists of an encryption algorithm, authentication algorithm, and DH key group that the ZyWALL wants to use in the IKE SA. The remote IPSec router selects an acceptable proposal and sends the accepted proposal back to the ZyWALL. If the remote IPSec router rejects all of the proposals, the ZyWALL and remote IPSec router cannot establish an IKE SA.

Note: Both routers must use the same encryption algorithm, authentication algorithm, and DH key group.

In most ZyWALLs, you can select one of the following encryption algorithms for each proposal. The algorithms are listed in order from weakest to strongest.

  • Data Encryption Standard (DES) is a widely used method of data encryption. It applies a 56-bit key to each 64-bit block of data.
  • Triple DES (3DES) is a variant of DES. It iterates three times with three separate keys, effectively tripling the strength of DES.
  • Advanced Encryption Standard (AES) is a newer method of data encryption that also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data. It is faster than 3DES.

Some ZyWALLs also offer stronger forms of AES that apply 192-bit or 256-bit keys to 128-bit blocks of data.

In most ZyWALLs, you can select one of the following authentication algorithms for each proposal. The algorithms are listed in order from weakest to strongest.

- MD5 (Message Digest 5) produces a 128-bit digest to authenticate packet data.

- SHA1 (Secure Hash Algorithm) produces a 160-bit digest to authenticate packet data.

See Diffie-Hellman (DH) Key Exchange on page 369 for more information about DH key groups.

Diffie-Hellman (DH) Key Exchange

The ZyWALL and the remote IPSec router use DH public-key cryptography to establish a shared secret. The shared secret is then used to generate encryption keys for the IKE SA and IPSec SA. In main mode, this is done in steps 3 and 4, as illustrated next.

Figure 229 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
Diffie-Hellman key exchange
ZYXEL ZYWALL USG 2000 - Diffie-Hellman (DH) Key Exchange - 1

flowchart
graph LR
    X["设备X"] -->|3| Y["设备Y"]
    Y -->|4| X

DH public-key cryptography is based on DH key groups. Each key group is a fixed number of bits long. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. For example, DH2 keys (1024 bits) are more secure than DH1 keys (768 bits), but DH2 keys take longer to encrypt and decrypt.

Authentication

Before the ZyWALL and remote IPSec router establish an IKE SA, they have to verify each other's identity. This process is based on pre-shared keys and router identities.

In main mode, the ZyWALL and remote IPSec router authenticate each other in steps 5 and 6, as illustrated below. The identities are also encrypted using the

encryption algorithm and encryption key the ZyWALL and remote IPSec router selected in previous steps.

Figure 230 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication (continued)
ZYXEL ZYWALL USG 2000 - Authentication - 1

flowchart
graph LR
    A["Device X"] -->|Step 5: pre-shared key ZyWALL identity, consisting of - ID type - content
Step 6: pre-shared key Remote IPSec router identity, consisting of - ID type - content| B["Device Y"]
    B -->|Step 6: pre-shared key ZyWALL identity, consisting of - ID type - content| A

You have to create (and distribute) a pre-shared key. The ZyWALL and remote IPSec router use it in the authentication process, though it is not actually transmitted or exchanged.

Note: The ZyWALL and the remote IPSec router must use the same pre-shared key.

Router identity consists of ID type and content. The ID type can be domain name, IP address, or e-mail address, and the content is a (properly-formatted) domain name, IP address, or e-mail address. The content is only used for identification. Any domain name or e-mail address that you enter does not have to actually exist. Similarly, any domain name or IP address that you enter does not have to correspond to the ZyWALL's or remote IPSec router's properties.

The ZyWALL and the remote IPSec router have their own identities, so both of them must store two sets of information, one for themselves and one for the other router. Local ID type and content refers to the ID type and content that applies to the router itself, and peer ID type and content refers to the ID type and content that applies to the other router.

Note: The ZyWALL's local and peer ID type and content must match the remote IPSec router's peer and local ID type and content, respectively.

For example, in Table 114 on page 371, the ZyWALL and the remote IPSec router authenticate each other successfully. In contrast, in Table 115 on page 371, the

ZyWALL and the remote IPSec router cannot authenticate each other and, therefore, cannot establish an IKE SA.

Table 114 VPN Example: Matching ID Type and Content

ZYWALLREMOTE IPSEC ROUTER
Local ID type: E-mailLocal ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Peer ID type: IPPeer ID type: E-mail
Peer ID content: 1.1.1.2Peer ID content: tom@yourcompany.com

Table 115 VPN Example: Mismatching ID Type and Content

ZYWALLREMOTE IPSEC ROUTER
Local ID type: E-mailLocal ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Peer ID type: IPPeer ID type: E-mail
Peer ID content: 1.1.1.20Peer ID content: tom@yourcompany.com

It is also possible to configure the ZyWALL to ignore the identity of the remote IPSec router. In this case, you usually set the peer ID type to Any. This is less secure, so you should only use this if your ZyWALL provides another way to check the identity of the remote IPSec router (for example, extended authentication) or if you are troubleshooting a VPN tunnel.

Additional Topics for IKE SA

This section provides more information about IKE SA.

Negotiation Mode

There are two negotiation modes--main mode and aggressive mode. Main mode provides better security, while aggressive mode is faster.

Main mode takes six steps to establish an IKE SA.

Steps 1 - 2: The ZyWALL sends its proposals to the remote IPSec router. The remote IPSec router selects an acceptable proposal and sends it back to the ZyWALL.

Steps 3 - 4: The ZyWALL and the remote IPSec router exchange pre-shared keys for authentication and participate in a Diffie-Hellman key exchange, based on the accepted DH key group, to establish a shared secret.

Steps 5 - 6: Finally, the ZyWALL and the remote IPSec router generate an encryption key (from the shared secret), encrypt their identities, and exchange their encrypted identity information for authentication.

In contrast, aggressive mode only takes three steps to establish an IKE SA. Aggressive mode does not provide as much security because the identity of the ZyWALL and the identity of the remote IPSec router are not encrypted. It is usually used in remote-access situations, where the address of the initiator is not known by the responder and both parties want to use pre-shared keys for authentication. For example, the remote IPSec router may be a telecommuter who does not have a static IP address.

VPN, NAT, and NAT Traversal

In the following example, there is another router (A) between router X and router Y.

Figure 231 VPN/NAT Example
ZYXEL ZYWALL USG 2000 - VPN, NAT, and NAT Traversal - 1

flowchart
graph LR
    X["Router X"] --> A["Router A"]
    A --> Internet["Internet"]
    Y["Router Y"] --> Internet
    style Internet fill:#ccc,stroke:#333

If router A does NAT, it might change the IP addresses, port numbers, or both. If router X and router Y try to establish a VPN tunnel, the authentication fails because it depends on this information. The routers cannot establish a VPN tunnel.

Most routers like router A now have an IPSec pass-thru feature. This feature helps router A recognize VPN packets and route them appropriately. If router A has this feature, router X and router Y can establish a VPN tunnel as long as the active protocol is ESP. (See Active Protocol on page 374 for more information about active protocols.)

If router A does not have an IPSec pass-thru or if the active protocol is AH, you can solve this problem by enabling NAT traversal. In NAT traversal, router X and router Y add an extra header to the IKE SA and IPSec SA packets. If you configure router A to forward these packets unchanged, router X and router Y can establish a VPN tunnel.

You have to do the following things to set up NAT traversal.

  • Enable NAT traversal on the ZyWALL and remote IPSec router.
  • Configure the NAT router to forward packets with the extra header unchanged. (See the field description for detailed information about the extra header.)

The extra header may be UDP port 500 or UDP port 4500, depending on the standard(s) the ZyWALL and remote IPSec router support.

Extended Authentication

Extended authentication is often used when multiple IPSec routers use the same VPN tunnel to connect to a single IPSec router. For example, this might be used with telecommuters.

In extended authentication, one of the routers (the ZyWALL or the remote IPSec router) provides a user name and password to the other router, which uses a local user database and/or an external server to verify the user name and password. If the user name or password is wrong, the routers do not establish an IKE SA.

You can set up the ZyWALL to provide a user name and password to the remote IPSec router, or you can set up the ZyWALL to check a user name and password that is provided by the remote IPSec router.

If you use extended authentication, it takes four more steps to establish an IKE SA. These steps occur at the end, regardless of the negotiation mode (steps 7-10 in main mode, steps 4-7 in aggressive mode).

Certificates

It is possible for the ZyWALL and remote IPSec router to authenticate each other with certificates. In this case, you do not have to set up the pre-shared key, local identity, or remote identity because the certificates provide this information instead.

  • Instead of using the pre-shared key, the ZyWALL and remote IPSec router check the signatures on each other's certificates. Unlike pre-shared keys, the signatures do not have to match.
  • The local and peer ID type and content come from the certificates.

Note: You must set up the certificates for the ZyWALL and remote IPSec router first.

Regular Expressions in Searching IPSec SAs

A question mark (?) lets a single character in the VPN connection or policy name vary. For example, use "a?c" (without the quotation marks) to specify abc, acc and so on.

Wildcards (*) let multiple VPN connection or policy names match the pattern. For example, use “*abc” (without the quotation marks) to specify any VPN connection or policy name that ends with “abc”. A VPN connection named “testabc” would match. There could be any number (of any type) of characters in front of the “abc” at the end and the VPN connection or policy name would still match. A VPN connection or policy name named “testacc” for example would not match.

A * in the middle of a VPN connection or policy name has the ZyWALL check the beginning and end and ignore the middle. For example, with "abc*123", any VPN connection or policy name starting with "abc" and ending in "123" matches, no matter how many characters are in between.

The whole VPN connection or policy name has to match if you do not use a question mark or asterisk.

IPSec SA Overview

Once the ZyWALL and remote IPSec router have established the IKE SA, they can securely negotiate an IPSec SA through which to send data between computers on the networks.

Note: The IPSec SA stays connected even if the underlying IKE SA is not available anymore.

This section introduces the key components of an IPSec SA.

Local Network and Remote Network

In an IPSec SA, the local network, the one(s) connected to the ZyWALL, may be called the local policy. Similarly, the remote network, the one(s) connected to the remote IPSec router, may be called the remote policy.

Active Protocol

The active protocol controls the format of each packet. It also specifies how much of each packet is protected by the encryption and authentication algorithms. IPSec VPN includes two active protocols, AH (Authentication Header, RFC 2402) and ESP (Encapsulating Security Payload, RFC 2406).

Note: The ZyWALL and remote IPSec router must use the same active protocol.

Usually, you should select ESP. AH does not support encryption, and ESP is more suitable with NAT.

Encapsulation

There are two ways to encapsulate packets. Usually, you should use tunnel mode because it is more secure. Transport mode is only used when the IPSec SA is used for communication between the ZyWALL and remote IPSec router (for example, for remote management), not between computers on the local and remote networks.

Note: The ZyWALL and remote IPSec router must use the same encapsulation.

These modes are illustrated below.

Figure 232 VPN: Transport and Tunnel Mode Encapsulation
ZYXEL ZYWALL USG 2000 - Encapsulation - 1

bar_stacked | Packet Type | IP Header | AH/ESP Header | Data | | ----------------------- | --------- | ------------- | ---- | | Original Packet | IP Header | TCP Header | Data | | Transport Mode Packet | IP Header | AH/ESP Header | TCP Header | | Tunnel Mode Packet | IP Header | AH/ESP Header | IP Header | | Transport Mode Packet | Data | AH/ESP Header | Data |

In tunnel mode, the ZyWALL uses the active protocol to encapsulate the entire IP packet. As a result, there are two IP headers:

  • Outside header: The outside IP header contains the IP address of the ZyWALL or remote IPSec router, whichever is the destination.
  • Inside header: The inside IP header contains the IP address of the computer behind the ZyWALL or remote IPSec router. The header for the active protocol (AH or ESP) appears between the IP headers.

In transport mode, the encapsulation depends on the active protocol. With AH, the ZyWALL includes part of the original IP header when it encapsulates the packet. With ESP, however, the ZyWALL does not include the IP header when it encapsulates the packet, so it is not possible to verify the integrity of the source IP address.

IPSec SA Proposal and Perfect Forward Secrecy

An IPSec SA proposal is similar to an IKE SA proposal (see IKE SA Proposal on page 368), except that you also have the choice whether or not the ZyWALL and remote IPSec router perform a new DH key exchange every time an IPSec SA is established. This is called Perfect Forward Secrecy (PFS).

If you enable PFS, the ZyWALL and remote IPSec router perform a DH key exchange every time an IPSec SA is established, changing the root key from which encryption keys are generated. As a result, if one encryption key is compromised, other encryption keys remain secure.

If you do not enable PFS, the ZyWALL and remote IPSec router use the same root key that was generated when the IKE SA was established to generate encryption keys.

The DH key exchange is time-consuming and may be unnecessary for data that does not require such security.

Additional Topics for IPSec SA

This section provides more information about IPSec SA in your ZyWALL.

IPSec SA using Manual Keys

You might set up an IPSec SA using manual keys when you want to establish a VPN tunnel quickly, for example, for troubleshooting. You should only do this as a temporary solution, however, because it is not as secure as a regular IPSec SA.

In IPSec SAs using manual keys, the ZyWALL and remote IPSec router do not establish an IKE SA. They only establish an IPSec SA. As a result, an IPSec SA using manual keys has some characteristics of IKE SA and some characteristics of IPSec SA. There are also some differences between IPSec SA using manual keys and other types of SA.

IPSec SA Proposal using Manual Keys

In an IPSec SA using manual keys, you can only specify one encryption algorithm and one authentication algorithm. You cannot specify several proposals. There is no DH key exchange, so you have to provide the encryption key and the authentication key the ZyWALL and remote IPSec router use.

Note: The ZyWALL and remote IPSec router must use the same encryption key and authentication key.

Authentication and the Security Parameter Index (SPI)

For authentication, the ZyWALL and remote IPSec router use the SPI, instead of pre-shared keys, ID type and content. The SPI is an identification number.

Note: The ZyWALL and remote IPSec router must use the same SPI.

NAT for Inbound and Outbound Traffic

The ZyWALL can translate the following types of network addresses in IPSec SA.

  • Source address in outbound packets - this translation is necessary if you want the ZyWALL to route packets from computers outside the local network through the IPSec SA.
  • Source address in inbound packets - this translation hides the source address of computers in the remote network.
  • Destination address in inbound packets - this translation is used if you want to forward packets (for example, mail) from the remote network to a specific computer (like the mail server) in the local network.

Each kind of translation is explained below. The following example is used to help explain each one.

Figure 233 VPN Example: NAT for Inbound and Outbound Traffic
ZYXEL ZYWALL USG 2000 - NAT for Inbound and Outbound Traffic - 1

flowchart
graph LR
    subgraph A
        A1["Computer"] --> A2["Router"]
        A2 --> A3["Server"]
        A3 --> X
        X --> M
    end
    subgraph B
        B1["Computer"] --> B2["Router"]
        B2 --> B3["Server"]
        B3 --> Y
        Y --> B4["Computer"]
    end
    X -->|10.0.0.1/24| M
    style A fill:#f9f,stroke:#333
    style B fill:#bbf,stroke:#333
    style X fill:#dfd,stroke:#333
    style Y fill:#dfd,stroke:#333

Source Address in Outbound Packets (Outbound Traffic, Source NAT)

This translation lets the ZyWALL route packets from computers that are not part of the specified local network (local policy) through the IPSec SA. For example, in Figure 233 on page 377, you have to configure this kind of translation if you want computer M to establish a connection with any computer in the remote network (B). If you do not configure it, the remote IPSec router may not route messages for computer M through the IPSec SA because computer M's IP address is not part of its local policy.

To set up this NAT, you have to specify the following information:

  • Source - the original source address; most likely, computer M's network.
  • Destination - the original destination address; the remote network (B).
  • SNAT - the translated source address; the local network (A).

Source Address in Inbound Packets (Inbound Traffic, Source NAT)

You can set up this translation if you want to change the source address of computers in the remote network. To set up this NAT, you have to specify the following information:

  • Source - the original source address; the remote network (B).
  • Destination - the original destination address; the local network (A).

- SNAT - the translated source address; a different IP address (range of addresses) to hide the original source address.

Destination Address in Inbound Packets (Inbound Traffic, Destination NAT)

You can set up this translation if you want the ZyWALL to forward some packets from the remote network to a specific computer in the local network. For example, in Figure 233 on page 377, you can configure this kind of translation if you want to forward mail from the remote network to the mail server in the local network (A).

You have to specify one or more rules when you set up this kind of NAT. The ZyWALL checks these rules similar to the way it checks rules for a firewall. The first part of these rules define the conditions in which the rule apply.

  • Original IP - the original destination address; the remote network (B).
  • Protocol - the protocol [TCP, UDP, or both] used by the service requesting the connection.
  • Original Port - the original destination port or range of destination ports; in Figure 233 on page 377, it might be port 25 for SMTP.

The second part of these rules controls the translation when the condition is satisfied.

  • Mapped IP - the translated destination address; in Figure 233 on page 377, the IP address of the mail server in the local network (A).
  • Mapped Port - the translated destination port or range of destination ports.

The original port range and the mapped port range must be the same size.

22.1 Overview

Use SSL VPN to allow users to use a web browser for secure remote user login (the remote users do not need a VPN router or VPN client software.

22.1.1 What You Can Do in the SSL VPN Screens

  • Use the VPN > SSL VPN > Access Privilege screens (see Section 22.2 on page 381) to configure SSL access policies.
  • Use the VPN > SSL VPN > Connection Monitor screen (see Section 22.3 on page 385) to view a list of active SSL VPN connections and delete an active connection.
  • Use the Click VPN > SSL VPN > Global Setting screen (see Section 22.4 on page 386) to set the IP address of the ZyWALL (or a gateway device) on your network for full tunnel mode access, enter access messages or upload a custom logo to be displayed on the remote user screen.

22.1.2 What You Need to Know About SSL VPN

There are two SSL VPN network access modes: reverse proxy and full tunnel.

Reverse Proxy Mode

In reverse proxy mode, the ZyWALL is a proxy that acts on behalf of the local network servers (such as your web and mail servers). As the final destination, the ZyWALL appears to be the server to remote users. This provides an added layer of protection for your internal servers.

With reverse proxy mode, remote users can easily access any web-based applications on the local network by clicking on links or entering the provided URL.

You do not have to install additional client software on the remote user computers for access.

Figure 234 Network Access Mode: Reverse Proxy
ZYXEL ZYWALL USG 2000 - Reverse Proxy Mode - 1

flowchart
graph LR
    A["User"] -->|https://| B["Internet"]
    B --> C["Server"]
    C --> D["LAN (192.168.1.x)"]
    D --> E["Web Mail"]
    D --> F["File Share"]
    E --> G["Web-based Application"]
    F --> G

Full Tunnel Mode

In full tunnel mode, a virtual connection is created for remote users with private IP addresses in the same subnet as the local network. This allows them to access network resources in the same way as if they were part of the internal network.

Figure 235 Network Access Mode: Full Tunnel Mode
ZYXEL ZYWALL USG 2000 - Full Tunnel Mode - 1

flowchart
graph LR
    A["User"] -->|https://| B["Internet"]
    B --> C["Server"]
    C --> D["LAN (192.168.1.x)"]
    D --> E["Application Server"]
    D --> F["Web Mail"]
    D --> G["Non-Web"]
    D --> H["File Share"]
    style A fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style C fill:#cfc,stroke:#333
    style D fill:#fcc,stroke:#333
    style E fill:#ffc,stroke:#333
    style F fill:#cfc,stroke:#333
    style G fill:#cfc,stroke:#333
    style H fill:#cfc,stroke:#333

SSL Access Policy

An SSL access policy allows the ZyWALL to perform the following tasks:

- limit user access to specific applications or files on the network.

- allow user access to specific networks.

- assign private IP addresses and provide DNS/WINS server information to remote users to access internal networks.

SSL Access Policy Objects

The SSL access policies reference the following objects. If you update this information, in response to changes, the ZyWALL automatically propagates the

changes through the SSL policies that use the object(s). When you delete an SSL policy, the objects are not removed.

Table 116 Objects

OBJECT TYPEOBJECT SCREENDESCRIPTION
User AccountsUser Account/User GroupConfigure a user account or user group to which you want to apply this SSL access policy.
ApplicationSSL ApplicationConfigure an SSL application object to specify the application type and server users are allowed to access.
IP PoolAddressConfigure an address object that defines a range of private IP addresses to assign to user computers so they can access the internal network through a VPN connection.
Server AddressesAddressConfigure address objects for the IP addresses of the DNS and WINS servers that the ZyWALL sends to the VPN connection users.
VPN NetworkAddressConfigure an address object to specify which network segment users are allowed to access through a VPN connection.

You cannot delete an object that is referenced by an SSL access policy. To delete the object, you must first unassociate the object from the SSL access policy.

Finding Out More

• See Section 5.4.5 on page 107 for related information on these screens.
• See Section 22.5 on page 388 for how to establish an SSL VPN connection to the ZyWALL (after you have configured the SSL VPN settings on the ZyWALL).

22.2 The SSL Access Privilege Screen

Click VPN > SSL VPN to open the Access Privilege screen. This screen lists the configured SSL access policies.

Figure 236 VPN > SSL VPN > Access Privilege
ZYXEL ZYWALL USG 2000 - The SSL Access Privilege Screen - 1

text_image Access Privilege Connection Monitor Global Setting Configuration

Name User/Group Application

1 WebAccess Cindy, admin, ldap-users WebExample Apply Reset

The following table describes the labels in this screen.

Table 117 VPN > SSL VPN > Access Privilege

LABELDESCRIPTION
#This field displays the index number of the entry.
NameThis field displays the descriptive name of the SSL access policy for identification purposes.
User/GroupThis field displays the user account or user group name(s) associated to an SSL access policy.This field displays up to three names.
ApplicationThis field displays the descriptive name of the SSL application object this policy uses.
Add iconThis column provides icons to add, edit, and remove policies.To add a new policy, click the Add icon at the top of the column.To activate or disable the policy, click the Activate/Deactivate icon.To edit a policy, click the Edit icon next to the policy.To delete a policy, click the Remove icon next to the policy.To rearrange a policy in the list, click the Move to N icon next to the policy.
ApplyClick Apply to save the settings.
ResetClick Reset to discard all changes.

22.2.1 The SSL Access Policy Add/Edit Screen

To create a new or edit an existing SSL access policy, click the Add or Edit icon in the Access Privilege screen.

Figure 237 VPN > SSL VPN > Access Privilege > Add/Edit
ZYXEL ZYWALL USG 2000 - The SSL Access Policy Add/Edit Screen - 1

text_image Configuration Enable Policy Name Description New New create (Optional) User/Group Selectable User/Group Objects ad-users ldap-users radius-users >>> << Selected User/Group Objects admin user Create New User Object SSL Application List (Optional) Selectable Application Objects >>>> << Selected Application Objects Create New Application Object Network Extension (Optional) Enable Network Extension Assign IP Pool DNS Server 1 DNS Server 2 none none WINS Server 1 WINS Server 2 none Network List Selectable Address Objects DMZ1_SUBNET DMZ2_SUBNET DMZ3_SUBNET LAN_SUBNET VMZ_VPN_LOCAL >> << Selected Address Objects Create New Address Object OK Cancel

The following table describes the labels in this screen.

Table 118 VPN > SSL VPN > Access Privilege > Add/Edit

LABELDESCRIPTION
Configuration
Enable PolicySelect this option to activate this SSL access policy.
NameEnter a descriptive name to identify this policy. You can enter up to 15 characters (“a-z”, A-Z”, “0-9”) with no spaces allowed.
DescriptionEnter additional information about this SSL access policy. You can enter up to 31 characters (“0-9”, “a-z”, “A-Z”, “-” and “_”).
User/GroupThe Selectable User/Group Objects list displays the name(s) of the user account and/or user group(s) to which you have not applied an SSL access policy yet.To associate a user or user group to this SSL access policy, select a user account or user group and click >> to add to the Selected User/Group Objects list. You can select more than one name.To remove a user or user group, select the name(s) in the Selected User/Group Objects list and click <<.
Create New User ObjectClick this to display a screen you use to create a new user account or user group name (see Chapter 36 on page 613 for details).
SSL Application List (Optional)The Selectable Application Objects list displays the name(s) of the SSL application(s) you can select for this SSL access policy.To associate an SSL application to this SSL access policy, select a name and click >> to add to the Selected Application Objects list. You can select more than one application.To remove an SSL application, select the name(s) in the Selected Application Objects list and click <<.
Create New Application ObjectClick this to create a new SSL application object. Refer to Chapter 44 on page 689 for more information.
Network Extension (Optional)
Enable Network ExtensionSelect this option to create a VPN tunnel between the authenticated users and the internal network. This allows the users to access the resources on the network as if they were on the same local network.Clear this option to disable this feature. Users can only access the applications as defined by the selected SSL application settings and the remote user computers are not made to be a part of the local network.
Assign IP PoolDefine a separate pool of IP addresses to assign to the SSL users. Select it here.The SSL VPN IP pool cannot overlap with IP addresses on the ZyWALL's local networks (LAN and DMZ for example), the SSL user's network, or the networks you specify in the SSL VPN Network List.
DNS/WINS Server 1..2Select the name of the DNS or WINS server whose information the ZyWALL sends to the remote users. This allows them to access devices on the local network using domain names instead of IP addresses.
Network ListTo allow user access to local network(s), select a network name in the Selectable Address Objects list and click >> to add to the Selected Address Objects list. You can select more than one network.To block access to a network, select the network name in the Selected Address Objects list and click <<.
Create New Address ObjectClick this to create a new network object. Refer to Chapter 37 on page 629 for more information.
OKClick OK to save the changes and return to the main Access Privilege screen.
CancelClick Cancel to discard all changes and return to the main Access Privilege screen.

22.3 The SSL VPN Connection Monitor Screen

The ZyWALL can keep track of SSL VPN users' connections. Click VPN > SSL VPN in the navigation panel and click the Connection Monitor tab to display the user list.

Use this screen to do the following:

• View a list of active SSL VPN connections.
- Delete an active connection.

Once a user disconnects the connection, the corresponding entry is removed from the Connection Monitor screen.

Figure 238 VPN > SSL VPN > Connection Monitor
ZYXEL ZYWALL USG 2000 - The SSL VPN Connection Monitor Screen - 1

text_image Access Privilege Connection Monitor Global Setting Configuration

User Access Login Address Connected Time Inbound (Bytes) Outbound (Bytes) Action

Refresh

The following table describes the labels in this screen.

Table 119 VPN > SSL VPN > Connection Monitor

LABELDESCRIPTION
#This field displays the index number.
UserThis field displays the account user name used to establish this SSL VPN connection.
AccessThis field displays the name of the SSL VPN application the user is accessing.
Login AddressThis field displays the IP address the user used to establish this SSL VPN connection.
Connected TimeThis field displays the time this connection was established.
Inbound (Bytes)This field displays the number of bytes received by the ZyWALL on this connection.
Outbound (Bytes)This field displays the number of bytes transmitted by the ZyWALL on this connection.
ActionClick the icon to terminate the connection of the user and delete corresponding session information from the ZyWALL.
RefreshClick Refresh to update this screen.

22.4 The SSL Global Setting Screen

Click VPN > SSL VPN and click the Global Setting tab to display the following screen. Use this screen to set the IP address of the ZyWALL (or a gateway device) on your network for full tunnel mode access, enter access messages or upload a custom logo to be displayed on the remote user screen.

Figure 239 VPN > SSL VPN > Global Setting
ZYXEL ZYWALL USG 2000 - The SSL Global Setting Screen - 1

text_image Access Privilege Connection Monitor Global Setting Global Setting Network Extension Local IP 192.168.200.1 Message Login Message Welcome to SSL VPN Logout Message Goodbye to SSL VPN Update Client Virtual Desktop Logo To upload a logo file (*.gif/png/jpg), browse to the location of the file and then click Upload. File Path: Browse... Upload Reset Logo to default ZyXEL Apply Reset

The following table describes the labels in this screen.

Table 120 VPN > SSL VPN > Global Setting

LABELDESCRIPTION
Global Setting
Network Extension IP AddressSpecify the IP address of the ZyWALL (or a gateway device) for full tunnel mode SSL VPN access.Leave this field to the default settings unless it conflicts with another interface.
Message
Login MessageSpecify a message to display on the screen when a user logs in and an SSL VPN connection is established successfully. You can enter up to 31 characters (“a-z”, A-Z”, “0-9”) with spaces allowed.
Logout MessageSpecify a message to display on the screen when a user logs out and the SSL VPN connection is terminated successfully. You can enter up to 31 characters ("a-z", A-Z", "0-9") with spaces allowed.
Update Client Virtual Desktop LogoYou can upload a graphic logo to be displayed on the web browser on the remote user computer. The ZyXEL company logo is the default logo.Specify the location and file name of the logo graphic or clickBrowseto locate it.Note: The logo graphic must be GIF, JPG, or PNG format. The graphic should use a resolution of 127 x 57 pixels to avoid distortion when displayed. The ZyWALL automatically resizes a graphic of a different resolution to 127 x 57 pixels. The file size must be 100 kilobytes or less. Transparent background is recommended.
BrowseClickBrowseto locate the graphic file on your computer.
UploadClickUploadto transfer the specified graphic file from your computer to the ZyWALL.
Reset Logo to DefaultClickReset Logo to Defaultto display the ZyXEL company logo on the remote user's web browser.
ApplyClickApplyto save the changes and/or start the logo file upload process.
ResetClickResetto start configuring this screen again.

Follow the steps below to upload a custom logo to display on the remote user SSL VPN screens.

1 Click VPN > SSL VPN and click the Global Setting tab to display the configuration screen.
2 Click Browse to locate the logo graphic. Make sure the file is in GIF, JPG, or PNG format.
3 Click Apply to start the file transfer process.
4 Log in as a user to verify that the new logo displays properly.

The following shows an example logo on the remote user screen.

Figure 240 Example Logo Graphic Display
ZYXEL ZYWALL USG 2000 - How to Upload a Custom Logo - 1

text_image Application File Sharing Language: English Application Name Type WebExample Web Server ZW5 Web Server

22.5 Establishing an SSL VPN Connection

After you have configured the SSL VPN settings on the ZyWALL, follow the steps below to establish an SSL VPN connection.

1 Display the login screen and enter your user account information (the user name and password).
2 Select Login to SSL VPN.
3 Click Login.

4 SSL VPN connection starts. This may take several minutes depending on your network connection. Once the connection is up, you should see the client portal screen. The following shows an example.

Figure 241 SSL VPN Client Portal Screen Example
ZYXEL ZYWALL USG 2000 - Establishing an SSL VPN Connection - 1

text_image Zyxel Application File Sharing Language: English Application Name Type WebExample Web Server ZW5 Web Server

If the user account is not set up for SSL VPN access, an “SSL VPN connection is not activated” message displays in the Login screen. Clear the Login to SSL VPN check box and try logging in again.

For more information on user portal screens, refer to Chapter 23 on page 391.

SSL User Screens

23.1 Overview

This chapter introduces the remote user SSL VPN screens. The following figure shows a network example where a remote user (A) logs into the ZyWALL from the Internet to access the web server (WWW) on the local network.

Figure 242 Network Example
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph LR
    A["WWW"] --> B["数据交换机"]
    B --> C["INTERNET"]
    C --> D["Laptop"]
    style A fill:#f9f,stroke:#333
    style D fill:#bbf,stroke:#333

23.1.1 What You Need to Know About the SSL User Screens

The ZyWALL can use SSL VPN to provide secure connections to network resources such as applications, files, intranet sites or e-mail through a web-based interface and using Microsoft Outlook Web Access (OWA).

Network Resource Access Methods

As a remote user, you can access resources on the local network using one of the following methods.

• Using a supported web browser
Once you have successfully logged in through the ZyWALL, you can access any intranet site, web-based applications or web-based e-mails using one of the supported web browsers.

• Using the SecuExtender Java thin client

The ZyWALL automatically loads a Java thin client program to your computer after a successful login. With the thin client, you can access servers, remote desktops and manage files as if you were on the local network.

System Requirements

Here are the browser and computer system requirements for remote user access.

• Windows 2000 and Windows XP
- Internet Explorer 5.5 and above (for IE7, JRE 1.6 must be enabled)
• Netscape 7.2 and above
- Firefox 1.0 and above
- Mozilla 1.7.3 and above
- Sun's Java (Java Runtime Environment or 'JRE') installed and enabled with a minimum version of 1.4.

Required Information

A remote user needs the following information from the network administrator to log in and access network resources.

  • the domain name or IP address of the ZyWALL
  • the login account user name and password
  • if also required, the user name and/or password to access the network resource

Certificates

The remote user's computer establishes an HTTPS connection to the ZyWALL to access the login screen. If instructed by your network administrator, you must install or import a certificate (provided by the ZyWALL or your network administrator). Refer to Appendix D on page 881 for more information.

Finding Out More

See Chapter 22 on page 379 for how to configure SSL VPN on the ZyWALL.

23.2 Remote User Login

This section shows you how to access and log into the network through the ZyWALL. Example screens for Internet Explorer are shown.

1 Open a web browser and enter the web site address or IP address of the ZyWALL. For example, "http://sslvpn.mycompany.com".

Figure 243 Enter the Address in a Web Browser
ZYXEL ZYWALL USG 2000 - Remote User Login - 1

text_image about:blank - Microsoft Internet Explorer File Edit View Favorites Tools Help Back → Search Address http://sslvpn.mycompany.com

2 Click OK or Yes if a security screen displays.

Figure 244 Login Security Screen
ZYXEL ZYWALL USG 2000 - Remote User Login - 2

text_image Security Alert Information you exchange with this site cannot be viewed or changed by others. However, there is a problem with the site's security certificate. The security certificate was issued by a company you have not chosen to trust. View the certificate to determine whether you want to trust the certifying authority. The security certificate date is valid. The name on the security certificate is invalid or does not match the name of the site Do you want to proceed? Yes No View Certificate

3 A login screen displays. Enter the user name and password of your login account. If a token password is also required, enter it in the One-Time Password field.
4 Select Log into SSL VPN and click Login to log in and establish an SSL VPN connection to the network to access network resources.

Figure 245 Login Screen
ZYXEL ZYWALL USG 2000 - Remote User Login - 3

text_image Enter User Name/Password and click to login. User Name: Password: One-Time Password: (Optional) (max. 31 alphanumeric, printable characters and no spaces) Log into SSL VPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. 3. Turn on Java Runtime Environment (JRE) in your web browser. Login Reset

5 Your computer starts establishing a secure connection to the ZyWALL after a successful login. This may take up to two minutes. If you get a message about needing Java, download and install it and restart your browser and re-login. If a certificate warning screen displays, click OK, Yes or Continue.

Figure 246 Java Needed Message
ZYXEL ZYWALL USG 2000 - Remote User Login - 4

text_image Portal Java Runtime Environment(JRE) 1.4 or higher must be installed and enabled in order for web application objects and the network extension feature to work. Please download the latest JRE at site: http://www.java.com/download You can use all of the SSL VPN features after installing the JRE and restarting your browser. NOTE: Without JRE, file sharing still works. OK

6 The following status screen displays indicating the progress of the secure SSL VPN connection setup.

Figure 247 SecuExtender Progress
ZYXEL ZYWALL USG 2000 - Remote User Login - 5

text_image Loading ZyWALL SecuExtender: 80%

7 The Application screen displays showing the list of resources available to you. See Figure 248 on page 395 for a screen example.

Note: Available resource links vary depending on the configuration your network administrator made.

23.3 The SSL VPN User Screens

This section describes the main elements in the remote user screens.

Figure 248 Remote User Screen
ZYXEL ZYWALL USG 2000 - The SSL VPN User Screens - 1

text_image ZyXEL Application File Sharing Language: English Application Name Type WebExample Web Server ZW5 Web Server

The following table describes the various parts of a remote user screen.

Table 121 Remote User Screen Overview

#DESCRIPTION
1Click on a menu tab to go to theApplication or File Sharingscreen.
2Click this icon to create a bookmark to the SSL VPN user screen in your web browser.
3Click this icon to display the on-line help window.
4Click this icon to log out and terminate the secure connection.
5Select your preferred language for the interface.
6This part of the screen displays a list of the resources available to you.In theApplicationscreen, click on a link to access or display the access method.In theFile Sharingscreen, click on a link to open a file or directory.

23.4 Bookmarking the ZyWALL

You can create a bookmark of the ZyWALL by clicking the Add to Favorite icon. This allows you to access the ZyWALL using the bookmark without having to enter the address every time.

1 In any remote user screen, click the Add to Favorite icon.
2 A screen displays. Accept the default name in the Name field or enter a descriptive name to identify this link.
3 Click OK to create a bookmark in your web browser.

Figure 249 Add Favorite
ZYXEL ZYWALL USG 2000 - Bookmarking the ZyWALL - 1

text_image Add Favorite Internet Explorer will add this page to your Favorites list. Make available offline Customize... Name: Protal Serial OK Cancel Create in >>

23.5 Logging Out of the SSL VPN User Screens

To properly terminate a connection, click on the Logout icon in any remote user screen.

1 Click the Logout icon in any remote user screen.
2 A prompt window displays. Click OK to continue.

Figure 250 Logout: Prompt
ZYXEL ZYWALL USG 2000 - Logging Out of the SSL VPN User Screens - 1

text_image Microsoft Internet Explorer Are you sure you want to logout? OK Cancel

3 An information screen displays to indicate that the SSL VPN connection is about to terminate.

Figure 251 Logout: Connection Termination Progress
ZYXEL ZYWALL USG 2000 - Logging Out of the SSL VPN User Screens - 2

text_image Shutting down ZyWALL SecuExtender: 20% Java Applet Window

SSL User Application Screens

24.1 SSL User Application Screens Overview

Use the Application screen to access web-based applications (such as web sites and e-mail) on the network through the SSL VPN connection. Which applications you can access depends on the ZyWALL's configuration.

24.2 The Application Screen

Click the Application tab to display the screen. The Name field displays the descriptive name for an application. The Type field displays whether the application is a web site (Web Server) or web-based e-mail using Microsoft Outlook Web Access (OWA).

To access a web-based application, simply click a link in the Application screen to display the web screen in a separate browser window.

Figure 252 Application
ZYXEL ZYWALL USG 2000 - The Application Screen - 1

text_image Zyxel Application File Sharing Language: English Application Name Type WebExample Web Server ZW5 Web Server

SSL User File Sharing

25.1 Overview

The File Sharing screen lets you access files on a file server through the SSL VPN connection.

25.1.1 What You Need to Know About the SSL VPN File Sharing

Use the File Sharing screen to display and access shared files/folders on a file server.

You can also perform the following actions:

  • Access a folder.
  • Open a file (if your web browser cannot open the file, you are prompted to download it).
  • Save a file to your computer.
  • Create a new folder.
  • Rename a file or folder.
  • Delete a file or folder.
  • Upload a file.

Note: Available actions you can perform in the File Sharing screen vary depending on the rights granted to you on the file server.

25.2 The Main File Sharing Screen

The first File Sharing screen displays the name(s) of the shared folder(s) available. The following figure shows an example with one file share.

Figure 253 File Sharing
ZYXEL ZYWALL USG 2000 - The Main File Sharing Screen - 1

text_image ZyXEL Application File Sharing Language: English File Sharing FileSharing

25.3 Opening a File or Folder

You can open a file if the file extension is recognized by the web browser and the associated application is installed on your computer.

1 Log in as a remote user and click the File Sharing tab.
2 Click on a file share icon.

3 If an access user name and password are required, a screen displays as shown in the following figure. Enter the account information and click Login to continue.

Figure 254 File Sharing: Enter Access User Name and Password
ZYXEL ZYWALL USG 2000 - Opening a File or Folder - 1

text_image ZyXEL Application File Sharing Language: English File Sharing Up 172.23.37.110 Enter User Name/Password and click to login. User Name: Password: ( max. 30 alphanumeric, printable characters and no spaces ) Note: You are requested to login this shared folder because administrator set permissions for users who access this folder over the network. Login Cancel

4 A list of files/folders displays. Click on a file to open it in a separate browser window. You can also click a folder to access it.

For this example, click on a .doc file to open the Word document.

Figure 255 File Sharing: Open a Word File
ZYXEL ZYWALL USG 2000 - Opening a File or Folder - 2

text_image ZyXEL Application File Sharing Language: English File Sharing New Folder Up Type File Name Size Modified Date Action Standard_SC.ps 491 kb Thu Dec 7 15:03:18 2006 PrintingProcess.doc 31 kb Thu Dec 7 14:55:00 2006 NewBusRoute.pdf 489 kb Thu Dec 7 14:55:24 2006 New Folder 0 kb Thu Dec 7 15:04:58 2006 FeedbackEdit.doc 23 kb Thu Dec 7 14:55:12 2006 2006calender.xls 35 kb Thu Dec 7 14:55:42 2006 Browse... Upload https://172.23.37.121/cifs/172.23.37.110/Tmp/Share/PrintingProcess.doc - Microsoft Internet E... File Edit View Insert Format Tools Table Go To Favorites Help Back Search Favorites Media Address https://172.23.37.121/cifs/172.23.37.110/Tmp/Share/PrintingProcess.doc Go Links 3 | | 2 | | 1 | | | | | | | | | | | | | | | | | | | | Printing Process Process Overview For Boxes 1. Digital output and proofing Unknown Zone

25.3.1 Downloading a File

You are prompted to download a file which cannot be opened using a web browser.

Follow the on-screen instructions to download and save the file to your computer. Then launch the associated application to open the file.

25.3.2 Saving a File

After you have opened a file in a web browser, you can save a copy of the file by clicking File > Save As and following the on-screen instructions.

Figure 256 File Sharing: Save a Word File
ZYXEL ZYWALL USG 2000 - Saving a File - 1

text_image https://172.23.37.121/cifs/172.23.37.110/Tmp/Share/PrintingProcess.doc - Microsoft Internet E... File Edit View Insert Format Tools Table Go To Favorites Help New Open... Ctrl+O Save Ctrl+S Save As... Page Setup... Print... Ctrl+P Send Import and Export... Properties Work Offline Close Search Favorites Media cifs/172.23.37.110/Tmp/Share/PrintingProcess.doc Go Links 1 2 3 4 5 6 7 8 9 10 11 Printing Process cess Overview For Boxes 1. Digital output and proofing Saves this document as a file.

25.4 Creating a New Folder

To create a new folder in the file share location, click the New Folder icon.

Specify a descriptive name for the folder. You can enter up to 356 characters. Then click Add.

Note: Make sure the length of the folder name does not exceed the maximum allowed on the file server.

Figure 257 File Sharing: Save a Word File
ZYXEL ZYWALL USG 2000 - Creating a New Folder - 1

text_image New Folder Folder Name Add Cancel

25.5 Renaming a File or Folder

To rename a file or folder, click the Rename icon next to the file/folder.

Figure 258 File Sharing: Rename
ZYXEL ZYWALL USG 2000 - Renaming a File or Folder - 1

text_image ZyXEL Application File Sharing Language: English File Sharing New Folder Up Type File Name Size Modified Dateakoction Standard_SC.ps 491 kb Thu Dec 7 15:03:18 2006 PrintingProcess.doc 31 kb Thu Dec 7 14:55:00 2006 NewBusRoute.pdf 489 kb Thu Dec 7 14:55:24 2006 New Folder 0 kb Thu Dec 7 15:04:58 2006 FeedbackEdit.doc 23 kb Thu Dec 7 14:55:12 2006 2006calender.xls 35 kb Thu Dec 7 14:55:42 2006 Rename Browse... Upload

A popup window displays. Specify the new name and/or file extension in the field provided. You can enter up to 356 characters. Then click Apply.

Note: Make sure the length of the name does not exceed the maximum allowed on the file server.

You may not be able to open a file if you change the file extension.

Figure 259 File Sharing: Rename
ZYXEL ZYWALL USG 2000 - Renaming a File or Folder - 2

text_image Rename Original Name File.RTF New Name Test.RTF Apply Cancel

25.6 Deleting a File or Folder

Click the Delete icon next to a file or folder to remove it. There is no confirmation screen - the file or folder is just deleted - so be sure you really do not want the item before you click.

25.7 Uploading a File

Follow the steps below to upload a file to the file server.

1 Log into the remote user screen and click the File Sharing tab.
2 Specify the location and/or name of the file you want to upload. Or click Browse to locate it.
3 Click Upload to send the file to the file server.
4 After the file is uploaded successfully, you should see the name of the file and a message in the screen.

Figure 260 File Sharing: File Upload
ZYXEL ZYWALL USG 2000 - Uploading a File - 1

text_image ZyXEL Application File Sharing Language: English File Sharing New Folder Up Type File Name Size Modified Dateako Standard_SC.ps 491 kb Thu Dec 7 15:03:18 2006 PrintingProcess.doc 31 kb Thu Dec 7 14:55:00 2006 NewBusRoute.pdf 489 kb Thu Dec 7 14:55:24 2006 New Folder 0 kb Thu Dec 7 15:04:58 2006 LogoTest.jpg 5 kb Thu Dec 7 17:14:54 2006 File.RTF 88 kb Thu Dec 7 17:03:36 2006 FeedbackEdit.doc 23 kb Thu Dec 7 14:55:12 2006 2006calender.xls 35 kb Thu Dec 7 14:55:42 2006 Browse... Upload

Note: Uploading a file with the same name and file extension replaces the existing file on the file server. No warning message is displayed.

26.1 Overview

L2TP VPN lets remote users use the L2TP and IPSec client software included with their computers' operating systems to securely connect to the network behind the ZyWALL. The remote users do not need their own IPSec gateways or VPN client software.

Figure 261 L2TP VPN Overview
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph LR
    A["Desktop"] --> B["IPSec VPN Tunnel"]
    C["Desktop"] --> B
    D["Desktop"] --> B
    B --> E["Internet"]
    F["L2TP Tunnel"] --> B
    G["User"] --> H["Computer"]

26.1.1 What You Can Do in the L2TP VPN Screens

  • Use the L2TP VPN screen (see Section 26.2 on page 411) to configure the ZyWALL's L2TP VPN settings.
  • Use the Session Monitor screen (see Section 26.3 on page 412) to display and manage the ZyWALL's connected L2TP VPN sessions.

26.1.2 What You Need to Know About L2TP VPN

The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel network traffic between two peers over another network (like the Internet). In L2TP VPN, an IPSec VPN tunnel is established first and then an L2TP tunnel is built inside it. See Chapter 21 on page 339 for information on IPSec VPN.

IPSec Configuration Required for L2TP VPN

You must configure an IPSec VPN connection for L2TP VPN to use (see Chapter 21 on page 339 for details). The IPSec VPN connection must:

  • Be enabled.
  • Use transport mode.
  • Not be a manual key VPN connection.
  • Use Pre-Shared Key authentication.
  • Use a VPN gateway with the Secure Gateway set to 0.0.0.0 if you need to allow L2TP VPN clients to connect from more than one IP address.

Using the Default L2TP VPN Connection

Default_L2TP_VPN_Connection is pre-configured to be convenient to use for L2TP VPN. If you use it, edit the following.

Configure the local and remote policies as follows.

  • For the Local Policy, create an address object that uses host type and contains the My Address IP address that you configured in the Default_L2TP_VPN_GW. Use this address object in the local policy.
  • For the Remote Policy, create an address object that uses host type and an IP address of 0.0.0.0. Use this address object in the remote policy.

You must also edit the Default_L2TP_VPN_GW gateway entry.

  • Configure the My Address setting according to your requirements.
  • Replace the default Pre-Shared Key.

Policy Route

You must configure a policy route to let remote users access resources on a network behind the ZyWALL.

  • Set the policy route's Source Address to the address object that you want to allow the remote users to access (LAN_SUBNET in the following figure).
  • Set the Destination Address to the IP address pool that the ZyWALL assigns to the remote users (L2TP_POOL in the following figure).
  • Set the next hop to be the VPN tunnel that you are using for L2TP.

Figure 262 Policy Route for L2TP VPN
ZYXEL ZYWALL USG 2000 - Policy Route - 1

flowchart
graph LR
    A["LAN_SUBNET"] --> B["L2TP Tunnel"]
    B --> C["Internet"]
    C --> D["L2TP_POOL"]
    subgraph LAN_SUBNET
        E["Computer 1"]
        F["Computer 2"]
        G["Computer 3"]
        H["Computer 4"]
    end
    subgraph IPSec_VPN_Tunnel
        I["IPSec VPN Tunnel"]
    end

Finding Out More

• See Section 5.4.6 on page 107 for related information on these screens.
• See Chapter 27 on page 415 for an example of how to create a basic L2TP VPN tunnel.

26.2 L2TP VPN Screen

Click VPN > L2TP VPN to open the following screen. Use this screen to configure the ZyWALL's L2TP VPN settings.

Note: Disconnect any existing L2TP VPN sessions before modifying L2TP VPN settings. The remote users must make any needed matching configuration changes and re-establish the sessions using the new settings.

Figure 263 VPN > L2TP VPN
ZYXEL ZYWALL USG 2000 - L2TP VPN Screen - 1

text_image L2TP VPN Session Monitor General Settings Enable L2TP Over IPSec VPN Connection Default_L2TP_VPN_Connection IP Address Pool L2TP_POOL Authentication Method default Allowed User L2TP-test Keep Alive Timer 60 (1-180 seconds) First DNS Server (Optional) Custom Defined Second DNS Server (Optional) Custom Defined First WINS Server (Optional) Second WINS Server (Optional) Apply Reset

The following table describes the fields in this screen.

Table 122 VPN > IPSec VPN > VPN Connection

LABELDESCRIPTION
Enable L2TP Over IPSecUse this field to turn the ZyWALL's L2TP VPN function on or off.
VPN ConnectionSelect the IPSec VPN connection the ZyWALL uses for L2TP VPN. All of the configured VPN connections display here, but the one you use must meet the requirements listed in IPSec Configuration Required for L2TP VPN on page 409.Note: Modifying this VPN connection (or the VPN gateway that it uses) disconnects any existing L2TP VPN sessions.
IP Address PoolSelect the pool of IP addresses that the ZyWALL uses to assign to the L2TP VPN clients. SelectCreate Objectto configure a new pool of IP addresses.
Authentication MethodSelect how the ZyWALL authenticates a remote user before allowing access to the L2TP VPN tunnel.The authentication method has the ZyWALL check a user's user name and password against the ZyWALL's local database, a remote LDAP, RADIUS, a Active Directory server, or more than one of these. See Chapter 41 on page 659 for how to create authentication method objects.
Allowed UserThe remote user must log into the ZyWALL to use the L2TP VPN tunnel.Select a user or user group that can use the L2TP VPN tunnel. Select Create Object to configure a new user account (see Section 36.2.1 on page 616 for details). Otherwise, select any to allow any user with a valid account and password on the ZyWALL to log in.
Keep Alive TimerThe ZyWALL sends a Hello message after waiting this long without receiving any traffic from the remote user. The ZyWALL disconnects the VPN tunnel if the remote user does not respond.
First DNS Server Second DNS ServerSpecify the IP addresses of DNS servers to assign to the remote users. You can specify these IP addresses two ways.Custom Defined - enter a static IP address.From ISP - use the IP address of a DNS server that another interface received from its DHCP server.
First WINS Server, Second WINS ServerThe WINS (Windows Internet Naming Service) server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using.Type the IP addresses of up to two WINS servers to assign to the remote users. You can specify these IP addresses two ways.
ApplyClick Apply to save your changes in the ZyWALL.
ResetClick Cancel to start configuring this screen afresh.

26.3 L2TP VPN Session Monitor Screen

Click VPN > L2TP VPN > Session Monitor to open the following screen. Use this screen to display and manage the ZyWALL's connected L2TP VPN sessions.

Figure 264 VPN > L2TP VPN > Session Monitor
ZYXEL ZYWALL USG 2000 - L2TP VPN Session Monitor Screen - 1

text_image L2TP VPN Session Monitor Current L2TP Session

User Name Hostname Assigned IP Public IP Action

1 L2TP-test Tw11746 192.168.10.13 172.23.37.122 Refresh

The following table describes the fields in this screen.

Table 123 VPN > L2TP VPN > Session Monitor

LABELDESCRIPTION
#This is the index number of a current L2TP VPN session.
User NameThis field displays the remote user's user name.
HostnameThis field displays the name of the computer that has this L2TP VPN connection with the ZyWALL.
Assigned IPThis field displays the IP address that the ZyWALL assigned for the remote user's computer to use within the L2TP VPN tunnel.
Public IPThis field displays the public IP address that the remote user is using to connect to the Internet.
ActionClick the Disconnect icon next to an L2TP VPN connection to disconnect it.
RefreshClick Refresh to update the information in the display.

L2TP VPN Example

This chapter shows how to create a basic L2TP VPN tunnel.

27.1 L2TP VPN Example

This chapter uses the following settings in creating a basic L2TP VPN tunnel.

Figure 265 L2TP VPN Example
ZYXEL ZYWALL USG 2000 - L2TP VPN Example - 1

flowchart
graph LR
    A["LAN_SUBNET: 192.168.1.x"] --> B["L2TP Tunnel"]
    B --> C["IPSec VPN Tunnel"]
    C --> D["L2TP_POOL: 192.168.10.10~192.168.10.20"]
    style A fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style C fill:#cfc,stroke:#333
    style D fill:#fcc,stroke:#333
  • The ZyWALL has a static IP address of 172.16.1.2 for the ge2 interface.
  • The remote user has a dynamic public IP address and connects through the Internet.
  • You configure an IP address pool object named L2TP_POOL to assign the remote users IP addresses from 192.168.10.10 to 192.168.10.20 for use in the L2TP VPN tunnel.
  • The VPN rule allows the remote user to access the LAN_SUBNET which covers the 192.168.1.x subnet.

27.2 Configuring the Default L2TP VPN Gateway Example

1 Click VPN > Network > IPSec VPN > VPN Gateway to open the screen that lists the VPN gateways. Click the Default_L2TP_VPN_GW entry's Edit icon.

Figure 266 VPN > IPSec VPN > VPN Gateway > Edit
ZYXEL ZYWALL USG 2000 - Configuring the Default L2TP VPN Gateway Example - 1

text_image General Settings VPN Gateway Name Default_L2TP_VPN_GW Gateway Settings My Address Interface ge2 Static - 172.16.1.2/255.255.255.0 Domain Name / IP Peer Gateway Address Static Address Dynamic Address Authentication Advanced Pre-Shared Key top-secret Certificate default (See My Certificates) Phase 1 Settings Advanced SA Life Time 86400 (180 - 3000000 Seconds) More Settings OK Cancel
  • Configure the My Address setting. This example uses interface ge2 with static IP address 172.16.1.2.
  • Select Pre-Shared Key and configure a password. This example uses top-secret. Click OK.

2 Click the Default_L2TP_VPN_GW entry's Enable icon and click Apply to turn on the entry.

Figure 267 VPN > IPSec VPN > VPN Gateway (Enable)
ZYXEL ZYWALL USG 2000 - Configuring the Default L2TP VPN Gateway Example - 2

text_image VPN Connection VPN Gateway Concentrator SA Monitor Configuration Total Connection:1 30 connection per page Page: 1 of 1

Name My address Secure Gateway VPN Connection

1 Default_L2TP_VPN_GW ge2 0.0.0.0, 0.0.0.0 Default_L2TP_VPN_Connection Apply Reset

27.3 Configuring the Default L2TP VPN Connection Example

1 Click VPN > Network > IPSec VPN to open the screen that lists the VPN connections. Click the Default_L2TP_VPN_Connection's Edit icon.

Figure 268 VPN > IPSec VPN > VPN Connection > Edit
ZYXEL ZYWALL USG 2000 - Configuring the Default L2TP VPN Connection Example - 1

text_image Policy Local policy L2TP_FACE HOST, 172.16.1.2 Remote policy L2TP_HOST HOST, 0.0.0.0 ✓ Policy Enforcement Phase 2 Settings SA Life Time 86400 (180 - 3000000 Seconds) More Settings OK Cancel Basic Advanced

2 Click the Policy section's Advanced button. Enforce and configure the local and remote policies.

  • For the Local Policy, create an address object that uses host type and contains the My Address IP address that you configured in the Default_L2TP_VPN_GW. The address object in this example uses the ge2 interface's IP address (172.16.1.2) and is named L2TP_IFACE.
  • For the Remote Policy, create an address object that uses host type and an IP address of 0.0.0.0. It is named L2TP_HOST in this example.

3 Click the Default_L2TP_VPN_Connection entry's Enable icon and click Apply to turn on the entry.

Figure 269 VPN > IPSec VPN > VPN Connection (Enable)
ZYXEL ZYWALL USG 2000 - Configuring the Default L2TP VPN Connection Example - 2

text_image VPN Connection VPN Gateway Concentrator SA Monitor Global Setting Use Policy Route to control dynamic IPSec rules Ignore "Don't Fragment" setting in packet header Configuration Total Connection:1 30 connection per page Page: 1 of 1

Name VPN Gateway Encapsulation Algorithm Policy

1 Default_L2TP_VPN_Connection Default_L2TP_VPN_GW TRANSPORT 3DES/SHA 3DES/MD5 DES/SHA L2TP_IFACE/L2TP_HOST Apply Reset

27.4 Configuring the L2TP VPN Settings Example

1 Click VPN > L2TP VPN to open the following screen.

Figure 270 VPN > L2TP VPN Example
ZYXEL ZYWALL USG 2000 - Configuring the L2TP VPN Settings Example - 1

text_image L2TP VPN Session Monitor General Settings Enable L2TP Over IPSec VPN Connection Default_L2TP_VPN_Connection IP Address Pool L2TP_POOL Authentication Method default Allowed User L2TP-test Keep Alive Timer 60 (1-180 seconds) First DNS Server (Optional) Custom Defined Second DNS Server (Optional) Custom Defined First WINS Server (Optional) Second WINS Server (Optional) Apply Reset

2 Configure the following.

  • Enable the connection.
  • Set it to use the Default_L2TP_VPN_Connection VPN connection.
  • Configure an IP address pool for the range of 192.168.10.10 to 192.168.10.20. It is called L2TP_POOL here.
  • This example uses the default authentication method (the ZyWALL's local user data base).
  • Select a user or group of users that can use the tunnel. Here a user account named L2TP-test has been created.
  • The other fields are left to the defaults in this example, click Apply.

27.5 Configuring the Policy Route for L2TP Example

1 Click Routing > Add to open the following screen.

Figure 271 Routing > Add: L2TP VPN Example
ZYXEL ZYWALL USG 2000 - Configuring the Policy Route for L2TP Example - 1

text_image Configuration Enable Description for-L2TP (Optional) Criteria User any Incoming Interface / any Change... Source Address LAN_SUBNET Destination Address L2TP_POOL Schedule none Service any Next-Hop Type VPN Tunnel Default_L2TP_VPN_Connection Auto Destination Address Bandwidth Shaping Maximum Bandwidth 0 Kbps Bandwidth Priority (1-7, 1 is highest priority) Maximize Bandwidth Usage OK Cancel

2 Configure the following.

  • Enable the policy route.
  • Set the policy route's Source Address to the address object that you want to allow the remote users to access (LAN_SUBNET in this example).
  • Set the Destination Address to the IP address pool that the ZyWALL assigns to the remote users (L2TP_POOL in this example).
  • Set the next hop to be the Default_L2TP_VPN_Connection VPN tunnel.
  • Click OK.

27.6 Configuring L2TP VPN in Windows XP and 2000

The following sections cover how to configure L2TP in remote user computers using Windows XP and Windows 2000. The example settings in these sections go along with the L2TP VPN configuration example in Section 27.1 on page 415.

Before you configure the client, issue one of the following commands from the Windows command prompt to make sure the computer is running the Microsoft IPSec service. Make sure you include the quotes.

  • For Windows XP. use net start "ipsec services".
  • For Windows 2000, use net start "ipsec policy agent".

27.6.1 Configuring L2TP in Windows XP

In Windows XP do the following to establish an L2TP VPN connection.

1 Click Start > Control Panel > Network Connections > New Connection Wizard.
2 Click Next in the Welcome screen.
3 Select Connect to the network at my workplace and click Next.

Figure 272 New Connection Wizard: Network Connection Type
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 1

text_image New Connection Wizard Network Connection Type What do you want to do? Connect to the Internet Connect to the Internet so you can browse the Web and read email. Connect to the network at my workplace Connect to a business network (using dial-up or VPN) so you can work from home, a field office, or another location. Set up a home or small office network Connect to an existing home or small office network or set up a new one. Set up an advanced connection Connect directly to another computer using your serial, parallel, or infrared port, or set up this computer so that other computers can connect to it. < Back Next > Cancel

4 Select Virtual Private Network connection and click Next.

Figure 273 New Connection Wizard: Network Connection
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 2

text_image New Connection Wizard Network Connection How do you want to connect to the network at your workplace? Create the following connection: ○ Dial-up connection Connect using a modem and a regular phone line or an Integrated Services Digital Network (ISDN) phone line. ● Virtual Private Network connection Connect to the network using a virtual private network (VPN) connection over the Internet. < Back Next > Cancel

5 Type L2TP to ZyWALL as the Company Name.

Figure 274 New Connection Wizard: Connection Name
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 3

text_image New Connection Wizard Connection Name Specify a name for this connection to your workplace. Type a name for this connection in the following box. Company Name L2TP to ZyWALL For example, you could type the name of your workplace or the name of a server you will connect to. < Back Next > Cancel

6 Select Do not dial the initial connection and click Next.

Figure 275 New Connection Wizard: Public Network
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 4

text_image New Connection Wizard Public Network Windows can make sure the public network is connected first. Windows can automatically dial the initial connection to the Internet or other public network, before establishing the virtual connection. Do not dial the initial connection. Automatically dial this initial connection: < Back Next > Cancel

7 Enter the domain name or WAN IP address configured as the My Address in the VPN gateway configuration that the ZyWALL is using for L2TP VPN (172.16.1.2 in this example).

Figure 276 New Connection Wizard: VPN Server Selection
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 5

text_image New Connection Wizard VPN Server Selection What is the name or address of the VPN server? Type the host name or Internet Protocol (IP) address of the computer to which you are connecting. Host name or IP address (for example, microsoft.com or 157.54.0.1): 172.16.1.2 < Back Next > Cancel

8 Click Finish.

9 The Connect L2TP to ZyWALL screen appears. Click Properties > Security.

Figure 277 Connect L2TP to ZyWALL
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 6

text_image Connect L2TP to ZyWALL User name: Password: Save this user name and password for the following users: ○ Me only ○ Anyone who uses this computer Connect Cancel Properties Help

10 Click Security, select Advanced (custom settings) and click Settings.

Figure 278 Connect L2TP to ZyWALL: Security
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 7

text_image L2TP to ZyWALL General Options Security Networking Sharing Security options Typical (recommended settings) Validate my identity as follows: Automatically use my Windows logon name and password (and domain if any) Require data encryption (disconnect if none) Advanced (custom settings) Using these settings requires a knowledge of security protocols. Settings OK Cancel

11 Select Optional encryption (connect even if no encryption) and the Allow these protocols radio button. Select Unencrypted password (PAP) and clear all of the other check boxes. Click OK.

Figure 279 Connect ZyWALL L2TP: Security > Advanced
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 8

text_image Advanced Security Settings Data encryption: Optional encryption (connect even if no encryption) Logon security Use Extensible Authentication Protocol (EAP) Allow these protocols Unencrypted password (PAP) Shiva Password Authentication Protocol (SPAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft CHAP (MS-CHAP) Allow older MS-CHAP version for Windows 95 servers Microsoft CHAP Version 2 (MS-CHAP v2) For MS-CHAP based protocols, automatically use my Windows logon name and password (and domain if any) OK Cancel

12 Click IPSec Settings.

Figure 280 L2TP to ZyWALL Properties > Security
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 9

text_image L2TP to ZyWALL Properties General Options Security Networking Advanced Security options Typical (recommended settings) Validate my identity as follows: Automatically use my Windows logon name and password (and domain if any) Require data encryption (disconnect if none) Advanced [custom settings] Using these settings requires a knowledge of security protocols. Settings... IPSec Settings... OK Cancel

13 Select the Use pre-shared key for authentication check box and enter the pre-shared key used in the VPN gateway configuration that the ZyWALL is using for L2TP VPN. Click OK.

Figure 281 L2TP to ZyWALL Properties > Security > IPSec Settings
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 10

text_image IPSec Settings Use pre-shared key for authentication Key: top-secret OK Cancel

14 Click Networking. Select L2TP IPSec VPN as the Type of VPN. Click OK.

Figure 282 L2TP to ZyWALL Properties: Networking
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 11

text_image L2TP to ZyWALL Properties General Options Security Networking Advanced Type of VPN: L2TP IPSec VPN Settings This connection uses the following items: Internet Protocol (TCP/IP) QoS Packet Scheduler File and Printer Sharing for Microsoft Networks Client for Microsoft Networks Novell Client for Windows Install... Uninstall Properties Description Transmission Control Protocol/Internet Protocol. The default wide area network protocol that provides communication across diverse interconnected networks. OK Cancel

15 Enter the user name and password of your ZyWALL account. Click Connect.

Figure 283 Connect L2TP to ZyWALL
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 12

text_image Connect L2TP to ZyWALL User name: Password: Save this user name and password for the following users: ○ Me only ○ Anyone who uses this computer Connect Cancel Properties Help

16 A window appears while the user name and password are verified.

17 A ZyWALL-L2TP icon displays in your system tray. Double-click it to open a status screen.

Figure 284 ZyWALL-L2TP System Tray Icon
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 13

18 Click Details to see the address that you received is from the L2TP range you specified on the ZyWALL (192.168.10.10-192.168.10.20).

Figure 285 ZyWALL-L2TP Status: Details
ZYXEL ZYWALL USG 2000 - Configuring L2TP in Windows XP - 14

text_image L2TP to ZyWALL Status General Details Property Value Device Name WAN Miniport (L2TP) Device Type-vpn Server type PPP Transports TCP/IP Authentication PAP IPSEC Encryption IPSec, ESP 3DES Compression(none) PPP multilink framing Off Server IP address 0.0.0.0 Client IP address 192.168.10.12 Close

19 Access a server or other network resource behind the ZyWALL to make sure your access works.

27.6.2 Configuring L2TP in Windows 2000

Windows 2000 does not support using pre-shared keys by default. Use the following procedures to edit the registry and then configure the computer to use the L2TP client.

27.6.2.1 Editing the Windows 2000 Registry

In Windows 2000, you need to create a registry entry and restart the computer to have it use pre-shared keys.

1 Click Start > Run. Type regedit and click OK.

Figure 286 Starting the Registry Editor
ZYXEL ZYWALL USG 2000 - Editing the Windows 2000 Registry - 1

text_image Run Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: regedit OK Cancel Browse...

2 Click Registry > Export Registry File and save a backup copy of your registry. You can go back to using this backup if you misconfigure the registry settings.
3 Select

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rasman\Parameters.

Figure 287 Registry Key
ZYXEL ZYWALL USG 2000 - Editing the Windows 2000 Registry - 2

text_image Registry Editor Registry Edit View Favorites Help PolicyAgent PptpMiniport ProtectedStorage Ptilink ql1080 Ql10wnt ql1240 ql2100 RasAcd RasAuto Rasl2tp RasMan Enum Parameters PPP Security Racphi Name Type Data ab(Default) REG_SZ (value not set) IpOutHighWatermark REG_DWORD 0x00000005 (5) IpOutLowWatermark REG_DWORD 0x00000001 (1) abMedias REG_MULTI_SZ rastapi abServiceDll REG_EXPAND_SZ %SystemRoot%\Sys

4 Right-click Parameters and select New > DWORD Value.

Figure 288 New DWORD Value
ZYXEL ZYWALL USG 2000 - Editing the Windows 2000 Registry - 3

text_image Enum Par PPF Sec Raspti RCA Rdbss redbool Remote RemoteRegistry RESMGR RpcLocator RpcSc Expand New Find... Delete Rename Copy Key Name Key String Value Binary Value DWORD Value

5 Enter ProhibitIpSec as the name. And make sure the Data displays as 0's.

Figure 289 ProhibitIpSec DWORD Value
ZYXEL ZYWALL USG 2000 - Editing the Windows 2000 Registry - 4

text_image istry Editor Edit View Favorites Help PolicyAgent PptpMiniport ProtectedStorage Ptilink ql1080 ql10wnt ql1240 ql2100 RasAcd RasAuto Name Type Data ab(Default) REG_SZ (value not set) outIpOutHighWatermark REG_DWORD 0x00000005 (5) outIpOutLowWatermark REG_DWORD 0x00000001 (1) abMedias REG_MULTI_SZ rastapi abServiceDll REG_EXPAND_SZ %SystemRoot%\Syst outProhibitIpSec REG_DWORD 0x00000000 (0)

6 Restart the computer and continue with the next section.

27.6.2.2 Configure the Windows 2000 IPSec Policy

After you have created the registry entry and restarted the computer, use these directions to configure an IPSec policy for the computer to use.

1 Click Start > Run. Type mmc and click OK.

Figure 290 Run mmc
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 1

text_image Run Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: mmc OK Cancel Browse...

2 Click Console > Add/Remove Snap-in.

Figure 291 Console > Add/Remove Snap-in
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 2

text_image Console1 New Ctrl+N Open... Ctrl+O Save Ctrl+S Save As... Add/Remove Snap-in... Ctrl+M Options... 1 C:\WINNT\system32\dfrg.msc 2 C:\WINNT\system32\services.msc 3 C:\WINNT\system32\devmgmt.msc 4 C:\WINNT\system32\compmgmt.msc Exit

3 Click Add > IP Security Policy Management > Add > Finish. Click Close > OK.

Figure 292 Add > IP Security Policy Management > Finish
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 3

text_image Select Computer Select which computer this Snap-in will manage When this console is saved the location will also be saved Add/Remove Snap-in Standalone Extensions Use this page to add or remove Snap-ins added to: Cor Add Standalone Snap-in Available Standalone Snap-ins: Snap-in Fax Service Management Folder FrontPage Server Extensions Group Policy Indexing Service IP Security Policy Management Link to Web Address Local Users and Groups Performance Logs and Alerts Removable Storage Management Description Internet Protocol Security (IPSec) Adm policies for secure communication with < Back Finish Cancel Add Close OK Cancel

4 Right-click IP Security Policies on Local Machine and click Create IP Security Policy. Click Next in the welcome screen.

Figure 293 Create IP Security Policy
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 4

text_image Console1 Console Window Help Console Root Action View Favorites Tree Favorites Console Root IP Security Policies Name IP Security Policies on Local Machine Create IP Security Policy Manage IP filter lists and filter actions All Tasks New Window from Here Refresh Help Create an IP Security Policy

5 Name the IP security policy L2TP to ZyWALL, and click Next.

Figure 294 IP Security Policy: Name
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 5

text_image IP Security Policy Wizard IP Security Policy Name Name this security policy and optionally give it a brief description Name: L2TP to ZyWALL Description: < Back Next > Cancel

6 Clear the Activate the default response rule check box and click Next.

Figure 295 IP Security Policy: Request for Secure Communication
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 6

text_image IP Security Policy Wizard Requests for Secure Communication Specify how this policy responds to requests for secure communication. The default response rule responds to remote computers that request security, when no other rule applies. To communicate securely, the computer must respond to requests for secure communication. □ Activate the default response rule. < Back Next > Cancel

7 Leave the Edit Properties check box selected and click Finish.

Figure 296 IP Security Policy: Completing the IP Security Policy Wizard
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 7

text_image IP Security Policy Wizard Completing the IP Security Policy Wizard You have successfully completed specifying the properties for your new IP security policy. To edit your IP security policy now, select the Edit properties check box, and then click Finish. Edit properties To close this wizard, click Finish. < Back Finish Cancel

8 In the properties dialog box, click Add > Next.

Figure 297 IP Security Policy Properties > Add
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 IPSec Policy - 8

text_image L2TP to ZyWALL Properties Rules | General Security rules for communicating with other compute IP Security Rules: IP Filter List Filter Action Authentica Default Response Kerberos Security Rule Wizard Welcome to the Create IP Security Rule Wizard. A security rule governs how and when security is invoked based upon criteria, such as the source, destination, and type of IP traffic, in the security rule's IP filter list. A security rule contains a collection of security actions that are activated when a communication matches the criteria in the IP filter list. Security actions: - IP tunneling attributes - Authentication methods - Filter actions To continue, click Next. Add... Edit... Remove Use. < Back Next > Cancel OK Cancel

9 Select This rule does not specify a tunnel and click Next.

Figure 298 IP Security Policy Properties: Tunnel Endpoint
ZYXEL ZYWALL USG 2000 - Select This rule does not specify a tunnel and click Next. - 1

text_image Security Rule Wizard Tunnel Endpoint The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list. An IPSec tunnel allows packets to traverse a public or private internetwork with the security level of a direct, private connection between two computers. Specify the tunnel endpoint for the IP security rule: • This rule does not specify a tunnel • The tunnel endpoint is specified by this IP address: 0 . 0 . 0 . 0 < Back Next > Cancel

10 Select All network connections and click Next.

Figure 299 IP Security Policy Properties: Network Type
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 1

text_image Security Rule Wizard Network Type The security rule must be applied to a network type. Select the network type: All network connections Local area network (LAN) Remote access < Back Next > Cancel

11 Select Use this string to protect the key exchange (preshared key), type password in the text box, and click Next.

Figure 300 IP Security Policy Properties: Authentication Method
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 2

text_image IP Security Policy Wizard Authentication Method To add multiple authentication methods, edit the security rule after completing the IP security rule wizard. Set the initial authentication method for this security rule: ● Windows 2000 default (Kerberos V5 protocol) ○ Use a certificate from this Certificate Authority (CA): Browse... ● Use this string to protect the key exchange (preshared key): top-secret < Back Next > Cancel

12 Click Add.

Figure 301 IP Security Policy Properties: IP Filter List
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 3

text_image Security Rule Wizard IP Filter List Select the IP filter list for the type of IP traffic to which this security rule applies. If no IP filter in the following list matches your needs, click Add to create a new one. IP filter lists: Name Description All ICMP Traffic Matches all ICMP packets bet... All IP Traffic Matches all IP packets from t... Add... Edit... Remove < Back Next > Cancel

13 Type ZyWALL WAN_IP in the Name field. Clear the Use Add Wizard check box and click Add.

Figure 302 IP Security Policy Properties: IP Filter List > Add
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 4

text_image IP Filter List An IP filter list is composed of multiple filters. In this way multiple subnets, IP addresses and protocols can be combined into one IP filter. Name: ZyWALL WAN_IP Description: Add... Edit... Remove Filters: Use Add Wizard Mirrored | Description | Protocol | Source Port | Destination OK Cancel

14 Configure the following in the Addressing tab. Select My IP Address in the Source address drop-down list box. Select A specific IP Address in the Destination address drop-down list box and type the ZyWALL's WAN IP address (172.16.1.2 in this example) in the IP Address field. Make certain the Mirrored. Also match packets with the exact opposite source and destination addresses check box is selected and click Apply.

Figure 303 Filter Properties: Addressing
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 5

text_image Filter Properties Addressing | Protocol | Description | Source address: My IP Address Destination address: A specific IP Address IP Address: 172 . 16 . 1 . 2 Subnet mask: 255 . 255 . 255 . 255 ✓ Mirrigred. Also match packets with the exact opposite source and destination addresses. OK Cancel Apply

15 Configure the following in the Filter Properties window's Protocol tab. Set the protocol type to UDP from port 1701. Select To any port. Click Apply, OK, and then Close.

Figure 304 Filter Properties: Protocol
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 6

text_image Filter Properties Addressing Protocol Description Select a protocol type: UDP 17 Set the IP protocol port: From any port From this port: 1701 To any port To this port: OK Cancel Apply

16 Select ZyWALL WAN_IP and click Next.

Figure 305 IP Security Policy Properties: IP Filter List
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 7

text_image Security Rule Wizard IP Filter List Select the IP filter list for the type of IP traffic to which this security rule applies. If no IP filter in the following list matches your needs, click Add to create a new one. IP filter lists: Name Description All ICMP Traffic Matches all ICMP packets bet... All IP Traffic Matches all IP packets from t... ZyWALL WAN_IP Add... Edit... Remove < Back Next > Cancel

17 Select Require Security and click Next. Then click Finish and Close.

Figure 306 IP Security Policy Properties: IP Filter List
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 8

text_image Security Rule Wizard Filter Action Select the filter action for this security rule. If no filter actions in the following list matches your needs, click Add to create a new one. Select Use Add Wizard to create a filter action. Filter Actions: Name Description Permit Permit unsecured IP packets t... Request Security (Optional) Accepts unsecured communi... Require Security Accepts unsecured communi... Use Add Wizard Add... Edit... Remove < Back Next > Cancel

18 In the Console window, right-click L2TP to ZyWALL and select Assign.

Figure 307 Console: L2TP to ZyWALL Assign
ZYXEL ZYWALL USG 2000 - Select All network connections and click Next. - 9

text_image Console1 Console Window Help Console Root\IP Security Policies on Local Machine Action View Favorites Tree Favorites Name Description Client (Respond Only) Communicate normally (uns... L2TP to ZyWALL Secure Server (Require Se Assign For all IP traffic, always req... Server (Request Security) All Tasks For all IP traffic, always req... Delete Rename Properties Help Assign this policy, attempt to make it active

27.6.2.3 Configure the Windows 2000 Network Connection

After you have configured the IPSec policy, use these directions to create a network connection.

1 Click Start > Settings > Network and Dial-up connections > Make New Connection. In the wizard welcome screen, click Next.

Figure 308 Start New Connection Wizard
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 Network Connection - 1

text_image Windows 2000 Profes Settings Search Help Run... Shut Down... Control Panel Network and Dial-up Connections Make New Connection Printers Taskbar & Start Menu... Local Area Connection Console1

2 Select Connect to a private network through the Internet and click Next.

Figure 309 New Connection Wizard: Network Connection Type
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 Network Connection - 2

text_image Network Connection Wizard Network Connection Type You can choose the type of network connection you want to create, based on your network configuration and your networking needs. ○ Dial-up to private network Connect using my phone line (modem or ISDN). ○ Dial-up to the Internet Connect to the Internet using my phone line (modem or ISDN). ○ Connect to a private network through the Internet Create a Virtual Private Network (VPN) connection or 'tunnel' through the Internet. ○ Accept incoming connections Let other computers connect to mine by phone line, the Internet, or direct cable. ○ Connect directly to another computer Connect using my serial, parallel, or infrared port. < Back Next > Cancel

3 Enter the domain name or WAN IP address configured as the My Address in the VPN gateway configuration that the ZyWALL is using for L2TP VPN. Click Next.

Figure 310 New Connection Wizard: Destination Address
ZYXEL ZYWALL USG 2000 - Configure the Windows 2000 Network Connection - 3

text_image Network Connection Wizard Destination Address What is the name or address of the destination? Type the host name or IP address of the computer or network to which you are connecting. Host name or IP address (such as microsoft.com or 123.45.6.78): 172.16.1.2 < Back Next > Cancel

4 Select For all users and click Next.

Figure 311 New Connection Wizard: Connection Availability
ZYXEL ZYWALL USG 2000 - Select For all users and click Next. - 1

text_image Network Connection Wizard Connection Availability You may make the new connection available to all users, or just yourself. You may make this connection available to all users, or keep it only for your own use. A connection stored in your profile will not be available unless you are logged on. Create this connection: • For all users ○ Only for myself < Back Next > Cancel

5 Name the connection L2TP to ZyWALL and click Finish.

Figure 312 New Connection Wizard: Naming the Connection
ZYXEL ZYWALL USG 2000 - Name the connection L2TP to ZyWALL and click Finish. - 1

text_image Network Connection Wizard Completing the Network Connection Wizard Type the name you want to use for this connection: L2TP to ZyWALL To create this connection and save it in the Network and Dial-up Connections folder, click Finish. To edit this connection in the Network and Dial-up Connections folder, select it, click File, and then click Properties. Add a shortcut to my desktop < Back Finish Cancel

6 Click Properties.

Figure 313 Connect L2TP to ZyWALL
ZYXEL ZYWALL USG 2000 - Click Properties. - 1

text_image Connect L2TP to ZyWALL User name: Administrator Password: Save Password Connect Cancel Properties Help

7 Click Security and select Advanced (custom settings) and click Settings.

Figure 314 Connect L2TP to ZyWALL: Security
ZYXEL ZYWALL USG 2000 - Click Properties. - 2

text_image L2TP to ZyWALL General Options Security Networking Sharing Security options Typical (recommended settings) Validate my identity as follows: Automatically use my Windows logon name and password (and domain if any) Require data encryption (disconnect if none) Advanced (custom settings) Using these settings requires a knowledge of security protocols. Settings OK Cancel

8 Select Optional encryption allowed (connect even if no encryption) and the Allow these protocols radio button. Select Unencrypted password (PAP) and clear all of the other check boxes. Click OK. Click Yes if a screen pops up.

Figure 315 Connect L2TP to ZyWALL: Security > Advanced
ZYXEL ZYWALL USG 2000 - Click Properties. - 3

text_image Advanced Security Settings Data encryption: Optional encryption (connect even if no encryption) Logon security Use Extensible Authentication Protocol (EAP) Properties Allow these protocols Unencrypted password (PAP) Shiva Password Authentication Protocol (SPAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft CHAP (MS-CHAP) Allow older MS-CHAP version for Windows 95 servers Microsoft CHAP Version 2 (MS-CHAP v2) For MS-CHAP based protocols, automatically use my Windows logon name and password (and domain if any) OK Cancel

9 Click Networking and select Layer 2 Tunneling Protocol (L2TP) from the drop-down list box. Click OK.

Figure 316 Connect L2TP to ZyWALL: Networking
ZYXEL ZYWALL USG 2000 - Click Properties. - 4

text_image L2TP to ZyWALL General Options Security Networking Sharing Type of VPN server I am calling: Layer-2 Tunneling Protocol (L2TP) Settings Components checked are used by this connection: Internet Protocol (TCP/IP) File and Printer Sharing for Microsoft Networks Client for Microsoft Networks Novell Client for Windows Install... Uninstall Properties Description Transmission Control Protocol/Internet Protocol. The default wide area network protocol that provides communication across diverse interconnected networks. OK Cancel

10 Enter your user name and password and click Connect. It may take up to one minute to establish the connection and register on the network.

Figure 317 Connect L2TP to ZyWALL
ZYXEL ZYWALL USG 2000 - Click Properties. - 5

text_image Connect L2TP to 2yWALL User name: L2TP-test Password: Save Password Connect Cancel Properties Help

11 A ZyWALL-L2TP icon displays in your system tray. Double-click it to open a status screen.

Figure 318 ZyWALL-L2TP System Tray Icon
ZYXEL ZYWALL USG 2000 - Click Properties. - 6

12 Click Details and scroll down to see the address that you received is from the L2TP range you specified on the ZyWALL (192.168.10.10-192.168.10.20).

Figure 319 L2TP to ZyWALL Status: Details
ZYXEL ZYWALL USG 2000 - Click Properties. - 7

text_image L2TP to ZyWALL Status General Details Property Value Authentication PAP IPSEC Encryption IPSec, ESP 3DES Compression (none) PPP multilink framing Off Server IP address 0.0.0.0 Client IP address 192.168.10.11 Close

13 Access a server or other network resource behind the ZyWALL to make sure your access works.

PART V

Application Patrol

Application Patrol (445)

Application Patrol

28.1 Overview

Application patrol provides a convenient way to manage the use of various applications on the network. It manages general protocols (for example, http and ftp) and instant messenger (IM), peer-to-peer (P2P), Voice over IP (VoIP), and streaming (RSTP) applications. You can even control the use of a particular application's individual features (like text messaging, voice, video conferencing, and file transfers). Application patrol also has powerful bandwidth management including traffic prioritization to enhance the performance of delay-sensitive applications like voice and video.

There is also an option that gives SIP priority over all other traffic going through the ZyWALL. This maximizes SIP traffic throughput for improved VoIP call sound quality.

28.1.1 What You Can Do in the Application Patrol Screens

  • Use the General summary screen (see Section 28.2 on page 454) to enable and disable application patrol.
  • Use the Common, Instant Messenger, Peer to Peer, VoIP, and Streaming (see Section 28.3 on page 455) screens to look at the applications the ZyWALL can recognize, and review the settings for each one. You can also enable and disable the rules for each application and specify the default and custom policies for each application.
  • Use the Application Patrol Edit screen (see Section 28.3.1 on page 456) to edit the settings for an application.
  • Use the Application Policy Edit screen (see Section 28.3.2 on page 459) to edit a group of settings for an application.
  • Use the Other screens (see Section 28.4 on page 462) to control what the ZyWALL does when it does not recognize the application, and it identifies the conditions that refine this. It also lets you open the Other Configuration Add/Edit screen to create new conditions or edit existing ones.
  • Use the Statistics screen (see Section 28.5 on page 466) to see a bandwidth usage graph and statistics for each protocol.

28.1.2 What You Need to Know About Application Patrol

Note: The ZyWALL checks firewall rules before it checks application patrol rules for traffic going through the ZyWALL.

If you want to use a service, make sure both the firewall and application patrol allow the service's packets to go through the ZyWALL.

Application patrol examines every TCP and UDP connection passing through the ZyWALL and identifies what application is using the connection. Then, you can specify, by application, whether or not the ZyWALL continues to route the connection.

Configurable Application Policies

The ZyWALL has policies for individual applications. For each policy, you can specify the default action the ZyWALL takes once it identifies one of the service's connections.

You can also specify custom policies that have the ZyWALL forward, drop, or reject a service's connections based on criteria that you specify (like the source zone, destination zone, original destination port of the connection, schedule, user, source, and destination information). Your custom policies take priority over the policy's default settings.

Classification of Applications

There are two ways the ZyWALL can identify the application. The first is called auto. The ZyWALL looks at the IP payload (OSI level-7 inspection) and attempts to match it with known patterns for specific applications. Usually, this occurs at the beginning of a connection, when the payload is more consistent across connections, and the ZyWALL examines several packets to make sure the match is correct.

Note: The ZyWALL allows the first eight packets to go through the firewall, regardless of the application patrol policy for the application. The ZyWALL examines these first eight packets to identify the application.

The second approach is called service ports. The ZyWALL uses only OSI level-4 information, such as ports, to identify what application is using the connection. This approach is available in case the ZyWALL identifies a lot of “false positives” for a particular application.

Bandwidth Management

When you allow an application, you can restrict the bandwidth it uses or even the bandwidth that particular features in the application (like voice, video, or file

sharing) use. This restriction may be ineffective in certain cases, however, such as using MSN to send files via P2P.

The application patrol bandwidth management is more flexible and powerful than the bandwidth management in policy routes. Application patrol controls TCP and UDP traffic. Use policy routes to manage other types of traffic (like ICMP).

Note: Bandwidth management in policy routes has priority over application patrol bandwidth management. It is recommended to use application patrol instead of policy routes to manage the bandwidth of TCP and UDP traffic.

Connection and Packet Directions

Application patrol looks at the connection direction, that is from which zone the connection was initiated and to which zone the connection is going.

A connection has outbound and inbound packet flows. The ZyWALL controls the bandwidth of traffic of each flow as it is going out through an interface or VPN tunnel.

  • The outbound traffic flows from the connection initiator to the connection responder.
  • The inbound traffic flows from the connection responder to the connection initiator.

For example, a LAN to WAN connection is initiated from LAN and goes to the WAN.

  • Outbound traffic goes from a LAN zone device to a WAN zone device. Bandwidth management is applied before sending the packets out a WAN zone interface on the ZyWALL.
  • Inbound traffic comes back from the WAN zone device to the LAN zone device. Bandwidth management is applied before sending the traffic out a LAN zone interface.

Figure 320 LAN to WAN Connection and Packet Directions
ZYXEL ZYWALL USG 2000 - Connection and Packet Directions - 1

flowchart
graph LR
    A["LAN1"] -->|Connection| B["WAN"]
    B -->|Outbound| C["BWM"]
    C -->|Inbound| D["Internet"]
    style A fill:#FFD700,stroke:#333
    style B fill:#B2C4A2,stroke:#333
    style C fill:#E6F3FF,stroke:#333
    style D fill:#90EE90,stroke:#333

Outbound and Inbound Bandwidth Limits

You can limit an application's outbound or inbound bandwidth. This limit keeps the traffic from using up too much of the out-going interface's bandwidth. This way you can make sure there is bandwidth for other applications. When you apply a bandwidth limit to outbound or inbound traffic, each member of the out-going zone can send up to the limit. Take a LAN to WAN policy for example.

  • Outbound traffic is limited to 200 kbps. The connection initiator is on the LAN so outbound means the traffic traveling from the LAN to the WAN. Each of the WAN zone's two interfaces can send the limit of 200 kbps of traffic.
  • Inbound traffic is limited to 500 kbs. The connection initiator is on the LAN so inbound means the traffic traveling from the WAN to the LAN.

Figure 321 LAN to WAN, Outbound 200 kbps, Inbound 500 kbps
ZYXEL ZYWALL USG 2000 - Outbound and Inbound Bandwidth Limits - 1

text_image P1 Inbound 500 kbps P2 Outbound 200 kbps P3 Outbound 200 kbps P4 P5 P6

Bandwidth Management Priority

  • The ZyWALL gives bandwidth to higher-priority traffic first, until it reaches its configured bandwidth rate.
  • Then lower-priority traffic gets bandwidth.
  • The ZyWALL uses a fairness-based (round-robin) scheduler to divide bandwidth among traffic flows with the same priority.
  • The ZyWALL automatically treats traffic with bandwidth management disabled as priority 7 (the lowest priority).

Maximize Bandwidth Usage

Maximize bandwidth usage allows applications with maximize bandwidth usage enabled to "borrow" any unused bandwidth on the out-going interface.

After each application gets its configured bandwidth rate, the ZyWALL uses the fairness- based scheduler to divide any unused bandwidth on the out-going interface amongst applications that need more bandwidth and have maximize bandwidth usage enabled.

Unused bandwidth is divided equally. Higher priority traffic does not get a larger portion of the unused bandwidth.

Bandwidth Management Behavior

The following sections show how bandwidth management behaves with various settings. For example, you configure DMZ to WAN policies for FTP servers A and B. Each server tries to send 1000 kbps, but the WAN is set to a maximum outgoing speed of 1000 kbps. You configure policy A for server A's traffic and policy B for server B's traffic.

Figure 322 Bandwidth Management Behavior
ZYXEL ZYWALL USG 2000 - Bandwidth Management Behavior - 1

flowchart
graph LR
    A["DMZ"] -->|1000 kbps| B["BWM"]
    B -->|1000 kbps| C["INTERNET"]
    D["AMZ"] -->|1000 kbps| B
    E["AMZ"] -->|1000 kbps| B
    B --> F["WAN"]

Configured Rate Effect

In the following table the configured rates total less than the available bandwidth and maximize bandwidth usage is disabled, both servers get their configured rate.

Table 124 Configured Rate Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsNo1300 kbps
B200 kbpsNo1200 kbps

Priority Effect

Here the configured rates total more than the available bandwidth. Because server A has higher priority, it gets up to its configured rate (800 kbps), leaving only 200 kbps for server B.

Table 125 Priority Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A800 kbpsYes1800 kbps
B1000 kbpsYes2200 kbps

Maximize Bandwidth Usage Effect

With maximize bandwidth usage enabled, after each server gets its configured rate, the rest of the available bandwidth is divided equally between the two. So server A gets its configured rate of 300 kbps and server B gets its configured rate

of 200 kbps. Then the ZyWALL divides the remaining bandwidth (1000 - 500 = 500) equally between the two (500 / 2 = 250 kbps for each). The priority has no effect on how much of the unused bandwidth each server gets.

So server A gets its configured rate of 300 kbps plus 250 kbps for a total of 550 kbps. Server B gets its configured rate of 200 kbps plus 250 kbps for a total of 450 kbps.

Table 126 Maximize Bandwidth Usage Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsYes1550 kbps
B200 kbpsYes2450 kbps

Priority and Over Allotment of Bandwidth Effect

Server A has a configured rate that equals the total amount of available bandwidth and a higher priority. You should regard extreme over allotment of traffic with different priorities (as shown here) as a configuration error. Even though the ZyWALL still attempts to let all traffic get through and not be lost, regardless of its priority, server B gets almost no bandwidth with this configuration.

Table 127 Priority and Over Allotment of Bandwidth Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A1000 kbpsYes1999 kbps
B1000 kbpsYes21 kbps

Finding Out More

• See Section 5.4.13 on page 111 for related information on these screens.
- See Section 6.4 on page 128 for an example of how to set up web surfing policies with bandwidth restrictions.

28.1.3 Application Patrol Bandwidth Management Examples

Bandwidth management is very useful when applications are competing for limited bandwidth. For example, say you have a WAN zone interface connected to an ADSL device with a 8 Mbps downstream and 1 Mbps upstream ADSL connection. The following sections give some simplified examples of using application patrol policies to manage applications competing for that 1 Mbps of upstream bandwidth.

Here is an overview of what the rules need to accomplish. See the following sections for more details.

  • SIP traffic from VIP users must get through with the least possible delay regardless of if it is an outgoing call or an incoming call. The VIP users must be able to make and receive SIP calls no matter which interface they are connected to.
  • HTTP traffic needs to be given priority over FTP traffic.
  • FTP traffic from the WAN to the DMZ must be limited so it does not interfere with SIP and HTTP traffic.
  • FTP traffic from the LAN to the DMZ can use more bandwidth since the interfaces support up to 1 Gbps connections, but it must be the lowest priority and limited so it does not interfere with SIP and HTTP traffic.

Figure 323 Application Patrol Bandwidth Management Example

SIP: Any to WAN Outbound: 200 Kbps Inbound: 200 Kbps Priority: 1 Max. B. U.

SIP: WAN to Any Outbound: 200 Kbps Inbound: 200 Kbps Priority: 1 Max. B. U.

HTTP: Any to WAN Outbound: 100 Kbps Inbound: 500 Kbps Priority: 2 Max. B. U.

FTP: WAN to DMZ Outbound: 100 Kbps Inbound: 300 Kbps Priority: 3 No Max. B. U.

ZYXEL ZYWALL USG 2000 - Application Patrol Bandwidth Management Examples - 1

flowchart
graph TD
    A["User"] --> B["Phone"]
    C["Computer"] --> D["Router"]
    E["Server"] --> D
    B --> F["WAN"]
    D --> F
    F --> G["INTERNET"]
    style A fill:#f9f,stroke:#333
    style C fill:#f9f,stroke:#333
    style E fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style D fill:#ccf,stroke:#333
    style F fill:#cff,stroke:#333
    note right of F ADSL: Up: 1 Mbps, Down: 8 Mbps

FTP: LAN to DMZ Outbound: 50 Mbps Inbound: 50 Mbps Priority: 4 No Max. B. U.

28.1.3.1 Setting the Interface's Bandwidth

Use the interface screens to set the WAN zone interface's upstream bandwidth to be equal to (or slightly less than) what the connected device can support. This example uses 1000 Kbps.

28.1.3.2 SIP Any to WAN Bandwidth Management Example

  • Manage SIP traffic going to the WAN zone from a VIP user on the LAN or DMZ.
  • Outbound traffic (to the WAN from the LAN and DMZ) is limited to 200 kbps. The ZyWALL applies this limit before sending the traffic to the WAN.
  • Inbound traffic (to the LAN and DMZ from the WAN) is also limited to 200 kbps. The ZyWALL applies this limit before sending the traffic to LAN or DMZ.
  • Highest priority (1). Set policies for other applications to lower priorities so the SIP traffic always gets the best treatment.

- Enable maximize bandwidth usage so the SIP traffic can borrow unused bandwidth.

Figure 324 SIP Any to WAN Bandwidth Management Example
ZYXEL ZYWALL USG 2000 - SIP Any to WAN Bandwidth Management Example - 1

flowchart
graph TD
    A["LAN"] -->|Outbound: 200 kbps| B["BWM"]
    C["DMZ"] -->|Inbound: 200 kbps| B
    D["WAN"] -->|Outbound: 200 kbps| B
    B --> E["Internet"]
    style A fill:#f9f,stroke:#333
    style C fill:#f9f,stroke:#333
    style D fill:#ccf,stroke:#333
    style B fill:#cff,stroke:#333
    style E fill:#ffc,stroke:#333

28.1.3.3 SIP WAN to Any Bandwidth Management Example

You also create a policy for calls coming in from the SIP server on the WAN. It is the same as the SIP Any to WAN policy, but with the directions reversed (WAN to Any instead of Any to WAN).

28.1.3.4 HTTP Any to WAN Bandwidth Management Example

  • Inbound traffic gets more bandwidth as the local users will probably download more than they upload (and the ADSL connection supports this).
  • Second highest priority (2). Set policies for other applications (except SIP) to lower priorities so the local users' HTTP traffic gets sent before non-SIP traffic.
  • Enable maximize bandwidth usage so the HTTP traffic can borrow unused bandwidth.

Figure 325 HTTP Any to WAN Bandwidth Management Example
ZYXEL ZYWALL USG 2000 - HTTP Any to WAN Bandwidth Management Example - 1

flowchart
graph TD
    A["LAN"] -->|Outbound: 200 kbps| B["BWM"]
    C["DMZ"] -->|Inbound: 500 kbps| B
    D["WAN"] -->|Outbound: 200 kbps| B
    B --> E["Internet"]
    B --> F["HTTP"]

28.1.3.5 FTP WAN to DMZ Bandwidth Management Example

  • ADSL supports more downstream than upstream so you allow remote users 300 kbps for uploads to the DMZ FTP server (outbound) but only 100 kbps for downloads (inbound).
    • Third highest priority (3).
  • Disable maximize bandwidth usage since you do not want to give FTP more bandwidth.

Figure 326 FTP WAN to DMZ Bandwidth Management Example
ZYXEL ZYWALL USG 2000 - FTP WAN to DMZ Bandwidth Management Example - 1

flowchart
graph TD
    DMZ["DMZ"] -->|Outbound: 300 kbps| BWM["BWM"]
    BWM -->|Inbound: 100 kbps| WAN["INTERNET"]
    BWM -->|BWM| BWM

28.1.3.6 FTP LAN to DMZ Bandwidth Management Example

  • The LAN and DMZ zone interfaces are connected to Ethernet networks (not an ADSL device) so you limit both outbound and inbound traffic to 50 Mbps.
    • Fourth highest priority (4).
  • Disable maximize bandwidth usage since you do not want to give FTP more bandwidth.

Figure 327 FTP LAN to DMZ Bandwidth Management Example
ZYXEL ZYWALL USG 2000 - FTP LAN to DMZ Bandwidth Management Example - 1

flowchart
graph TD
    A["LAN"] -->|Inbound: 50 Mbps| B["BWM"]
    B --> C["DMZ"]
    D["BWM"] -->|Outbound: 50 Mbps| C
    style A fill:#FFD700,stroke:#333
    style B fill:#E6F2FF,stroke:#333
    style C fill:#E6F2FF,stroke:#333

28.2 Application Patrol General Screen

Use this screen to enable and disable application patrol. It also lists the registration status and details about the signature set the ZyWALL is using.

Note: You must register for the IDP/AppPatrol signature service (at least the trial) before you can use it.

See Chapter 8 on page 165 for how to register.

Click AppPatrol to open the following screen.

Figure 328 AppPatrol > General
ZYXEL ZYWALL USG 2000 - Application Patrol General Screen - 1

text_image General Common Instant Messenger Peer to Peer VoIP Streaming Other Statistics General Settings Enable Application Patrol BWM Global Setting Enable BWM Enable Highest Bandwidth Priority for SIP Traffic License License Status: Not Licensed License Type: None Apply New Registration Signature Information Current Version: 2.051 Released Date: 2007/12/04 16:27:09 Update Signatures Apply Reset

The following table describes the labels in this screen. See Section 28.3.1 on page 456 for more information as well.

Table 128 AppPatrol > General

LABELDESCRIPTION
General Settings
Enable Application PatrolSelect this check box to turn on application patrol.
BWM Global Setting
Enable BWMThis is a global setting for enabling or disabling bandwidth management on the ZyWALL. You must enable this setting to have individual policy routes or application patrol policies apply bandwidth management.This same setting also appears in the Network > Routing > Policy Route screen. Enabling or disabling it in one screen also enables or disables it in the other screen.
Enable Highest Bandwidth Priority for SIP TrafficSelect this to maximize the throughput of SIP traffic to improve SIP-based VoIP call sound quality. This has the ZyWALL immediately send SIP traffic upon identifying it. The ZyWALL ignores any other application patrol rules for SIP traffic (so there is no bandwidth control for SIP traffic). When this option is enabled the ZyWALL also does not record SIP traffic bandwidth usage statistics.
LicenseThe following fields display information about the current state of your subscription for IDP/application patrol signatures.
License StatusThis field displays whether a service is activated (Licensed) or not (Not Licensed) or expired (Expired).
License TypeThis field displays whether you applied for a trial application (Trial) or registered a service with your iCard's PIN number (Standard). None displays when the service is not activated.
Apply new RegistrationThis link appears if you have not registered for the service or only have the trial registration. Click this link to go to the screen where you can register for the service.
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Current VersionThis field displays the IDP signature and anomaly rule set version number. This number gets larger as the set is enhanced.
Released DateThis field displays the date and time the set was released.
Update SignaturesClick this link to go to the screen you can use to download signatures from the update server.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

28.3 Application Patrol Applications

Use the application patrol Common, Instant Messenger, Peer to Peer, VoIP, or Streaming screen to manage traffic of individual applications.

Use the Common screen (shown here as an example) to manage traffic of the most commonly used web, file transfer and e-mail protocols.

Click AppPatrol > Common to open the following screen.

Figure 329 AppPatrol > Common
ZYXEL ZYWALL USG 2000 - Application Patrol Applications - 1

text_image General Common Instant Messenger Peer to Peer VoIP Streaming Other Statistics Configuration

Service Default Access Modify

1 irc forward ✓ ✓ 2.http forward ✓ ✓ 3 ftp forward ✓ ✓ 4 pop3 forward ✓ ✓ 5 smtp forward ✓ ✓ Apply Reset

The following table describes the labels in this screen. See Section 28.3.1 on page 456 for more information as well.

Table 129 AppPatrol > Common

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific application.
ServiceThis field displays the name of the application.
Default AccessThis field displays what the ZyWALL does with packets for this application. Choices are: forward, drop, and reject.
ModifyThis column provides icons to activate and deactivate each application and to edit the settings for each one.To activate or deactivate patrol for an application, click the Active icon for the corresponding application. Make sure you click Apply to save and apply the change.To edit the settings for an application, click the Edit icon next to the application. The Configuration Edit screen appears.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

28.3.1 The Application Patrol Edit Screen

Use this screen to edit the settings for an application. To access this screen, go to the application patrol Common, Instant Messenger, Peer to Peer, VoIP, or

Streaming screen and click an application's Edit icon. The screen displayed here is for the MSN instant messenger service.

Figure 330 Application Edit
ZYXEL ZYWALL USG 2000 - The Application Patrol Edit Screen - 1

text_image Service Enable Service Service Identification Name msn Classification Auto Service Ports Policy

Port Schedule User From To Source Destination Access BWM In/Out/Pri\Log

1 0 any any any any ZYNOS_GATEWAY any forward,no/no/1=no 2 0 OFF_WORK2 any any any any any forward,no/no/1=no 3 0 OFF_WORK1 any any any any any forward,no/no/1=no 4 0 any ZLD_All any any any any forward,no/no/1=no Default 0 any any any any any drop N/AloggLOG OK Cancel

The following table describes the labels in this screen.

Table 130 Application Edit

LABELDESCRIPTION
Service
Enable ServiceSelect this check box to turn on patrol for this application.
Service Identification
NameThis field displays the name of the application.
ClassificationSpecify how the ZyWALL should identify this application. Choices are:Auto - the ZyWALL identifies this application by matching the IP payload with the application's pattern(s).Service Ports - the ZyWALL identifies this application by looking at the destination port in the IP header.
Service PortThis is available if the Classification is Service Ports. You can view and edit the ports used to identify this application.
Add iconWhen the Classification is Service Ports, this column provides icons to add and remove port numbers used to identify the application.Click Add add a port number. Type the destination port number in the Service Port field.Click Remove to delete a port number. The web configurator confirms that you want to delete the port number before doing so.
PolicyThis table lists the policies configured for this application.
#This field is a sequential value, and it is not associated with a specific condition.Note: The ZyWALL checks conditions in the order they appear in the list. While this sequence does not affect the functionality, you might improve the performance of the ZyWALL by putting more common conditions at the top of the list.
PortThis field displays the specific port number to which this policy applies.
ScheduleThis is the schedule that defines when the policy applies.anymeans the policy is active at all times if enabled.
UserThis is the user name or user group to which the policy applies. If any displays, the policy applies to all users.
FromThis is the source zone of the traffic to which this policy applies.
ToThis is the destination zone of the traffic to which this policy applies.
SourceThis is the source address or address group for whom this policy applies. If any displays, the policy is effective for every source.
DestinationThis is the destination address or address group for whom this policy applies. If any displays, the policy is effective for every destination.
AccessThis field displays what the ZyWALL does with packets for this application that match this policy.forward- the ZyWALL routes the packets for this application.Drop- the ZyWALL does not route the packets for this application and does not notify the client of its decision.Reject- the ZyWALL does not route the packets for this application and notifies the client of its decision.
BWMLogThese fields show the amount of bandwidth the application's traffic that matches the policy can use. These fields only apply when Accessis set to forward.In- This is how much inbound bandwidth, in kilobits per second, this policy allows the application to use. Inbound refers to the traffic the ZyWALL sends to a connection's initiator. If no displays here, this policy does not apply bandwidth management for the application's incoming traffic.Out- This is how much outbound bandwidth, in kilobits per second, this policy allows the application to use. Outbound refers to the traffic the ZyWALL sends out from a connection's initiator. If no displays here, this policy does not apply bandwidth management for the application's outgoing traffic.Pri- This is the priority for this application's traffic that matches this policy. The smaller the number, the higher the priority. The traffic of an application with higher priority is given bandwidth before traffic of an application with lower priority. The ZyWALL ignores this number if the incoming and outgoing limits are both set to 0. In this case the traffic is automatically treated as being set to the lowest priority (7) regardless of this field's configuration.This field shows whether the ZyWALL generates a log (log), a log and alert (log alert) or neither (no) when the application's traffic matches this policy.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the entry is enabled or not. Click the Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the entry.Click the Add icon in an entry to add a new entry below the current entry.Click the Remove icon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry.To move an entry up or down in the list, click on the Move to N icon next to the entry, and type the line number (# field) of where you want to move the entry. The # field is updated accordingly. The ordering of the entries is important as they are applied in order of their numbering.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

28.3.2 The Application Patrol Policy Edit Screen

The Application Policy Edit screen allows you to edit a group of settings for an application. To access this screen, go to the application patrol Common, Instant Messenger, Peer to Peer, VoIP, or Streaming screen and click an application's Edit icon. Then click the Add icon or an Edit icon in the Policy table. The screen displayed here is for the MSN instant messenger service.

Figure 331 Application Policy Edit
ZYXEL ZYWALL USG 2000 - The Application Patrol Policy Edit Screen - 1

text_image Configuration Enable Policy Port 0 (0 : any) Schedule any User any From any To any Source any Destination any Access-forward Action Block Login Message Audio Video File-Transfer Bandwidth Management Inbound: 0 kbps Outbound: 0 kbps (0 : disabled) Priority1 Log Maximize Bandwidth Usage LOG=no OK Cancel

The following table describes the labels in this screen.

Table 131 Application Policy Edit

LABELDESCRIPTION
Enable PolicySelect this check box to turn on this policy for the application.
PortUse this field to specify a specific port number to which to apply this policy. Type zero, if this policy applies for every port number.
ScheduleSelect a schedule that defines when the policy applies or selectCreate Objectto configure a new one (seeChapter 39 on page 641for details). Otherwise, selectnoneto make the policy always effective.
UserSelect a user name or user group to which to apply the policy. SelectCreate Objectto configure a new user account (seeSection 36.2.1 on page 616for details). Selectanyto apply the policy for every user.
FromSelect the source zone of the traffic to which this policy applies.
ToSelect the destination zone of the traffic to which this policy applies.
SourceSelect a source address or address group for whom this policy applies. SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every source.
DestinationSelect a destination address or address group for whom this policy applies. SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every destination.
AccessThis field controls what the ZyWALL does with packets for this application that match this policy. Choices are:forward- the ZyWALL routes the packets for this application.Drop- the ZyWALL does not route the packets for this application and does not notify the client of its decision.Reject- the ZyWALL does not route the packets for this application and notifies the client of its decision.
Action BlockFor some applications, you can select individual uses of the application that the policy will have the ZyWALL block. These fields only apply whenAccessis set toforward.Login- Select this option to block users from logging in to a server for this application.Message- Select this option to block users from sending or receiving instant messages.Audio- Select this option to block users from sending or receiving audio traffic.Video- Select this option to block users from sending or receiving video traffic.File Transfer- Select this option to block users from sending or receiving files.
Bandwidth ManagementConfigure these fields to set the amount of bandwidth the application can use. These fields only apply whenAccessis set toforward.You must also enable bandwidth management in the main application patrol screen (AppPatrol > General) in order to apply bandwidth shaping.
Inbound kbpsType how much inbound bandwidth, in kilobits per second, this policy allows the application to use. Inbound refers to the traffic the ZyWALL sends to a connection's initiator.If you enter 0 here, this policy does not apply bandwidth management for the application's traffic that the ZyWALL sends to the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
Outbound kbpsType how much outbound bandwidth, in kilobits per second, this policy allows the application to use. Outbound refers to the traffic the ZyWALL sends out from a connection's initiator.If you enter 0 here, this policy does not apply bandwidth management for the application's traffic that the ZyWALL sends out from the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
PriorityEnter a number between 1 and 7 to set the priority for this application's traffic that matches this policy. The smaller the number, the higher the priority.The ZyWALL gives traffic of an application with higher priority bandwidth before traffic of an application with lower priority.The ZyWALL uses a fairness-based (round-robin) scheduler to divide bandwidth between applications with the same priority.The number in this field is ignored if the incoming and outgoing limits are both set to 0. In this case the traffic is automatically treated as being set to the lowest priority (7) regardless of this field's configuration.
Maximize Bandwidth UsageEnable maximize bandwidth usage to let the traffic matching this policy "borrow" any unused bandwidth on the out-going interface.After each application gets its configured bandwidth rate, the ZyWALL uses the fairness- based scheduler to divide any unused bandwidth on the out-going interface amongst applications that need more bandwidth and have maximize bandwidth usage enabled.
LogSelect whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when the application's traffic matches this policy. See Chapter 47 on page 761 for more on logs.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

28.4 The Other Applications Screen

Sometimes, the ZyWALL cannot identify the application. For example, the application might be a new application, or the packets might arrive out of sequence. (The ZyWALL does not reorder packets when identifying the application.)

The Other (applications) screen controls the default policy for TCP and UDP traffic that the ZyWALL cannot identify. You can use source zone, destination zone, destination port, schedule, user, source, and destination information as criteria to create a sequence of specific conditions, similar to the sequence of rules used by firewalls, to specify what the ZyWALL should do more precisely. You can also control the bandwidth used by these other applications. This screen also allows you to add, edit, and remove conditions to this default policy.

Click AppPatrol > Other to open the Other (applications) screen.

Figure 332 AppPatrol > Other
ZYXEL ZYWALL USG 2000 - The Other Applications Screen - 1

text_image General Common Instant Messenger Peer to Peer VoIP Streaming Other Statistics Configuration

Port Schedule User From To Source Destination Protocol Access BWM In/Out/Pri\Log

Default 0 any any any any any any any forward,no/no/1=no Apply Reset

The following table describes the labels in this screen. See Section 28.4.1 on page 464 for more information as well.

Table 132 AppPatrol > Other

LABELDESCRIPTION
ConfigurationThis table lists the policies configured for traffic which does not match an application.
#This field is a sequential value, and it is not associated with a specific condition.Note: The ZyWALL checks conditions in the order they appear in the list. While this sequence does not affect the functionality, you might improve the performance of the ZyWALL by putting more common conditions at the top of the list.
PortThis field displays the specific port number to which this policy applies.
ScheduleThis is the schedule that defines when the policy applies.anymeans the policy always applies.
UserThis is the user name or user group to which the policy applies. If any displays, the policy applies to all users.
FromThis is the source zone of the traffic to which this policy applies.
ToThis is the destination zone of the traffic to which this policy applies.
SourceThis is the source address or address group for whom this policy applies. If any displays, the policy is effective for every source.
DestinationThis is the destination address or address group for whom this policy applies. If any displays, the policy is effective for every destination.
ProtocolThis is the protocol of the traffic to which this policy applies.
AccessThis field displays what the ZyWALL does with packets that match this policy.forward - the ZyWALL routes the packets.Drop - the ZyWALL does not route the packets and does not notify the client of its decision.Reject - the ZyWALL does not route the packets and notifies the client of its decision.
BWMThese fields show the amount of bandwidth the traffic can use. These fields only apply when Access is set to forward.In - This is how much inbound bandwidth, in kilobits per second, this policy allows the matching traffic to use. Inbound refers to the traffic the ZyWALL sends to a connection's initiator. If no displays here, this policy does not apply bandwidth management for the inbound traffic.Out - This is how much outgoing bandwidth, in kilobits per second, this policy allows the matching traffic to use. Outbound refers to the traffic the ZyWALL sends out from a connection's initiator. If no displays here, this policy does not apply bandwidth management for the outbound traffic.Pri - This is the priority for the traffic that matches this policy. The smaller the number, the higher the priority. Traffic with a higher priority is given bandwidth before traffic with a lower priority. The ZyWALL ignores this number if the incoming and outgoing limits are both set to 0. In this case the traffic is automatically treated as being set to the lowest priority (7) regardless of this field's configuration.
LogSelect whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this policy. See Chapter 47 on page 761 for more on logs.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the entry is enabled or not. Click the Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the entry.Click the Add icon in an entry to add a new entry below the current entry.Click the Remove icon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry.To move an entry up or down in the list, click on the Move to N icon next to the entry, and type the line number (# field) of where you want to move the entry. The # field is updated accordingly. The ordering of the entries is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

28.4.1 The Other Applications Add/Edit Screen

The Other Configuration Add/Edit screen allows you to create a new condition or edit an existing one. To access this screen, go to the Other Protocol screen (see Section 28.4 on page 462), and click either the Add icon or an Edit icon.

Figure 333 AppPatrol > Other > Edit
ZYXEL ZYWALL USG 2000 - The Other Applications Add/Edit Screen - 1

text_image Configuration Enable Port 0 (0 : any) Schedule none User any From any To any Access forward Source any Destination any Protocol TCP Bandwidth Management Inbound: 0 kbps Outbound: 0 kbps (0 : disabled) Priority 1 Log Maximize Bandwidth Usage no OK Cancel

The following table describes the labels in this screen.

Table 133 AppPatrol > Other > Edit

LABELDESCRIPTION
EnableSelect this check box to turn on this policy.
PortUse this field to specify a specific port number to which to apply this policy. Type zero, if this policy applies for every port number.
ScheduleSelect a schedule that defines when the policy applies or selectCreate Objectto configure a new one (seeChapter 39 on page 641for details). Otherwise, selectanyto make the policy always effective.
UserSelect a user name or user group to which to apply the policy. SelectCreate Objectto configure a new user account (seeSection 36.2.1 on page 616for details). Selectanyto apply the policy for every user.
FromSelect the source zone of the traffic to which this policy applies.
ToSelect the destination zone of the traffic to which this policy applies.
AccessThis field controls what the ZyWALL does with packets that match this policy. Choices are:forward - the ZyWALL routes the packets.Drop - the ZyWALL does not route the packets and does not notify the client of its decision.Reject - the ZyWALL does not route the packets and notifies the client of its decision.
SourceSelect a source address or address group for whom this policy applies. SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every source.
DestinationSelect a destination address or address group for whom this policy applies. SelectCreate Objectto configure a new one. Selectanyif the policy is effective for every destination.
ProtocolSelect the protocol for which this condition applies. Choices are:TCP andUDP. Selectanyto apply the policy to both TCP and UDP traffic.
Bandwidth ManagementConfigure these fields to set the amount of bandwidth the application can use. These fields only apply whenAccessis set to forward.
Inbound kbpsType how much inbound bandwidth, in kilobits per second, this policy allows the traffic to use. Inbound refers to the traffic the ZyWALL sends to a connection's initiator.If you enterOhere, this policy does not apply bandwidth management for the matching traffic that the ZyWALL sends to the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
Outbound kbpsType how much outbound bandwidth, in kilobits per second, this policy allows the traffic to use. Outbound refers to the traffic the ZyWALL sends out from a connection's initiator.If you enterOhere, this policy does not apply bandwidth management for the matching traffic that the ZyWALL sends out from the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
PriorityEnter a number between 1 and 7 to set the priority for traffic that matches this policy. The smaller the number, the higher the priority.Traffic with a higher priority is given bandwidth before traffic with a lower priority.The ZyWALL uses a fairness-based (round-robin) scheduler to divide bandwidth between traffic flows with the same priority.The number in this field is ignored if the incoming and outgoing limits are both set to 0. In this case the traffic is automatically treated as being set to the lowest priority (7) regardless of this field's configuration.
Maximize Bandwidth UsageEnable maximize bandwidth usage to let the traffic matching this policy "borrow" any unused bandwidth on the out-going interface.After each application or type of traffic gets its configured bandwidth rate, the ZyWALL uses the fairness- based scheduler to divide any unused bandwidth on the out-going interface amongst applications and traffic types that need more bandwidth and have maximize bandwidth usage enabled.
LogThis field controls what kind of record the ZyWALL creates when traffic matches this policy. Please see Chapter 47 on page 761 for more information.no - the ZyWALL does not record anythinglog - the ZyWALL creates a record in the loglog alert - the ZyWALL creates an alert
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

28.5 Application Patrol Statistics

This screen displays a bandwidth usage graph and statistics for selected protocols.

Click AppPatrol > Statistics to open the following screen.

28.5.1 Application Patrol Statistics: General Setup

Use the top of the AppPatrol > Statistics screen to configure what to display.

Figure 334 AppPatrol > Statistics: General Setup
ZYXEL ZYWALL USG 2000 - Application Patrol Statistics: General Setup - 1

text_image General Settings Refresh Interval None Display Protocols Select All Clear All Collapse irc http ftp pop3 smtp yahoo msn bittorrent gnutella qglive pplive thunder h323 sip other Apply

The following table describes the labels in this screen.

Table 134 AppPatrol > Statistics: General Setup

LABELDESCRIPTION
Refresh IntervalSelect how often you want the statistics display to update.
Display ProtocolsSelect the protocols for which to display statistics.Select All selects all of the protocols.Clear All clears all of the protocols.Click Expand to display individual protocols. Collapse hides them.Statistics for the selected protocols display after you click Apply.

28.5.2 Application Patrol Statistics: Bandwidth Statistics

The middle of the AppPatrol > Statistics screen displays a bandwidth usage line graph for the selected protocols.

Figure 335 AppPatrol > Statistics: Bandwidth Statistics
Bandwidth Statistics
ZYXEL ZYWALL USG 2000 - Application Patrol Statistics: Bandwidth Statistics - 1

line | Category | Value | | ------------ | ----- | | mbn | 9.0 | | msn | 9.0 | | sip | 9.0 | | h323 | 9.0 | | smtp | 9.0 | | pop3 | 9.0 | | ftp | 9.0 | | http | 9.0 | | thunder | 9.0 | | pplive | 9.0 | | qqlive | 9.0 | | gnutella | 9.0 | | bittorrent | 9.0 | | yahoo | 9.0 | | irc | 9.0 |
  • The y-axis represents the amount of bandwidth used.
  • The x-axis shows the time period over which the bandwidth usage occurred.
  • A solid line represents a protocol's incoming bandwidth usage. This is the protocol's traffic that the ZyWALL sends to the initiator of the connection.
  • A dotted line represents a protocol's outgoing bandwidth usage. This is the protocol's traffic that the ZyWALL sends out from the initiator of the connection.
  • Different colors represent different protocols.

28.5.3 Application Patrol Statistics: Protocol Statistics

The bottom of the AppPatrol > Statistics screen displays statistics for each of the selected protocols.

Figure 336 AppPatrol > Statistics: Protocol Statistics

Protocol Statistics
ServiceForwarded Data(KB)Dropped Data(KB)Rejected Data(KB)Matched Auto ConnectionMatched Service Ports Connection
web-msn00000
irc00000
yahoo00000
aol-icq00000
qq00000
jabber/google talk00000
rediff00000
eDonkey00000
kad00000
bittorrent00000
ezpeer00000
kuro00000
gnutella00000
fasttrack00000
soulseek00000
poco00000
qqlive00000
pplive00000
thunder00000
http00000
ftp00000
pop300000
smtp00000
h32300000
sip00000
rtsp00000
msn00000
other000n/a0

The following table describes the labels in this screen.

Table 135 AppPatrol > Statistics: Protocol Statistics

LABELDESCRIPTION
ServiceThis is the protocol. Click the expand icon (+) to display the statistics for each of a protocol's rules. Click the close icon (-) to hide the statistics for each of a protocol's rules.
Forwarded Data (KB)This is how much of the application's traffic the ZyWALL has sent (in kilobytes).
Dropped Data (KB)This is how much of the application's traffic the ZyWALL has discarded without notifying the client (in kilobytes). This traffic was dropped because it matched an application policy set to “drop”.
Rejected Data (KB)This is how much of the application's traffic the ZyWALL has discarded and notified the client that the traffic was rejected (in kilobytes). This traffic was rejected because it matched an application policy set to “reject”.
Matched Auto ConnectionThis is how much of the application's traffic the ZyWALL identified by examining the IP payload.
Matched Service Ports ConnectionThis is how much of the application's traffic the ZyWALL identified by examining OSI level-3 information such as IP addresses and port numbers.
RuleThis is a protocol's rule.
Inbound KbpsThis is the incoming bandwidth usage for traffic that matched this protocol rule, in kilobits per second. This is the protocol's traffic that the ZyWALL sends to the initiator of the connection. So for a connection initiated from the LAN to the WAN, the traffic sent from the WAN to the LAN is the inbound traffic.
Outbound KbpsThis is the outgoing bandwidth usage for traffic that matched this protocol rule, in kilobits per second. This is the protocol's traffic that the ZyWALL sends out from the initiator of the connection. So for a connection initiated from the LAN to the WAN, the traffic sent from the LAN to the WAN is the outbound traffic.
Forwarded Data (KB)This is how much of the application's traffic the ZyWALL has sent (in kilobytes).
Dropped Data (KB)This is how much of the application's traffic the ZyWALL has discarded without notifying the client (in kilobytes). This traffic was dropped because it matched a policy set to “drop”.
Rejected Data (KB)This is how much of the application's traffic the ZyWALL has discarded and notified the client that the traffic was rejected (in kilobytes). This traffic was rejected because it matched a policy set to “reject”.

PART VI

Anti-X

Anti-Virus (473)

IDP (489)

ADP (523)

Content Filtering (543)

Content Filter Reports (567)

Anti-Spam (575)

Anti-Virus

29.1 Overview

Use the ZyWALL's anti-virus feature to protect your connected network from virus/spyware infection. The ZyWALL checks traffic going in the direction(s) you specify for signature matches. In the following figure the ZyWALL is set to check traffic coming from the WAN zone (which includes two interfaces) to the LAN zone.

Figure 337 ZyWALL Anti-Virus Example
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph TD
    LAN["LAN"] -->|LAN| LAN1["LAN"]
    LAN -->|LAN| LAN2["LAN"]
    LAN1 -->|LAN1| LAN3["LAN"]
    LAN2 -->|LAN2| LAN4["LAN"]
    LAN3 -->|LAN3| LAN5["LAN"]
    LAN4 -->|LAN4| LAN6["LAN"]
    LAN5 -->|LAN5| LAN7["LAN"]
    LAN6 -->|LAN6| LAN8["LAN"]
    LAN7 -->|LAN7| LAN9["LAN"]
    LAN8 -->|LAN8| LAN10["LAN"]
    LAN9 -->|LAN9| LAN11["LAN"]
    LAN10 -->|WAN 1| LAN12["Internet"]
    LAN11 -->|WAN 1| LAN13["Internet"]
    LAN12 -->|WAN 1| LAN14["Internet"]
    LAN13 -->|WAN 1| LAN15["Internet"]
    LAN14 -->|WAN 1| LAN16["Internet"]
    LAN15 -->|WAN 1| LAN17["Internet"]
    LAN16 -->|WAN 2| LAN18["Internet"]
    LAN17 -->|WAN 2| LAN19["Internet"]
    LAN18 -->|WAN 2| LAN20["Internet"]
    LAN19 -->|WAN 2| LAN21["Internet"]
    LAN20 -->|WAN 2| LAN22["Internet"]

29.1.1 What You Can Do in the Anti-Virus Screens

  • Use the General screens (Section 29.2 on page 476) to turn anti-virus on or off, set up anti-virus policies and check the anti-virus engine type and the anti-virus license and signature status.
  • Use the Black/White List screen (Section 29.3 on page 481) to set up antivirus black (blocked) and white (allowed) lists of virus file patterns.
  • Use the Signature screen (Section 29.6 on page 485) to search signatures to get more information about signatures.

29.1.2 What You Need to Know About Anti-Virus

Anti-Virus Engines

Subscribe to signature files for ZyXEL's anti-virus engine or one powered by Kaspersky. When using the trial, you can switch from one engine to the other in the Registration screen. After the trial expires, you need to purchase an iCard for the anti-virus engine you want to use and register it in the Registration >Service screen. You must use the ZyXEL anti-virus iCard for the ZyXEL anti-virus engine and the Kaspersky anti-virus iCard for the Kaspersky anti-virus engine. See Chapter 8 on page 165 for details.

Virus and Worm

A computer virus is a small program designed to corrupt and/or alter the operation of other legitimate programs. A worm is a self-replicating virus that resides in active memory and duplicates itself. The effect of a virus attack varies from doing so little damage that you are unaware your computer is infected to wiping out the entire contents of a hard drive to rendering your computer inoperable.

ZyWALL Anti-Virus Scanner

The ZyWALL has a built-in signature database. Setting up the ZyWALL between your local network and the Internet allows the ZyWALL to scan files transmitting through the enabled interfaces into your network. As a network-based anti-virus scanner, the ZyWALL helps stop threats at the network edge before they reach the local host computers.

You can set the ZyWALL to examine files received through the following protocols:

  • FTP (File Transfer Protocol)
  • HTTP (Hyper Text Transfer Protocol)
  • SMTP (Simple Mail Transfer Protocol)
    • POP3 (Post Office Protocol version 3)
  • IMAP4 (Internet Message Access Protocol version 4)

How the ZyWALL Anti-Virus Scanner Works

The following describes the virus scanning process on the ZyWALL.

1 The ZyWALL first identifies SMTP, POP3, IMAP4, HTTP and FTP packets through standard ports.

2 If the packets are not session connection setup packets (such as SYN, ACK and FIN), the ZyWALL records the sequence of the packets.
3 The scanning engine checks the contents of the packets for virus.
4 If a virus pattern is matched, the ZyWALL removes the infected portion of the file along with the rest of the file. The un-infected portion of the file before a virus pattern was matched still goes through.
5 If the send alert message function is enabled, the ZyWALL sends an alert to the file's intended destination computer(s).

Note: Since the ZyWALL erases the infected portion of the file before sending it, you may not be able to open the file.

Notes About the ZyWALL Anti-Virus

The following lists important notes about the anti-virus scanner:

1 The ZyWALL anti-virus scanner can detect polymorphic viruses.
2 When a virus is detected, an alert message is displayed in Microsoft Windows computers. Refer to Appendix C on page 875 if your Windows computer does not display the alert messages.
3 Changes to the ZyWALL's anti-virus settings affect new sessions (not the sessions that already existed before you applied the changed settings).

4 The ZyWALL does not scan the following file/traffic types:

  • Simultaneous downloads of a file using multiple connections. For example, when you use FlashGet to download sections of a file simultaneously.
  • Encrypted traffic. This could be password-protected files or VPN traffic where the ZyWALL is not the endpoint (pass-through VPN traffic).
  • Traffic through custom (non-standard) ports. The only exception is FTP traffic. The ZyWALL scans whatever port number is specified for FTP in the ALG screen.
  • ZIP file(s) within a ZIP file.

Finding Out More

• See Section 5.4.14 on page 111 for related information on these screens.
• See Section 29.7 on page 487 for anti-virus background information.

29.1.3 Before You Begin

  • Before using anti-virus, see Chapter 8 on page 165 for how to register for the anti-virus service.
  • You may need to customize the zones (in the Network > Zone) used for the anti-virus scanning direction.

29.2 Anti-Virus Summary Screen

Click Anti-X > Anti-Virus to display the configuration screen as shown next.

Figure 338 Anti-X > Anti-Virus > General
ZYXEL ZYWALL USG 2000 - Anti-Virus Summary Screen - 1

text_image General Black/White List Signature General Settings Enable Anti-Virus and Anti-Spyware Scan EICAR Policies Priority From To Protocol 1 WAN LAN1 HTTP FTP SMTP POP3 IMAP4 License License Status: Not Licensed License Type: None Apply New Registration Signature Information Anti-Virus Engine Type: Kasperskey Current Version: 1.009 Signature Number: 3200 Released Date: 2007-05-17 18:48:40 Update Signatures Apply Reset

The following table describes the labels in this screen.

Table 136 Anti-X > Anti-Virus > General

LABELDESCRIPTION
General SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
Enable Anti-Virus and Anti-SpywareSelect this check box to check traffic for viruses and spyware. The following table lists policies that define which traffic the ZyWALL scans and the action it takes upon finding a virus.
Scan EICARSelect this option to have the ZyWALL check for the EICAR test file and treat it in the same way as a real virus file. The EICAR test file is a standardized test file for signature based anti-virus scanners. When the virus scanner detects the EICAR file, it responds in the same way as if it found a real virus. Besides straightforward detection, the EICAR file can also be compressed to test whether the anti-virus software can detect it in a compressed file. The test string consists of the following human-readable ASCII characters.X5O!P%@AP[4\PZX54(P^)7CC)7]EICAR-STANDARD-ANTIVIRUS-TEST-FILE!H+H*
Policies
PriorityThis is the position of an anti-virus policy in the list. The ordering of your anti-virus policies is important as the ZyWALL applies them in sequence. Once traffic matches an anti-virus policy, the ZyWALL applies that policy and does not check the traffic against any more policies.
FromThe anti-virus policy has the ZyWALL scan traffic coming from this zone and going to theTozone.
ToThe anti-virus policy has the ZyWALL scan traffic going to this zone from theFromzone.
ProtocolThese are the protocols of traffic to scan for viruses.FTPapplies to traffic using the TCP port number specified for FTP in the ALG screen.HTTPapplies to traffic using TCP ports 80, 8080 and 3128.SMTPapplies to traffic using TCP port 25.POP3applies to traffic using TCP port 110.IMAP4applies to traffic using TCP port 143.
Add iconClick theAddicon in the heading row to add a new first entry.TheActivedisplays whether the entry is enabled or not. Click it to activate or deactivate the entry. Make sure you clickApplyto save and apply the change.Click theEditicon to go to the screen where you can edit the entry on the ZyWALL.Click theAddicon in an entry to add a policy below the current entry.Click theRemoveicon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry. Note that subsequent entries move up by one when you take this action.In a numbered list, click theMove to Nicon to display a field to type an index number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. For example, if you type 6, the policy you are moving becomes number 6 and the previous policy 6 (if there is one) gets pushed up (or down) one.The ordering of your policies is important as they are applied in order of their numbering.
LicenseThe following fields display information about the current state of your subscription for virus signatures.
License StatusThis field displays whether a service is activated (Licensed) or not (Not Licensed) or expired (Expired).
License TypeThis field displays whether you applied for a trial application (Trial) or registered a service with your iCard's PIN number (Standard). None displays when the service is not activated.
Apply New RegistrationThis link appears if you have not registered for the service or only have the trial registration. Click this link to go to the screen where you can register for the service.
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Anti-Virus Engine TypeThis field displays whether the ZyWALL is set to use ZyXEL's anti-virus engine or the one powered by Kaspersky.
Current VersionThis field displays the anti-virus signature set version number. This number gets larger as the set is enhanced.
Signature NumberThis field displays the number of anti-virus signatures in this set.
Released DateThis field displays the date and time the set was released.
Update SignaturesClick this link to go to the screen you can use to download signatures from the update server.
ApplyClick Apply to save your changes.
ResetClick Reset to start configuring this screen again.

29.2.1 Anti-Virus Policy Add or Edit Screen

Click the Add or Edit icon in the Anti-X > Anti-Virus > General screen to display the configuration screen as shown next.

Figure 339 Anti-X > Anti-Virus > General > Add
ZYXEL ZYWALL USG 2000 - Anti-Virus Policy Add or Edit Screen - 1

text_image Configuration Enable Direction From any To any Protocols to Scan HTTP FTP SMTP POP3 IMAP4 Actions When Matched Destroy infected file Send windows message Log log White List / Black List Checking Check White List Check Black List File decompression Enable file decompression (ZIP and RAR) Destroy compressed files that could not be decompressed OK Cancel

The following table describes the labels in this screen.

Table 137 Anti-X > Anti-Virus > General > Add

LABELDESCRIPTION
Configuration
EnableSelect this check box to have the ZyWALL apply this anti-virus policy to check traffic for viruses.
Direction
FromToSelect source and destination zones for traffic to scan for viruses. The anti-virus policy has the ZyWALL scan traffic coming from the From zone and going to the To zone.
Protocols to ScanSelect which protocols of traffic to scan for viruses.HTTP applies to traffic using TCP ports 80, 8080 and 3128.FTP applies to traffic using the TCP port number specified for FTP in the ALG screen.SMTP applies to traffic using TCP port 25.POP3 applies to traffic using TCP port 110.IMAP4 applies to traffic using TCP port 143.
Actions When Matched
Destroy infected fileWhen you select this check box, if a virus pattern is matched, the ZyWALL overwrites the infected portion of the file (and the rest of the file) with zeros. The un-infected portion of the file before a virus pattern was matched goes through unmodified.
Send Windows MessageSelect this check box to set the ZyWALL to send a message alert to files' intended user(s) using Microsoft Windows computers connected to the to interface.Refer toAppendix C on page 875if your Windows computer does not display the alert messages.
LogThese are the log options:no: Do not create a log when a packet matches a signature(s).log: Create a log on the ZyWALL when a packet matches a signature(s).log alert: An alert is an e-mailed log for more serious events that may need more immediate attention. Select this option to have the ZyWALL send an alert when a packet matches a signature(s).
White List / Black List Checking
Check White ListSelect this check box to check files against the white list.
Check Black ListSelect this check box to check files against the black list.
File decompression
Enable file decompression (ZIP and RAR)Select this check box to have the ZyWALL scan a ZIP file (the file does not have to have a "zip" or "rar" file extension). The ZyWALL first decompresses the ZIP file and then scans the contents for viruses.Note: The ZyWALL decompresses a ZIP file once. The ZyWALL does NOT decompress any ZIP file(s) within a ZIP file.
Destroy compressed files that could not be decompressedNote: When you select this option, the ZyWALL deletes ZIP files that use password encryption.Select this check box to have the ZyWALL delete any ZIP files that it is not able to unzip. The ZyWALL cannot unzip password protected ZIP files or a ZIP file within another ZIP file. There are also limits to the number of ZIP files that the ZyWALL can concurrently unzip.Note: The ZyWALL's firmware package cannot go through the ZyWALL with this option enabled. The ZyWALL classifies the firmware package as not being able to be decompressed and deletes it.You can upload the firmware package to the ZyWALL with the option enabled, so you only need to clear this option while you download the firmware package.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

29.3 Anti-Virus Black List

Click Anti-X > Anti-Virus > Black/White List to display the screen shown next. Use the Black List screen to set up the Anti-Virus black (blocked) list of virus file patterns.

Figure 340 Anti-X > Anti-Virus > Black/White List > Black List
ZYXEL ZYWALL USG 2000 - Anti-Virus Black List - 1

text_image General Black/White List Signature Black List White List General Settings Enable Black List Rule Summary Total Rule: 1 30 rules per page Page: 1 of 1

File Pattern

1 blacklist-example Apply Reset

The following table describes the labels in this screen.

Table 138 Anti-X > Anti-Virus > Black/White List > Black List

LABELDESCRIPTION
General Settings
Enable Black ListSelect this check box to log and delete files with names that match the black list patterns. Use the black list to log and delete files with names that match the black list patterns.
Rule Summary
Total RuleThis is the number of entries configured.
rules per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the entry's index number in the list.
File PatternThis is the file name pattern. If a file's name that matches this pattern, the ZyWALL logs and deletes the file.
Add iconThis column provides icons to add, activate / deactivate, edit, and remove entries.To add an entry, click the Add icon at the top of the column.Click an entry's Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click an entry's Edit icon to edit the entry.To delete an entry, click the entry's Remove icon. The web configurator confirms that you want to delete the entry.
ApplyClick Apply to save your changes.
ResetClick Reset to start configuring this screen again.

29.4 Anti-Virus Black List or White List Add/Edit

From the Anti-X > Anti-Virus > Black/White List > Black List (or White List) screen, click the Add icon or an Edit icon to display the following screen.

- For a black list entry, enter a file pattern that should cause the ZyWALL to log and delete a file.

- For a white list entry, enter a file pattern that should cause the ZyWALL to allow a file.

Figure 341 Anti-X > Anti-Virus > Black/White List > Black List (or White List) > Add
ZYXEL ZYWALL USG 2000 - Anti-Virus Black List or White List Add/Edit - 1

text_image Configuration Enable File Pattern OK Cancel

The following table describes the labels in this screen.

Table 139 Anti-X > Anti-Virus > Black/White List > Black List (or White List) > Add

LABELDESCRIPTION
EnableIf this is a black list entry, select this option to have the ZyWALL apply this entry when using the black list.If this is a white list entry, select this option to have the ZyWALL apply this entry when using the white list.
File PatternFor a black list entry, specify a pattern to identify the names of files that the ZyWALL should log and delete.For a white list entry, specify a pattern to identify the names of files that the ZyWALL should not scan for viruses.Use up to 80 characters. Alphanumeric characters, underscores ( ), dashes (-), question marks (?) and asterisks (*) are allowed.A question mark (?) lets a single character in the file name vary. For example, use “a?.zip” (without the quotation marks) to specify aa.zip, ab.zip and so on.Wildcards (*) let multiple files match the pattern. For example, use “*a.zip” (without the quotation marks) to specify any file that ends with “a.zip”. A file named “testa.zip would match. There could be any number (of any type) of characters in front of the “a.zip” at the end and the file name would still match. A file named “test.zipa” for example would not match.A * in the middle of a pattern has the ZyWALL check the beginning and end of the file name and ignore the middle. For example, with “abc*.zip”, any file starting with “abc” and ending in “.zip” matches, no matter how many characters are in between.The whole file name has to match if you do not use a question mark or asterisk.If you do not use a wildcard, the ZyWALL checks up to the first 80 characters of a file name.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

29.5 Anti-Virus White List

Click Anti-X > Anti-Virus > Black/White List > White List to display the screen shown next. Use the Black/White List screen to set up Anti-Virus black (blocked) and white (allowed) lists of virus file patterns.

Figure 342 Anti-X > Anti-Virus > Black/White List > White List
ZYXEL ZYWALL USG 2000 - Anti-Virus White List - 1

text_image General Black/White List Signature Black List White List General Settings Enable White List Rule Summary Total Rule: 1 30 rules per page Page: 1 of 1

File Pattern

1 white-list-example Apply Reset

The following table describes the labels in this screen.

Table 140 Anti-X > Anti-Virus > Black/White List > White List

LABELDESCRIPTION
General Settings
Enable White ListSelect this check box to have the ZyWALL not perform the anti-virus check on files with names that match the white list patterns.Use the white list to have the ZyWALL not perform the anti-virus check on files with names that match the white list patterns.
Rule Summary
Total RuleThis is the number of entries configured.
rules per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the entry's index number in the list.
File PatternThis is the file name pattern. If a file's name matches this pattern, the ZyWALL does not check the file for viruses.

Table 140 Anti-X > Anti-Virus > Black/White List > White List

LABELDESCRIPTION
Add iconThis column provides icons to add, activate / deactivate, edit, and remove entries.To add an entry, click the Add icon at the top of the column. See Section 29.4 on page 482 for details.Click an entry's Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click an entry's Edit icon to edit the entry. See Section 29.4 on page 482 for details.To delete an entry, click the entry's Remove icon. The web configurator confirms that you want to delete the entry.
ApplyClick Apply to save your changes.
ResetClick Reset to start configuring this screen again.

29.6 Signature Searching

Click Anti-X > Anti-Virus > Signature to display this screen. Use this screen to locate signatures and display details about them.

If Internet Explorer opens a warning screen about a script making Internet Explorer run slowly and the computer maybe becoming unresponsive, just click No to continue.

Figure 343 Anti-X > Anti-Virus > Signature: Search by Severity
ZYXEL ZYWALL USG 2000 - Signature Searching - 1

text_image General Setting Signature Query Signatures Signatures Search By Severity High Search Query all signatures and export Export Query Result Total Signature:1200 30 signatures per Page: 1 of 40 page Name ID Severity Category Trojan-PSW.Win32.OnLineGames.es 10010 High Virus Trojan-PSW.Win32.QQPass.kr 7688 High Virus Trojan-PSW.Win32.WOW.at 7421 High Virus Trojan-PSW.Win32.WOW.at 7423 High Virus Trojan-Proxy.Win32.Slaper.e 10578 High Virus Trojan-Spy.Win32.Agent.ct 7266 High Spyware Trojan-Spy.Win32.Agent.iw 4421 High Spyware Trojan-Spy.Win32.Agent.iw 4422 High Spyware Trojan-Spy.Win32.Agent.iw 4423 High Spyware Trojan-Spy.Win32.Agent.iw 4424 High Spyware

The following table describes the labels in this screen.

Table 141 Anti-X > Anti-Virus > Signature

LABELDESCRIPTION
Query Signatures
Signatures SearchSelect the criteria on which to perform the search.Select By Name from the drop down list box and type the name or part of the name of the signature(s) you want to find. This search is not case-sensitive.Select By ID from the drop down list box and type the ID or part of the ID of the signature you want to find.Select By Severity from the drop down list box and select the severity level of the signatures you want to find.Select By Category from the drop down list box and select whether you want to see virus signatures or spyware signatures.Click Search to have the ZyWALL search the signatures based on your specified criteria.
Query all signatures and exportClick Export to have the ZyWALL save all of the anti-virus signatures to your computer in a .txt file.
Query Result
Total SignatureThis is the number of signatures that matched your search criteria.
signatures per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
NameThis is the name of the anti-virus signature. Click the Name column heading to sort your search results in ascending or descending order according to the signature name.Click a signature's name to see details about the virus.
IDThis is the IDentification number of the anti-virus signature. Click the ID column header to sort your search results in ascending or descending order according to the ID.
SeverityThis is the severity level of the anti-virus signature. Click the severity column header to sort your search results by ascending or descending severity.
CategoryThis column displays whether the signature is for identifying a virus or spyware. Click the column heading to sort your search results by category.

29.7 Anti-Virus Technical Reference

Types of Computer Viruses

The following table describes some of the common computer viruses.

Table 142 Common Computer Virus Types

TYPEDESCRIPTION
File InfectorThis is a small program that embeds itself in a legitimate program. A file infector is able to copy and attach itself to other programs that are executed on an infected computer.
Boot Sector VirusThis type of virus infects the area of a hard drive that a computer reads and executes during startup. The virus causes computer crashes and to some extend renders the infected computer inoperable.
Macro VirusMacro viruses or Macros are small programs that are created to perform repetitive actions. Macros run automatically when a file to which they are attached is opened. Macros spread more rapidly than other types of viruses as data files are often shared on a network.
E-mail VirusE-mail viruses are malicious programs that spread through e-mail.
Polymorphic VirusA polymorphic virus (also known as a mutation virus) tries to evade detection by changing a portion of its code structure after each execution or self replication. This makes it harder for an anti-virus scanner to detect or intercept it.A polymorphic virus can also belong to any of the virus types discussed above.

Computer Virus Infection and Prevention

The following describes a simple life cycle of a computer virus.

1 A computer gets a copy of a virus from a source such as the Internet, e-mail, file sharing or any removable storage media. The virus is harmless until the execution of an infected program.
2 The virus spreads to other files and programs on the computer.
3 The infected files are unintentionally sent to another computer thus starting the spread of the virus.
4 Once the virus is spread through the network, the number of infected networked computers can grow exponentially.

Types of Anti-Virus Scanner

The section describes two types of anti-virus scanner: host-based and network-based.

A host-based anti-virus (HAV) scanner is often software installed on computers and/or servers in the network. It inspects files for virus patterns as they are moved in and out of the hard drive. However, host-based anti-virus scanners cannot eliminate all viruses for a number of reasons:

  • HAV scanners are slow in stopping virus threats through real-time traffic (such as from the Internet).
  • HAV scanners may reduce computing performance as they also share the resources (such as CPU time) on the computer for file inspection.
  • You have to update the virus signatures and/or perform virus scans on all computers in the network regularly.

A network-based anti-virus (NAV) scanner is often deployed as a dedicated security device (such as your ZyWALL) on the network edge. NAV scanners inspect real-time data traffic (such as E-mail messages or web) that tends to bypass HAV scanners. The following lists some of the benefits of NAV scanners.

  • NAV scanners stops virus threats at the network edge before they enter or exit a network.
  • NAV scanners reduce computing loading on computers as the read-time data traffic inspection is done on a dedicated security device.

30.1 Overview

This chapter introduces packet inspection IDP (Intrusion, Detection and Prevention), IDP profiles, binding an IDP profile to a traffic flow, custom signatures and updating signatures. An IDP system can detect malicious or suspicious packets and respond instantaneously. IDP on the ZyWALL protects against network-based intrusions.

30.1.1 What You Can Do Using the IDP Screens

  • Use the Anti-X > IDP > General screen (Section 30.2 on page 491) to turn IDP on or off, bind IDP profiles to traffic directions, and view registration and signature information. Click the Add or Edit icon in this screen to bind an IDP profile to a traffic direction.
  • Use the Anti-X > IDP > Profile screen (Section 30.3 on page 494) to add a new profile, edit an existing profile or delete an existing profile.
  • Use the Anti-X > IDP > Custom Signature (Section 30.7 on page 506) screens to create a new signature, edit an existing signature, delete existing signatures or save signatures to your computer.

30.1.2 What You Need To Know About IDP

Packet Inspection Signatures

A signature identifies a malicious or suspicious packet and specifies an action to be taken. You can change the action in the profile screens. Packet inspection signatures examine OSI (Open System Interconnection) layer-4 to layer-7 packet contents for malicious data. Generally, packet inspection signatures are created for known attacks while anomaly detection looks for abnormal behavior (see Chapter 31 on page 523).

Zone

A zone is a combination of ZyWALL interfaces and VPN connections used for configuring security. See the zone chapter for details on zones and the interfaces chapter for details on interfaces.

IDP Profiles

An IDP profile is a set of related IDP signatures that you can activate as a set and configure common log and action settings. You can apply IDP profiles to traffic flowing from one zone to another. For example, apply the default LAN_IDP profile to any traffic going to the LAN zone in order to protect your LAN computers.

Note: You can only apply one IDP profile to one traffic flow.

Base IDP Profiles

Base IDP profiles are templates that you use to create new IDP profiles. The ZyWALL comes with several base profiles. See Table 145 on page 495 for details on base profiles.

IDP Policies

An IDP policy refers to application of an IDP profile to a traffic flowing from one zone to another.

Applying Your IDP Configuration

Changes to the ZyWALL's IDP settings affect new sessions (not the sessions that already existed before you applied the changed settings).

Finding Out More

• See Section 5.4.15 on page 112 for IDP prerequisite information.
• See Chapter 31 on page 523 for anomaly detection and protection.
• See Section 30.9 on page 520 for more information on network-based intrusions
- See Section 30.6.1 on page 501 for a list of attacks that the ZyWALL can protect against.
- See Section 30.7 on page 506 for how to create your own custom IDP signatures.

30.1.3 Before You Begin

  • Register for a trial IDP subscription in the Registration screen (see Section 8.2 on page 167). This gives you access to free signature updates. This is important as new signatures are created as new attacks evolve. When the trial subscription expires, purchase and enter a license key using the same screens to continue the subscription.
  • Configure zones on the ZyWALL - see Chapter 14 on page 275 for more information.

30.2 The IDP General Screen

Click Anti-X > IDP > General to open this screen. Use this screen to turn IDP on or off, bind IDP profiles to traffic directions, and view registration and signature information.

Note: You must register in order to use packet inspection signatures. See the Registration screens.

If you try to enable IDP when the IDP service has not yet been registered, a warning screen displays and IDP is not enabled.

Figure 344 Anti-X > IDP > General
ZYXEL ZYWALL USG 2000 - The IDP General Screen - 1

text_image General Profile Custom Signatures General Settings Enable Signature Detection Policies Priority From To IDP Profile 1 any LAN LAN_IDP 2 any DMZ DMZ_IDP License License Status:Licensed License Type:Trial Apply New Registration Signature Information Current Version: 2.026 Signature Number: 2020 Released Date: 2007/06/20 17:08:10 Update Signatures Apply Reset

The following table describes the screens in this screen.

Table 143 Anti-X > IDP > General

LABELDESCRIPTION
General Settings
Enable Signature DetectionYou must register for IDP service in order to use packet inspection signatures. If you don’t have a standard license, you can register for a once-off trial one.
PoliciesUse this list to specify which IDP profile the ZyWALL uses for traffic flowing in a specific direction.
PriorityIDP policies are applied in order of priority.
From, ToThis is the direction of travel of packets to which an IDP profile is bound.Note: Depending on your network topology and traffic load, binding every packet direction to an IDP profile may affect the ZyWALL's performance.From LAN To LAN means packets traveling from a computer on one LAN subnet to a computer on another LAN subnet via the ZyWALL's LAN zone interfaces. The ZyWALL does not check packets traveling from a LAN computer to another LAN computer on the same subnet.From WAN To WAN means packets that come in from the WAN zone and the ZyWALL routes back out through the WAN zone.
IDP ProfileThis field shows which IDP profile is bound to which traffic direction. Click the popup icon to change to a different profile.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the entry is enabled or not. Click it to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the entry.Click the Add icon in an entry to add an entry below the current entry.Click the Remove icon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry. Note that subsequent entries move up by one when you take this action.In a numbered list, click the Move to N icon to display a field to type an index number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. For example, if you type 6, the entry you are moving becomes number 6 and the previous entry 6 (if there is one) gets pushed up (or down) one.The ordering of your entries is important as they are applied in order of their numbering.
LicenseYou need to create an account at myZyXEL.com, register your ZyWALL and then subscribe for IDP in order to be able to download new packet inspection signatures from myZyXEL.com. There's an initial free trial period for IDP after which you must pay to subscribe to the service. See the Registration chapter for details.
License StatusLicensed, Not Licensed or Expired indicates whether you have subscribed for IDP services or not or your registration has expired.
License TypeThis field shows Trial, Standard or None depending on whether you subscribed to the IDP trial, bought an iCard for IDP service or neither.
Apply New RegistrationThis link appears if you have not registered for the service or only have the trial registration. Click this link to go to the screen where you can register for the service.
Signature InformationThe following fields display information on the current signature set that the ZyWALL is using.
Current VersionThis field displays the IDP signature set version number. This number gets larger as the set is enhanced.
Signature NumberThis field displays the number of IDP signatures in this set. This number usually gets larger as the set is enhanced. Older signatures and rules may be removed if they are no longer applicable or have been supplanted by newer ones.
Released DateThis field displays the date and time the set was released.
Update SignaturesClick this link to go to the screen you can use to download signatures from the update server.
ApplyClick Apply to save your changes.
ResetClick Reset to start configuring this screen again.

30.2.1 Configuring IDP Policies

Click Anti-X > IDP > General and then an Add or Edit icon to display the following screen. Use this screen to apply an IDP profile to traffic flowing from one zone to another.

Figure 345 Anti-X > IDP > General > Add
ZYXEL ZYWALL USG 2000 - Configuring IDP Policies - 1

text_image Configuration Enable Direction From any To any Profile Selection IDP Profile none OK Cancel

The following table describes the screens in this screen.

Table 144 Anti-X > IDP > General > Add

LABELDESCRIPTION
Configuration
EnableSelect this check box to turn on this IDP profile to traffic direction binding.
Direction
FromToTraffic direction is defined by the zone the traffic is coming from and the zone the traffic is going to.Use the From field to specify the zone from which the traffic is coming.Use the To field to specify the zone to which the traffic is going.
Profile Selection
IDP ProfileSelect an IDP profile to apply to the entry's traffic direction.Configure the IDP profiles in the IDP profile screens.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

30.3 Introducing IDP Profiles

An IDP profile is a set of packet inspection signatures.

Packet inspection signatures examine packet content for malicious data. Packet inspection applies to OSI (Open System Interconnection) layer-4 to layer-7 contents. You need to subscribe for IDP service in order to be able to download new signatures.

In general, packet inspection signatures are created for known attacks while anomaly detection looks for abnormal behavior (see Chapter 31 on page 523 for information on anomaly detection).

30.3.1 Base Profiles

The ZyWALL comes with several base profiles. You use base profiles to create new profiles. In the Anti-X > IDP > Profile screen, click the Add icon to display the following screen.

Figure 346 Base Profiles
ZYXEL ZYWALL USG 2000 - Base Profiles - 1

text_image GoTo: 1 Page 1/1 Please select one IDP Base Profile. all dmz lan none wan OK Cancel

The following table describes this screen.

Table 145 Base Profiles

BASE PROFILEDESCRIPTION
allAll signatures are enabled. Signatures with a high or severe severity level (greater than three) generate log alerts and cause packets that trigger them to be dropped. Signatures with a very low, low or medium severity level (less than or equal to three) generate logs (not log alerts) and no action is taken on packets that trigger them.
dmzThis profile is most suitable for networks containing your servers.Signatures for common services such as DNS, FTP, HTTP, ICMP, IMAP, MISC, NETBIOS, POP3, RPC, RSERVICE, SMTP, SNMP, SQL, TELNET, Oracle, MySQL are enabled. Signatures with a high or severe severity level (greater than three) generate log alerts and cause packets that trigger them to be dropped. Signatures with a low or medium severity level (two or three) generate logs (not log alerts) and no action is taken on packets that trigger them. Signatures with a very low severity level (one) are disabled.
lanThis profile is most suitable for common LAN network services.Signatures for common services such as DNS, FTP, HTTP, ICMP, IM, IMAP, MISC, NETBIOS, P2P, POP3, RPC, RSERVICE, SMTP, SNMP, SQL, TELNET, TFTP, MySQL are enabled. Signatures with a high or severe severity level (greater than three) generate logs (not log alerts) and cause packets that trigger them to be dropped. Signatures with a low or medium severity level (two or three) generate logs (not log alerts) and no action is taken on packets that trigger them. Signatures with a very low severity level (one) are disabled.
noneAll signatures are disabled. No logs are generated nor actions are taken.
wanSignatures for all services are enabled. Signatures with a medium, high or severe severity level (greater than two) generate logs (not log alerts) and no action is taken on packets that trigger them. Signatures with a very low or low severity level (less than or equal to two) are disabled.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

30.4 The Profile Summary Screen

Select Anti-X > IDP > Profile. Use this screen to:

  • Add a new profile
  • Edit an existing profile

- Delete an existing profile

Figure 347 Anti-X > IDP > Profile
ZYXEL ZYWALL USG 2000 - The Profile Summary Screen - 1

text_image General Profile Custom Signatures Profile Management Name Base Profile LAN_IDP lan DMZ_IDP dmz

The following table describes the fields in this screen.

Table 146 Anti-X > IDP > Profile

LABELDESCRIPTION
NameThis is the name of the profile you created.
Base ProfileThis is the base profile from which the profile was created.
Add iconClick the Add icon in the column header to create a new profile. A pop-up screen displays requiring you to choose a base profile from which to create the new profile.Click an Edit icon to edit an existing profile.Click a Remove icon to delete an existing profile.

30.5 Creating New Profiles

You may want to create a new profile if not all signatures in a base profile are applicable to your network. In this case you should disable non-applicable signatures so as to improve ZyWALL IDP processing efficiency.

You may also find that certain signatures are triggering too many false positives or false negatives. A false positive is when valid traffic is flagged as an attack. A false negative is when invalid traffic is wrongly allowed to pass through the ZyWALL. As each network is different, false positives and false negatives are common on initial IDP deployment.

You could create a new ‘monitor profile’ that creates logs but all actions are disabled. Observe the logs over time and try to eliminate the causes of the false alarms. When you’re satisfied that they have been reduced to an acceptable level, you could then create an ‘inline profile’ whereby you configure appropriate actions to be taken when a packet matches a signature.

30.5.1 Procedure To Create a New Profile

To create a new profile:

1 Click the Add icon in the Anti-X > IDP > Profile screen to display a pop-up screen allowing you to choose a base profile.
2 Select a base profile (see Table 145 on page 495) and then click OK to go to the profile details screen.
Note: If Internet Explorer opens a warning screen about a script making Internet Explorer run slowly and the computer maybe becoming unresponsive, just click No to continue.
3 Type a new profile name
4 Enable or disable individual signatures.
5 Edit the default log options and actions.

30.6 Profiles: Packet Inspection

Select Anti-X > IDP > Profile and then add a new or edit an existing profile select. Packet inspection signatures examine the contents of a packet for malicious data. It operates at layer-4 to layer-7.

Figure 348 Anti-X > IDP > Profile > Edit : Group View
ZYXEL ZYWALL USG 2000 - Profiles: Packet Inspection - 1

text_image Name SPF2612 Switch to query view Signature Group Service ▲ Activation Log Action WEB_PHP original setting original setting WEB_MISC original setting original setting WEB_IIS original setting original setting WEB_FRONTPAGE original setting original setting WEB_CGI original setting original setting WEB_ATTACKS original setting original setting TFTP original setting original setting TELNET original setting original setting SQL original setting original setting SNMP original setting original setting SMTP original setting original setting RSERVICES original setting original setting RPC original setting original setting POP3 original setting original setting POP2 original setting original setting P2P original setting original setting ORACLE original setting original setting NNTP log alert drop NETBIOS original setting original setting MYSQL original setting original setting MISC_EXPLOIT original setting original setting MISC_DDOS original setting original setting MISC_BACKDOOR original setting original setting MISC original setting original setting IMAP original setting original setting IM original setting original setting Message ▲ SID Severity Policy Type CHAT AIM receive message 8000659 low IM log none CHAT ICO access 8004032 verylow IM log none CHAT ICO forced user addition 8000857 medium IM log none CHAT MSN login attempt 8001036 low IM log none CHAT MSN message 8004031 verylow IM log none CHAT MSN outbound file transfer rejected 8001033 high IM log alert drop CHAT MSN outbound file transfer request 8001030 low IM log none CHAT MSN user search 8001035 low IM log none ICMP log none FTP original setting original setting FINGER original setting original setting DNS original setting original setting OK Cancel Save

The following table describes the fields in this screen.

Table 147 Anti-X > IDP > Profile > Group View

LABELDESCRIPTION
NameThis is the name of the profile. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names:MyProfilemYProfileMymy12_3-4These are invalid profile names:1mYProfileMy ProfileMyProfile?Whatalongprofilename123456789012
Switch to query viewClick this button to go to a screen where you can search for signatures by criteria such as name, ID, severity, attack type, vulnerable attack platforms, service category, log options or actions.
ServiceClick the + sign next to a service group to expand it. A service group is a group of related IDP signatures.
MessageThis is the name of the signature.
SIDThis is the signature ID (identification) number that uniquely identifies a ZyWALL signature.
SeverityThese are the severities as defined in the ZyWALL. The number in brackets is the number you use if using commands.Severe(5): These denote attacks that try to run arbitrary code or gain system privileges.High(4): These denote known serious vulnerabilities or attacks that are probably not false alarms.Medium(3): These denote medium threats, access control attacks or attacks that could be false alarms.Low(2): These denote mild threats or attacks that could be false alarms.Very Low(1): These denote possible attacks caused by traffic such as Ping, trace route, ICMP queries etc.
Policy TypeThis is the attack type as defined on the ZyWALL. See Table 148 on page 501 for a description of each type.
ActivationClick the icon to enable or disable a signature or group of signatures.
LogThese are the log options:original setting: Select this option to return each log option within a service group to its previously saved configuration.no: Select this option on an individual signature or a complete service group to have the ZyWALL create no log when a packet matches a signature(s).log: Select this option on an individual signature or a complete service group to have the ZyWALL create a log when a packet matches a signature(s).log alert: An alert is an e-mailed log for more serious events that may need more immediate attention. Select this option to have the ZyWALL send an alert when a packet matches a signature(s).
ActionSelect what action the ZyWALL should take when a packet matches a signature here.original setting: Select this action to return each signature in a service group to its previously saved configuration none: Select this action on an individual signature or a complete service group to have the ZyWALL take no action when a packet matches the signature(s).drop: Select this action on an individual signature or a complete service group to have the ZyWALL silently drop a packet that matches the signature(s). Neither sender nor receiver are notified.reject-sender: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to the sender when a packet matches the signature. If it is a TCP attack packet, the ZyWALL will send a packet with a ‘RST’ flag. If it is an ICMP or UDP attack packet, the ZyWALL will send an ICMP unreachable packet.reject-receiver: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to the receiver when a packet matches the signature. If it is a TCP attack packet, the ZyWALL will send a packet with an a ‘RST’ flag. If it is an ICMP or UDP attack packet, the ZyWALL will do nothing.reject-both: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to both the sender and receiver when a packet matches the signature. If it is a TCP attack packet, the ZyWALL will send a packet with a ‘RST’ flag to the receiver and sender. If it is an ICMP or UDP attack packet, the ZyWALL will send an ICMP unreachable packet.
OKA profile consists of three separate screens. If you want to configure just one screen for an IDP profile, click OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
CancelClick Cancel to return to the profile summary page without saving any changes.
SaveIf you want to configure more than one screen for an IDP profile, click Save to save the configuration to the ZyWALL, but remain in the same page. You may then go to another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.

30.6.1 Policy Types

This section describes IDP policy types, also known as attack types, as categorized in the ZyWALL. You may refer to these types when categorizing your own custom rules.

Table 148 Policy Types

POLICY TYPEDESCRIPTION
P2PPeer-to-peer (P2P) is where computing devices link directly to each other and can directly initiate communication with each other; they do not need an intermediary. A device can be both the client and the server. In the ZyWALL, P2P refers to peer-to-peer applications such as e-Mule, e-Donkey, BitTorrent, iMesh, etc.
IMIM (Instant Messenger) refers to chat applications. Chat is real-time, text-based communication between two or more users via networks-connected computers. After you enter a chat (or chat room), any room member can type a message that will appear on the monitors of all the other participants.
SPAMSpam is unsolicited “junk” e-mail sent to large numbers of people to promote products or services.
DoS/DDoSThe goal of Denial of Service (DoS) attacks is not to steal information, but to disable a device or network on the Internet.A Distributed Denial of Service (DDoS) attack is one in which multiple compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
ScanA scan describes the action of searching a network for an exposed service. An attack may then occur once a vulnerability has been found. Scans occur on several network levels.A network scan occurs at layer-3. For example, an attacker looks for network devices such as a router or server running in an IP network.A scan on a protocol is commonly referred to as a layer-4 scan. For example, once an attacker has found a live end system, he looks for open ports.A scan on a service is commonly referred to a layer-7 scan. For example, once an attacker has found an open port, say port 80 on a server, he determines that it is a HTTP service run by some web server application. He then uses a web vulnerability scanner (for example, Nikto) to look for documented vulnerabilities.
Buffer OverflowA buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. The excess information can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.Intruders could run codes in the overflow buffer region to obtain control of the system, install a backdoor or use the victim to launch attacks on other devices.
Virus/WormA computer virus is a small program designed to corrupt and/or alter the operation of other legitimate programs. A worm is a program that is designed to copy itself from one computer to another on a network. A worm's uncontrolled replication consumes system resources, thus slowing or stopping other tasks.
Backdoor/TrojanA backdoor (also called a trapdoor) is hidden software or a hardware mechanism that can be triggered to gain access to a program, online service or an entire computer system. A Trojan horse is a harmful program that is hidden inside apparently harmless programs or data.Although a virus, a worm and a Trojan are different types of attacks, they can be blended into one attack. For example, W32/Blaster and W32/Sasser are blended attacks that feature a combination of a worm and a Trojan.
Access ControlAccess control refers to procedures and controls that limit or detect access. Access control attacks try to bypass validation checks in order to access network resources such as servers, directories, and files.
Web AttackWeb attacks refer to attacks on web servers such as IIS (Internet Information Services).

30.6.2 IDP Service Groups

An IDP service group is a set of related packet inspection signatures.

Table 149 IDP Service Groups

WEB_PHPWEB_MISCWEB_IISWEB_FRONTPAGE
WEB_CGIWEB_ATTACKSTFTPTELNET
SQLSNMPSMTPRSERVICES
RPCPOP3POP2P2P
ORACLENNTPNETBIOSMYSQL
MISC_EXPLOITMISC_DDOSMISC_BACKDOORMISC
IMAPIMICMPFTP
FINGERDNS

The following figure shows the WEB_PHP service group that contains signatures related to attacks on web servers using PHP exploits. PHP (PHP: Hypertext Preprocessor) is a server-side HTML embedded scripting language that allows web developers to build dynamic websites.

Logs and actions applied to a service group apply to all signatures within that group. If you select original setting for service group logs and/or actions, all signatures within that group are returned to their last-saved settings.

Figure 349 Anti-X > IDP > Profile > Edit > IDP Service Group
ZYXEL ZYWALL USG 2000 - IDP Service Groups - 1

text_image General Profile Custom Signatures Name SPF2612 Switch to query view Signature Group Service ▲ Activation Log Action WEB_PHP original setting original setting Message ▲ SID Severity Policy Type WEB-PHP_admin.php access 8000316 medium WebAttacks log none WEB-PHP_admin.php file upload attempt 8000315 high WebAttacks log alert drop WEB-PHP Advanced Poll admin comment.php access 8001350 medium WebAttacks log none WEB-PHP Advanced Poll admin edit.php access 8001351 medium WebAttacks log none WEB-PHP Advanced Poll admin embed.php access 8001352 medium WebAttacks log none WEB-PHP Advanced Poll admin help.php access 8001354 medium WebAttacks log none WEB-PHP Advanced Poll admin license.php access 8001355 medium WebAttacks log none

30.6.3 Profile > Query View Screen

Click Switch to query view in the screen as shown in Figure 348 on page 498 to go to a signature query screen. In the query view screen, you can search for signatures by criteria such as name, ID, severity, attack type, vulnerable attack platforms, service category, log options or actions.

Figure 350 Anti-X > IDP > Profile: Query View
ZYXEL ZYWALL USG 2000 - Profile &gt; Query View Screen - 1

text_image General Profile Custom Signatures Name LAN_IDP Switch to group view Query Signatures Search all custom signatures Name (Optional) Signature ID (Optional) Severity Any Attack Type Any Platform Any Service Any Action Very-Low Access-Control All DNS Severity Low Backdoor/Trojan Win95/98 FINGER Medium Buffer-Overflow WinNT Impact High DDoS WinXP/2000 FTP High MYSGL Activation any Log any Search Query Result Total IDP: 0 30 IDP per page Page: 1 of 1 SID Name Severity Attack Type Platform Service Activation Log Action - - - OK Cancel Save

The following table describes the fields in this screen.

Table 150 Anti-X > IDP > Profile: Query View

LABELDESCRIPTION
NameThis is the name of the profile that you created in the IDP > Profiles > Group View screen.
Switch to group viewClick this button to go to the IDP profile group view screen where IDP signatures are grouped by service and you can configure activation, logs and/or actions.
Query SignaturesSelect the criteria on which to perform the search.
Search all custom signaturesSelect this check box to search for signatures you created or imported in the Custom Signatures screen. You can search by name or ID. If the name and ID fields are left blank, then all custom signatures are displayed.
NameType the name or part of the name of the signature(s) you want to find.
Signature IDType the ID or part of the ID of the signature(s) you want to find.
SeveritySearch for signatures by severity level(s) (see Table 147 on page 499). Hold down the [Ctrl] key if you want to make multiple selections.
Attack TypeSearch for signatures by attack type(s) (see Table 148 on page 501). Attack types are known as policy types in the group view screen. Hold down the [Ctrl] key if you want to make multiple selections.
PlatformSearch for signatures created to prevent intrusions targeting specific operating system(s). Hold down the [Ctrl] key if you want to make multiple selections.
ServiceSearch for signatures by IDP service group(s). See Table 149 on page 502 for group details. Hold down the [Ctrl] key if you want to make multiple selections.
ActionSearch for signatures by the response the ZyWALL takes when a packet matches a signature. See Table 147 on page 499 for action details. Hold down the [Ctrl] key if you want to make multiple selections.
ActivationSearch for enabled and/or disabled signatures here.
LogSearch for signatures by log option here. See Table 147 on page 499 for option details.
SearchClick this button to begin the search. The results display at the bottom of the screen. Results may be spread over several pages depending on how broad the search criteria selected were. The tighter the criteria selected, the fewer the signatures returned.
Query ResultThe results are displayed in a table showing the SID, Name, Severity, Attack Type, Platform, Service, Activation, Log, and Action criteria as selected in the search. Click the SID column header to sort search results by signature ID.
Total IDP:This displays the total number of signatures found in your search.
IDP per pageSelect the number of signatures you want to appear per page here.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
OKClick OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
CancelClick Cancel to return to the profile summary page without saving any changes.
SaveClick Save to save the configuration to the ZyWALL, but remain in the same page. You may then go to the another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.

30.6.4 Query Example

This example shows a search with these criteria:

• Severity: severe and high
- Attack Type: DDoS
- Platform: Windows 2000 and Windows XP computers
- Service: Any

- Actions: Any

Figure 351 Query Example Search Criteria
ZYXEL ZYWALL USG 2000 - Query Example - 1

text_image Attributes, hold "Ctrl" to make multiple selection on items in the list. Severity Very-Low Low Medium High Severe Attack Type Any Access-Control Backdoor/Trojan Buffer-Overflow DDoS Platform Any All Win95/98 WinNT WinXP/2000 Service Any DNS FINGER FTP MYSQL Configured options Activation any Log any Actions, hold "Ctrl" to make multiple selection on items in the list. Any none drop reject-sender reject-receiver Search

Figure 352 Query Example Search Results
ZYXEL ZYWALL USG 2000 - Query Example - 2

text_image General Profile Custom Signatures Name LAN_IDP Switch to group view Query Signatures Search all custom signatures Name (Optional) Signature ID (Optional) Severity Attack Type Platform Service Action Any Very-Low Low Medium High Access-Control Backdoor/Trojan Buffer-Overflow DDoS All Win95/98 WinNT WinXP/2000 DNS FINGER FTP MYSQL none drop reject-sender reject-receiver Activation any Log any Search Query Result Total IDP: 35 30 IDP per page Page: 1 of 2 SID Name Severity Attack Type Platform Service Activation Log Action original setting original setting 8004021 NETBIO... high DDOS Win95/... NETBIOS log alert drop 8002693 WEB-CG... high DDOS Win95/... WEB_CGI log alert drop 8002530 WEB-MI... high DDOS WinXP/... WEB_MISC log alert drop 8002286 NETBIO... high DDOS WinXP/... NETBIOS log alert drop 8002284 NETBIO... high DDOS WinXP/... NETBIOS log alert drop

30.7 Introducing IDP Custom Signatures

Create custom signatures for new attacks or attacks peculiar to your network. Custom signatures can also be saved to/from your computer so as to share with others.

You need some knowledge of packet headers and attack types to create your own custom signatures.

30.7.1 IP Packet Header

These are the fields in an Internet Protocol (IP) version 4 packet header.

Figure 353 IP v4 Packet Headers

VersionIHLType of ServiceTotal Length
IdentificationFlagsFragment Offset
Time To LiveProtocolHeader Checksum
Source IP Address
Destination IP Address
OptionsPadding

The header fields are discussed below:

Table 151 IP v4 Packet Headers

HEADERDESCRIPTION
VersionThe value 4 indicates IP version 4.
IHLIP Header Length is the number of 32 bit words forming the total length of the header (usually five).
Type of ServiceThe Type of Service, (also known as Differentiated Services Code Point (DSCP)) is usually set to 0, but may indicate particular quality of service needs from the network.
Total LengthThis is the size of the datagram in bytes. It is the combined length of the header and the data.
IdentificationThis is a 16-bit number, which together with the source address, uniquely identifies this packet. It is used during reassembly of fragmented datagrams.
FlagsFlags are used to control whether routers are allowed to fragment a packet and to indicate the parts of a packet to the receiver.
Fragment OffsetThis is a byte count from the start of the original sent packet.
Time To LiveThis is a counter that decrements every time it passes through a router. When it reaches zero, the datagram is discarded. It is used to prevent accidental routing loops.
ProtocolThe protocol indicates the type of transport packet being carried, for example, 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP.
Header ChecksumThis is used to detect processing errors introduced into the packet inside a router or bridge where the packet is not protected by a link layer cyclic redundancy check. Packets with an invalid checksum are discarded by all nodes in an IP network.
Source IP AddressThis is the IP address of the original sender of the packet.
Destination IP AddressThis is the IP address of the final destination of the packet.
OptionsIP options is a variable-length list of IP options for a datagram that define IP Security Option, IP Stream Identifier, (security and handling restrictions for the military), Record Route (have each router record its IP address), Loose Source Routing (specifies a list of IP addresses that must be traversed by the datagram), Strict Source Routing (specifies a list of IP addresses that must ONLY be traversed by the datagram), Timestamp (have each router record its IP address and time), End of IP List and No IP Options.
PaddingPadding is used as a filler to ensure that the IP packet is a multiple of 32 bits.

30.8 Configuring Custom Signatures

Select Anti-X > IDP > Custom Signatures. The first screen shows a summary of all custom signatures created. Click the SID or Name heading to sort. Click the Add icon to create a new signature or click the Edit icon to edit an existing signature. You can also delete custom signatures here or save them to your computer.

Note: The ZyWALL checks all signatures and continues searching even after a match is found. If two or more rules have conflicting actions for the same packet, then the ZyWALL applies the more restrictive action (reject-both, reject-receiver or reject-sender, drop, none in this order). If a packet matches a rule for reject-receiver and it also matches a rule for reject-sender, then the ZyWALL will reject-both.

Figure 354 Anti-X > IDP > Custom Signatures
ZYXEL ZYWALL USG 2000 - Configuring Custom Signatures - 1

text_image General Profile Custom Signatures Creating SID ▲ Name 9914437 MS0539 Export Importing Import name.rules; custom.rules = device custom signature file. File Path: Browse... Import

The following table describes the fields in this screen.

Table 152 Anti-X > IDP > Custom Signatures

LABELDESCRIPTION
Custom Signature RulesUse this part of the screen to create, edit, delete or export (save to your computer) custom signatures.
SIDSID is the signature ID that uniquely identifies a signature. Click the SID header to sort signatures in ascending or descending order. It is automatically created when you click the Add icon to create a new signature. You can edit the ID, but it cannot already exist and it must be in the 9000000 to 9999999 range.
NameThis is the name of your custom signature. Duplicate names can exist, but it is advisable to use unique signature names that give some hint as to intent of the signature and the type of attack it is supposed to prevent.
Add iconClick the Add icon to create a new signature or click the Edit icon to edit an existing signature.
DeleteUse this column to delete signatures. Select (or clear) the check box in the header column to select (or clear) all check boxes in that column. You can also select (or clear) individual signatures within the column. When you are certain that you have only selected signatures that you want to remove, click the Delete icon. Click OK in the confirm delete signature dialog box to delete the selected signature(s).
ExportUse this column to save signatures to your computer. Select (or clear) the check box in the header column to select (or clear) all check boxes in that column. You can also select (or clear) individual signatures within the column. When you are certain that you have only selected signatures that you want to save, click Export. Click Save in the file download dialog box and then select a location and name for the file.Custom signatures must end with the ‘rules’ file name extension, for example, MySig.rules.
Customer Signature Rule ImportingUse this part of the screen to import custom signatures (previously saved to your computer) to the ZyWALL.Note: The name of the complete custom signature file on the ZyWALL is ‘custom.rules’. If you import a file named ‘custom.rules’, then all custom signatures on the ZyWALL are overwritten with the new file. If this is not your intention, make sure that the files you import are not named ‘custom.rules’.
File PathType the file path and name of the custom signature file you want to import in the text box (or click Browse to find it on your computer) and then click Import to transfer the file to the ZyWALL.New signatures then display in the ZyWALL IDP > Custom Signatures screen.

30.8.1 Creating or Editing a Custom Signature

Click the Add icon to create a new signature or click the Edit icon to edit an existing signature in the screen as shown in Figure 354 on page 509.

A packet must match all items you configure in this screen before it matches the signature. The more specific your signature (including packet contents), then the fewer false positives the signature will trigger.

Try to write signatures that target a vulnerability, for example a certain type of traffic on certain operating systems, instead of a specific exploit.

Figure 355 Anti-X > IDP > Custom Signatures > Add/Edit
ZYXEL ZYWALL USG 2000 - Creating or Editing a Custom Signature - 1

text_image Name Example Signature ID 9024084 Information Severity Platform All Win95/98 WinNT WinXP/2000 Linux FreeBSD Solaris SGI Other-Unix Network-Device Service Frequency Policy Type Threshold 0 Packet(s)/0 Second(s) Header Options Network Protocol IPv4 Type of Service Equal 0 Identification 0 Fragmentation Reserved Bit Don't Fragment More Fragment Fragment Offset Equal 0 Time to Live Equal 0 IP Options Any Same IP Transport Protocol TCP Port Source Port 0 Destination Port 0 Flow Established To Client No Stream Flags SYN FIN RST PSH ACK URG Reserved 1 (MSB) Reserved 2 Sequence Number 0 Ack Number 0 Window Size Equal 0 Payload Options Payload Size Equal 0 Byte(s) Patterns Offset Relative to start of payload 23 Content Add content Case-insensitive Decode as URI Offset Relative to start of payload 58 Content Add content0 Case-insensitive Decode as URI OK Cancel

The following table describes the fields in this screen.

Table 153 Anti-X > IDP > Custom Signatures > Add/Edit

LABELDESCRIPTION
NameType the name of your custom signature. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.Duplicate names can exist but it is advisable to use unique signature names that give some hint as to intent of the signature and the type of attack it is supposed to prevent. Refer to (but do not copy) the packet inspection signature names for hints on creating a naming convention.
Signature IDA signature ID is automatically created when you click the Add icon to create a new signature. You can edit the ID to create a new one (in the 9000000 to 9999999 range), but you cannot use one that already exists. You may want to do that if you want to order custom signatures by SID.
InformationUse the following fields to set general information about the signature as denoted below.
SeverityThe severity level denotes how serious the intrusion is. Categorize the seriousness of the intrusion here. See Table 147 on page 499 as a reference.
PlatformSome intrusions target specific operating systems only. Select the operating systems that the intrusion targets, that is, the operating systems you want to protect from this intrusion. SGI refers to Silicon Graphics Incorporated, who manufactures multi-user Unix workstations that run the IRIX operating system (SGI's version of UNIX). A router is an example of a network device.
ServiceSelect the IDP service group that the intrusion exploits or targets. See Table 149 on page 502 for a list of IDP service groups. The custom signature then appears in that group in the IDP > Profile > Group View screen.
Policy TypeCategorize the type of intrusion here. See Table 148 on page 501 as a reference.
FrequencyRecurring packets of the same type may indicate an attack. Use the following field to indicate how many packets per how many seconds constitute an intrusion
ThresholdSelect Threshold and then type how many packets (that meet the criteria in this signature) per how many seconds constitute an intrusion.
Header Options
Network ProtocolConfigure signatures for IP version 4.
Type Of ServiceType of service in an IP header is used to specify levels of speed and/or reliability. Some intrusions use an invalid Type Of Service number. Select the check box, then select Equal or Not-Equal and then type in a number.
IdentificationThe identification field in a datagram uniquely identifies the datagram. If a datagram is fragmented, it contains a value that identifies the datagram to which the fragment belongs. Some intrusions use an invalid Identification number. Select the check box and then type in the invalid number that the intrusion uses.
FragmentationA fragmentation flag identifies whether the IP datagram should be fragmented, not fragmented or is a reserved bit. Some intrusions can be identified by this flag. Select the check box and then select the flag that the intrusion uses.
Fragmentation OffsetWhen an IP datagram is fragmented, it is reassembled at the final destination. The fragmentation offset identifies where the fragment belongs in a set of fragments. Some intrusions use an invalid Fragmentation Offset number. Select the check box, select Equal, Smaller or Greater and then type in a number
Time to LiveTime to Live is a counter that decrements every time it passes through a router. When it reaches zero, the datagram is discarded. Usually it's used to set an upper limit on the number of routers a datagram can pass through. Some intrusions can be identified by the number in this field. Select the check box, select Equal, Smaller or Greater and then type in a number.
IP OptionsIP options is a variable-length list of IP options for a datagram that define IP Security Option, IP Stream Identifier, (security and handling restrictions for the military), Record Route (have each router record its IP address), Loose Source Routing (specifies a list of IP addresses that must be traversed by the datagram), Strict Source Routing (specifies a list of IP addresses that must ONLY be traversed by the datagram), Timestamp (have each router record its IP address and time), End of IP List and No IP Options. IP Options can help identify some intrusions. Select the check box, then select an item from the list box that the intrusion uses
Same IPSelect the check box for the signature to check for packets that have the same source and destination IP addresses.
Transport ProtocolThe following fields vary depending on whether you choose TCP, UDP or ICMP.
Transport Protocol: TCP
PortSelect the check box and then enter the source and destination TCP port numbers that will trigger this signature.
FlowIf selected, the signature only applies to certain directions of the traffic flow and only to clients or servers. Select Flow and then select the identifying options.Established: The signature only checks for established TCP connectionsStateless: The signature is triggered regardless of the state of the stream processor (this is useful for packets that are designed to cause devices to crash)To Client: The signature only checks for server responses from A to B.To Server: The signature only checks for client requests from B to A.From Client: .The signature only checks for client requests from B to A.From Servers: The signature only checks for server responses from A to B.No Stream: The signature does not check rebuilt stream packets.Only Stream: The signature only checks rebuilt stream packets.
FlagsSelect what TCP flag bits the signature should check.
Sequence NumberUse this field to check for a specific TCP sequence number.
Ack NumberUse this field to check for a specific TCP acknowledgement number.
Window SizeUse this field to check for a specific TCP window size.
Transport Protocol: UDP
PortSelect the check box and then enter the source and destination UDP port numbers that will trigger this signature.
Transport Protocol: ICMP
TypeUse this field to check for a specific ICMP type value.
CodeUse this field to check for a specific ICMP code value.
IDUse this field to check for a specific ICMP ID value. This is useful for covert channel programs that use static ICMP fields when they communicate.
Sequence NumberUse this field to check for a specific ICMP sequence number. This is useful for covert channel programs that use static ICMP fields when they communicate.
Payload OptionsThe longer a payload option is, the more exact the match, the faster the signature processing. Therefore, if possible, it is recommended to have at least one payload option in your signature.
Payload SizeThis field may be used to check for abnormally sized packets or for detecting buffer overflows.Select the check box, then select Equal, Smaller or Greater and then type the payload size.Stream rebuilt packets are not checked regardless of the size of the payload.
OffsetThis field specifies where to start searching for a pattern within a packet. For example, an offset of 5 would start looking for the specified pattern after the first five bytes of the payload.
ContentType the content that the signature should search for in the packet payload. Hexadecimal code entered between pipes is converted to ASCII. For example, you could represent the ampersand as either & or |26| (26 is the hexadecimal code for the ampersand).
Case-insensitiveSelect this check box if content casing does NOT matter.
Decode as URIA Uniform Resource Identifier (URI) is a string of characters for identifying an abstract or physical resource (RFC 2396). A resource can be anything that has identity, for example, an electronic document, an image, a service ("today's weather report for Taiwan"), a collection of other resources. An identifier is an object that can act as a reference to something that has identity. Example URIs are:ftp://ftp.is.co.za/rfc/rfc1808.txt; ftp scheme for File Transfer Protocol serviceshttp://www.math.uio.no/faq/compression-faq/part1.html; http scheme for Hypertext Transfer Protocol servicesmailto:mduerst@ifi.unizh.ch; mailto scheme for electronic mail addressestelnet://melvyl.ucop.edu/; telnet scheme for interactive services via the TELNET ProtocolSelect this check box for the signature to search for normalized URI fields. This means that if you are writing signatures that includes normalized content, such as %2 for directory traversals, these signatures will not be triggered because the content is normalized out of the URI buffer.For example, the URI:/scripts/..%c0%af../winnt/system32/cmd.exe?/c+verwill get normalized into:/winnt/system32/cmd.exe?/c+ver
OKClick this button to save your changes to the ZyWALL and return to the summary screen.
CancelClick this button to return to the summary screen without saving any changes.

30.8.2 Custom Signature Example

Before creating a custom signature, you must first clearly understand the vulnerability.

30.8.2.1 Understand the Vulnerability

Check the ZyWALL logs when the attack occurs. Use web sites such as Google or Security Focus to get as much information about the attack as you can. The more specific your signature, the less chance it will cause false positives.

As an example, say you want to create a signature for the 'Microsoft Windows Plug-and-Play Service Remote Overflow (MS-05-39)' attack. Search the Security Focus web site and you will find it uses the NetBIOS service in established TCP connections to a server using port 445.

30.8.2.2 Analyze Packets

Then use a packet sniffer such as TCPdump or Ethereal to investigate some more.

From the NetBIOS header you see that the first byte '00' defines the message type. The next three bytes represent the length of data, so you can ignore it. Therefore enter |00| as the first pattern.

Figure 356 Custom Signature Example Pattern 1
ZYXEL ZYWALL USG 2000 - Analyze Packets - 1

text_image [SEQ/ACK analysis] NetBIOS Session Service Message Type: Session message Length: 2192 SMB (Server Message Block Protocol) SMB Header 030 fc c5 d9 df 00 00 00 00 08 90 ff 53 4d 42 25 00 ....... ... .SMB%. 040 00 00 00 18 07 c8 00 00 00 00 00 00 00 00 00 ....... ...... 050 00 00 00 08 78 04 00 08 60 00 10 00 00 3c 08 00 x

Next, check the content of the SMB header. Add |FF|SMB% and 'TransactionNmPipe' to the signature as the next patterns.

Figure 357 Custom Signature Example Pattern 2
ZYXEL ZYWALL USG 2000 - Analyze Packets - 2

text_image SMB Header Server Component: SMB SMB Command: Trans (0x25) NT Status: STATUS_SUCCESS (0x00000000) Flags: 0x18 03 dc 08 sc 40 00 80 06 66 81 c0 a8 01 fe c0 a8 ....&... I..... 030 03 02 04 de 01 bd c9 76 b2 e4 c0 62 b8 97 50 10 .......v ...b..P. 030 fc c5 d9 df 00 00 00 00 08 90 ff 53 4d 42 25 00 ....... .SMB%. 040 00 00 00 18 07 c8 00 00 00 00 00 00 00 00 00 00 00 00 ....... ...... 050 00 00 00 08 78 04 00 08 60 00 10 00 00 3c 08 00 ....x... ...<.. T

Figure 358 Custom Signature Example Patterns 3 and 4
ZYXEL ZYWALL USG 2000 - Analyze Packets - 3

text_image Transaction Name: \PIPE\ Padding: 4000 SMB Pipe Protocol Function: TransactNmPipe (0x0026) FTD: 0x4000 0000 00 13 49 T1 26 S6 00 04 e2 e1 a5 2d 08 00 45 00 ...I.&V... ....E. 0010 05 dc 08 3c 40 00 80 06 66 8f c0 a8 01 fe c0 a8 ...<@... f... 0020 03 02 04 de 01 bd c9 76 b2 e4 c0 62 b8 97 50 10 ......v ...b..P. 0030 fc c5 d9 df 00 00 00 00 08 90 ff 53 4d 42 25 00 .........SMB%. 0040 00 00 00 18 07 c8 00 00 00 00 00 00 00 00 00 00 00 00 ...X... ...... 0050 00 00 00 78 04 00 08 60 00 10 00 00 3c 08 00 ...X... ...... 0060 00 00 01 00 00 00 00 00 00 00 00 00 00 54 ...T 0070 00 3c 08 54 00 02 26 26 4o 4o 4d 4e 5c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

The final custom signature should look like as shown in the following figure.

If the attack occurs, check the logs for a log of your custom signature. This indicates the signature works correctly.

Figure 359 Example Custom Signature
ZYXEL ZYWALL USG 2000 - Analyze Packets - 4

text_image Name MS0539 Signature ID 9914437 Information Severity high Platform All Win95/98 WinNT WinXP/2000 Linux FreeBSD Solaris SGI Other-Unix Service NETBIOS Policy Type BufferOverflow Frequency Threshold Packet(s)/ Second(s) Header Options Network Protocol IPv4 Type of Service Equal Identification Fragmentation Reserved Bit Don't Fragment More Fragment Fragment Offset Equal Time to Live Equal IP Options Any Same IP Transport Protocol TCP Port Source Port 0 Destination Port 445 Flow Established To Server Only Stream Flags SYN FIN RST PSH ACK URG Reserved 1 (MSB) Reserved 2 Sequence Number Ack Number Window Size Equal Payload Options Payload Size Equal Byte(s) Patterns Offset Relative to start of payload 0 Content [00] Case-insensitive Decode as URI Offset Relative to start of payload Relative to end of last match 3 Content [FF|SMB%] Case-insensitive Within 5 bytes Decode as URI Offset Relative to start of payload Relative to end of last match 56 Content [800] Case-insensitive Within 2 bytes Decode as URI Offset Relative to start of payload 58 Relative to end of last match Content [SC 00|P|00||00|P|00|E|00 5C 00 00 00] Case-insensitive Within 6 bytes Decode as URI OK Cancel

30.8.3 Applying Custom Signatures

After you create your custom signature, it becomes available in the IDP service group category in the IDP > Profile > Packet Inspection screen. Custom signatures have an SID from 9000000 to 9999999.

You can activate the signature, configure what action to take when a packet matches it and if it should generate a log or alert in a profile. Then bind the profile to a zone.

Figure 360 Example: Custom Signature in IDP Profile
ZYXEL ZYWALL USG 2000 - Applying Custom Signatures - 1

text_image RPC POP3 POP2 P2P ORACLE NNTP NETBIOS Message ▲ SID Severity Policy Type MS0539 9914437 high BufferOverflow log none NETBIOS DCERPC CoGetInstanceFromFile little endian overflow attempt 3158 high DDOS log none NETBIOS DCERPC CoGetInstanceFromFile overflow attempt 3159 high DDOS log none NETBIOS DCERPC DIRECT veritas alter context attempt 3697 low AccessControl no none NETBIOS DCERPC DIRECT veritas bind attempt 3698 low AccessControl no none NETBIOS DCERPC DIRECT veritas little endian alter context attempt 3699 low AccessControl no none NETBIOS DCERPC DIRECT veritas little endian bind attempt 3700 low AccessControl no none

30.8.4 Verifying Custom Signatures

You should configure the signature to create a log when an 'attack packet' matches the signature. (You may also want to configure an alert if the attack is more serious and needs more immediate attention.) After you apply the signature to a zone, you can see if it works by checking the logs (Maintenance > Logs > View Log).

All IDP signatures come under the IDP category. The Priority column shows warn for signatures that are configured to generate a log only. It shows critical for signatures that are configured to generate a log and alert. count is the number of attacks that occurred at that time. The Note column displays ACCESS FORWARD when no action is configured for the signature. It displays ACCESS

DENIED if you configure the signature action to drop the packet. The destination port is the service port (NetBIOS in this case) that the attack tries to exploit.

Figure 361 Custom Signature Log
ZYXEL ZYWALL USG 2000 - Verifying Custom Signatures - 1

text_image Logs Show Filter Display All Logs Email Log Now Refresh Clear Log Total logging entries: 2 30 entries per page Page 1/1

Time Priority Category Message Source Destination Note

1 2006-05-08 warn IDP [type=Sig(648)] SHELLCODE x86 NOOP, Action: No Action 10.10.10.1:1246 192.168.199.96:445 ACCESS FORWARD 2 2006-05-08 warn IDP [type=Sig (9914437)] ms0539, Action: No Action [count=10] 10.10.10.1:1246 192.168.199.96:445 ACCESS FORWARD

30.9 IDP Technical Reference

This section contains some background information on IDP.

Host Intrusions

The goal of host-based intrusions is to infiltrate files on an individual computer or server in with the goal of accessing confidential information or destroying information on a computer.

You must install a host IDP directly on the system being protected. It works closely with the operating system, monitoring and intercepting system calls to the kernel or APIs in order to prevent attacks as well as log them.

Disadvantages of host IDPs are that you have to install them on each device (that you want to protect) in your network and due to the necessarily tight integration with the host operating system, future operating system upgrades could cause problems.

Network Intrusions

Network-based intrusions have the goal of bringing down a network or networks by attacking computer(s), switch(es), router(s) or modem(s). If a LAN switch is compromised for example, then the whole LAN is compromised. Host-based intrusions may be used to cause network-based intrusions when the goal of the host virus is to propagate attacks on the network, or attack computer/server operating system vulnerabilities with the goal of bringing down the computer/server. Typical “network-based intrusions” are SQL slammer, Blaster, Nimda MyDoom etc.

Snort Signatures

You may want to refer to open source Snort signatures when creating custom ZyWALL ones. Most Snort rules are written in a single line. Snort rules are divided into two logical sections, the rule header and the rule options as shown in the following example:

alert tcp any any -> 192.168.1.0/24 111 (content:"|00 01 a5|";

msg:"mountd access";)

The text up to the first parenthesis is the rule header and the section enclosed in parenthesis contains the rule options. The words before the colons in the rule options section are the option keywords.

The rule header contains the rule's:

  • Action
  • Protocol
  • Source and destination IP addresses and netmasks
  • Source and destination ports information.

The rule option section contains alert messages and information on which parts of the packet should be inspected to determine if the rule action should be taken.

These are some equivalent Snort terms in the ZyWALL.

Note: Not all Snort functionality is supported in the ZyWALL.
Table 154 ZyWALL - Snort Equivalent Terms

ZYWALL TERMSNORT EQUIVALENT TERM
Type Of Servicetos
Identificationid
Fragmentationfragbits
Fragmentation Offsetfragoffset
Time to Livettl
IP Optionsipopts
Same IPsameip
Transport Protocol
Transport Protocol: TCP
Port(In Snort rule header)
Flowflow
Flagsflags
Sequence Numberseq
Ack Numberack
Window Sizewindow
Transport Protocol: UDP(In Snort rule header)
Port(In Snort rule header)
Transport Protocol: ICMP
Typeitype
Codeicode
IDicmp_id
Sequence Numbericmp_seq
Payload Options(Snort rule options)
Payload Sizedsize
Offset (relative to start of payload)offset
Relative to end of last matchdistance
Contentcontent
Case-insensitivenocase
Decode as URIuricontent

31.1 Overview

This chapter introduces ADP (Anomaly Detection and Prevention), anomaly profiles and applying an ADP profile to a traffic direction. ADP protects against anomalies based on violations of protocol standards (RFCs – Requests for Comments) and abnormal flows such as port scans.

31.1.1 ADP and IDP Comparison

1 ADP anomaly detection is in general effective against abnormal behavior while IDP packet inspection signatures are in general effective for known attacks (see Chapter 30 on page 489 for information on packet inspection).
2 ADP traffic and anomaly rules are updated when you upload new firmware. This is different from the IDP packet inspection signatures and the system protect signatures you download from myZyXEL.com.

31.1.2 What You Can Do Using the ADP Screens

  • Use Anti-X > ADP > General (Section 31.2 on page 525) to turn anomaly detection on or off and apply anomaly profiles to traffic directions.
  • Use Anti-X > ADP > Profile (Section 31.3 on page 527) to add a new profile, edit an existing profile or delete an existing profile.

31.1.3 What You Need To Know About ADP

Traffic Anomalies

Traffic anomaly rules look for abnormal behavior or events such as port scanning, sweeping or network flooding. It operates at OSI layer-2 and layer-3. Traffic anomaly rules may be updated when you upload new firmware.

Protocol Anomalies

Protocol anomalies are packets that do not comply with the relevant RFC (Request For Comments). Protocol anomaly detection includes HTTP Inspection, TCP Decoder, UDP Decoder and ICMP Decoder. Protocol anomaly rules may be updated when you upload new firmware.

ADP Profile

An ADP profile is a set of traffic anomaly rules and protocol anomaly rules that you can activate as a set and configure common log and action settings. You can apply ADP profiles to traffic flowing from one zone to another.

Base ADP Profiles

Base ADP profiles are templates that you use to create new ADP profiles. The ZyWALL comes with several base profiles. See Table 157 on page 528 for details on ADP base profiles.

ADP Policy

An ADP policy refers to application of an ADP profile to a traffic flow.

Finding Out More

• See Section 5.4.18 on page 113 for ADP prerequisites
• See Chapter 30 on page 489 for IDP information.
• See Section 30.1.2 on page 489 for IDP-related term definitions.
• See Section 31.4 on page 534 for background information on these screens.

31.1.4 Before You Begin

Configure the ZyWALL's zones - see Chapter 14 on page 275 for more information.

31.2 The ADP General Screen

Click Anti-X > ADP > General. Use this screen to turn anomaly detection on or off and apply anomaly profiles to traffic directions.

Figure 362 Anti-X > ADP > General
ZYXEL ZYWALL USG 2000 - The ADP General Screen - 1

text_image General Profile General Settings Enable Anomaly Detection Policies Priority From To Anomaly Profile 1 any LAN1 ADP_PROFILE 2 any WLAN ADP_PROFILE 3 any DMZ ADP_PROFILE 4 any ZyWALL ADP_PROFILE Apply Reset

The following table describes the screens in this screen.

Table 155 Anti-X > ADP > General

LABELDESCRIPTION
General Settings
Enable Anomaly DetectionSelect this check box to enable traffic anomaly and protocol anomaly detection.
PoliciesUse this list to specify which anomaly profile the ZyWALL uses for traffic flowing in a specific direction.
PriorityThis is the rank in the list of anomaly profile policies. The list is applied in order of priority.
From, ToThis is the direction of travel of packets to which an anomaly profile is bound.Note: Depending on your network topology and traffic load, applying every packet direction to an anomaly profile may affect the ZyWALL's performance.
Anomaly ProfileAn anomaly profile is a set of anomaly rules with configured activation, log and action settings. This field shows which anomaly profile is bound to which traffic direction.
Add iconClick the Add icon in the heading row to add a new first entry.The Active icon displays whether the entry is enabled or not. Click it to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the entry.Click the Add icon in an entry to add an entry below the current entry.Click the Remove icon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry. Note that subsequent entries move up by one when you take this action.In a numbered list, click the Move to N icon to display a field to type an index number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. For example, if you type 6, the entry you are moving becomes number 6 and the previous entry 6 (if there is one) gets pushed up (or down) one.The ordering of your entries is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes.
ResetClick Reset to start configuring this screen again.

31.2.1 Configuring ADP Policies

Click Anti-X > ADP > General and then an Add or Edit icon to display the following screen. Use this screen to apply an ADP profile to a traffic direction.

Figure 363 Anti-X > ADP > General > Add
ZYXEL ZYWALL USG 2000 - Configuring ADP Policies - 1

text_image Configuration Enable From any To any ADP Profile none OK Cancel

The following table describes the screens in this screen.

Table 156 Anti-X > ADP > General > Add

LABELDESCRIPTION
EnableSelect this check box to turn on this anomaly profile to traffic direction policy.
FromTraffic direction is defined by the zone the traffic is coming from and the zone the traffic is going to.Use the From field to specify the zone from which the traffic is coming.Select ZyWALL to specify traffic coming from the ZyWALL itself.
ToUse the To field to specify the zone to which the traffic is going.Select ZyWALL to specify traffic destined for the ZyWALL itself.From LAN To LAN means packets traveling from a computer on one LAN subnet to a computer on another LAN subnet via the ZyWALL's LAN zone interfaces. The ZyWALL does not check packets traveling from a LAN computer to another LAN computer on the same subnet.From WAN To WAN means packets that come in from the WAN zone and the ZyWALL routes back out through the WAN zone.
ADP ProfileAn ADP profile is a set of ADP rules with configured activation, log and action settings. Select an ADP profile to apply to the entry's traffic direction. Configure the ADP profiles in the ADP profile screens.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

31.3 The Profile Summary Screen

Use this screen to:

  • Create a new profile using an existing base profile
  • Edit an existing profile
  • Delete an existing profile

31.3.1 Base Profiles

The ZyWALL comes with base profiles. You use base profiles to create new profiles.

Figure 364 Base Profiles
ZYXEL ZYWALL USG 2000 - Base Profiles - 1

text_image GoTo: 1 Page 1/1 Please select one ADP Base Profile. all none OK Cancel

These are the default base profiles at the time of writing.

Table 157 Base Profiles

BASE PROFILEDESCRIPTION
allAll traffic anomaly and protocol anomaly rules are enabled. Rules with a high or severe severity level (greater than three) generate log alerts and cause packets that trigger them to be dropped. Rules with a very low, low or medium severity level (less than or equal to three) generate logs (not log alerts) and no action is taken on packets that trigger them.
noneAll traffic anomaly and protocol anomaly rules are disabled. No logs are generated nor actions are taken.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

31.3.2 Configuring The ADP Profile Summary Screen

Select Anti-X > ADP > Profile.

Figure 365 Anti-X > ADP > Profile
ZYXEL ZYWALL USG 2000 - Configuring The ADP Profile Summary Screen - 1

text_image General Profile Profile Management Name Base Profile ZyWALL_ADP all LAN_ADP all DMZ_ADP all

The following table describes the fields in this screen.

Table 158 Anti-X > ADP > Profile

LABELDESCRIPTION
NameThis is the name of the profile you created.
Base ProfileThis is the base profile from which the profile was created.
Add iconClick the Add icon in the column header to create a new profile. A pop-up screen displays requiring you to choose a base profile from which to create the new profile.Click an Edit icon to edit an existing profile.Click a Remove icon to delete an existing profile.

31.3.3 Creating New ADP Profiles

You may want to create a new profile if not all rules in a base profile are applicable to your network. In this case you should disable non-applicable rules so as to improve ZyWALL ADP processing efficiency.

You may also find that certain rules are triggering too many false positives or false negatives. A false positive is when valid traffic is flagged as an attack. A false negative is when invalid traffic is wrongly allowed to pass through the ZyWALL. As each network is different, false positives and false negatives are common on initial ADP deployment.

You could create a new ‘monitor profile’ that creates logs but all actions are disabled. Observe the logs over time and try to eliminate the causes of the false alarms. When you’re satisfied that they have been reduced to an acceptable level, you could then create an ‘inline profile’ whereby you configure appropriate actions to be taken when a packet matches a rule.

ADP profiles consist of traffic anomaly profiles and protocol anomaly profiles. To create a new profile, select a base profile (see Table 157 on page 528) and then click OK to go to the profile details screen. Type a new profile name, enable or disable individual rules and then edit the default log options and actions.

31.3.4 Traffic Anomaly Profiles

The traffic anomaly screen is the second screen in an ADP profile. Traffic anomaly detection looks for abnormal behavior such as scan or flooding attempts. In the Anti-X > ADP > Profile screen, click the Edit icon or click the Add icon and choose a base profile. If you made changes to other screens belonging to this

profile, make sure you have clicked OK or Save to save the changes before selecting the Traffic Anomaly tab.

Figure 366 Profiles: Traffic Anomaly
ZYXEL ZYWALL USG 2000 - Traffic Anomaly Profiles - 1

text_image General Profile Traffic Anomaly Protocol Anomaly Name APF210 Scan Detection Sensitivity medium Block Period 1_(1-3600 seconds) Name Activation Log Action LOG none (open port) Open Port LOG none (portscan) IP Decoy Protocol Scan LOG none (portscan) IP Distributed Protocol Scan LOG none (portscan) IP Filtered Decoy Protocol Scan LOG none (portscan) IP Filtered Distributed Protocol Scan LOG none (portscan) IP Filtered Protocol Scan LOG none (portscan) IP Protocol Scan LOG none (portscan) TCP Decoy Portscan LOG none (portscan) TCP Distributed Portscan LOG none (portscan) TCP Filtered Decoy Portscan LOG none (portscan) TCP Filtered Distributed Portscan LOG none (portscan) TCP Filtered Portscan LOG none (portscan) TCP Portscan LOG none (portscan) UDP Decoy Portscan LOG none (portscan) UDP Distributed Portscan LOG none (portscan) UDP Filtered Decoy Portscan LOG none (portscan) UDP Filtered Distributed Portscan LOG none (portscan) UDP Filtered Portscan LOG none (portscan) UDP Portscan LOG none (sweep) ICMP Filtered Sweep LOG none (sweep) ICMP Sweep LOG none (sweep) IP Filtered Protocol Sweep LOG none (sweep) IP Protocol Sweep LOG none (sweep) TCP Filtered Port Sweep LOG none (sweep) TCP Port Sweep LOG none (sweep) UDP Filtered Port Sweep LOG none (sweep) UDP Port Sweep LOG none Flood Detection Block Period 1_(1-3600 seconds) Name Activation Log Action Threshold LOG none (flood) ICMP Flood LOG none 2000 (flood) IP Flood LOG none 2000 (flood) TCP Flood LOG none 2000 (flood) UDP Flood LOG none 2000 OK Cancel Save

The following table describes the fields in this screen.

Table 159 ADP > Profile > Traffic Anomaly

LABELDESCRIPTION
NameThis is the name of the ADP profile. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names:MyProfilemYProfileMymy12_3-4These are invalid profile names:1mYProfileMy ProfileMyProfile?Whatalongprofilename123456789012
Scan/Flood Detection
Sensitivity(Scan detection only.) Select a sensitivity level so as to reduce false positives in your network. If you choose low sensitivity, then scan thresholds and sample times are set low, so you will have fewer logs and false positives; however some traffic anomaly attacks may not be detected.If you choose high sensitivity, then scan thresholds and sample times are set high, so most traffic anomaly attacks will be detected; however you will have more logs and false positives.
Block PeriodSpecify for how many seconds the ZyWALL blocks all packets from being sent to the victim (destination) of a detected anomaly attack.
NameThis is the name of the traffic anomaly rule. Click the Name column heading to sort in ascending or descending order according to the rule name.
ActivationClick the icon to enable or disable a rule or group of rules.
LogSelect whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this anomaly rule. See Chapter 47 on page 761 for more on logs.
ActionSelect what the ZyWALL should do when a packet matches a rule none: The ZyWALL takes no action when a packet matches the signature(s).block: The ZyWALL silently drops packets that matches the rule. Neither sender nor receiver are notified.
ThresholdFor flood detection you can set the number of detected flood packets per second that causes the ZyWALL to take the configured action.
OKClick OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
CancelClick Cancel to return to the profile summary page without saving any changes.
SaveClick Save to save the configuration to the ZyWALL but remain in the same page. You may then go to the another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.

31.3.5 Protocol Anomaly Profiles

Protocol anomaly is the third screen in an ADP profile. Protocol anomaly (PA) rules check for protocol compliance against the relevant RFC (Request for Comments).

Protocol anomaly detection includes HTTP Inspection, TCP Decoder, UDP Decoder, and ICMP Decoder where each category reflects the packet type inspected.

Protocol anomaly rules may be updated when you upload new firmware.

31.3.6 Protocol Anomaly Configuration

In the Anti-X > ADP > Profile screen, click the Edit icon or click the Add icon and choose a base profile, then select the Protocol Anomaly tab. If you made changes to other screens belonging to this profile, make sure you have clicked OK or Save to save the changes before selecting the Protocol Anomaly tab.

Figure 367 Profiles: Protocol Anomaly
ZYXEL ZYWALL USG 2000 - Protocol Anomaly Configuration - 1

text_image General Profile Traffic Anomaly Protocol Anomaly Name APF210 HTTP Inspection Name △ ( http_inspect) APACHE-WHITESPACE ATTACK ( http_inspect) ASCII-ENCODING ATTACK ( http_inspect) BARE-BYTE-UNICODING-ENCODING ATTACK ( http_inspect) BASE36-ENCODING ATTACK ( http_inspect) DIRECTORY-TRAVERSAL ATTACK ( http_inspect) DOUBLE-DECODING ATTACK ( http_inspect) IIS-BACKSLASH-EVASION ATTACK ( http_inspect) IIS-UNICODE-CODEPOINT-ENCODING ATTACK ( http_inspect) MULTI-SLASH-ENCODING ATTACK ( http_inspect) NON-RFC-DEFINED-CHAR ATTACK ( http_inspect) NON-RFC-HTTP-DELIMITER ATTACK ( http_inspect) OVERSIZE-CHUNK-ENCODING ATTACK ( http_inspect) OVERSIZE-REQUEST-URI-DIRECTORY ATTACK ( http_inspect) SELF-DIRECTORY-TRAVERSAL ATTACK ( http_inspect) U-ENCODING ATTACK ( http_inspect) UNAUTHORIZED-PROXY-USE-DETECTED ATTACK ( http_inspect) UTF-8-ENCODING ATTACK ( http_inspect) WEBROOT-DIRECTORY-TRAVERSAL ATTACK TCP Decoder Name △ ( tcp_decoder) BAD-LENGTH-OPTIONS ATTACK ( tcp_decoder) EXPERIMENTAL-OPTIONS ATTACK ( tcp_decoder) OBSOLETE-OPTIONS ATTACK ( tcp_decoder) OVERSIZE-OFFSET ATTACK ( tcp_decoder) TRUNCATED-OPTIONS ATTACK ( tcp_decoder) TTCP-DETECTED ATTACK ( tcp_decoder) UNDERSIZE-LEN ATTACK ( tcp_decoder) UNDERSIZE-OFFSET ATTACK UDP Decoder Name △ ( udp_decoder) OVERSIZE-LEN ATTACK ( udp_decoder) TRUNCATED-HEADER ATTACK ( udp_decoder) UNDERSIZE-LEN ATTACK ICMP Decoder Name △ ( icmp_decoder) TRUNCATED-ADDRESS-HEADER ATTACK ( icmp_decoder) TRUNCATED-HEADER ATTACK ( icmp_decoder) TRUNCATED-TIMESTAMP-HEADER ATTACK Activation Log Action log none log none log none log none log none log none log none log none log none log none log none log none log none

The following table describes the fields in this screen.

Table 160 ADP > Profile > Protocol Anomaly

LABELDESCRIPTION
NameThis is the name of the profile. You may use 1-31 alphanumeric characters, underscores(_, or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names:MyProfilemYProfileMymy12_3-4These are invalid profile names:1mYProfileMy ProfileMyProfile?Whatalongprofilename123456789012
HTTP Inspection/TCP Decoder/UDP Decoder/ICMP Decoder
NameThis is the name of the protocol anomaly rule. Click the Name column heading to sort in ascending or descending order according to the protocol anomaly rule name.
ActivationClick the icon to enable or disable a rule or group of rules.
LogSelect whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this anomaly rule. See Chapter 47 on page 761 for more on logs.
ActionSelect what the ZyWALL should do when a packet matches a rule none: The ZyWALL takes no action when a packet matches the signature(s).block: The ZyWALL silently drops packets that matches the rule. Neither sender nor receiver are notified.
OKClick OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
CancelClick Cancel to return to the profile summary page without saving any changes.
SaveClick Save to save the configuration to the ZyWALL but remain in the same page. You may then go to the another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.

31.4 Technical Reference

This section is divided into traffic anomaly background information and protocol anomaly background information.

Traffic Anomaly Background Information

The following sections may help you configure the traffic anomaly profile screen (Section 31.3.4 on page 529)

Port Scanning

An attacker scans device(s) to determine what types of network protocols or services a device supports. One of the most common port scanning tools in use today is Nmap.

Many connection attempts to different ports (services) may indicate a port scan. These are some port scan types:

  • TCP Portscan
  • UDP Portscan
  • IP Portscan

An IP port scan searches not only for TCP, UDP and ICMP protocols in use by the remote computer, but also additional IP protocols such as EGP (Exterior Gateway Protocol) or IGP (Interior Gateway Protocol). Determining these additional protocols can help reveal if the destination device is a workstation, a printer, or a router.

Decoy Port Scans

Decoy port scans are scans where the attacker has spoofed the source address. These are some decoy scan types:

  • TCP Decoy Portscan
  • UDP Decoy Portscan
  • IP Decoy Portscan

Distributed Port Scans

Distributed port scans are many-to-one port scans. Distributed port scans occur when multiple hosts query one host for open services. This may be used to evade intrusion detection. These are distributed port scan types:

  • TCP Distributed Portscan
  • UDP Distributed Portscan
    • IP Distributed Portscan

Port Sweeps

Many different connection attempts to the same port (service) may indicate a port sweep, that is, they are one-to-many port scans. One host scans a single port on multiple hosts. This may occur when a new exploit comes out and the attacker is looking for a specific service. These are some port sweep types:

  • TCP Portsweep
  • UDP Portsweep
  • IP Portsweep
  • ICMP Portsweep

Filtered Port Scans

A filtered port scan may indicate that there were no network errors (ICMP unreachables or TCP RSTs) or responses on closed ports have been suppressed. Active network devices, such as NAT routers, may trigger these alerts if they send out many connection attempts within a very small amount of time. These are some filtered port scan examples.

  • TCP Filtered Portscan
  • UDP Filtered Portscan
  • IP Filtered Portscan
  • TCP Filtered Decoy Portscan
  • UDP Filtered Decoy Portscan
    • IP Filtered Decoy Portscan
  • TCP Filtered Portsweep
  • UDP Filtered Portsweep
    • IP Filtered Portsweep
  • ICMP Filtered Portsweep
  • TCP Filtered Distributed Portscan
  • UDP Filtered Distributed Portscan
    • IP Filtered Distributed Portscan

Flood Detection

Flood attacks saturate a network with useless data, use up all available bandwidth, and therefore make communications in the network impossible.

ICMP Flood Attack

An ICMP flood is broadcasting many pings or UDP packets so that so much data is sent to the system, that it slows it down or locks it up.

Smurf

A smurf attacker (A) floods a router (B) with Internet Control Message Protocol (ICMP) echo request packets (pings) with the destination IP address of each packet as the broadcast address of the network. The router will broadcast the

ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a large amount of ICMP echo request and response traffic.

If an attacker (A) spoofs the source IP address of the ICMP echo request packet, the resulting ICMP traffic will not only saturate the receiving network (B), but the network of the spoofed source IP address (C).

Figure 368 Smurf Attack
ZYXEL ZYWALL USG 2000 - Smurf - 1

flowchart
graph LR
    A["A"] --> B["B"]
    B --> C["C"]
    C --> D["Computer 1"]
    C --> E["Computer 2"]
    C --> F["Computer 3"]

TCP SYN Flood Attack

Usually a client starts a session by sending a SYN (synchronize) packet to a server. The receiver returns an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment). After this handshake, a connection is established.

Figure 369 TCP Three-Way Handshake
ZYXEL ZYWALL USG 2000 - TCP SYN Flood Attack - 1

flowchart
graph LR
    A["Client"] --> B["Server"]
    B --> C["SYN"]
    B --> D["SYN-ACK"]
    B --> E["ACK"]

A SYN flood attack is when an attacker sends a series of SYN packets. Each packet causes the receiver to reply with a SYN-ACK response. The receiver then waits for the ACK that follows the SYN-ACK, and stores all outstanding SYN-ACK responses on a backlog queue. SYN-ACKs are only moved off the queue when an ACK comes back or when an internal timer ends the three-way handshake. Once the queue is

full, the system will ignore all incoming SYN requests, making the system unavailable for other users.

Figure 370 SYN Flood
ZYXEL ZYWALL USG 2000 - TCP SYN Flood Attack - 2

flowchart
graph TD
    A["Client"] --> B["Server"]
    B --> C["SYN"]
    B --> D["SYN"]
    B --> E["SYN"]
    B --> F["SYN"]
    C --> G["SYN-ACK"]
    D --> H["SYN-ACK"]
    E --> I["SYN-ACK"]
    F --> J["SYN-ACK"]

LAND Attack

In a LAND attack, hackers flood SYN packets into a network with a spoofed source IP address of the network itself. This makes it appear as if the computers in the network sent the packets to themselves, so the network is unavailable while they try to respond to themselves.

UDP Flood Attack

UDP is a connection-less protocol and it does not require any connection setup procedure to transfer data. A UDP flood attack is possible when an attacker sends a UDP packet to a random port on the victim system. When the victim system receives a UDP packet, it will determine what application is waiting on the destination port. When it realizes that there is no application that is waiting on the port, it will generate an ICMP packet of destination unreachable to the forged source address. If enough UDP packets are delivered to ports on victim, the system will go down.

Protocol Anomaly Background Information

The following sections may help you configure the protocol anomaly profile screen (see Section 31.3.5 on page 532)

HTTP Inspection and TCP/UDP/ICMP Decoders

The following table gives some information on the HTTP inspection, TCP decoder, UDP decoder and ICMP decoder ZyWALL protocol anomaly rules.

Table 161 HTTP Inspection and TCP/UDP/ICMP Decoders

LABELDESCRIPTION
HTTP Inspection
APACHE-WHITESPACE ATTACKThis rule deals with non-RFC standard of tab for a space delimiter. Apache uses this, so if you have an Apache server, you need to enable this option.
ASCII-ENCODING ATTACKThis rule can detect attacks where malicious attackers use ASCII-encoding to encode attack strings. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
BARE-BYTE-UNICODING-ENCODING ATTACKBare byte encoding uses non-ASCII characters as valid values in decoding UTF-8 values. This is NOT in the HTTP standard, as all non-ASCII values have to be encoded with a %. Bare byte encoding allows the user to emulate an IIS server and interpret non-standard encodings correctly.
BASE36-ENCODING ATTACKThis is a rule to decode base36-encoded characters. This rule can detect attacks where malicious attackers use base36-encoding to encode attack strings. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
DIRECTORY-TRAVERSAL ATTACKThis rule normalizes directory traversals and self-referential directories. So, "/abc/this_is_not_a_real_dir/../xyz" get normalized to "/abc/xyz". Also, "/abc/.xyz" gets normalized to "/abc/xyz". If a user wants to configure an alert, then specify "yes", otherwise "no". This alert may give false positives since some web sites refer to files using directory traversals.
DOUBLE-ENCODING ATTACKThis rule is IIS specific. IIS does two passes through the request URI, doing decodes in each one. In the first pass, IIS encoding (UTF-8 unicode, ASCII, bare byte, and %u) is done. In the second pass ASCII, bare byte, and %u encodings are done.
IIS-BACKSLASH-EVASION ATTACKThis is an IIS emulation rule that normalizes backslashes to slashes. Therefore, a request-URI of "/abc\xyz" gets normalized to "/abc/xyz".
IIS-UNICODE-CODEPOINT-ENCODING ATTACKThis rule can detect attacks which send attack strings containing non-ASCII characters encoded by IIS Unicode. IIS Unicode encoding references the unicode.map file. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
MULTI-SLASH-ENCODING ATTACKThis rule normalizes multiple slashes in a row, so something like: "abc/////xyz" get normalized to "abc/xyz".
NON-RFC-DEFINED-CHAR ATTACKThis rule lets you receive a log or alert if certain non-RFC characters are used in a request URI. For instance, you may want to know if there are NULL bytes in the request-URI.
NON-RFC-HTTP-DELIMITER ATTACKThis is when a newline "\n" character is detected as a delimiter. This is non-standard but is accepted by both Apache and IIS web servers.
OVERSIZE-CHUNK-ENCODING ATTACKThis rule is an anomaly detector for abnormally large chunk sizes. This picks up the apache chunk encoding exploits and may also be triggered on HTTP tunneling that uses chunk encoding.
OVERSIZE-REQUEST-URI-DIRECTORY ATTACKThis rule takes a non-zero positive integer as an argument. The argument specifies the max character directory length for URL directory. If a URL directory is larger than this argument size, an alert is generated. A good argument value is 300 characters. This should limit the alerts to IDS evasion type attacks, like whisker.
SELF-DIRECTORY-TRAVERSAL ATTACKThis rule normalizes self-referential directories. So, "/abc/./xyz" gets normalized to "/abc/xyz".
U-ENCODING ATTACKThis rule emulates the IIS %u encoding scheme. The %u encoding scheme starts with a %u followed by 4 characters, like %uXXXX. The XXXX is a hex encoded value that correlates to an IIS unicode codepoint. This is an ASCII value. An ASCII character is encoded like, %u002f = /, %u002e = , etc.
UTF-8-ENCODING ATTACKThe UTF-8 decode rule decodes standard UTF-8 unicode sequences that are in the URI. This abides by the unicode standard and only uses % encoding. Apache uses this standard, so for any Apache servers, make sure you have this option turned on. When this rule is enabled, ASCII decoding is also enabled to enforce correct functioning.
WEBROOT-DIRECTORY-TRAVERSAL ATTACKThis is when a directory traversal traverses past the web server root directory. This generates much fewer false positives than the directory option, because it doesn't alert on directory traversals that stay within the web server directory structure. It only alerts when the directory traversals go past the web server root directory, which is associated with certain web attacks.
TCP Decoder
BAD-LENGTH-OPTIONS ATTACKThis is when a TCP packet is sent where the TCP option length field is not the same as what it actually is or is 0. This may cause some applications to crash.
EXPERIMENTAL-OPTIONS ATTACKThis is when a TCP packet is sent which contains non-RFC-complaint options. This may cause some applications to crash.
OBSOLETE-OPTIONS ATTACKThis is when a TCP packet is sent which contains obsolete RFC options.
OVERSIZE-OFFSET ATTACKThis is when a TCP packet is sent where the TCP data offset is larger than the payload.
TRUNCATED-OPTIONS ATTACKThis is when a TCP packet is sent which doesn't have enough data to read. This could mean the packet was truncated.
TTCP-DETECTED ATTACKT/TCP provides a way of bypassing the standard three-way handshake found in TCP, thus speeding up transactions. However, this could lead to unauthorized access to the system by spoofing connections.
UNDERSIZE-LEN ATTACKThis is when a TCP packet is sent which has a TCP datagram length of less than 20 bytes. This may cause some applications to crash.
UNDERSIZE-OFFSET ATTACKThis is when a TCP packet is sent which has a TCP header length of less than 20 bytes. This may cause some applications to crash.
UDP Decoder
OVERSIZE-LEN ATTACKThis is when a UDP packet is sent which has a UDP length field of greater than the actual packet length. This may cause some applications to crash.
TRUNCATED-HEADER ATTACKThis is when a UDP packet is sent which has a UDP datagram length of less the UDP header length. This may cause some applications to crash.
UNDERSIZE-LEN ATTACKThis is when a UDP packet is sent which has a UDP length field of less than 8 bytes. This may cause some applications to crash.
ICMP Decoder
TRUNCATED-ADDRESS-HEADER ATTACKThis is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP address header length. This may cause some applications to crash.
TRUNCATED-HEADER ATTACKThis is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP header length. This may cause some applications to crash.
TRUNCATED-TIMESTAMP-HEADER ATTACKThis is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP Time Stamp header length. This may cause some applications to crash.

Content Filtering

32.1 Overview

Use the content filtering feature to control access to specific web sites or web content.

32.1.1 What You Can Do in the Content Filter Screens

  • Use the General screens (Section 32.2 on page 546) to configure global content filtering settings, configure content filtering policies, and check the content filtering license status.
  • Use the Filter Profile screens (Section 32.4 on page 550) to set up content filtering profiles.
  • Use the Cache screen (Section 32.7 on page 563) to view and configure your ZyWALL's URL caching.

32.1.2 What You Need to Know About Content Filtering

Content Filtering

Content filtering allows you to block certain web features, such as cookies, and/or block access to specific web sites. It can also block access to specific categories of web site content. You can create different content filter policies for different addresses, schedules, users or groups and content filter profiles. For example, you can configure one policy that blocks John Doe's access to arts and entertainment web pages during the workday and another policy that lets him access them after work.

Content Filtering Policies

A content filtering policy allows you to do the following.

  • Use schedule objects to define when to apply a content filter profile.
  • Use address and/or user/group objects to define to whose web access to apply the content filter profile.
  • Apply a content filter profile that you have custom-tailored.

Content Filtering Profiles

A content filtering profile conveniently stores your custom settings for the following features.

- Category-based Blocking

The ZyWALL can block access to particular categories of web site content, such as pornography or racial intolerance.

- Restrict Web Features

The ZyWALL can disable web proxies and block web features such as ActiveX controls, Java applets and cookies.

- Customize Web Site Access

You can specify URLs to which the ZyWALL blocks access. You can alternatively block access to all URLs except ones that you specify. You can also have the ZyWALL block access to URLs that contain particular keywords.

Content Filtering Configuration Guidelines

When the ZyWALL receives an HTTP request, the content filter searches for a policy that matches the source address and time (schedule). The content filter checks the policies in order (based on the policy numbers). When a matching policy is found, the content filter allows or blocks the request depending on the settings of the filtering profile specified by the policy. Some requests may not match any policy. The ZyWALL allows the request if the default policy is not set to block. The ZyWALL blocks the request if the default policy is set to block.

External Web Filtering Service

When you register for and enable the external web filtering service, your ZyWALL accesses an external database that has millions of web sites categorized based on content. You can have the ZyWALL block, block and/or log access to web sites based on these categories.

Keyword Blocking URL Checking

The ZyWALL checks the URL's domain name (or IP address) and file path separately when performing keyword blocking.

The URL's domain name or IP address is the characters that come before the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the domain name is www.zyxel.com.tw.

The file path is the characters that come after the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the file path is news/pressroom.php.

Since the ZyWALL checks the URL's domain name (or IP address) and file path separately, it will not find items that go across the two. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the ZyWALL would find "tw" in the domain name (www.zyxel.com.tw). It would also find "news" in the file path (news/pressroom.php) but it would not find "tw/news".

Finding Out More

• See Section 5.4.17 on page 112 for related information on these screens.
- See Section 32.8 on page 566 for content filtering background/technical information.

32.1.3 Before You Begin

  • You must configure an address object, a schedule object and a filtering profile before you can set up a content filter policy.
  • You must register the content filtering standard (in the Licensing > Registration > Service) or trial (Licensing > Registration > Registration) service before you can use external database content filtering (in the Anti-X > Content Filter > Filter Profiles > Categories).

32.2 Content Filter General Screen

Click Anti-X > Content Filter > General to open the Content Filter General screen. Use this screen to enable content filtering, view and order your list of content filter policies, create a denial of access message or specify a redirect URL and check your external web filtering service registration status.

Figure 371 Anti-X > Content Filter > General
ZYXEL ZYWALL USG 2000 - Content Filter General Screen - 1

text_image General Filter Profile Cache General Settings Enable Content Filter Enable Content Filter Report Service Policies Block web access when no policy is applied

Address Schedule User Filter Profile

1 WLAN_FT_02 none any RD_CF_PROFILE 2 LAN_SUBNET none any RD_CF_PROFILE Message to display when a site is blocked Denied Access Message The web access is restricted. Please contact with administrator. Redirect URL Content Filter Category Service License Status License Status: Licensed License Type: Standard Expiration Date: Standard Apply New Registration Apply Reset

The following table describes the labels in this screen.

Table 162 Anti-X > Content Filter > General

LABELDESCRIPTION
General Settings
Enable Content FilterSelect this check box to enable the content filter.
Enable Content Filter Report ServiceSelect this check box to have the ZyWALL collect category-based content filtering statistics.
PoliciesThis is a list of the configured content filter policies.
Block web access when no policy is appliedSelect this check box to stop users from accessing the Internet by default when their attempted access does not match a content filter policy.
#This column lists the index numbers of the content filter policies.
AddressA content filter policy applies to web access from the IP addresses listed here.anymeans the content filter policy applies to all of the web access requests that the ZyWALL receives from any IP address.
ScheduleThis column displays the name of the schedule for each content filter policy. You can define different policies for different time periods. none means the content filter policy applies all of the time.
UserThis column displays the individual or group to which this policy applies. any means the content filter policy applies to all of the web access requests that the ZyWALL receives from any user.
Filter ProfileThis column displays the name of the content filter profile that each content filter policy uses. The content filter profile defines to which web services, web sites or web site categories access is to be allowed or denied.
Add iconClick the Add icon at the top of the column to create a new content filter policy at the top of the list.The Active icon shows the entry is enabled. Click this icon to disable the entry.The Inactive icon shows the entry is disabled. Click this icon to enable the entry.Click the Edit icon to go to a screen where you can change the configuration settings of an entry.Click the Remove icon to delete an entry from the list.Click the Move to N icon, type a number in the move entry dialog box and press [ENTER] to move the entry to the numbered location.Click a content filter policy's Add icon to create a new content filter policy above the current line. All other entries below the new entry are pushed down.The ordering of the content filter policies is important as they are used in the order they are listed. The ZyWALL checks requests for Web sessions against the list of content filter policies (starting from the first in the list). The ZyWALL's content filter feature blocks or allows the Web session according to the first matching content filter policy and does not check any other content filter policies. The ZyWALL does not perform content filter on Web session requests that do not match any of the content filter policies.
Message to display when a site is blocked
Denied Access MessageEnter a message to be displayed when content filter blocks access to a web page. Use up to 255 characters (0-9a-zA-Z;/?:@&=+\._!~*')%,"). For example, "Access to this web page is not allowed. Please contact the network administrator".
Redirect URLEnter the URL of the web page to which you want to send users when their web access is blocked by content filter. The web page you specify here opens in a new frame below the denied access message.Use "http://" or "https://" followed by up to 255 characters (0-9a-zA-Z; /?:@&=+\.-_!~*')%). For example, http://192.168.1.17/blocked access.
Content FilterCategory ServiceLicense Status
License StatusThis read-only field displays the status of your content-filtering database service registration.Not Licensed displays if you have not successfully registered and activated the service.Expired displays if your subscription to the service has expired.Licensed displays if you have successfully registered the ZyWALL and activated the service.After you register for content filter, you can see Chapter 32 on page 550 for how to use the Test Against Web Filtering Server button. When the content filter is active, you should see the web page's category. The query fails if the content filter is not active.You can view content filter reports after you register the ZyWALL and activate the subscription service in the Registration screen (see Chapter 33 on page 567).
License TypeThis read-only field displays what kind of service registration you have for the content-filtering database.None displays if you have not successfully registered and activated the service.Standard displays if you have successfully registered the ZyWALL and activated the service.Trial displays if you have successfully registered the ZyWALL and activated the trial service subscription.
Apply New RegistrationThis link appears if you have not registered for the service or only have the trial registration. Click this link to go to the screen where you can register for the service.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

32.3 Content Filter Policy Add or Edit Screen

Click Anti-X > Content Filter > General > Add or Edit to open the Content Filter Policy screen. Use this screen to configure a content filter policy. A content filter policy defines which content filter profile should be applied, when it should be applied, and to whose web access it should be applied.

Figure 372 Anti-X > Content Filter > General > Add I
ZYXEL ZYWALL USG 2000 - Content Filter Policy Add or Edit Screen - 1

text_image Configuration Schedule none Address DMZ1_SUBNET Filter Profile test User / Group any OK Cancel

The following table describes the labels in this screen.

Table 163 Anti-X > Content Filter > General > Add

LABELDESCRIPTION
ScheduleSelect a schedule to define when to apply this content filter policy. You can define different policies for different time periods. For example, you could have one policy that blocks access to certain categories of web sites during working hours and another policy that allows access to certain categories after the work day is over.SelectCreate Objectto configure a new schedule (see Chapter 39 on page 641 for details).Selectnoneto have the content filter policy apply all of the time.
AddressSelect the address or address group for which you want to use this policy.SelectCreate Objectto configure a new address or address group.Selectanyto have the content filter policy apply to all of the web access requests that the ZyWALL receives from any IP address.
Filter ProfileUse the drop-down list box to select the content filter profile that you want to use for this policy. The content filter profile defines to which web services, web sites or web site categories access is to be allowed or denied. Use the content filterFilter Profilescreens to configure the profiles.
User/GroupUse the drop-down list box to select the individual or group for which you want to use this policy.SelectCreate Objectto configure a new user account (see Section 36.2.1 on page 616 for details).Selectanyto have the content filter policy apply to all of the web access requests that the ZyWALL receives from any user.
OKClickOKto save your changes back to the ZyWALL.
CancelClickCancelto exit this screen without saving your changes.

32.4 Content Filter Profile Screen

Click Anti-X > Content Filter > Filter Profile to open the Filter Profile screen. A content filter profile defines to which web services, web sites or web site categories access is to be allowed or denied.

Figure 373 Anti-X > Content Filter > Filter Profile
ZYXEL ZYWALL USG 2000 - Content Filter Profile Screen - 1

text_image General Filter Profile Cache Profile Management

Filter Profile Name

1 test

The following table describes the labels in this screen.

Table 164 Anti-X > Content Filter > Filter Profile

LABELDESCRIPTION
#This column lists the index numbers of the content filter profiles.
Filtering Profile NameThis column lists the names of the content filter profiles.
AddClick the Add icon at the top of the column to create a new content filter profile at the end of the list.Click a content filter policy's Add icon at the to create a new content filter policy below the current line. All other entries below the new entry are pushed down.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

32.5 Content Filter Categories Screen

Click Anti-X > Content Filter > Filter Profile > Add or Edit to open the Categories screen. Use this screen to enable external database content filtering and select which web site categories to block and/or log.

Note: You must register for external content filtering before you can use it. See Section 8.2 on page 167 for how to register.

See Chapter 33 on page 567 for how to view content filtering reports.

Figure 374 Anti-X > Content Filter > Filter Profile > Add
ZYXEL ZYWALL USG 2000 - Content Filter Categories Screen - 1

text_image General Filter Profile Cache Category Service Custom Service General Settings License Status: Not Licensed License Type: None Name Enable Content Filter Category Service Action for Unsafe Web Pages Warn Log Action for Managed Web Pages Block Log Action for Unrated Web Pages Pass Log Action When Category Server Is Unavailable Pass Log Content Filter Category Service Timeout 10 (1~60 Seconds ) Select Categories Select All Categories Clear All Categories Unsafe Categories: Phishing Spyware/Malware Sources Spyware Effects/Privacy Concerns Managed Categories: Adult/Mature Content Pornography Sex Education Intimate Apparel/Swimsuit Nudity Alcohol/Tobacco Weapons Abortion Hacking Arts/Entertainment Business/Economy Alternative Spirituality/Occult Illegal Drugs Education Cultural/Charitable Organizations Financial Services Brokerage/Trading Online Games Government/Legal Military Political/Activist Groups Health Computers/Internet Search Engines/Portals Job Search/Careers News/Media Persons/Dating Reference Open Image/Media Search Chat/Instant Messaging Email Blogs/Newsgroups Religion Social Networking Online Storage Remote Access Tools Shopping Auctions Real Estate Society/Lifestyle Sexuality/Alternative Lifestyles Restaurants/Dining/Food Sports/Recreation/Hobbies Travel Vehicles Humor/Jokes Software Downloads Pay to Surf Peer-to-Peer Streaming Media/MP3s Proxy Avoidance For Kids Web Advertisements Web Hosting Test Web Site Category URL to test Test Against Local Cache Test Against Content Filter Category Server OK Cancel

The following table describes the labels in this screen.

Table 165 Anti-X > Content Filter > Filter Profile > Add

LABELDESCRIPTION
General Settings
License StatusThis read-only field displays the status of your content-filtering database service registration.Not Licensed displays if you have not successfully registered and activated the service.Expired displays if your subscription to the service has expired.Licensed displays if you have successfully registered the ZyWALL and activated the service.After you register for content filter, you can see Chapter 32 on page 550 for how to use the Test Against Web Filtering Server button. When the content filter is active, you should see the web page's category. The query fails if the content filter is not active.You can view content filter reports after you register the ZyWALL and activate the subscription service in the Registration screen (see Chapter 33 on page 567).
License TypeThis read-only field displays what kind of service registration you have for the content-filtering database.None displays if you have not successfully registered and activated the service.Standard displays if you have successfully registered the ZyWALL and activated the standard content filtering service.Trial displays if you have successfully registered the ZyWALL and activated the trial service subscription.
NameEnter a descriptive name for this content filtering profile name. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Enable Content Filter Category ServiceEnable external database content filtering to have the ZyWALL check an external database to find to which category a requested web page belongs. The ZyWALL then blocks or forwards access to the web page depending on the configuration of the rest of this page.
Action for Unsafe Web PagesSelect Pass to allow users to access web pages that match the unsafe categories that you select below.Select Block to prevent users from accessing web pages that match the unsafe categories that you select below. When external database content filtering blocks access to a web page, it displays the denied access message that you configured in the Content Filter General screen along with the category of the blocked web page.Select Warn to display a warning message before allowing users to access web pages that match the unsafe categories that you select below.Select Log to record attempts to access web pages that match the unsafe categories that you select below.
Action for Managed Web PagesSelect Pass to allow users to access web pages that match the other categories that you select below.Select Block to prevent users from accessing web pages that match the other categories that you select below. When external database content filtering blocks access to a web page, it displays the denied access message that you configured in the Content Filter General screen along with the category of the blocked web page.Select Log to record attempts to access web pages that match the unsafe categories that you select below.
Action for Unrated Web PagesSelect Pass to allow users to access web pages that the external web filtering service has not categorized.Select Block to prevent users from accessing web pages that the external web filtering service has not categorized. When the external database content filtering blocks access to a web page, it displays the denied access message that you configured in the Content Filter General screen along with the category of the blocked web page.Select Warn to display a warning message before allowing users to access web pages that the external web filtering service has not categorized.Select Log to record attempts to access web pages that are not categorized.
Action When Category Server Is UnavailableSelect Pass to allow users to access any requested web page if the external content filtering database is unavailable.Select Block to block access to any requested web page if the external content filtering database is unavailable.Select Warn to display a warning message before allowing users to access any requested web page if the external content filtering database is unavailable.The following are possible causes for the external content filtering server not being available:There is no response from the external content filtering server within the time period specified in the Content Filter Server Unavailable Timeout field.The ZyWALL is not able to resolve the domain name of the external content filtering database.There is an error response from the external content filtering database. This can be caused by an expired content filtering registration (External content filtering's license key is invalid").Select Log to record attempts to access web pages that occur when the external content filtering database is unavailable.
Content Filter Category Service TimeoutSpecify a number of seconds (1 to 60) for the ZyWALL to wait for a response from the external content filtering server. If there is still no response by the time this period expires, the ZyWALL blocks or allows access to the requested web page based on the setting in the Block When Content Filter Server Is Unavailable field.This setting applies to all of your content filtering profiles.
Select Categories
Select All CategoriesSelect this check box to restrict access to all site categories listed below.
Clear All CategoriesSelect this check box to clear the selected categories below.
Unsafe CategoriesThese are categories of web pages that are known to pose a threat to users or their computers.
PhishingThis category includes pages that are designed to appear as a legitimate bank or retailer with the intent to fraudulently capture sensitive data (i.e. credit card numbers, pin numbers).
Spyware/Malware SourcesThis category includes pages which distribute spyware and other malware. Spyware is defined as software which takes control of your computer, modifies computer settings, collects or reports personal information, or misrepresents itself by tricking users to install, download, or enter personal information. This includes drive-by downloads; browser hijackers; dialers; intrusive advertising; any program which modifies your homepage, bookmarks, or security settings; and keyloggers. It also includes any software which bundles spyware (as defined above) as part of its offering. Information collected or reported is "personal" if it contains uniquely identifying data, such as e-mail addresses, name, social security number, IP address, etc. A site is not classified as spyware if the user is reasonably notified that the software will perform these actions (that is, it alerts that it will send personal information, be installed, or that it will log keystrokes). Note: Sites rated as spyware should have a second category assigned with them.
Spyware Effects/Privacy ConcernsThis category includes pages to which spyware (as defined in the Spyware/Malware Sources category) reports its findings or from which it alone downloads advertisements. Also includes sites that contain serious privacy issues, such as "phone home" sites to which software can connect and send user info; sites that make extensive use of tracking cookies without a posted privacy statement; and sites to which browser hijackers redirect users. Usually does not include sites that can be marked as Spyware/Malware. Note: Sites rated as spyware effects typically have a second category assigned with them.
Managed CategoriesThese are categories of web pages based on their content. Select categories in this section to control access to specific types of Internet content.
Adult/Mature ContentThis category includes pages that contain material of adult nature that does not necessarily contain excessive violence, sexual content, or nudity. These pages include very profane or vulgar content and pages that are not appropriate for children.
PornographyThis category includes pages that contain sexually explicit material for the purpose of arousing a sexual or prurient interest.
Sex EducationThis category includes pages that provide graphic information (sometimes graphic) on reproduction, sexual development, safe sex practices, sexuality, birth control, and sexual development. It also includes pages that offer tips for better sex as well as products used for sexual enhancement.
Intimate Apparel/SwimsuitThis category includes pages that contain images or offer the sale of swimsuits or intimate apparel or other types of suggestive clothing. It does not include pages selling undergarments as a subsection of other products offered.
NudityThis category includes pages containing nude or seminude depictions of the human body. These depictions are not necessarily sexual in intent or effect, but may include pages containing nude paintings or photo galleries of artistic nature. This category also includes nudist or naturist pages that contain pictures of nude individuals.
Alcohol/TobaccoThis category includes pages that promote or offer the sale alcohol/tobacco products, or provide the means to create them. It also includes pages that glorify, tout, or otherwise encourage the consumption of alcohol/tobacco. It does not include pages that sell alcohol or tobacco as a subset of other products.
Illegal/QuestionableThis category includes pages that advocate or give advice on performing illegal acts such as service theft, evading law enforcement, fraud, burglary techniques and plagiarism. It also includes pages that provide or sell questionable educational materials, such as term papers.Note: This category includes sites identified as being malicious in any way (such as having viruses, spyware and etc.).
GamblingThis category includes pages where a user can place a bet or participate in a betting pool (including lotteries) online. It also includes pages that provide information, assistance, recommendations, or training on placing bets or participating in games of chance. It does not include pages that sell gambling related products or machines. It also does not include pages for offline casinos and hotels (as long as those pages do not meet one of the above requirements).
Violence/Hate/RacismThis category includes pages that depict extreme physical harm to people or property, or that advocate or provide instructions on how to cause such harm. It also includes pages that advocate, depict hostility or aggression toward, or denigrate an individual or group on the basis of race, religion, gender, nationality, ethnic origin, or other characteristics.
WeaponsThis category includes pages that sell, review, or describe weapons such as guns, knives or martial arts devices, or provide information on their use, accessories, or other modifications. It does not include pages that promote collecting weapons, or groups that either support or oppose weapons use.
AbortionThis category includes pages that provide information or arguments in favor of or against abortion, describe abortion procedures, offer help in obtaining or avoiding abortion, or provide information on the effects, or lack thereof, of abortion.
HackingThis category includes pages that distribute, promote, or provide hacking tools and/or information which may help gain unauthorized access to computer systems and/or computerized communication systems. Hacking encompasses instructions on illegal or questionable tactics, such as creating viruses, distributing cracked or pirated software, or distributing other protected intellectual property.
Arts/EntertainmentThis category includes pages that promote and provide information about motion pictures, videos, television, music and programming guides, books, comics, movie theatres, galleries, artists or reviews on entertainment.
Business/EconomyThis category includes pages devoted to business firms, business information, economics, marketing, business management and entrepreneurship. This does not include pages that perform services that are defined in another category (such as Information Technology companies, or companies that sell travel services).
Alternative Spirituality/OccultThis category includes pages that promote and provide information on religions such as Wicca, Witchcraft or Satanism. Occult practices, atheistic views, voodoo rituals or any other form of mysticism are represented here. Includes sites that endorse or offer methods, means of instruction, or other resources to affect or influence real events through the use of spells, incantations, curses and magic powers. This category includes sites which discuss or deal with paranormal or unexplained events.
Illegal DrugsThis category includes pages that promote, offer, sell, supply, encourage or otherwise advocate the illegal use, cultivation, manufacture, or distribution of drugs, pharmaceuticals, intoxicating plants or chemicals and their related paraphernalia.
EducationThis category includes pages that offer educational information, distance learning and trade school information or programs. It also includes pages that are sponsored by schools, educational facilities, faculty, or alumni groups.
Cultural/Charitable OrganizationThis category includes pages that nurture cultural understanding and foster volunteerism such as 4H, the Lions and Rotary Clubs. Also encompasses non-profit associations that cultivate philanthropic or relief efforts. Sites that provide a learning environment or cultural refinement/awareness outside of the strictures of formalized education such as museums and planetariums are included under this heading.
Financial ServicesThis category includes pages that provide or advertise banking services (online or offline) or other types of financial information, such as loans. It does not include pages that offer market information, brokerage or trading services.
Brokerage/TradingThis category includes pages that provide or advertise trading of securities and management of investment assets (online or offline). It also includes insurance pages, as well as pages that offer financial investment strategies, quotes, and news.
Online GamesThis category includes pages that provide information and support game playing or downloading, video games, computer games, electronic games, tips, and advice on games or how to obtain cheat codes. It also includes pages dedicated to selling board games as well as journals and magazines dedicated to game playing. It includes pages that support or host online sweepstakes and giveaways.
Government/LegalThis category includes pages sponsored by or which provide information on government, government agencies and government services such as taxation and emergency services. It also includes pages that discuss or explain laws of various governmental entities.
MilitaryThis category includes pages that promote or provide information on military branches or armed services.
Political/Activist GroupsThis category includes pages sponsored by or which provide information on political parties, special interest groups, or any organization that promotes change or reform in public policy, public opinion, social practice, or economic activities.
HealthThis category includes pages that provide advice and information on general health such as fitness and well-being, personal health or medical services, drugs, alternative and complimentary therapies, medical information about ailments, dentistry, optometry, general psychiatry, self-help, and support organizations dedicated to a disease or condition.
Computers/InternetThis category includes pages that sponsor or provide information on computers, technology, the Internet and technology-related organizations and companies.
Search Engines/PortalsThis category includes pages that support searching the Internet, indices, and directories.
Job Search/CareersThis category includes pages that provide assistance in finding employment, and tools for locating prospective employers.
News/MediaThis category includes pages that primarily report information or comments on current events or contemporary issues of the day. It also includes radio stations and magazines. It does not include pages that can be rated in other categories.
Personals/DatingThis category includes pages that promote interpersonal relationships.
ReferenceThis category includes pages containing personal, professional, or educational reference, including online dictionaries, maps, census, almanacs, library catalogues, genealogy-related pages and scientific information.
Open Image/Media SearchThis category includes pages with image or video search capabilities which return graphical results (i.e. thumbnail pictures) that include potentially pornographic content along with non-pornographic content (as defined in the Pornography category). Sites that explicitly exclude offensive content are not included in this category.
Chat/Instant MessagingThis category includes pages that provide chat or instant messaging capabilities or client downloads.
EmailThis category includes pages offering web-based email services, such as online email reading, e-cards, and mailing list services.
Blogs/NewsgroupsThis category includes pages that offer access to Usenet news groups or other messaging or bulletin board systems. Also, blog specific sites or an individual with his own blog. This does not include social networking communities with blogs.
ReligionThis category includes pages that promote and provide information on conventional or unconventional religious or quasi-religious subjects, as well as churches, synagogues, or other houses of worship. It does not include pages containing alternative religions such as Wicca or witchcraft or atheist beliefs (Alternative Spirituality/Occult).
Social NetworkingThis category includes pages that enable people to connect with others to form an online community. Typically members describe themselves in personal web page profiles and form interactive networks, linking them with other members based on common interests or acquaintances. Instant messaging, file sharing and web logs (blogs) are common features of Social Networking sites. Note: These sites may contain offensive material in the community-created content. Sites in this category are also referred to as "virtual communities" or "online communities". This category does not include more narrowly focused sites, like those that specifically match descriptions for Personals/Dating sites or Business sites.
Online StorageThis category includes pages that provide a secure, encrypted, off-site backup and restoration of personal data. These online repositories are typically used to store, organize and share videos, music, movies, photos, documents and other electronically formatted information. Sites that fit this criteria essentially act as your personal hard drive on the Internet.
Remote Access ToolsThis category includes pages that primarily focus on providing information about and/or methods that enables authorized access to and use of a desktop computer or private network remotely.
ShoppingThis category includes pages that provide or advertise the means to obtain goods or services. It does not include pages that can be classified in other categories (such as vehicles or weapons).
AuctionsThis category includes pages that support the offering and purchasing of goods between individuals. This does not include classified advertisements.
Real EstateThis category includes pages that provide information on renting, buying, or selling real estate or properties.
Society/LifestyleThis category includes pages providing information on matters of daily life. This does not include pages relating to entertainment, sports, jobs, sex or pages promoting alternative lifestyles such as homosexuality. Personal homepages fall within this category if they cannot be classified in another category.
Sexuality/Alternative LifestylesThis category includes pages that provide information, promote, or cater to gays, lesbians, swingers, other sexual orientations or practices, or a particular fetish. This category does not include sites that are sexually gratuitous in nature which would typically fall under the Pornography category.
Restaurants/Dining/FoodThis category includes pages that list, review, discuss, advertise and promote food, catering, dining services, cooking and recipes.
Sports/Recreation/HobbiesThis category includes pages that promote or provide information about spectator sports, recreational activities, or hobbies. This includes pages that discuss or promote camping, gardening, and collecting.
TravelThis category includes pages that promote or provide opportunity for travel planning, including finding and making travel reservations, vehicle rentals, descriptions of travel destinations, or promotions for hotels or casinos.
VehiclesThis category includes pages that provide information on or promote vehicles, boats, or aircraft, including pages that support online purchase of vehicles or parts.
Humor/JokesThis category includes pages that primarily focus on comedy, jokes, fun, etc. This may include pages containing jokes of adult or mature nature. Pages containing humorous Adult/Mature content also have an Adult/Mature category rating.
Software DownloadsThis category includes pages that are dedicated to the electronic download of software packages, whether for payment or at no charge.
Pay to SurfThis category includes pages that pay users in the form of cash or prizes, for clicking on or reading specific links, email, or web pages.
Peer-to-PeerThis category includes pages that distribute software to facilitate the direct exchange of files between users, including software that enables file search and sharing across a network without dependence on a central server.
Streaming Media/MP3sThis category includes pages that sell, deliver, or stream music or video content in any format, including sites that provide downloads for such viewers.
Proxy AvoidanceThis category includes pages that provide information on how to bypass proxy server/appliance features or gain access to URLs in any way that bypasses the proxy server/appliance. It also includes any service that will allow a person to bypass the content filtering feature, such as anonymous surfing services.
For KidsThis category includes pages designed specifically for children.
Web AdvertisementsThis category includes pages that provide online advertisements or banners. This does not include advertising servers that serve adult-oriented advertisements.
Web HostingThis category includes pages of organizations that provide top-level domain pages, as well as web communities or hosting services.
Test Web Site Category
URL to testYou can check which category a web page belongs to. Enter a web site URL in the text box.
Test Against Local CacheClick this button to see the category recorded in the ZyWALL's content filtering database for the web page you specified (if the database has an entry for it).
Test Against Content Filter ServerClick this button to see the category recorded in the external content filter server's database for the web page you specified.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

32.6 Content Filter Customization Screen

Click Anti-X > Content Filter > Filter Profile > Add or Edit > Customization to open the Customization screen. You can create a list of good (allowed) web site addresses and a list of bad (blocked) web site addresses. You can also block web sites based on whether the web site's address contains a keyword. Use this screen to add or remove specific sites or keywords from the filter list.

Figure 375 Anti-X > Content Filter > Filter Profile > Customization
ZYXEL ZYWALL USG 2000 - Content Filter Customization Screen - 1

text_image General Filter Profile Cache Category Service Custom Service General Settings Name Enable Custom Service Allow web traffic for trusted web sites only Restricted Web Features Block ActiveX Java Cookies Web Proxy Allow Java/ActiveX/Cookies/Web proxy to trusted web sites Trusted Web Sites Add Trusted Web Site Trusted Web Sites Add Delete Forbidden Web Sites Add Forbidden Web Site Forbidden Web Sites Add Delete Blocked URL Keywords Add Blocked URL Keyword Blocked URL Keywords Add Delete OK Cancel

The following table describes the labels in this screen.

Table 166 Anti-X > Content Filter > Filter Profile > Customization

LABELDESCRIPTION
General Settings
NameEnter a descriptive name for this content filtering profile name. You may use 1-31 alphanumeric characters, underscores(_, or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Enable Custom ServiceSelect this check box to allow trusted web sites and block forbidden web sites. Content filter list customization may be enabled and disabled without re-entering these site names.
Allow Web traffic for trusted web sites onlyWhen this box is selected, the ZyWALL blocks Web access to sites that are not on the Trusted Web Sites list. If they are chosen carefully, this is the most effective way to block objectionable material.
Restricted Web FeaturesSelect the check box(es) to restrict a feature. When you download a page containing a restricted feature, that part of the web page will appear blank or grayed out.
Block ActiveXActiveX is a tool for building dynamic and active web pages and distributed object applications. When you visit an ActiveX web site, ActiveX controls are downloaded to your browser, where they remain in case you visit the site again.
JavaJava is a programming language and development environment for building downloadable Web components or Internet and intranet business applications of all kinds.
CookiesCookies are files stored on a computer's hard drive. Some web servers use them to track usage and provide service based on ID.
Web ProxyA server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by pointing to this proxy server.
Allow Java/ActiveX/ Cookies/Web proxy to trusted web sitesWhen this box is selected, the ZyWALL will permit Java, ActiveX and Cookies from sites on the Trusted Web Sites list to the LAN. In certain cases, it may be desirable to allow Java, ActiveX or Cookies from sites that are known and trusted.
Trusted Web SitesThese are sites that you want to allow access to, regardless of their content rating, can be allowed by adding them to this list.
Add Trusted Web SiteEnter host names such as www.good-site.com into this text field. Do not enter the complete URL of the site – that is, do not include "http://". All subdomains are allowed. For example, entering "zyxel.com" also allows "www.zyxel.com", "partner.zyxel.com", "press.zyxel.com", etc.Use up to 63 characters (0-9a-z-). The casing does not matter.
Trusted Web SitesThis list displays the trusted web sites already added.
AddClick this button when you have finished adding the host name in the text field above.
DeleteSelect a web site name from the Trusted Web Sites list, and then click this button to delete it from that list.
Forbidden Web SitesSites that you want to block access to, regardless of their content rating, can be allowed by adding them to this list.
Add Forbidden Web SiteEnter host names such as www.bad-site.com into this text field. Do not enter the complete URL of the site – that is, do not include "http://". All subdomains are also blocked. For example, entering "bad-site.com" also blocks "www.bad-site.com", "partner.bad-site.com", "press.bad-site.com", etc.Use up to 63 characters (0-9a-z-). The casing does not matter.
Forbidden Web SitesThis list displays the forbidden web sites already added.
AddClick this button when you have finished adding the host name in the text field above.
DeleteSelect a web site name from the Forbidden Web Sites list, and then click this button to delete it from that list.
Blocked URL KeywordsThis section allows you to block Web sites with URLs that contain certain keywords in the domain name or IP address.
Add Blocked URL KeywordEnter a keyword or a numerical IP address to block. You can also enter a numerical IP address.Use up to 63 case-insensitive characters (0-9a-zA-Z;/?:@&=+$\._!~*')%. For example enter Bad_Site to block access to any web page that includes the exact phrase Bad_Site. This does not block access to web pages that only include part of the phrase (such as Bad for example).
Blocked URL KeywordsThis list displays the keywords already added.
AddClick this button when you have finished adding the key words field above.
DeleteSelect a keyword from the Blocked URL Keywords list, and then click this button to delete it from that list.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

32.7 Content Filter Cache Screen

Click Anti-X > Content Filter > Cache to display the Content Filter Cache screen. Use this screen to view and configure your ZyWALL's URL caching. You can also configure how long a categorized web site address remains in the cache as well as view those web site addresses to which access has been allowed or blocked based on the responses from the external content filtering server. The ZyWALL only queries the external content filtering database for sites not found in the cache.

You can remove individual entries from the cache. When you do this, the ZyWALL queries the external content filtering database the next time someone tries to

access that web site. This allows you to check whether a web site's category has been changed.

Figure 376 Anti-X > Content Filter > Cache

#CategoryURLRemaining Time (minutes)Remove
1Search Engines/Portalshttp://sb.google.com/safebrowsing/update?client=navclient-auto-ffox2.0.0.3&mozver=1.8.1.3-2007030918version=goog-white-domain:1:20%2Cgoog-white-url:1:371%2Cgoog-black-url:1:9723%2Cgoog-black-enchash:1:220864320
2Emailhttp://mail.google.com/mail/channel/test?at=a619f020e4f897b5-111a1d93760&MODE=init&zx=j9w2t-wtb93n&it=1397883904320
3Emailhttp://mail.google.com/mail/?ik=21f780c092&view=tl&search=inbox&start=0&tlt=111c49d383d&fp=0&auto=1&vv=188&q=xm&at=a619f020e4f897b5-111a1d93760&zx=47bd1e-3fb42g4320
4Computers/Internethttp://www.faststream.com/IPRedirectorv3/4180
5Search Engines/Portalshttp://rad.msn.com/ADSAdClient31.dll?GetAd=&PG=IMUSX13285
6Emailhttp://mail.google.com/mail/?ik=21f780c092&view=tl&search=inbox&start=0&tlt=111c49d383d&fp=0&auto=1&vv=188&q=xm&at=a619f020e4f897b5-111a1d93760&zx=jtmegq1-7jzx284315
7Computers/Internethttp://www.opinionatedgeek.com/dotnet/tools/Base64Decode/Default.aspx4315
8Emailhttp://mail.google.com/mail/?ik=21f780c092&view=bzr4050
9Web Advertisementshttp://pagead2.googlesyndication.com/pagead/js/graphics1985
28Emailhttp://mail.google.com/mail/?ik=21f780c092&iew=tl&search=inbox&start=0&tlt=111c49d383d&fp=0&auto=1&vv=188&q=xm&at=a619f020e4f897b5-111a1d93760&zx=8oiipj-n90qy4305
29Search Engines/Portalshttp://sb.google.com/safebrowsing/update?client=navclient-auto-ffox2.0.0.3&mozver=1.8.1.3-2007030918version=goog-white-domain:1:20%2Cgoog-white-url:1:371%2Cgoog-black-url:1:9723%2Cgoog-black-enchash:1:220854305
30Search Engines/Portalshttp://sb.google.com/safebrowsing/update?client=navclient-auto-tbff&version=goog-white-domain:1:20%2Cgoog-white-url:1:371%2Cgoog-black-url:1:9723%2Cgoog-black-enchash:1:22085%2Cgoog-sandbox-text:1:5&wrkey=MTq5aee3x0k3-z6dGEqvJvbs4305
URL Cache Setup
Maximum TTL 72 (1~720 hours)

The following table describes the labels in this screen.

Table 167 Anti-X > Content Filter > Cache

LABELDESCRIPTION
URL Cache Entry
FlushClick this button to clear all web site addresses from the cache manually.
RefreshClick this button to reload the list of content filter cache entries.
Total cache entriesThis is the number of web site addresses in the content filter cache.
entries per pageSelect how many web site addresses to display per page in the screen.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the index number of a categorized web site address record.
CategoryThis field shows whether access to the web site's URL was blocked-or allowed.Click the column heading to sort the entries. Point the triangle up to display the blocked URLs before the URLs to which access was allowed. Point the triangle down to display the URLs to which access was allowed before the blocked URLs.
URLThis is a web site's address that the ZyWALL previously checked with the external content filtering database.
Remaining Time (minutes)This is the number of minutes left before the URL entry is discarded from the cache.
RemoveClick the Delete icon to remove the URL entry from the cache.
URL Cache Setup
Maximum TTLType the maximum time to live (TTL) (1 to 720 hours). This sets how long the ZyWALL is to keep an entry in the URL cache before discarding it.The external content filtering database frequently adds previously uncategorized web sites and sometimes changes a web site's category. Setting this limit higher will speed up the processing of web access requests but will also make it take longer for the ZyWALL to reflect changes in the external content filtering database.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

32.8 Content Filter Technical Reference

This section provides content filtering background information.

External Content Filter Server Lookup Procedure

The content filter lookup process is described below.

Figure 377 Content Filter Lookup Procedure
ZYXEL ZYWALL USG 2000 - External Content Filter Server Lookup Procedure - 1

flowchart
graph LR
    A["电脑"] <-->|1| B["服务器"]
    B -->|2| C["计算机"]
    B -->|3| D["服务器"]
    B -->|4| E["计算机"]

1 A computer behind the ZyWALL tries to access a web site.
2 The ZyWALL looks up the web site in its cache. If an attempt to access the web site was made in the past, a record of that web site's category will be in the ZyWALL's cache. The ZyWALL blocks, blocks and logs or just logs the request based on your configuration.
3 Use the Content Filter Cache screen to configure how long a web site address remains in the cache as well as view those web site addresses (see Section 32.7 on page 563). All of the web site address records are also cleared from the local cache when the ZyWALL restarts.
4 If the ZyWALL has no record of the web site, it queries the external content filter database and simultaneously sends the request to the web server.
5 The external content filter server sends the category information back to the ZyWALL, which then blocks and/or logs access to the web site based on the settings in the content filter profile. The web site's address and category are then stored in the ZyWALL's content filter cache.

Content Filter Reports

33.1 Overview

You can view content filtering reports after you have activated the category-based content filtering subscription service.

See Chapter 8 on page 165 on how to create a myZyXEL.com account, register your device and activate the subscription services.

33.2 Viewing Content Filter Reports

Content filtering reports are generated statistics and charts of access attempts to web sites belonging to the categories you selected in your device content filter screen.

You need to register your iCard before you can view content filtering reports.

Alternatively, you can also view content filtering reports during the free trial (up to 30 days).

1 Go to http://www.myZyXEL.com.

2 Fill in your myZyXEL.com account information and click Login.

Figure 378 myZyXEL.com: Login
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 1

text_image myZyXEL.com Login/ Welcome to myZyXEL.com What's myZyXEL.com? Anti-Spam trial service stop announcement myZyXEL.com provides an easy-to-use service management platform where you can manage your ZyXEL product registrations and services using your personal account. The ZyXEL products which can be registered at myZyXEL.com are as follows: ZyWALL Series which support Content Filter, Anti-Virus, IDP, Anti-Spam and VPN P662H series and P662HW series which support Anti-Virus and Content Access Control HS100/HS100W which support Content Filter Vantage series which include Vantage CNM, Vantage Report and Vantage Access NetAtlas Access EMS which support device management Please register your account at myZyXEL.com first. Log In Username: Forget User Name / Password? Click here Password: Remember Username: Login Cancel ZyXEL | Privacy Statement Version 3.2.02.60.01b1 (C) Copyright 1995-2008 by ZyXEL Communications Corp.

3 A welcome screen displays. Click your ZyWALL's model name and/or MAC address under Registered ZyXEL Products (the ZyWALL 70 is shown as an example here). You can change the descriptive name for your ZyWALL using the Rename button in the Service Management screen (see Figure 380 on page 570).

Figure 379 myZyXEL.com: Welcome
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 2

text_image myZyXEL.com Welcome | My Account | My Product | Download Center | WELCOME Welcome / Welcome You have logged in myZyXEL.com for 668 times. > Last Viewed * IP: 172.25.21.18 * Viewed Date: 2009-03-05 * Viewed time: 17:32:19(GMT+8:00)Beijing Registered ZyXEL Products To register product, Click here Friendly Name Model Serial Number Authentication Code / MAC Address IPPBX X6004-00FFFF100029 IPPBX X6004 FFFF100029 00FFFF100029 IPPBX X6004-00FFFF100028 IPPBX X6004 FFFF100028 00FFFF100028 IPPBX X6004-00FFFF100027 IPPBX X6004 FFFF100027 00FFFF100027 IPPBX X6004-00FFFF100026 IPPBX X6004 FFFF100026 00FFFF100026 ZYWALL 70-0000AA778821 ZYWALL 70 AAAA778821 0000AA778821 More mySecurity Zone

4 In the Service Management screen click Content Filter in the Service Name column to open the Blue Coat login screen.

Figure 380 myZyXEL.com: Service Management
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 3

text_image My Products / Service Activation Service Management Product Information ZYWALL 70-0000AA778821 Serial Number: AAAA778821 Products: ZYWALL 70 Authentication Code / MAC Address: 0000AA778821 Activation Key: N/A Manage Product Manage this product's registration by clicking on the appropriate buttons below > ZYWALL 70-0000AA778821 Rename Transfer Reinstall Available Service List To enable your service(s), please click "Activate" shown below to enter your license key(s). Service Name Service Activation Service Type Status Expiration Date Remark 1 Content Filter Upgrade Standard Installed 2010-04-06 - 2 Anti-Spam Service Activate - 3 IDP/Anti-Virus Service Activate -

5 In the Web Filter Home screen, click the Reports tab.

Figure 381 Blue Coat Content Filter Reports Main Screen
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 4

text_image ZyXEL Powered By BlueCoat® Technical Support Web Filter Home Reports Home Web Filter Home Welcome You're protected by Blue Coat Web Filtering. Web Filtering provides you the ability to control what web sites can be accessed on your home or business PC. Blue Coat Web Filter allows you to modify blocked categories and view reports of Internet activity. REPORTS: Track Internet activity by viewing user reports, including site violations. Web Filter Home | Reports | Logout

6 Select items under Global Reports to view the corresponding reports.

Figure 382 Blue Coat: Report Home
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 5

text_image ZyXEL Powered By Blue Coat® Technical Support Web Filter Home Reports Report Home Global Reports Report Home Report Navigation Global reports provide You with an overview of all your Internet use. Global Reports Allowed/Blocked Categories URLs Web Filter Home | Reports | Logout

7 Select a time period in the Date Range field, either Allowed or Blocked in the Action Taken field and click Run Report. The screens vary according to the report type you selected in the Report Home screen.
8 A chart and/or list of requested web site categories display in the lower half of the screen.

Figure 383 Global Report Screen Example
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 6

pie | Category | Number of Requests | | :--- | :--- | | Email | 15198 | | Search Engines/Portals | 13754 | | Web Advertisement | 10219 | | Computers/Internet | 7518 | | News/Media | 6839 | | Social Networking | 5691 | | Reference | 3932 | | Proxy Avoidance | 3180 | | Blogs/Newsgroups | 2815 | | Business/Economy | 2216 | | Political/Activist Groups | 2200 | | Travel | 1850 | The pie chart displays the percentage of total requests for each category, with 'Email' as the largest segment. The data includes a title 'Global Reports - Categories' and a subtitle stating that this report shows the total numbers of allowed or blocked requests for each category. Select a report type and a date range from the drop down boxes below to modify this report. Click on a category to view a report of the URLs requested for a specific category. Date Range: Last 24 Hours. Action taken: Allowed. Run Report.

9 You can click a category in the Categories report or click URLs in the Report Home screen to see the URLs that were requested.

Figure 384 Requested URLs Example
ZYXEL ZYWALL USG 2000 - Viewing Content Filter Reports - 7

text_image ZyXEL Powered By BlueCoat® Technical Support Web Filter Home Reports Report Home | Global Reports Global Reports - URLs This report displays allowed or blocked URLs requested within a specific category. Date Range: Last 24 Hours Action taken: Allowed Category: Email Run Report URLs Requested for category: Email Item # URL Number of Requests Open Web Page 1 www.mail.yahoo.com/ 10 2 mail.yahoo.com/ 10 3 mail.google.com/a/stam.com.my/ 10 4 mail.google.com/mail/ 9 5 mail.google.com/mail/?ui=2&view=bsp&ver=1qygpcgurkovy 9 6 uk.mg41.mail.yahoo.com/ws/mail/v1/formrpc?m=GetDisplayMessage&appid=YahooMailRC&... 9 7 us.mg1.mail.yahoo.com/ws/mail/v1/formrpc?m=ListMessages&appid=YahooMailRC&fid=In... 8 8 mail.yahoo.com/?.intl=us 8 9 mail.google.com/mail/?shva=1 8 10 mail.google.com/mail/?ui=2&ik=3f43ea5532&view=au&rt=j 8 11 mail.google.com/mail/?logout&hl=en 8 12 mail.google.com/mail/?view=page&name=browser&ver=zpwhtygjntrz 8 13 www.gmail.com/ 7 14 filetransferenabled.mail.google.com/images/cleardot.gif 7 15 mail.google.com/mail/images/cleardot.gif 7 16 mail.google.com/mail/?ui=2&view=js&name=js&ver=v0lxBnHNwXQ&am=X7V4pcX3cBGIBFXi0f... 7 17 mail.google.com/mail/?view=sjs&name=wih&ver=yqaglnkl9n79 7 18 mail.google.com/a/stam.com.my/?view=ca&file=2 7 19 mail.google.com/a/stam.com.my/?view=sjs&name=wih&ver=yqaglnkl9n79 7 20 mail.yimg.com/a/i/us/pim/dclient/img/spacer_1.gif 7 21 us.mg2.mail.yahoo.com/ws/mail/v1/formrpc?m=GetDisplayMessage&appid=YahooMailRC&f... 6 22 mail.google.com/mail/?hl=en&tab=wm 6 23 mail.google.com/mail/?view=ca&file=2 6 24 mail.google.com/mail/?ui=2&view=jsm&name=ld% 6 25 2Cml&ver=v0lxBnHNwXQ&am=X7V4pcX3cBGI... 6 26 mail.google.com/a/stam.com.my/?ui=2&ik=543adc39f9&view=tllstart=08num=70&auto=1&... 6

Anti-Spam

34.1 Overview

The anti-spam feature can mark or discard spam (unsolicited commercial or junk e-mail). Use the white list to identify legitimate e-mail. Use the black list to identify spam e-mail. The ZyWALL can also check e-mail against a DNS black list (DNSBL) of IP addresses of servers that are suspected of being used by spammers.

34.1.1 What You Can Do in the Anti-Spam Screens

  • Use the General screens (Section 34.3 on page 578) to turn anti-spam on or off and manage anti-spam policies.
  • Use the Black/White List screens (Section 34.4 on page 581) to set up a black list to identify spam and a white list to identify legitimate e-mail.
  • Use the DNSBL screens (Section 34.6 on page 586) to have the ZyWALL check e-mail against DNS Black Lists.
  • Use the Status screen (Section 34.6 on page 586) to see how many mail sessions the ZyWALL is currently checking and DNSBL statistics.

34.1.2 What You Need to Know About Anti-Spam

White list

Configure white list entries to identify legitimate e-mail. The white list entries have the ZyWALL classify any e-mail that is from a specified sender or uses a specified header field and header value as being legitimate (see E-mail Headers on page 576 for more on mail headers). The anti-spam feature checks an e-mail against the white list entries before doing any other anti-spam checking. If the e-mail matches a white list entry, the ZyWALL classifies the e-mail as legitimate and does not perform any more anti-spam checking on that individual e-mail. A properly configured white list helps keep important e-mail from being incorrectly classified as spam. The white list can also increases the ZyWALL's anti-spam speed and efficiency by not having the ZyWALL perform the full anti-spam checking process on legitimate e-mail.

Black List

Configure black list entries to identify spam. The black list entries have the ZyWALL classify any e-mail that is from or forwarded by a specified IP address or uses a specified header field and header value as being spam. If an e-mail does not match any of the white list entries, the ZyWALL checks it against the black list entries. The ZyWALL classifies an e-mail that matches a black list entry as spam and immediately takes the configured action for dealing with spam. If an e-mail matches a blacklist entry, the ZyWALL does not perform any more anti-spam checking on that individual e-mail. A properly configured black list helps catch spam e-mail and increases the ZyWALL's anti-spam speed and efficiency.

SMTP and POP3

Simple Mail Transfer Protocol (SMTP) is the Internet's message transport standard. It controls the sending of e-mail messages between servers. E-mail clients (also called e-mail applications) then use mail server protocols such as POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) to retrieve e-mail. E-mail clients also generally use SMTP to send messages to a mail server. The older POP2 requires SMTP for sending messages while the newer POP3 can be used with or without it. This is why many e-mail applications require you to specify both the SMTP server and the POP or IMAP server (even though they may actually be the same server).

The ZyWALL's anti-spam feature checks SMTP (TCP port 25) and POP3 (TCP port 110) e-mails. The anti-spam feature does not check (or act upon) e-mails that use other protocols (such as IMAP) or other port numbers.

E-mail Headers

Every email has a header and a body. The header is structured into fields and includes the addresses of the recipient and sender, the subject, and other information about the e-mail and its journey. The body is the actual message text and any attachments. You can have the ZyWALL check for specific header fields with specific values.

E-mail programs usually only show you the To:, From:, Subject:, and Date: header fields but there are others such as Received: and Content-Type:. To see all of an e-mail's header, you can select an e-mail in your e-mail program and look at its properties or details. For example, in Microsoft's Outlook Express, select a mail and click File > Properties > Details. This displays the e-mail's header. Click Message Source to see the source for the entire mail including both the header and the body.

E-mail Header Buffer Size

The ZyWALL has a 5 K buffer for an individual e-mail header. If an e-mail's header is longer than 5 K, the ZyWALL only checks up to the first 5 K.

DNSBL

A DNS Blacklist (DNSBL) is a server that hosts a list of IP addresses known or suspected of having sent or forwarded spam. A DNSBL is also known as a DNS spam blocking list. The ZyWALL can check the routing addresses of e-mail against DNSBLs and classify an e-mail as spam if it was sent or forwarded by a computer with an IP address in the DNSBL.

Here's how the ZyWALL uses DNSBLs.

Figure 385 DNSBL Example
ZYXEL ZYWALL USG 2000 - DNSBL - 1

flowchart
graph TD
    A["DNSBL 1"] -->|2 Not spam.| B["DNSBL 2"]
    B -->|3 Spam!| C["DNSBL 3"]
    D["IPv6"] -->|1 IPs: a.b.c.d w.x.y.z| E["No foreign symbol"]
    F["Red prohibition icon"] --> D

1 The ZyWALL checks the e-mail's header for sender or relay IP addresses and sends them to all of the DNSBL domains configured in the ZyWALL.
2 The DNSBL servers reply as to whether or not the IP addresses match an entry in their list. In this example, DNSBL 1's reply came first. Since DNSBL 1 says the IP addresses are not in its list, the ZyWALL waits for more responses.
3 DNSBL 2 has one of the IP addresses in its list.
4 The ZyWALL immediately classifies the e-mail as spam and takes the action for spam that you defined in the anti-spam policy (in this example it was an SMTP mail and the defined action is to drop the mail). After a positive match is found in a DNSBL, the ZyWALL does not wait for any more DNSBL responses.

34.2 Before You Begin

Configure your zones before you configure anti-spam.

34.3 The Anti-Spam General Screen

Click Anti-X > Anti-Spam to open the Anti-Spam General screen. Use this screen to turn the anti-spam feature on or off and manage anti-spam policies. You can also select the action the ZyWALL takes when the mail sessions threshold is reached.

Figure 386 Anti-X > Anti-Spam > General
ZYXEL ZYWALL USG 2000 - The Anti-Spam General Screen - 1

text_image General Black/White List DNSBL Status General Settings Enable Anti-Spam Action taken when mail session threshold is reached Forward Session Drop Session Policy Summary Priority From To Protocol 1 any any SMTP POP3 Apply Reset

The following table describes the labels in this screen.

Table 168 Anti-X > Anti-Spam > General

LABELDESCRIPTION
General SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
Enable Anti-SpamSelect this check box to check SMTP (TCP port 25) and POP3 (TCP port 110) traffic for spam e-mail.
Action taken when mail sessions threshold is reachedAn e-mail session is when an e-mail client and e-mail server (or two e-mail servers) connect through the ZyWALL. Select how to handle concurrent e-mail sessions that exceed the maximum number of concurrent e-mail sessions that the anti-spam feature can handle. See the chapter of product specifications for the threshold.Select Forward Session to have the ZyWALL allow the excess e-mail sessions without any spam filtering.Select Drop to have the ZyWALL drop mail connections to stop the excess e-mail sessions. The e-mail client or server will have to re-attempt to send or receive e-mail later when the number of e-mail sessions is under the threshold.
Policy Summary

Table 168 Anti-X > Anti-Spam > General

LABELDESCRIPTION
PriorityThis is the position of an anti-spam policy in the list. The ordering of your anti-spam policies is important as the ZyWALL applies them in sequence. Once traffic matches an anti-spam policy, the ZyWALL applies that policy and does not check the traffic against any more policies.
FromThe anti-spam policy has the ZyWALL scan e-mail traffic that is coming from this zone and going to the To zone.
ToThe anti-spam policy has the ZyWALL scan e-mail traffic that is going to this zone from the From zone.
ProtocolThese are the protocols of traffic to scan for spam.SMTP applies to traffic using TCP port 25.POP3 applies to traffic using TCP port 110.
Add iconClick the Add icon in the heading row to add a new first entry.The Active displays whether the entry is enabled or not. Click it to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click the Edit icon to go to the screen where you can edit the entry on the ZyWALL.Click the Add icon in an entry to add an entry below the current entry.Click the Remove icon to delete an existing entry from the ZyWALL. A window displays asking you to confirm that you want to delete the entry. Note that subsequent entries move up by one when you take this action.In a numbered list, click the Move to N icon to display a field to type an index number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. For example, if you type 6, the entry you are moving becomes number 6 and the previous rule 6 (if there is one) gets pushed up (or down) one.The ordering of your policies is important as they are applied in order of their numbering.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

34.3.1 The Anti-Spam Policy Add or Edit Screen

Click the Add or Edit icon in the Anti-X > Anti-Spam > General screen to display the configuration screen as shown next. Use this screen to configure an anti-spam policy that controls what traffic direction of e-mail to check, which e-

mail protocols to scan, the scanning options, and the action to take on spam traffic.

Figure 387 Anti-X > Anti-Spam > General > Add
ZYXEL ZYWALL USG 2000 - The Anti-Spam Policy Add or Edit Screen - 1

text_image General Settings Enable Policy Log log Email Direction From any To any Protocols to Scan SMTP POP3 Scan Options Check White List Check Black List Check DNSBL Actions For Spam Mail SMTP forward with tag POP3 forward with tag OK Cancel

The following table describes the labels in this screen.

Table 169 Anti-X > Anti-Virus > General > Add

LABELDESCRIPTION
General Settings
Enable PolicySelect this check box to have the ZyWALL apply this anti-spam policy to check e-mail traffic for spam.
LogSelect how the ZyWALL is to log the event when the DNSBL times out or an e-mail matches the white list, black list, or DNSBL.no: Do not create a log.log: Create a log on the ZyWALL.log alert: An alert is an e-mailed log for more serious events that may need more immediate attention. Select this option to have the ZyWALL send an alert.
Email Direction
FromToSelect source and destination zones for traffic to scan for spam. The anti-spam policy has the ZyWALL scan traffic coming from the From zone and going to the To zone.
Protocols to ScanSelect which protocols of traffic to scan for spam.SMTP applies to traffic using TCP port 25.POP3 applies to traffic using TCP port 110.
Scan Options
Check White ListSelect this check box to check e-mail against the white list. The ZyWALL classifies e-mail that matches a white list entry as legitimate (not spam).
Check Black ListSelect this check box to check e-mail against the black list. The ZyWALL classifies e-mail that matches a black list entry as spam.
Check DNSBLSelect this check box to check e-mail against the ZyWALL's configured DNSBL domains. The ZyWALL classifies e-mail that matches a DNS black list as spam.
Actions for Spam MailUse this section to set how the ZyWALL is to handle spam mail.
SMTPSelect how the ZyWALL is to handle spam SMTP mail.Select drop to discard spam SMTP mail.Select forward to allow spam SMTP mail to go through.Select forward with tag to add a spam tag to an SMTP spam mail's mail subject and send it on to the destination.
POP3Select how the ZyWALL is to handle spam POP3 mail.Select forward to allow spam POP3 mail to go through.Select forward with tag to add a spam tag to an POP3 spam mail's mail subject and send it on to the destination.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

34.4 The Anti-Spam Black List Screen

Click Anti-X > Anti-Spam > Black /White List to display the Anti-Spam Black List screen.

Configure the black list to identify spam e-mail. You can create black list entries based on the sender's or relay server's IP address or e-mail address. You can also

create entries that check for particular e-mail header fields with specific values or specific subject text.

Figure 388 Anti-X > Anti-Spam > Black/White List > Black List
ZYXEL ZYWALL USG 2000 - The Anti-Spam Black List Screen - 1

text_image General Black/White List DNSBL Status Black List White List General Settings Enable Black List Checking Black List Spam Tag [Spam] (Optional) Rule Summary Total Rule: 2 30 rules per page Page: 1 of 1

Type Content

1 subject subject-example 2 ip-address 1.2.3.4 / 255.255.0.0 Apply Reset

The following table describes the labels in this screen.

Table 170 Anti-X > Anti-Spam > Black/White List > Black List

LABELDESCRIPTION
General Settings
Enable Black List CheckingSelect this check box to have the ZyWALL treat e-mail that matches (an active) black list entry as spam.
Black List Spam TagEnter a message or label (up to 15 ASCII characters) to add to the mail subject of e-mails that match the ZyWALL's spam black list.
Total RuleThis is the number of entries configured.
rules per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the entry's index number in the list.
TypeThis field displays whether the entry is based on the e-mail's subject, source or relay IP address, source e-mail address, or header.
ContentThis field displays the subject content, source or relay IP address, source e-mail address, or header value for which the entry checks.
Add iconApplyThis column provides icons to add, activate / deactivate, edit, and remove entries.To add an entry, click the Add icon at the top of the column.Click an entry's Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click an entry's Edit icon to edit the entry.To delete an entry, click the entry's Remove icon. The web configurator confirms that you want to delete the entry.Click Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

34.4.1 The Anti-Spam Black or White List Add/Edit Screen

In the anti-spam Black List or White List screen, click the Add icon or an Edit icon to display the following screen.

Use this screen to configure an anti-spam black list entry to identify spam e-mail. You can create entries based on specific subject text, or the sender's or relay's IP address or e-mail address. You can also create entries that check for particular header fields and values.

Figure 389 Anti-X > Anti-Spam > Black/White List > Black List (or White List) > Add
ZYXEL ZYWALL USG 2000 - The Anti-Spam Black or White List Add/Edit Screen - 1

text_image Rule Configuration Enable Rule Type Subject Mail Subject Keyword OK Cancel

The following table describes the labels in this screen.

Table 171 Anti-X > Anti-Spam > Black/White List > Black List (or White List) > Add

LABELDESCRIPTION
Enable RuleSelect this to have the ZyWALL use this entry as part of the black or white list.To actually use the entry, you must also turn on the use of the list in the corresponding list screen, enable the anti-spam feature in the anti-spam general screen, and configure an anti-spam policy to use the list.
TypeUse this field to base the entry on the e-mail's subject, source or relay IP address, source e-mail address, or header.SelectSubjectto have the ZyWALL check e-mail for specific content in the subject line.SelectIP Addressto have the ZyWALL check e-mail for a specific source or relay IP address.SelectE-Mail Addressto have the ZyWALL check e-mail for a specific source e-mail address or domain name.SelectMail Headerto have the ZyWALL check e-mail for specific header fields and values. Configure black list header entries to check for e-mail from bulk mail programs or with content commonly used in spam. Configure white list header entries to allow certain header values that identify the e-mail as being from a trusted source.

Table 171 Anti-X > Anti-Spam > Black/White List > Black List (or White List) > Add

LABELDESCRIPTION
Mail Subject KeywordThis field displays when you select theSubjecttype. Enter up to 63 ASCII characters of text to check for in e-mail headers. Spaces are not allowed, although you could substitute a question mark (?). SeeSection 34.4.2 on page 584for more details.
Sender or Mail Relay IP AddressThis field displays when you select theIPtype. Enter an IP address in dotted decimal notation.
NetmaskThis field displays when you select theIPtype. Enter the subnet mask here, if applicable.
Sender E-Mail AddressThis field displays when you select theE-Mailtype. Enter a keyword (up to 63 ASCII characters). SeeSection 34.4.2 on page 584for more details.
Mail Header Field NameThis field displays when you select theMail Headertype.Type the name part of an e-mail header (the part that comes before the colon). Use up to 63 ASCII characters.For example, if you want the entry to check the “Received:” header for a specific mail server’s domain, enter “Received” here.
Field Value KeywordThis field displays when you select theMail Headertype.Type the value part of an e-mail header (the part that comes after the colon). Use up to 63 ASCII characters.For example, if you want the entry to check the “Received:” header for a specific mail server’s domain, enter the mail server’s domain here.SeeSection 34.4.2 on page 584for more details.
OKClickOKto save your changes.
CancelClickCancelto exit this screen without saving your changes.

34.4.2 Regular Expressions in Black or White List Entries

The following applies for a black or white list entry based on an e-mail subject, e-mail address, or e-mail header value.

  • Use a question mark (?) to let a single character vary. For example, use "a?c" (without the quotation marks) to specify abc, acc and so on.
  • You can also use a wildcard (*). For example, if you configure *def.com, any email address that ends in def.com matches. So "mail.def.com" matches.
  • The wildcard can be anywhere in the text string and you can use more than one wildcard. You cannot use two wildcards side by side, there must be other characters between them.
  • The ZyWALL checks the first header with the name you specified in the entry. So if the e-mail has more than one “Received” header, the ZyWALL checks the first one.

34.5 The Anti-Spam White List Screen

Click Anti-X > Anti-Spam > Black/White List and then the White List tab to display the Anti-Spam White List screen.

Configure the white list to identify legitimate e-mail. You can create white list entries based on the sender's or relay's IP address or e-mail address. You can also create entries that check for particular header fields and values or specific subject text.

Figure 390 Anti-X > Anti-Spam > Black/White List > White List
ZYXEL ZYWALL USG 2000 - The Anti-Spam White List Screen - 1

text_image General Black/White List DNSBL Status Black List White List General Settings Enable White List Checking Rule Summary Total Rule: 1 30 rules per page Page: 1 of 1

Type Content

1 subject white-list-subject-example Apply Reset

The following table describes the labels in this screen.

Table 172 Anti-X > Anti-Spam > Black/White List > White List

LABELDESCRIPTION
General Settings
Enable White List CheckingSelect this check box to have the ZyWALL forward e-mail that matches (an active) white list entry without doing any more anti-spam checking on that individual e-mail.
Total RuleThis is the number of entries configured.
rules per pageSelect how many entries you want to display on each page.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This is the entry's index number in the list.
TypeThis field displays whether the entry is based on the e-mail's subject, source or relay IP address, source e-mail address, or a header.
ContentThis field displays the subject content, source or relay IP address, source e-mail address, or header value for which the entry checks.
Add iconThis column provides icons to add, activate / deactivate, edit, and remove entries.To add an entry, click the Add icon at the top of the column. See Section 34.4.1 on page 583 for how to add or edit an entry.Click an entry's Active icon to activate or deactivate the entry. Make sure you click Apply to save and apply the change.Click an entry's Edit icon to edit the entry. See Section 34.4.1 on page 583 for how to add or edit an entry.To delete an entry, click the entry's Remove icon. The web configurator confirms that you want to delete the entry.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

34.6 The DNSBL Screen

Click Anti-X > Anti-Spam > DNSBL to display the anti-spam DNSBL screen. Use this screen to configure the ZyWALL to check the sender and relay IP addresses in e-mail headers against DNS (Domain Name Service)-based spam Black Lists (DNSBLs).

Figure 391 Anti-X > Anti-Spam > DNSBL
ZYXEL ZYWALL USG 2000 - The DNSBL Screen - 1

text_image General Black/White List DNSBL Status General Settings Enable DNS Black List (DNSBL) Checking DNSBL Spam Tag [Spam] (Optional) IP Checking Options Max. IPs Checking Per Mail 3 (1-5) IP Selection Per Mail last N IPs Query Timeout Setting Actions when Query Timeout SMTP forward with tag POP3 forward with tag Timeout Value 5 (1-10 Seconds) Timeout Tag [DNSBL Timeout] (Optional) DNSBL Domain List

DNSBL Domain

Note: Each mail relay and sender IP in mail header (under max. number) will be checked against the DNSBL domain servers listed and enabled above. Apply Reset

The following table describes the labels in this screen.

Table 173 Anti-X > Anti-Spam > DNSBL

LABELDESCRIPTION
General Settings
Enable DNS Black List (DNSBL) CheckingSelect this to have the ZyWALL check the sender and relay IP addresses in e-mail headers against the DNSBL servers maintained by the DNSBL domains listed in the ZyWALL. The ZyWALL checks public IP addresses (it does not check private IP addresses).The ZyWALL queries all of the DNSBL domains at the same time.If any of the e-mail header's IP addresses match an entry in a blacklist on one of the DNSBL domains, the ZyWALL immediately classifies the e-mail as spam and takes the action specified in the anti-spam policy. The ZyWALL does not wait for replies from other DNSBL domains.If none of the e-mail header's IP addresses are on any of the DNSBL domains, the ZyWALL classifies the mail as valid and forwards it.The ZyWALL records DNSBL responses for IP addresses in the cache for up to 72 hours. The ZyWALL checks an e-mail header's IP addresses against the cache first and only sends DNSBL queries for IP addresses that are not in the cache.
DNSBL Spam TagEnter a message or label (up to 15 ASCII characters) to add to the beginning of the mail subject of e-mails that have a sender or relay IP address in the header that matches a blacklist maintained by one of the DNSBL domains listed in the ZyWALL.This tag is only added if the anti-spam policy is configured to forward spam mail with a spam tag.
Max. IPs Checking Per MailSet up to how many sender and relay server IP addresses in the mail header to check against the DNSBL.
IP Selection Per MailSelectfirst N IPsto have the ZyWALL start checking from the first IP address in the mail header. This is the IP of the sender or the first server that forwarded the mail.Selectlast N IPsto have the ZyWALL start checking from the last IP address in the mail header. This is the IP of the last server that forwarded the mail.
Query Timeout Setting
Actions when Query TimeoutUse this section to set what the ZyWALL does if the queries to the DNSBL domains time out.
SMTPSelect how the ZyWALL is to handle SMTP mail (mail going to an e-mail server) if the queries to the DNSBL domains time out.Selectdropto discard SMTP mail.Selectforwardto allow SMTP mail to go through.Selectforward with tagto add a DNSBL timeout tag to the mail subject of an SMTP mail and send it.
POP3Select how the ZyWALL is to handle POP3 mail (mail coming to an e-mail client) if the queries to the DNSBL domains time out.Selectforwardto allow POP3 mail to go through.Selectforward with tagto add a DNSBL timeout tag to the mail subject of an POP3 mail and send it.
Timeout ValueSet how long the ZyWALL waits for a reply from the DNSBL domains listed below. If there is no reply before this time period expires, the ZyWALL takes the action defined in the relevantActions when Query Timeoutfield.
Timeout TagEnter a message or label (up to 15 ASCII characters) to add to the mail subject of e-mails that the ZyWALL forwards if queries to the DNSBL domains time out.
DNSBL Domain List
#This is the entry's index number in the list.
DNSBL DomainThis is the name of a domain that maintains DNSBL servers.
Add iconThis column provides icons to add, activate / deactivate, edit, and remove entries.To add an entry, click theAddicon at the top of the column.Click an entry'sActiveicon to activate or deactivate the entry. Make sure you clickApplyto save and apply the change.Click an entry'sEditicon to edit the entry.To delete an entry, click the entry'sRemoveicon. The web configurator confirms that you want to delete the entry.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.

34.6.1 The DNSBL Add/Edit Screen

Click the Add or Edit icon in the Anti-X > Anti-Spam > DNSBL screen to display the configuration screen as shown next.

Use this screen to specify a DNSBL (spam IP address blacklist). You need to enter the name of a domain that maintains DNSBL servers. Some blacklists are more effective than others. You want a list that catches most spam and avoids false positives (identifying legitimate e-mail as spam). Different DNSBLs have different

usage policies. For example, you can check http://www.spamhaus.org or https://www.sorbs.net for more information.

Figure 392 Anti-X > Anti-Spam > DNSBL > Add
ZYXEL ZYWALL USG 2000 - The DNSBL Add/Edit Screen - 1

text_image DNSBL Domain Configuration Enable DNSBL Domain DNSBL Domain OK Cancel

The following table describes the labels in this screen.

Table 174 Anti-X > Anti-Spam > DNSBL > Add

LABELDESCRIPTION
General Settings
Enable DNSBL DomainSelect this check box to have the ZyWALL check the sender and relay IP addresses in e-mails against this DNSBL.
DNSBL DomainEnter the domain that is maintaining a DNSBL.
OKClick OK to save your changes.
CancelClick Cancel to exit this screen without saving your changes.

34.7 The Anti-Spam Status Screen

Click Anti-X > Anti-Spam > Status to display the Anti-Spam Status screen.

Use the Anti-Spam Status screen to see how many e-mail sessions the anti-spam feature is scanning and statistics for the DNSBLs.

Figure 393 Anti-X > Anti-Spam > Status
ZYXEL ZYWALL USG 2000 - The Anti-Spam Status Screen - 1

text_image General Black/White List DNSBL Status Resource Status Refresh Flush Concurrent Mail Session Scanning : 0/1000 DNSBL Statistics

DNSBL Domain Total Queries Avg. Response Time (sec) No Response

The following table describes the labels in this screen.

Table 175 Anti-X > Anti-Spam > Status

LABELDESCRIPTION
Resource Status
RefreshClick this button to update the information displayed on this screen.
FlushClick this button to clear the DNSBL statistics. This also clears the concurrent mail session scanning bar's historical high.
Concurrent Mail Session ScanningThe darker shaded part of the bar shows how much of the ZyWALL's total spam checking capability is currently being used.The lighter shaded part of the bar and the pop-up show the historical high.The first number to the right of the bar is how many e-mail sessions the ZyWALL is presently checking for spam. The second number is the maximum number of e-mail sessions that the ZyWALL can check at once. An e-mail session is when an e-mail client and e-mail server (or two e-mail servers) connect through the ZyWALL.
DNSBL StatisticsThese are the statistics for the DNSBL the ZyWALL uses. These statistics are for when the ZyWALL actually queries the DNSBL servers. Matches for DNSBL responses stored in the cache do not affect these statistics.
#This is the entry's index number in the list.
DNSBL DomainThese are the DNSBLs the ZyWALL uses to check sender and relay IP addresses in e-mails.
Total QueriesThis is the total number of DNS queries the ZyWALL has sent to this DNSBL.
Avg. Response Time (sec)This is the average for how long it takes to receive a reply from this DNSBL.
No ResponseThis is how many DNS queries the ZyWALL sent to this DNSBL without receiving a reply.

PART VII

Device HA

Device HA (593)

35.1 Overview

Device HA lets a backup ZyWALL (B) automatically take over if a master ZyWALL (A) fails.

Figure 394 Device HA Backup Taking Over for the Master
ZYXEL ZYWALL USG 2000 - Overview - 1

flowchart
graph TD
    A["Router"] -->|A| SwitchA["Switch A"]
    A -->|B| SwitchB["Switch B"]
    SwitchA --> Internet["INTERNET"]
    SwitchB --> Internet
    subgraph Server 1
        A1["Computer 1"]
        A2["Computer 2"]
        A3["Computer 3"]
    end
    subgraph Server 2
        A4["Computer 4"]
        A5["Computer 5"]
    end
    subgraph Server 3
        A6["Computer 6"]
        A7["Computer 7"]
    end
    SwitchA <--> SwitchB
    SwitchA <--> Internet

35.1.1 What You Can Do in the Device HA Screens

  • Use the General screen (Section 35.2 on page 595) to configure device HA global settings, and see the status of each interface monitored by device HA.
  • Use the Active-Passive Mode screens (Section 35.3.1 on page 598) to use active-passive mode device HA. You can configure general active-passive mode device HA settings, view and manage the list of monitored interfaces, and synchronize backup ZyWALLs.
  • Use the Legacy Mode screens (Section 35.5 on page 602) to use legacy mode device HA. You can configure general legacy mode HA settings including link monitoring, configure the VRRP group settings and synchronize backup ZyWALLs.

35.1.2 What You Need to Know About Device HA

Active-Passive Mode and Legacy Mode

- Active-passive mode lets a backup ZyWALL take over if the master ZyWALL fails.

  • Legacy mode allows for more complex relationships between the master and backup ZyWALLs, such as active-active or using different ZyWALLs as the master ZyWALL for individual interfaces. Legacy mode configuration involves a greater degree of complexity. Active-passive mode is recommended for general failover deployments.
  • The ZyWALLs must all support and be set to use the same device HA mode (either active-passive or legacy).

Management Access

You can configure a separate management IP address for each interface. You can use it to access the ZyWALL for management whether the ZyWALL is the master or a backup. The management IP address should be in the same subnet as the interface IP address.

Synchronization

Use synchronization to have a backup ZyWALL copy the master ZyWALL's configuration, signatures (anti-virus, IDP/application patrol, and system protect), and certificates.

Note: Only ZyWALLs of the same model and firmware version can synchronize.

Otherwise you must manually configure the master ZyWALL's settings on the backup (by editing copies of the configuration files in a text editor for example).

Finding Out More

• See Section 5.4.8 on page 108 for related information on these screens.
• See Section 35.8 on page 608 for device HA background/technical information.
• See Section 6.7 on page 141 for an example of using device HA.

35.1.3 Before You Begin

- Configure a static IP address for each interface that you will have device HA monitor.

Note: Subscribe to services on the backup ZyWALL before synchronizing it with the master ZyWALL.

- Synchronization includes updates for services to which the master and backup ZyWALLs are both subscribed. For example, a backup subscribed to IDP/AppPatrol, but not anti-virus, gets IDP/AppPatrol updates from the master, but not anti-virus updates. It is highly recommended to subscribe the master and backup ZyWALLs to the same services.

35.2 Device HA General

The Device HA General screen lets you enable or disable device HA, and displays which device HA mode the ZyWALL is set to use along with a summary of the monitored interfaces.

Figure 395 Device HA > General
ZYXEL ZYWALL USG 2000 - Device HA General - 1

text_image General Active-Passive Mode Legacy Mode General Settings Enable Device HA Device HA Mode Active-Passive Mode (Switch to Legacy Mode page) Monitored Interface Summary Interface Virtual Router IP / Netmask Management IP / Netmask Link Status HA Status ge1 192.168.1.1 / 255.255.255.0 192.168.1.5 / 255.255.255.0 Up Master / Active Apply Reset

The following table describes the labels in this screen.

Table 176 Device HA > General

LABELDESCRIPTION
General Settings
Enable Device HATurn the ZyWALL's device HA feature on or off.
Device HA ModeThis displays whether the ZyWALL is currently set to use active-passive mode device HA or legacy mode device HA. Active-passive mode is recommended for general device failover deployments. Only use legacy mode if you need a more complex relationship between the master and backup ZyWALLs, such as active-active or using different ZyWALLs as the master for individual interfaces.The master and its backups must all use the same device HA mode.Click the link to go to the screen where you can configure the ZyWALL to use the device HA mode that it is not currently using.
Monitored Interface SummaryThis table shows the status of the interfaces that you selected for monitoring in the other device HA screens.
InterfaceThese are the names of the interfaces that are part of device HA.
Virtual Router IP / NetmaskThis is the interface's IP address and subnet mask. Whichever ZyWALL is the master uses this virtual router IP address and subnet mask.
Management IP / NetmaskThis field displays the interface's management IP address and subnet mask. You can use this IP address and subnet mask to access the ZyWALL whether it is in master or backup mode.
Link StatusThis tells whether the monitored interface's connection is down or up.
HA StatusThe text before the slash shows whether the device is configured as the master or the backup role.This text after the slash displays the monitored interface's status in the virtual router.Active- This interface is up and using the virtual IP address and subnet mask.Stand-By- This interface is a backup interface in the virtual router. It is not using the virtual IP address and subnet mask.Fault- This interface is not functioning in the virtual router right now. In active-passive mode (or in legacy mode with link monitoring enabled), if one of the master ZyWALL's interfaces loses its connection, the master ZyWALL forces all of its interfaces to the fault state so the backup ZyWALL can take over all of the master ZyWALL's functions.
ApplyClick Applyto save your changes back to the ZyWALL.
ResetClick Resetto begin configuring this screen afresh.

35.3 The Active-Passive Mode Screen

Virtual Router

The master and backup ZyWALL form a single 'virtual router'. In the following example, master ZyWALL A and backup ZyWALL B form a virtual router.

Figure 396 Virtual Router
ZYXEL ZYWALL USG 2000 - Virtual Router - 1

flowchart
graph TD
    A["Computer 1"] --> C["Router"]
    B["Computer 2"] --> C
    D["Computer 3"] --> C
    C --> E["Internet Cloud"]
    F["A"] --> G["Router"]
    H["B"] --> I["Router"]

Cluster ID

You can have multiple ZyWALL virtual routers on your network. Use a different cluster ID to identify each virtual router. In the following example, ZyWALLs A and

B form a virtual router that uses cluster ID 1. ZyWALLs C and D form a virtual router that uses cluster ID 2.

Figure 397 Cluster IDs for Multiple Virtual Routers
ZYXEL ZYWALL USG 2000 - Cluster ID - 1

flowchart
graph TD
    A["Router"] -->|1| B["Internet Cloud"]
    A -->|2| C["Client 1"]
    A -->|2| D["Client 2"]
    A -->|2| E["Client 3"]
    A -->|2| F["Client 4"]

Monitored Interfaces in Active-Passive Mode Device HA

You can select which interfaces device HA monitors. If a monitored interface on the ZyWALL loses its connection, device HA has the backup ZyWALL take over.

Enable monitoring for the same interfaces on the master and backup ZyWALLs. Each monitored interface must have a static IP address and be connected to the same subnet as the corresponding interface on the backup or master ZyWALL.

Virtual Router and Management IP Addresses

  • If a backup takes over for the master, it uses the master's IP addresses. These IP addresses are known as the virtual router IP addresses.
  • Each interface can also have a management IP address. You can connect to this IP address to manage the ZyWALL regardless of whether it is the master or the backup.

For example, ZyWALL B takes over A's 192.168.1.1 LAN interface IP address. This is a virtual router IP address. ZyWALL A keeps it's LAN management IP address of

192.168.1.5 and ZyWALL B has its own LAN management IP address of 192.168.1.6. These do not change when ZyWALL B becomes the master.

Figure 398 Management IP Addresses
ZYXEL ZYWALL USG 2000 - Virtual Router and Management IP Addresses - 1

flowchart
graph TD
    A["Server 1"] -->|192.168.1.1| R["Router"]
    B["Server 2"] -->|192.168.1.5| R
    R -->|192.168.1.1| S["Internet"]
    R -->|192.168.1.6| T["Server 3"]
    style R stroke:#ff0000,stroke-width:2px
    note right of R "INTERNET"
    note left of R "A" and note right of T "B"

35.3.1 Configuring Active-Passive Mode Device HA

The Device HA Active-Passive Mode screen lets you configure general active-passive mode device HA settings, view and manage the list of monitored interfaces, and synchronize backup ZyWALLs. To access this screen, click Device HA > Active-Passive Mode.

Figure 399 Device HA > Active-Passive Mode
ZYXEL ZYWALL USG 2000 - Configuring Active-Passive Mode Device HA - 1

text_image General Active-Passive Mode Legacy Mode General Settings Device Role Master Backup Cluster Settings Basic Cluster ID 1 (1-16) Authentication None Monitored Interface Summary Interface Virtual Router IP/Netmask Management IP/Netmask Link Status Modify ge1 192.168.1.1 / 255.255.255.0 192.168.1.5 / 255.255.255.0 Up ge2 / / Up ge3 / / Down ge4 192.168.2.1 / 255.255.255.0 / Down ge5 192.168.3.1 / 255.255.255.0 / Down ge6 / / Down ge7 / / Down ge8 / / Down Synchronization Server 192.168.1.1, 192.168.1.5, 10.59.0.33, 192.168.2.1, 192.168.3.1 Address Server Port 21 (Configure) Password Note: Backup device's configuration can synchronize with master device's. Apply Reset

The following table describes the labels in this screen. See Section 35.4 on page 601 for more information as well.

Table 177 Device HA > Active-Passive Mode

LABELDESCRIPTION
General Settings
Device RoleSelect the device HA role that the ZyWALL plays in the virtual router.Choices are:Master- This ZyWALL is the master ZyWALL in the virtual router. This ZyWALL uses the virtual IP address for each monitored interface.Note: Do not set this field to Master for two or more ZyWALLs in the same virtual router (same cluster ID).Backup- This ZyWALL is a backup ZyWALL in the virtual router. This ZyWALL does not use any of the virtual IP addresses.
PriorityThis field is available for a backup ZyWALL. Type the priority of the backup ZyWALL. The backup ZyWALL with the highest value takes over the role of the master ZyWALL if the master ZyWALL becomes unavailable. The priority must be between 1 and 254. (The master interface has priority 255.)
Enable PreemptionThis field is available for a backup ZyWALL. Select this if this ZyWALL should become the master ZyWALL if a lower-priority ZyWALL is the master when this one is enabled. (If the role is master, the ZyWALL preempts by default.)
Cluster SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
Cluster IDType the cluster ID number. A virtual router consists of a master ZyWALL and all of its backup ZyWALLs. If you have multiple ZyWALL virtual routers on your network, use a different cluster ID for each virtual router.
AuthenticationSelect the authentication method the virtual router uses. Every interface in a virtual router must use the same authentication method and password. Choices are:None- this virtual router does not use any authentication method.Text- this virtual router uses a plain text password for authentication. Type the password in the field next to the radio button. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @&%#~ ' () ), and it can be up to eight characters long.IP AH (MD5)- this virtual router uses an encrypted MD5 password for authentication. Type the password in the field next to the radio button. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @&%#~ ' \ () ), and it can be up to eight characters long.See Authentication Types on page 273 for more information about authentication methods.
Monitored Interface Summary
InterfaceThis field identifies the interface. At the time of writing, only the Ethernet interfaces can be included in the virtual router.
Virtual Router IP / NetmaskThis is the master ZyWALL's (static) IP address and subnet mask for this interface. If a backup takes over for the master, it uses this IP address. These fields are blank if the interface is a DHCP client or has no IP settings.
Management IP / NetmaskThis field displays the interface's management IP address and subnet mask. You can use this IP address and subnet mask to access the ZyWALL whether it is in master or backup mode.
Link StatusThis tells whether the monitored interface's connection is down or up.
ModifyThis column provides icons to activate, deactivate, or edit monitored interfaces.To activate or deactivate device HA monitoring of an interface, click the interface's Active icon. Make sure you click Apply to save and apply the change.To edit an interface's management IP address and subnet mask, click its Edit icon. The Add/Edit screen appears.
SynchronizationUse synchronization to have a backup ZyWALL copy the master ZyWALL's configuration, certificates, AV signatures, IDP and application patrol signatures, and system protect signatures.Every interface's management IP address must be in the same subnet as the interface's IP address (the virtual router IP address).
Server AddressIf this ZyWALL is set to backup role, enter the IP address or fully-qualified domain name (FQDN) of the ZyWALL from which to get updated configuration. Usually, you should enter the IP address or FQDN of a virtual router on a secure network.If this ZyWALL is set to master role, this field displays the ZyWALL's IP addresses and/or fully-qualified domain names (FQDN) through which ZyWALLs in backup role can get updated configuration from this ZyWALL.
Sync. NowClick this to copy the specified ZyWALL's configuration.
Server PortIf this ZyWALL is set to backup role, enter the port number to use for Secure FTP when synchronizing with the specified master ZyWALL.If this ZyWALL is set to master role, this field displays the ZyWALL's Secure FTP port number. Click the link if you need to change the FTP port number.Every ZyWALL in the virtual router must use the same port number. If the master ZyWALL changes, you have to manually change this port number in the backups.
PasswordEnter the password used for verification during synchronization. Every ZyWALL in the virtual router must use the same password.If you leave this field blank in the master ZyWALL, no backup ZyWALLs can synchronize from it.If you leave this field blank in a backup ZyWALL, it cannot synchronize from the master ZyWALL.
Auto SynchronizeSelect this to get the updated configuration automatically from the specified ZyWALL according to the specified Interval. The first synchronization begins after the specified Interval; the ZyWALL does not synchronize immediately.
IntervalWhen you select Auto Synchronize, set how often the ZyWALL synchronizes with the master.
ApplyThis appears when the ZyWALL is currently using active-passive mode device HA. Click Apply to save your changes back to the ZyWALL.
Apply & switch to Active-Passive ModeThis appears when the ZyWALL is currently configured for legacy mode device HA. Click Apply to save your changes back to the ZyWALL and set it to use active-passive mode device HA.
ResetClick Reset to begin configuring this screen afresh.

35.4 Configuring an Active-Passive Mode Monitored Interface

The Device HA Active-Passive Mode Monitored Interface Edit screen lets you enable or disable monitoring of an interface and set the interface's management IP address and subnet mask. To access this screen, click Device HA > Active-Passive Mode > Edit.

Figure 400 Device HA > Active-Passive Mode > Edit
ZYXEL ZYWALL USG 2000 - Configuring an Active-Passive Mode Monitored Interface - 1

text_image Monitored Interface Configuration Enable Monitored Interface Interface Name ge1 Virtual Router IP(VRIP) / Subnet Mask 192.168.1.1 / 255.255.255.0 Manage IP 192.168.1.5 Subnet Mask 255.255.255.0 OK Cancel

The following table describes the labels in this screen.

Table 178 Device HA > Active-Passive Mode > Edit

LABELDESCRIPTION
Enable Monitored InterfaceSelect this to have device HA monitor the status of this interface's connection.
Interface NameThis identifies the interface.
Virtual Router IP (VRIP) / Subnet MaskThis is the interface's (static) IP address and subnet mask in the virtual router. Whichever ZyWALL is currently serving as the master uses this virtual router IP address and subnet mask. These fields are blank if the interface is a DHCP client or has no IP settings.
Manage IPEnter the interface's IP address for management access. You can use this IP address to access the ZyWALL whether it is the master or a backup. This management IP address should be in the same subnet as the interface IP address.
Subnet MaskEnter the subnet mask of the interface's management IP address.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

35.5 The Legacy Mode Screen

Virtual Router Redundancy Protocol (VRRP)

Legacy mode device HA uses Virtual Router Redundancy Protocol (VRRP) to create redundant backup gateways to ensure that a default gateway is always available. The ZyWALL uses a custom VRRP implementation and is not compatible with standard VRRP.

While active-passive mode only requires a single cluster ID for the entire virtual router, legacy mode device HA requires you to configure a separate VRRP group and Virtual Router ID (VRID) for each interface in a virtual router.

Additional VRRP Notes

- It is possible to set up two virtual routers so that they back up each other.

• VRRP uses IP protocol 112.

VRRP Groups

In legacy mode, you create a VRRP group to add one of its interfaces to a virtual router. You can add any Ethernet or VLAN interface with a static IP address. You do not configure VRRP groups for virtual interfaces.

  • You can only use interfaces that have static IP addresses.
  • You can only enable one VRRP group for each interface, and you can only have one active VRRP group for each virtual router.
  • If you create a VRRP group for an Ethernet interface that has a VLAN interface configured on it, make sure you create a separate VRRP group for the VLAN interface. This will avoid an IP conflict if the backup ZyWALL takes over for the master.
  • When the ZyWALL is the master, the interface uses its IP address, the IP address of the virtual router. If the ZyWALL is a backup, the interface uses its management IP address.
  • You can only have one active VRRP group for each interface, and you can only have one active VRRP group for each virtual router (VR ID).
  • You can set up authentication for a VRRP group. If you select AH MD5 authentication, the VRRP group uses IP protocol 51 (AH), instead of IP protocol 112 (VRRP).

Link monitoring has a backup ZyWALL take over all of an unavailable master ZyWALL's static IP addresses. This way the backup ZyWALL takes over all of the master ZyWALL's functions. This also means you can only access the original master ZyWALL through its management IP address.

35.6 Configuring the Legacy Mode Screen

The Device HA Legacy Mode screen lets you configure general legacy mode HA settings including link monitoring, configure the VRRP group and synchronize backup ZyWALLs. To access this screen, click Device HA > Legacy Mode.

Figure 401 Device HA > Legacy Mode
ZYXEL ZYWALL USG 2000 - Configuring the Legacy Mode Screen - 1

text_image General Active-Passive Mode Legacy Mode General Settings Link Monitoring Monitored Interface Summary Name Interface Role VRID Virtual Router IP/Netmask Management IP/Netmask Synchronization Server Address Server Port Password Auto Synchronize Interval (IP or FQDN) 21 5 minutes (1-1440) Apply & switch to Legacy Mode Apply Reset

The following table describes the labels in this screen. See Table 180 on page 606 for more information as well.

Table 179 Device HA > Legacy Mode

LABELDESCRIPTION
Link MonitoringEnable link monitoring to have the master ZyWALL shut down all of its VRRP interfaces if one of its VRRP interface links goes down. This way the backup ZyWALL takes over all of the master ZyWALL's functions.
NameThis field displays the name of the VRRP group.
InterfaceThis field displays which interface is part of the virtual router.
RoleThis field displays which role the interface plays in the virtual router.Master- This interface is the master interface in the virtual router. The interface always uses its static IP address, not the management IP address of the VRRP group.Backup- This interface is a backup interface in the virtual router. The interface may use its static IP address or the management IP address of the VRRP group, depending on whether or not the backup has become the master.
VRIDThis field displays the virtual router ID number.
Virtual Router IP / NetmaskThis is the interface's IP address and subnet mask in the virtual router.
Management IP / NetmaskThis field displays the management IP address and subnet mask of an interface.
Add iconThis column provides icons to activate, deactivate, add, edit, and remove VRRP groups.To activate or deactivate a VRRP group, click theActiveicon next to the group. Make sure you clickApplyto save and apply the change. Activating a VRRP group has the ZyWALL monitor the connection of the group's interface. Each interface must have a static IP address and be connected to the same subnet as the group's interface on the other ZyWALL.To add a VRRP group, click theAddicon at the top of the column. The VRRP Group Add/Editscreen appears.To edit a VRRP group, click theEditicon next to the group. The VRRP Group Add/Editscreen appears.To delete a VRRP group, click theRemoveicon next to the group. The web configurator confirms that you want to delete the VRRP group before doing so.
Server AddressEnter the IP address or fully-qualified domain name (FQDN) of the ZyWALL from which to get configuration and subscription service updates (for services to which the backup ZyWALL is subscribed). Usually, you should enter the IP address or FQDN of a virtual router on a secure network.
Server PortEnter the port number that the ZyWALL you specified in theServerAddressfield uses for Secure FTP. Every ZyWALL in the virtual router must use the same port number. If the master ZyWALL changes, you have to manually change this port number in the backups.
PasswordEnter the password used to verify other ZyWALLs during synchronization. This password is different than the one that is used for authentication in the VRRP group. Every ZyWALL in the virtual router must use the same password. If you leave this field blank in the master ZyWALL, it does not allow any backup ZyWALLs to synchronize from it. If you leave this field blank in a backup ZyWALL, it cannot synchronize from the master ZyWALL.
Auto SynchronizeSelect this to get configuration and subscription service updates automatically from the specified ZyWALL according to the specified Interval. The first synchronization begins after the specified Interval; the ZyWALL does not synchronize immediately.
IntervalThis field is only available if Auto Synchronize is checked. Type the number of minutes to wait between synchronizations.
Apply & switch to Legacy ModeThis appears when the ZyWALL is currently using active-passive mode device HA. Click Apply to save your changes back to the ZyWALL and set it to use legacy mode device HA.
ApplyThis appears when the ZyWALL is currently using legacy mode device HA. Click Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

35.7 The Legacy Mode Add/Edit Screen

Use the VRRP Group Add/Edit screen to add or edit VRRP groups.

  • You can only use interfaces that have static IP addresses. In addition, you should set the static IP address to the IP address of the virtual router.
  • You can only enable one VRRP group for each interface.
  • You can only have one active VRRP group for each virtual router (VR ID).

The Device HA Legacy Mode Add or Edit screen lets you configure a VRRP group. To access this screen, click Device HA > Legacy Mode > Add (or Edit).

Figure 402 Device HA > Legacy Mode > Add
ZYXEL ZYWALL USG 2000 - The Legacy Mode Add/Edit Screen - 1

text_image Basic Setting Enable VRRP Group Name Description (Optional) Interface Name Management IP Subnet Mask Role Master Backup Virtual Router Settings VRID (1-254) Virtual Router IP(VRIP) / Subnet Mask Authentication IP AH(MD5) Password OK Cancel

The following table describes the labels in this screen.

Table 180 Device HA > Legacy Mode > Add

LABELDESCRIPTION
Basic Setting
Enable VRRP GroupSelect this to make the specified interface part of the virtual router. Clear this to take the specified interface out of the virtual router. Enabling a VRRP group has the ZyWALL monitor the connection of the group's interface.
NameThis field is read-only if you are editing the VRRP group. Type the name of the VRRP group. This field must be unique in the ZyWALL, but it is not used in the virtual router. The virtual router uses the VRID. The name can consist of alphanumeric characters, the underscore, and the dash and may be up to fifteen characters long.
DescriptionType the description of the VRRP group. This field is only for your reference. It may be up to sixty printable ASCII characters long.
Interface NameSelect the interface in this device that is part of the virtual router. You can only select interfaces that have static IP addresses. Connect the interface to the same subnet as the group's interface on the other ZyWALL.
Management IPEnter the interface's IP address for management access. You can use this IP address to access the ZyWALL whether it is the master or a backup. This management IP address should be in the same subnet as the interface IP address so the backup ZyWALL cannot synchronize with the master via this VRRP interface.
Subnet MaskRoleEnter the subnet mask of the interface's management IP address.Select the role that you want the interface to play in the virtual router.Choices are:Master- This interface is the master interface in the virtual router. The interface always uses its virtual IP address when its status is active.Note: Do not set this field to Master for two or more ZyWALLs in the same virtual router (same VR ID).Backup- This interface is a backup interface in the virtual router. The current role depends on the other ZyWALLs in the virtual router.
PriorityThis field is available if the selected interface is a Backup interface. Type the priority of the backup interface. The backup interface with the highest value takes over the role of the master interface if the master interface becomes unavailable. The priority must be between 1 and 254. (The master interface has priority 255.)
PreemptThis field is available if the selected interface is a Backup interface. Select this if the selected interface should become the master interface if a lower-priority interface is the master when this one is enabled. (If the role is Master, the interface preempts by default.)
Virtual Router SettingsClick Advanced to display more settings. Click Basic to display fewer settings.
VRIDType the virtual router ID number.
Virtual Router IP (VRIP) / Subnet MaskType the interface's IP address and subnet mask in the virtual router.
AuthenticationSelect the authentication method used in the virtual router. Every interface in a virtual router must use the same authentication method and password. Choices are:None- this virtual router does not use any authentication method.Text- this virtual router uses a plain text password for authentication. Type the password in the field next to the radio button. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @&%#~ ' () ), and it can be up to eight characters long.IP AH (MD5)- this virtual router uses an encrypted MD5 password for authentication. Type the password in the field next to the radio button. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @&%#~ ' \ () ), and it can be up to eight characters long.See Authentication Types on page 273 for more information about authentication methods.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

35.8 Device HA Technical Reference

Legacy Mode ZyWALL VRRP Application

In VRRP, a virtual router represents a number of ZyWALLs associated with one IP address, the IP address of the default gateway. Each virtual router is identified by a unique 8-bit identification number called a Virtual Router ID (VR ID). In the example below, ZyWALL A and ZyWALL B are part of virtual router 10 with IP address 192.168.10.254.

Figure 403 Example: VRRP, Normal Operation
ZYXEL ZYWALL USG 2000 - Legacy Mode ZyWALL VRRP Application - 1

flowchart
graph TD
    A["Router A"] -->|192.168.10.254| B["Router B"]
    A -->|192.168.10.254| C["Switch"]
    B -->|192.168.10.112| C
    D["Internet Cloud"] --> A

The VR ID is not shown. In normal operation, ZyWALL A is the master. It has the same IP address as the default gateway and forwards traffic for the network. ZyWALL B is a backup. It is using its management IP address 192.168.10.112. ZyWALL A sends regular messages to ZyWALL B to let ZyWALL B know that ZyWALL A is available. If ZyWALL A becomes unavailable, it stops sending messages to ZyWALL B. ZyWALL B detects this and assumes the role of the master. This is illustrated below.

Figure 404 Example: VRRP, Master Becomes Unavailable
ZYXEL ZYWALL USG 2000 - Legacy Mode ZyWALL VRRP Application - 2

flowchart
graph TD
    A["Router"] -->|default gateway = 192.168.10.254| B["Router"]
    B -->|192.168.10.254\n192.168.10.112| A
    A -->|INTERNET| C["Cloud"]
    style A fill:#f9f,stroke:#333
    style B fill:#bbf,stroke:#333

ZyWALL B is now using the IP address of the default gateway, and it is forwarding packets for the network. The loss of ZyWALL A has no effect on the network.

If there is more than one backup ZyWALL, the backup ZyWALL with the highest priority becomes the master. The other backup ZyWALLs remain backups.

If ZyWALL A becomes available again, ZyWALL A preempts ZyWALL B and becomes the master again (the network returns to the state shown in Figure 403 on page 608).

Synchronization

During synchronization, the master ZyWALL sends the following information to the backup ZyWALL.

  • Startup configuration file (startup-config.conf)
  • AV signatures
    • IDP and application patrol signatures
  • System protect signatures
    • Certificates (My Certificates, and Trusted Certificates)

Synchronization does not change the device HA settings in the backup ZyWALL.

Synchronization affects the entire device configuration. You can only configure one set of settings for synchronization, regardless of how many VRRP groups you might configure. The ZyWALL uses Secure FTP (on a port number you can change) to synchronize, but it is still recommended that the backup ZyWALL synchronize with a master ZyWALL on a secure network.

The backup ZyWALL gets the configuration from the master ZyWALL. The backup ZyWALL cannot become the master or be managed while it applies the new configuration. This usually takes two or three minutes or longer depending on the configuration complexity.

The following restrictions apply with active-passive mode.

  • The master ZyWALL must have no inactive monitored interfaces.
  • The backup ZyWALL cannot be the master. This refers to the actual role at the time of synchronization, not the role setting in the configuration screen.
    The following synchronization restrictions apply with legacy mode.
  • The master ZyWALL must have at least one active VRRP group and no standby VRRP groups.

- The backup ZyWALL cannot be the master in any active VRRP group. This refers to the actual role at the time of synchronization, not the role setting in the VRRP group.

The backup applies the entire configuration if it is different from the backup's current configuration.

PART VIII

Objects

User/Group (613)

Addresses (629)

Services (635)

Schedules (641)

AAA Server (647)

Authentication Method (659)

Certificates (663)

ISP Accounts (685)

SSL Application (689)

36.1 Overview

This chapter describes how to set up user accounts, user groups, and user settings for the ZyWALL. You can also set up rules that control when users have to log in to the ZyWALL before the ZyWALL routes traffic for them.

36.1.1 What You Can Do Using The User/Group Screens

  • The User screen (see Section 36.2 on page 616) provides a summary of all user accounts.
  • The Group screen (see Section 36.3 on page 619) provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups. User groups may consist of access users and other user groups. You cannot put admin users in user groups
  • The Setting screen (see Section 36.4 on page 620) controls default settings, login settings, lockout settings, and other user settings for the ZyWALL. You can also use this screen to specify when users must log in to the ZyWALL before it routes traffic for them.

36.1.2 What You Need To Know About User/Groups

User Account

A user account defines the privileges of a user logged into the ZyWALL. User accounts are used in firewall rules and application patrol, in addition to controlling access to configuration and services in the ZyWALL.

User Types

These are the types of user accounts the ZyWALL uses.

Note: The default admin account is always authenticated locally, regardless of the authentication method setting. (See Chapter 40 on page 647 for more information about authentication methods.)
Table 181 Types of User Accounts

TYPEABILITIESLOGIN METHOD(S)
Admin Users
AdminChange ZyWALL configuration (web, CLI)WWW, TELNET, SSH, FTP, Console, Dial-in
Limited-AdminLook at ZyWALL configuration (web, CLI)Perform basic diagnostics (CLI)WWW, TELNET, SSH, Console, Dial-in
Access Users
UserAccess network servicesBrowse user-mode commands (CLI)WWW, TELNET, SSH
GuestAccess network servicesWWW
Ext-UserExternal User AccountWWW

Ext-User Accounts

Set up an Ext-User account if the user is authenticated by an external server and you want to set up specific policies for this user in the ZyWALL. If you do not want to set up policies for this user, you do not have to set up an Ext-User account.

Ext-User users should be authenticated by an external server, such as AD, LDAP or RADIUS. If the ZyWALL tries to use the local database to authenticate an Ext-User, the authentication attempt always fails. (This is related to AAA servers and authentication methods, which are discussed in Chapter 40 on page 647 and Chapter 41 on page 659, respectively.)

Note: If the ZyWALL tries to authenticate an Ext-User using the local database, the attempt always fails.

Once an Ext-User user has been authenticated, the ZyWALL tries to get the user type (see Table 181 on page 613) from the external server. If the external server does not have the information, the ZyWALL sets the user type for this session to User.

For the rest of the user attributes, such as reauthentication time, the ZyWALL checks the following places, in order.

1 User account in the remote server.
2 User account (Ext-User) in the ZyWALL.
3 Default user account for AD users (ad-users), LDAP users (ldap-users) or RADIUS users (radius-users) in the ZyWALL.

See Setting up User Attributes in an External Server on page 626 for a list of attributes and how to set up the attributes in an external server.

User Groups

User groups may consist of user accounts or other user groups. Use user groups when you want to create the same rule for several user accounts, instead of creating separate rules for each one.

Note: You cannot put access users and admin users in the same user group.

Note: You cannot put the default admin account into any user group.

The sequence of members in a user group is not important.

User Awareness

By default, users do not have to log into the ZyWALL to use the network services it provides. The ZyWALL automatically routes packets for everyone. If you want to restrict network services that certain users can use via the ZyWALL, you can require them to log in to the ZyWALL first. The ZyWALL is then 'aware' of the user who is logged in and you can create 'user-aware policies' that define what services they can use. See Section 36.4.2 on page 625 for a user-aware login example.

Forced User Authentication

Instead of making users for which user-aware policies have been configured go to the ZyWALL Login screen manually, you can configure the ZyWALL to display the Login screen automatically whenever it routes HTTP traffic for anyone who has not logged in yet.

Note: This works with HTTP traffic only. The ZyWALL does not force users to log in before it routes other kinds of traffic.

The ZyWALL does not automatically route the request that prompted the login, however, so users have to make this request again.

Finding Out More

• See Section 5.5.1 on page 116 for related information on these screens.
- See Section 36.5 on page 626 for some information on users who use an external authentication server in order to log in.

36.2 User Summary Screen

The User screen provides a summary of all user accounts. To access this screen, login to the web configurator, and click Object > User/Group.

Figure 405 Object > User/Group
ZYXEL ZYWALL USG 2000 - User Summary Screen - 1

text_image User Group Setting Configuration

User Name Description

1 admin Administration account 2 ldap-users External LDAP Users 3 radius-users External RADIUS Users 4 ad-users External AD Users 5 guest Local User

The following table describes the labels in this screen.

Table 182 Object > User/Group

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific user.
User NameThis field displays the user name of each user.
DescriptionThis field displays the description for each user.
Add iconThis column provides icons to add, edit, and remove users.To add a user, click the Add icon at the top of the column. The User Add/Edit screen appears.To edit a user, click the Edit icon next to the user. The User Add/Edit screen appears.To delete a user, click the Remove icon next to the user. The web configurator confirms that you want to delete the user before doing so.

36.2.1 User Add/Edit Screen

The User Add/Edit screen allows you to create a new user account or edit an existing one.

36.2.1.1 Rules for User Names

Enter a user name from 1 to 31 characters.

The user name can only contain the following characters:

  • Alphanumeric A-z 0-9 (there is no unicode support)
  • _ [underscores]

- [dashes]

The first character must be alphabetical (A-Z a-z), an underscore (_), or a dash (-). Other limitations on user names are:

  • User names are case-sensitive. If you enter a user 'bob' but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for 'BOB' not 'bob'.
  • User names have to be different than user group names.
  • Reserved user names are listed in the following table.

Table 183 Reserved User Names

admadminanybindaemon
debugdevicehaecivedftpgameshalt
ldap-userslpmailnewsnobody
operatorradius-usersrootshutdownsshd
syncuucpzyxel

To access this screen, go to the User screen (see Section 36.2 on page 616), and click either the Add icon or an Edit icon.

Figure 406 User/Group > User > Edit
ZYXEL ZYWALL USG 2000 - Rules for User Names - 1

text_image User Configuration User Name User Type Password Retype Description Authentication Timeout Settings Lease Time Reauthentication Time User Local User Use Default Settings Use Manual Settings 1440 minutes 1440 minutes OK Cancel

The following table describes the labels in this screen.

Table 184 User/Group > User > Edit

LABELDESCRIPTION
User NameType the user name for this user account. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User names have to be different than user group names, and some words are reserved. See Section 36.2.1.1 on page 616.
User TypeSelect what type of user this is. Choices are:Admin - this user can look at and change the configuration of the ZyWALLLimited-Admin - this user can look at the configuration of the ZyWALL but not to change itUser - this user has access to the ZyWALL's services but cannot look at the configurationGuest - this user has access to the ZyWALL's services but cannot look at the configurationExt-User - this user account is maintained in a remote server, such as RADIUS or LDAP. See Ext-User Accounts on page 614 for more information about this type.
PasswordThis field is not available if you select the Ext-User user type.Enter the password of this user account. It can consist of 4 - 30 alphanumeric characters.
RetypeThis field is not available if you select the Ext-User user type. Enter the password again.
DescriptionEnter the description of each user, if any. You can use up to 60 printable ASCII characters. Default descriptions are provided.
Authentication Timeout SettingsIf you want to set authentication timeout to a value other than the default settings, select Use Manual Settings then fill your preferred values in the fields that follow.
Lease TimeEnter the number of minutes this user has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the web configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically (see Section 36.4 on page 620), the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication TimeType the number of minutes this user can be logged into the ZyWALL in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

36.3 User Group Summary Screen

User groups consist of access users and other user groups. You cannot put admin users in user groups. The Group screen provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups. To access this screen, login to the web configurator, and click Object > User/Group > Group.

Figure 407 Object > User/Group > Group
ZYXEL ZYWALL USG 2000 - User Group Summary Screen - 1

text_image User Group Setting Configuration

Group Name Description Member

1 example Cindy,s

The following table describes the labels in this screen. See Section 36.3.1 on page 620 for more information as well.

Table 185 Object > User/Group > Group

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific user group.
Group NameThis field displays the name of each user group.
DescriptionThis field displays the description for each user group.
MemberThis field lists the members in the user group. Each member is separated by a comma.
Add iconThis column provides icons to add, edit, and remove user groups.To add a user group, click the Add icon at the top of the column. The Group Add/Edit screen appears.To edit a user group, click the Edit icon next to the user group. The Group Add/Edit screen appears.To delete a user group, click the Remove icon next to the user group. The web configurator confirms that you want to delete the user group before doing so. If you delete the group, you do not delete the users in the group.

36.3.1 Group Add/Edit Screen

The Group Add/Edit screen allows you to create a new user group or edit an existing one. To access this screen, go to the Group screen (see Section 36.3 on page 619), and click either the Add icon or an Edit icon.

Figure 408 User/Group > Group > Add
ZYXEL ZYWALL USG 2000 - Group Add/Edit Screen - 1

text_image Configuration Name Description (Optional) Member List Available === User === Cindy L2TP-test ad-users Idap-users >>> << Member === User === === Group === OK Cancel

The following table describes the labels in this screen.

Table 186 User/Group > Group > Add

LABELDESCRIPTION
Configuration
NameType the name for this user group. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User group names have to be different than user names.
DescriptionEnter the description of the user group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Member List
AvailableThis field displays the names of the users and user groups that can be added to the user group.Select users and groups that you want to be members of this group and click the right arrow to add them to the member list.
MemberThis field displays the names of the users and user groups that have been added to the user group. The order of members is not important. To remove members, select them and click the left arrow.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

36.4 Setting Screen

The Setting screen controls default settings, login settings, lockout settings, and other user settings for the ZyWALL. You can also use this screen to specify when users must log in to the ZyWALL before it routes traffic for them.

To access this screen, login to the web configurator, and click Object > User/Group > Setting.

Figure 409 Object > User/Group > Setting
ZYXEL ZYWALL USG 2000 - Setting Screen - 1

text_image User Authentication Timeout Settings Default Authentication Timeout Settings User Type Lease Time (minutes) Reauthentication Time (minutes) Edit admin 1440 1440 # limited-admin 1440 1440 # user 1440 1440 # guest 1440 1440 # ext-user 1440 1440 # Miscellaneous Settings : ✓ Allow renewing lease time automatically □ Enable user idle detection User idle timeout 3 (1-60 minutes) User Logon Settings □ Limit the number of simultaneous logons for administration account Maximum number per administration account 1 (1-4096) □ Limit the number of simultaneous logons for access account Maximum number per access account 1 (1-4096) User Lockout Settings ✓ Enable logon retry limit Maximum retry count 5 (1-99) Lockout period 30 (1-65535 minutes) Force User Authentication Policy Total Policy: 0 30 Policy per page Page: 1 of 1

Schedule Source Destination Authenticate

Apply Reset

The following table describes the labels in this screen.

Table 187 Object > User/Group > Setting

LABELDESCRIPTION
User Authentication Timeout Settings
User TypeSelect the default user type when you create a new user account. You can still change the user type for each user account.
Lease TimeSelect the default lease time when you create a new user account. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. You can still change the lease time for each user account.
Reauthentication TimeSelect the default reauthentication time when you create a new user account. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. You can still change the reauthentication time for each user account.
EditTo edit a user group, click the Edit icon next to the user group. The Group Edit screen appears.
Miscellaneous Setting
Allow renewing lease time automaticallySelect this check box if access users can renew lease time automatically, as well as manually, simply by checking the Updating lease time automatically check box on their screen.
Enable user idle detectionThis is applicable for access users.Select this check box if you want the ZyWALL to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The ZyWALL automatically logs out the access user once the User idle timeout has been reached.
User idle timeoutThis is applicable for access users.This field is effective when Enable user idle detection is checked. Type the number of minutes each access user can be logged in and idle before the ZyWALL automatically logs out the access user.
User Logon Settings
Limit ... for administration accountSelect this check box if you want to set a limit on the number of simultaneous logins by admin users. If you do not select this, admin users can login as many times as they want at the same time using the same or different IP addresses.
Maximum number per administration accountThis field is effective when Limit ... for administration account is checked. Type the maximum number of simultaneous logins by each admin user.
Limit ... for access accountSelect this check box if you want to set a limit on the number of simultaneous logins by non-admin users. If you do not select this, access users can login as many times as they want as long as they use different IP addresses.
Maximum number per access accountThis field is effective when Limit ... for access account is checked. Type the maximum number of simultaneous logins by each access user.
User Lockout Settings
Enable logon retry limitSelect this check box to set a limit on the number of times each user can login unsuccessfully (for example, wrong password) before the IP address is locked out for a specified amount of time.
Maximum retry countThis field is effective when Enable logon retry limit is checked. Type the maximum number of times each user can login unsuccessfully before the IP address is locked out for the specified lockout period. The number must be between 1 and 99.
Lockout periodThis field is effective when Enable logon retry limit is checked. Type the number of minutes the user must wait to try to login again, if logon retry limit is enabled and the maximum retry count is reached. This number must be between 1 and 65,535 (about 45.5 days).
Force User Authentication PolicyUse this section to specify when users must log in to the ZyWALL before the ZyWALL routes HTTP traffic for them. Once users have logged in, the ZyWALL can enforce user-aware policies.This section displays the conditions that are applied, in sequence, to decide what the appropriate action is.By default, LAN users do not have to log into the ZyWALL.Click a column's heading cell to sort the table entries by that column's criteria. Click the heading cell again to reverse the sort order.
Total PolicyThis is the number of entries configured.
Policy per pageSelect how many entries to display per page in the screen.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific condition.
ScheduleThis field displays the schedule object that specifies when this condition applies. It displays none if this condition always applies.
SourceThis field displays the source address object of traffic to which this condition applies. It displays any if this condition applies to traffic from all source addresses.
DestinationThis field displays the destination address object of traffic to which this condition applies. It displays any if this condition applies to traffic from all destination addresses.
AuthenticateThis field displays whether users must log in (force) or whether users do not have to log in (skip) when this condition is checked and satisfied.
Add iconThis column provides icons to add, edit, move, and remove conditions. It also provides icons to activate and deactivate conditions.To add a condition, click the Add icon at the top of the column or next to each condition. If you click the one at the top of the column, the new condition is first in the list. If you click the one next to a condition, the new condition appears right below this condition.To edit a condition, click the Edit icon at the top of the column or next to each condition. The Force User Authentication Policy Add/Edit screen appears.To remove a condition, click on the Remove icon next to the condition. The Web Configurator confirms that you want to delete the condition before doing so.To move a condition up or down in the list, click on the Move to N icon next to the condition, and type the line number (# field) where you want to move this condition. The # field is updated accordingly.To activate or deactivate a condition, click the Active icon next to the condition. Make sure you click Apply to save and apply the change.
ApplyClick Apply to save the changes.
ResetClick Reset to start configuring this screen again.

36.4.1 Force User Authentication Policy Add/Edit Screen

Use this screen to specify a condition when users must log in or do not have to log in to the ZyWALL before their HTTP traffic can pass through the ZyWALL.

Figure 410 Object > User/Group > Setting > Add/Edit
ZYXEL ZYWALL USG 2000 - Force User Authentication Policy Add/Edit Screen - 1

text_image Configuration Enable Description (Optional) Authentication skip Criteria Source Address any Destination Address any Schedule none OK Cancel

The following table describes the labels in this screen.

Table 188 Object > User/Group > Setting > Add/Edit

LABELDESCRIPTION
Configuration
EnableSelect this if you want this condition to be active.
DescriptionEnter a description for this condition. It can be up to 60 printable ASCII characters long.
AuthenticationSelect whether users must log in (force) or whether users do not have to log in (skip) when this condition is checked and satisfied.
Criteria
Source AddressSelect a source IP address object or select Create Object to configure a new one.Select any if this condition applies to traffic from all source addresses.
Destination AddressSelect the destination address of traffic to which this condition applies or select Create Object to configure a new one. Select any if this condition applies to traffic from all destination addresses.
ScheduleSelect the schedule object that specifies when this condition applies or select Create Object to configure a new one (see Chapter 39 on page 641 for details). Select none if this condition always applies.
OKSelect this to save your changes and return to the previous screen.
CancelSelect this to return to the previous screen without saving any changes.

36.4.2 User Aware Login Example

Access users cannot use the Web configurator to browse the configuration of the ZyWALL. Instead, when access users log in to the ZyWALL (forced in the screen as shown in Figure 409 on page 621 or otherwise), the following screen appears.

Figure 411 Web Configurator for Non-Admin Users
ZYXEL ZYWALL USG 2000 - User Aware Login Example - 1

text_image ZyXEL WebUser, You now have logged in. Click the logout button to terminate the access session. You could renew your lease time by clicking the renew button. For security reason you must login in again after 24 hours 00 minutes. User-defined lease time (max 1440 minutes): 1440 Renew Updating lease time automatically Remaining time before lease timeout (hh:mm:ss): 23:59:58 Remaining time before auth. timeout (hh:mm): 23:59 Logout

The following table describes the labels in this screen.

Table 189 Web Configurator for Non-Admin Users

LABELDESCRIPTION
User-defined lease time (max ... minutes)Access users can specify a lease time shorter than or equal to the one that you specified. The default value is the lease time that you specified.
RenewAccess users can click this button to reset the lease time, the amount of time remaining before the ZyWALL automatically logs them out. The ZyWALL sets this amount of time according to theUser-defined lease time field in this screenLease time field in the User Add/Edit screen (see Section 36.2.1 on page 616)Lease time field in the Setting screen (see Section 36.4 on page 620)
Updating lease time automaticallyThis box appears if you checked the Allow renewing lease time automatically box in the Setting screen. (See Section 36.4 on page 620.) Access users can select this check box to reset the lease time automatically 30 seconds before it expires. Otherwise, access users have to click the Renew button to reset the lease time.
Remaining time before lease timeoutThis field displays the amount of lease time that remains, though the user might be able to reset it.
Remaining time before auth. timeoutThis field displays the amount of time that remains before the ZyWALL automatically logs the access user out, regardless of the lease time.

36.5 User /Group Technical Reference

This section provides some information on users who use an external authentication server in order to log in.

Setting up User Attributes in an External Server

To set up user attributes, such as reauthentication time, in LDAP or RADIUS servers, use the following keywords in the user configuration file.

Table 190 LDAP/RADIUS: Keywords for User Attributes

KEYWORDCORRESPONDING ATTRIBUTE IN WEB CONFIGURATOR
typeUser Type. Possible Values: admin, limited-admin, user, guest.
leaseTimeLease Time. Possible Values: 1-1440 (minutes).
reauthTimeReauthentication Time. Possible Values: 1-1440 (minutes).

The following examples show you how you might set up user attributes in LDAP and RADIUS servers.

Figure 412 LDAP Example: Keywords for User Attributes

type: admin leaseTime: 99 reauthTime: 199 

Figure 413 RADIUS Example: Keywords for User Attributes

type=user;leaseTime=222;reauthTime=222 

Creating a Large Number of Ext-User Accounts

If you plan to create a large number of Ext-User accounts, you might use CLI commands, instead of the web configurator, to create the accounts. Extract the user names from the LDAP or RADIUS server, and create a shell script that creates the user accounts. See Chapter 46 on page 749 for more information about shell scripts.

Addresses

37.1 Overview

Address objects can represent a single IP address or a range of IP addresses. Address groups are composed of address objects and other address groups.

37.1.1 What You Can Do Using The Addresses Screens

  • The Address screen (Section 37.2 on page 629) provides a summary of all addresses in the ZyWALL. Use the Address Add/Edit screen to create a new address or edit an existing one.
  • Use the Address Group summary screen (Section 37.3 on page 632) and the Address Group Add/Edit screen, to maintain address groups in the ZyWALL.

37.1.2 What You Need To Know About Addresses /Groups

Address objects and address groups are used in dynamic routes, firewall rules, application patrol, content filtering, and VPN connection policies. For example, addresses are used to specify where content restrictions apply in content filtering. Please see the respective sections for more information about how address objects and address groups are used in each one.

Address groups are composed of address objects and address groups. The sequence of members in the address group is not important.

See Section 5.5 on page 115 for related information on these screens.

37.2 Address Summary Screen

The address screens are used to create, maintain, and remove addresses. There are the types of address objects.

  • HOST - a host address is defined by an IP Address.
  • RANGE - a range address is defined by a Starting IP Address and an Ending IP Address.

- SUBNET - a network address is defined by a Network IP address and Netmask subnet mask.

The Address screen provides a summary of all addresses in the ZyWALL. To access this screen, click Object > Address > Address.

Figure 414 Object > Address > Address
ZYXEL ZYWALL USG 2000 - Address Summary Screen - 1

text_image Address Address Group Configuration

Name Type Address

1 LAN_SUBNET INTERFACE SUBNET ge1-192.168.1.0/24 2 DMZ1_SUBNET INTERFACE SUBNET ge4-192.168.2.0/24 3 DMZ2_SUBNET INTERFACE SUBNET ge5-192.168.3.0/24 4 LAN-server HOST 192.168.1.23 5 Dest_1 RANGE 192.168.1.10-192.168.1.15

The following table describes the labels in this screen. See Section 37.2.1 on page 631 for more information as well.

Table 191 Object > Address > Address

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific address.
NameThis field displays the configured name of each address object.
TypeThis field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the ZyWALL’s interfaces.
AddressThis field displays the IP addresses represented by each address object. If the object’s settings are based on one of the ZyWALL’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Add iconThis column provides icons to add, edit, and remove addresses.To add an address, click the Add icon at the top of the column. The Address Add/Edit screen appears.To edit an address, click the Edit icon next to the address. The Address Add/Edit screen appears.To delete an address, click on the Remove icon next to the address. The web configurator confirms that you want to delete the address before doing so.

37.2.1 Address Add/Edit Screen

The Address Add/Edit screen allows you to create a new address or edit an existing one. To access this screen, go to the Address screen (see Section 37.2 on page 629), and click either the Add icon or an Edit icon.

Figure 415 Object > Address > Address > Edit
ZYXEL ZYWALL USG 2000 - Address Add/Edit Screen - 1

text_image Configuration Name Address Type HOST IP Address 0.0.0.0 OK Cancel

The following table describes the labels in this screen.

Table 192 Object > Address > Address > Edit

LABELDESCRIPTION
NameType the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Address TypeSelect the type of address you want to create. Choices are:HOST,RANGE, SUBNET, INTERFACE IP, INTERFACE SUBNET, andINTERFACE GATEWAY.Note:The ZyWALL automatically updates address objects that are based on an interface's IP address, subnet, or gateway if the interface's IP address settings change. For example, if you change ge1's IP address, the ZyWALL automatically updates the corresponding interface-based, LAN subnet address object.
IP AddressThis field is only available if theAddress Typeis HOST. This field cannot be blank. Enter the IP address that this address object represents.
Starting IP AddressThis field is only available if theAddress Typeis RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
Ending IP AddressThis field is only available if theAddress Typeis RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
NetworkThis field is only available if theAddress Typeis SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents.
NetmaskThis field is only available if theAddress Typeis SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format.
InterfaceIf you selectedINTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAYas theAddress Type, use this field to select the interface of the network that this address object represents.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

37.3 Address Group Summary Screen

The Address Group screen provides a summary of all address groups. To access this screen, click Object > Address > Address Group.

Figure 416 Object > Address > Address Group
ZYXEL ZYWALL USG 2000 - Address Group Summary Screen - 1

text_image Address Address Group Configuration

Name Description

1 example-address-group

The following table describes the labels in this screen. See Section 37.3.1 on page 633 for more information as well.

Table 193 Object > Address > Address Group

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific address group.
NameThis field displays the name of each address group.
DescriptionThis field displays the description of each address group, if any.
Add iconThis column provides icons to add, edit, and remove address groups.To add an address group, click the Add icon at the top of the column.The Address Group Add/Edit screen appears.To edit an address group, click the Edit icon next to the address group.The Address Group Add/Edit screen appears.To delete an address group, click on the Remove icon next to the address group. The web configurator confirms that you want to delete the address group.

37.3.1 Address Group Add/Edit Screen

The Address Group Add/Edit screen allows you to create a new address group or edit an existing one. To access this screen, go to the Address Group screen (see Section 37.3 on page 632), and click either the Add icon or an Edit icon.

Figure 417 Object > Address > Address Group > Add
ZYXEL ZYWALL USG 2000 - Address Group Add/Edit Screen - 1

text_image Group Members Name Description Member List Available === Object === DMZ1_SUBNET DMZ2_SUBNET Dest_1 LAN-server LAN_SUBNET === Group === >> << Member === Object === === Group === OK Cancel

The following table describes the labels in this screen.

Table 194 Object > Address > Address Group > Add

LABELDESCRIPTION
Group Members
NameEnter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_, or dashes (-), but the first character cannot be a number. This value is case-sensitive.
DescriptionThis field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Member List
AvailableThis field displays the names of the address and address group objects that can be added to the address group.Select address and address group objects that you want to be members of this group and click the right arrow to add them to the member list.
MemberThis field displays the names of the address and address group objects that have been added to the address group. The order of members is not important. To remove members, select them and click the left arrow.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

Services

38.1 Overview

Use service objects to define TCP applications, UDP applications, and ICMP messages. You can also create service groups to refer to multiple service objects in other features.

38.1.1 What You Can Do in the Services Screens

  • Use the Service screens (Section 38.2 on page 636) to view and configure the ZyWALL's list of services and their definitions.
  • Use the Service Group screens (Section 38.2 on page 636) to view and configure the ZyWALL's list of service groups.

38.1.2 What You Need to Know About Protocols

IP Protocols

IP protocols are based on the eight-bit protocol field in the IP header. This field represents the next-level protocol that is sent in this packet. This section discusses three of the most common IP protocols.

Computers use Transmission Control Protocol (TCP, IP protocol 6) and User Datagram Protocol (UDP, IP protocol 17) to exchange data with each other. TCP guarantees reliable delivery but is slower and more complex. Some uses are FTP, HTTP, SMTP, and TELNET. UDP is simpler and faster but is less reliable. Some uses are DHCP, DNS, RIP, and SNMP.

TCP creates connections between computers to exchange data. Once the connection is established, the computers exchange data. If data arrives out of sequence or is missing, TCP puts it in sequence or waits for the data to be re-transmitted. Then, the connection is terminated.

In contrast, computers use UDP to send short messages to each other. There is no guarantee that the messages arrive in sequence or that the messages arrive at all.

Both TCP and UDP use ports to identify the source and destination. Each port is a 16-bit number. Some port numbers have been standardized and are used by low-level system processes; many others have no particular meaning.

Unlike TCP and UDP, Internet Control Message Protocol (ICMP, IP protocol 1) is mainly used to send error messages or to investigate problems. For example, ICMP is used to send the response if a computer cannot be reached. Another use is ping. ICMP does not guarantee delivery, but networks often treat ICMP messages differently, sometimes looking at the message itself to decide where to send it.

Service Objects and Service Groups

Use service objects to define IP protocols.

  • TCP applications
  • UDP applications
  • ICMP messages
  • user-defined services (for other types of IP protocols)

These objects are used in policy routes, firewall rules, and IDP profiles.

Use service groups when you want to create the same rule for several services, instead of creating separate rules for each service. Service groups may consist of services and other service groups. The sequence of members in the service group is not important.

Finding Out More

• See Section 5.5 on page 115 for related information on these screens.
• See Appendix B on page 871 for a list of commonly-used services.

38.2 The Service Summary Screen

The Service summary screen provides a summary of all services and their definitions. In addition, this screen allows you to add, edit, and remove services.

To access this screen, log in to the web configurator, and click Object > Service > Service.

Figure 418 Object > Service > Service
ZYXEL ZYWALL USG 2000 - The Service Summary Screen - 1

text_image Service Service Group Configuration Total Services: 72 30 services per Page: 1 of 3

Name Content +

1 Any_UDP UDP/1-65535 2 Any_TCP TCP/1-65535 3 AH Protocol=51 4 AIM TCP=5190 5 NEW_ICQ TCP=5190 6 AUTH TCP=113 7 BGP TCP=179 8 BOOTP_CLIENT UDP=68 9 BOOTP_SERVER UDP=67 10 CU_SEEME_TCP1 TCP=7648 11 CU_SEEME_TCP2 TCP=24032 12 CU_SEEME_UDP1 UDP=7648 Total Services: 72

The following table describes the labels in this screen.

Table 195 Object > Service > Service

LABELDESCRIPTION
Total ServicesThis displays the total number of services configured on the ZyWALL.
services per pageSelect the number of services you want to appear per page here.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific service.
NameThis field displays the name of each service.
ContentThis field displays a description of each service.
Add iconThis column provides icons to add, edit, and remove services.To add a service, click the Add icon at the top of the column. The Service Add/Edit screen appears.To edit a service, click the Edit icon next to the service. The Service Add/Edit screen appears.To delete a service, click the Remove icon next to the service. The web configurator confirms that you want to delete the service before doing so.

38.2.1 The Service Add/Edit Screen

The Service Add/Edit screen allows you to create a new service or edit an existing one. To access this screen, go to the Service screen (see Section 38.2 on page 636), and click either the Add icon or an Edit icon.

Figure 419 Object > Service > Service > Edit
ZYXEL ZYWALL USG 2000 - The Service Add/Edit Screen - 1

text_image Configuration Name IP Protocol Starting Port Ending Port TCP (1..65535) (1..65535) OK Cancel

The following table describes the labels in this screen.

Table 196 Object > Service > Service > Edit

LABELDESCRIPTION
NameType the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
IP ProtocolSelect the protocol the service uses. Choices are: TCP, UDP, ICMP, and User Defined.
Starting Port Ending PortThis field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports.
ICMP TypeThis field appears if the IP Protocol is ICMP Type.Select the ICMP message used by this service. This field displays the message text, not the message number.
IP Protocol NumberThis field appears if the IP Protocol is User Defined.Enter the number of the next-level protocol (IP protocol). Allowed values are 0 - 255.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

38.3 The Service Group Summary Screen

The Service Group summary screen provides a summary of all service groups. In addition, this screen allows you to add, edit, and remove service groups.

To access this screen, log in to the web configurator, and click Object > Service > Service Group.

Figure 420 Object > Service > Service Group
ZYXEL ZYWALL USG 2000 - The Service Group Summary Screen - 1

text_image Service Service Group Configuration

Name Description

1 CU-SEEME 2 DNS 3 IRC 4 NetBIOS 5 ROADRUNNER 6 RTSP 7 SNMP 8 SNMP-TRAPS 9 SSH

The following table describes the labels in this screen. See Section 38.3.1 on page 640 for more information as well.

Table 197 Object > Service > Service Group

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific service group.
NameThis field displays the name of each service group.
DescriptionThis field displays the description of each service group, if any.
Add iconThis column provides icons to add, edit, and remove service groups.To add a service group, click the Add icon at the top of the column. The Service Group Add/Edit screen appears.To edit a service group, click the Edit icon next to the service group. The Service Group Add/Edit screen appears.To delete a service group, click on the Remove icon next to the service group. The web configurator confirms that you want to delete the service group.

38.3.1 The Service Group Add/Edit Screen

The Service Group Add/Edit screen allows you to create a new service group or edit an existing one. To access this screen, go to the Service Group screen (see Section 38.3 on page 638), and click either the Add icon or an Edit icon.

Figure 421 Object > Service > Service Group > Edit
ZYXEL ZYWALL USG 2000 - The Service Group Add/Edit Screen - 1

text_image Configuration Name Description Member List Available === Object === AH AIM AUTH Any_TCP Any_UDP BGP BOOTP_CLIENT BOOTP_SERVER CU_SEEME_TCP1 Member === Object === === Group === << OK Cancel

The following table describes the labels in this screen.

Table 198 Object > Service > Service Group > Edit

LABELDESCRIPTION
Configuration
NameEnter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_, or dashes (-), but the first character cannot be a number. This value is case-sensitive.
DescriptionEnter a description of the service group, if any. You can use up to 60 printable ASCII characters.
Member List
AvailableThis field displays the names of the service and service group objects that can be added to the service group.Select service and service group objects that you want to be members of this group and click the right arrow to add them to the member list.
MemberThis field displays the names of the service and service group objects that have been added to the service group. The order of members is not important. To remove members, select them and click the left arrow.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

Schedules

39.1 Overview

Use schedules to set up one-time and recurring schedules for policy routes, firewall rules, application patrol, and content filtering. The ZyWALL supports one-time and recurring schedules. One-time schedules are effective only once, while recurring schedules usually repeat. Both types of schedules are based on the current date and time in the ZyWALL.

Note: Schedules are based on the ZyWALL's current date and time.

39.1.1 What You Can Do in the Schedule Screens

  • Use the Schedule summary screen (Section 39.2 on page 642) to see a list of all schedules in the ZyWALL.
  • Use the One-Time Schedule Add/Edit screen (Section 39.2.1 on page 643) to create or edit a one-time schedule.
  • Use the Recurring Schedule Add/Edit screen (Section 39.2.2 on page 644) to create or edit a recurring schedule.

39.1.2 What You Need to Know About Schedules

One-time Schedules

One-time schedules begin on a specific start date and time and end on a specific stop date and time. One-time schedules are useful for long holidays and vacation periods.

Recurring Schedules

Recurring schedules begin at a specific start time and end at a specific stop time on selected days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday). Recurring schedules always begin and end in the same day. Recurring schedules are useful for defining the workday and off-work hours.

Finding Out More

• See Section 5.5 on page 115 for related information on these screens.
- See Section 45.3 on page 698 for information about the ZyWALL's current date and time.

39.2 The Schedule Summary Screen

The Schedule summary screen provides a summary of all schedules in the ZyWALL. To access this screen, click Object > Schedule.

Figure 422 Object > Schedule
ZYXEL ZYWALL USG 2000 - The Schedule Summary Screen - 1

text_image One Time # Name Start Day/Time Stop Day/Time Recurring # Name Start Time Stop Time 1 Workday 09:00 17:00

The following table describes the labels in this screen. See Section 39.2.1 on page 643 and Section 39.2.2 on page 644 for more information as well.

Table 199 Object > Schedule

LABELDESCRIPTION
One Time
#This field is a sequential value, and it is not associated with a specific schedule.
NameThis field displays the name of the schedule, which is used to refer to the schedule.
Start Day / TimeThis field displays the date and time at which the schedule begins.
Stop Day / TimeThis field displays the date and time at which the schedule ends.
Add iconThis column provides icons to add, edit, and remove schedules.To add a schedule, click the Add icon at the top of the column. The Schedule Add/Edit screen appears.To edit a schedule, click the Edit icon next to the schedule. The Schedule Add/Edit screen appears.To delete a schedule, click the Remove icon next to the schedule. The web configurator confirms that you want to delete the schedule before doing so.
Recurring
#This field is a sequential value, and it is not associated with a specific schedule.
NameThis field displays the name of the schedule, which is used to refer to the schedule.
Start TimeThis field displays the time at which the schedule begins.
Stop TimeThis field displays the time at which the schedule ends.
Add iconThis column provides icons to add, edit, and remove schedules.To add a schedule, click the Add icon at the top of the column. The Schedule Add/Edit screen appears.To edit a schedule, click the Edit icon next to the schedule. The Schedule Add/Edit screen appears.To delete a schedule, click the Remove icon next to the schedule. The web configurator confirms that you want to delete the schedule before doing so.

39.2.1 The One-Time Schedule Add/Edit Screen

The One-Time Schedule Add/Edit screen allows you to define a one-time schedule or edit an existing one. To access this screen, go to the Schedule screen (see Section 39.2 on page 642), and click either the Add icon or an Edit icon in the One Time section.

Figure 423 Object > Schedule > Edit (One Time)
ZYXEL ZYWALL USG 2000 - The One-Time Schedule Add/Edit Screen - 1

text_image Configuration Name Day Time Item # Day Time Year Month Day Hour minute Start Stop OK Cancel

The following table describes the labels in this screen.

Table 200 Object > Schedule > Edit (One Time)

LABELDESCRIPTION
Configuration
NameType the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Date Time
StartType the year, month, day, hour, and minute when the schedule begins.Year - 1900 - 2999Month - 1 - 12Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)Hour - 0 - 23Minute - 0 - 59All of these fields are required.
StopType the year, month, day, hour, and minute when the schedule ends.Year - 1900 - 2999Month - 1 - 12Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)Hour - 0 - 23Minute - 0 - 59All of these fields are required.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

39.2.2 The Recurring Schedule Add/Edit Screen

The Recurring Schedule Add/Edit screen allows you to define a recurring schedule or edit an existing one. To access this screen, go to the Schedule screen

(see Section 39.2 on page 642), and click either the Add icon or an Edit icon in the Recurring section.

Figure 424 Object > Schedule > Edit (Recurring)
ZYXEL ZYWALL USG 2000 - The Recurring Schedule Add/Edit Screen - 1

text_image Configuration Name Day Time Item # Date Time Year Month Day Hour Minute Start Stop Weekly Week Days Monday Tuesday Wednesday Thursday Friday Saturday Sunday OK Cancel

The Year, Month, and Day columns are not used in recurring schedules and are disabled in this screen. The following table describes the remaining labels in this screen.

Table 201 Object > Schedule > Edit (Recurring)

LABELDESCRIPTION
Configuration
NameType the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Date Time
StartType the hour and minute when the schedule begins each day.Year - disabledMonth - disabledDay - disabledHour - 0 - 23Minute - 0 - 59The Hour and Minute fields are both required.To set all day (24 hours), configure the start hour and minute both to 0.
StopType the hour and minute when the schedule ends each day.Year - disabledMonth - disabledDay - disabledHour - 0 - 23Minute - 0 - 59The Hour and Minute fields are both required.To set all day (24 hours), configure the stop hour to 23 and minute to 59.
Weekly
Week DaysSelect each day of the week the recurring schedule is effective.
OKClick OK to save your changes back to the ZyWALL.
CancelClick Cancel to exit this screen without saving your changes.

AAA Server

40.1 Overview

You can use a AAA (Authentication, Authorization, Accounting) server to provide access control to your network. The AAA server can be a Active Directory, LDAP, or RADIUS server. Use the AAA Server screens to create and manage objects that contain settings for using individual AAA servers or groups of AAA servers. You use AAA server objects in configuring authentication method objects (see Chapter 41 on page 659).

40.1.1 Directory Service (AD/LDAP) Overview

LDAP/AD allows a client (the ZyWALL) to connect to a server to retrieve information from a directory. A network example is shown next.

Figure 425 Example: Directory Service Client and Server
ZYXEL ZYWALL USG 2000 - Directory Service (AD/LDAP) Overview - 1

flowchart
graph LR
    A["Database"] --> B["Server"]
    B --> C["Client 1"]
    B --> D["Client 2"]

The following describes the user authentication procedure via an LDAP/AD server.

1 A user logs in with a user name and password pair.
2 The ZyWALL tries to bind (or log in) to the LDAP/AD server.
3 When the binding process is successful, the ZyWALL checks the user information in the directory against the user name and password pair.
4 If it matches, the user is allowed access. Otherwise, access is blocked.

40.1.2 RADIUS Server Overview

RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external server instead of (or in addition to) an internal device user database that is limited to the memory capacity of the device. In essence, RADIUS authentication allows you to validate a large number of users from a central location.

Figure 426 RADIUS Server Network Example
ZYXEL ZYWALL USG 2000 - RADIUS Server Overview - 1

flowchart
graph LR
    A["Server"] --> B["Switch"]
    B --> C["Client Interface"]
    B --> D["Computer 1"]
    B --> E["Computer 2"]

40.1.3 ASAS

ASAS (Authenex Strong Authentication System) is a RADIUS server that works with the One-Time Password (OTP) feature. Purchase a ZyWALL OTP package in order to use this feature. The package contains server software and physical OTP tokens (PIN generators). Do the following to use OTP. See the documentation included on the ASAS' CD for details.

1 Install the ASAS server software on a computer.
2 Create user accounts on the ZyWALL and in the ASAS server.
3 Import each token's database file (located on the included CD) into the server.
4 Assign users to OTP tokens (on the ASAS server).
5 Configure the ASAS as a RADIUS server in the ZyWALL's Object > AAA Server screens.
6 Give the OTP tokens to (local or remote) users.

40.1.4 What You Can Do Using The AAA Screens

  • Use the Object > AAA Server > Active Directory (or LDAP) screens (Section 40.2.1 on page 651) to configure the Active Directory or LDAP default server settings.
  • Use the Object > AAA Server > RADIUS screen (Section 40.4 on page 654) to configure the default external RADIUS server to use for user authentication.

40.1.5 What You Need To Know About AAA Servers

AAA Servers Supported by the ZyWALL

The following lists the types of authentication server the ZyWALL supports.

- Local user database

The ZyWALL uses the built-in local user database to authenticate administrative users logging into the ZyWALL's web configurator or network access users logging into the network through the ZyWALL. You can also use the local user database to authenticate VPN users.

- Directory Service (LDAP/AD)

LDAP (Lightweight Directory Access Protocol)/AD (Active Directory) is a directory service that is both a directory and a protocol for controlling access to a network. The directory consists of a database specialized for fast information retrieval and filtering activities. You create and store user profile and login information on the external server.

- RADIUS

RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external or built-in RADIUS server. RADIUS authentication allows you to validate a large number of users from a central location.

Finding Out More

See Section 6.4.3 on page 129 for an example of how to set up user authentication using a radius server.

40.2 Active Directory or LDAP Default Server Screen

Directory Structure

The directory entries are arranged in a hierarchical order much like a tree structure. Normally, the directory structure reflects the geographical or

organizational boundaries. The following figure shows a basic directory structure branching from countries to organizations to organizational units to individuals.

Figure 427 Basic Directory Structure
ZYXEL ZYWALL USG 2000 - Directory Structure - 1

flowchart
graph TD
    A["Root"] --> B["US"]
    A --> C["Japan"]
    B --> D["Sprint"]
    B --> E["UPS"]
    B --> F["NEC"]
    D --> G["Sales"]
    D --> H["RD3"]
    E --> I["QA"]
    E --> J["CSO"]
    F --> K["Sales"]
    F --> L["RD"]
    G --> M["Unique Common Name (cn)"]
    H --> M
    I --> M
    J --> M
    K --> M
    L --> M

Distinguished Name (DN)

A DN uniquely identifies an entry in a directory. A DN consists of attribute-value pairs separated by commas. The leftmost attribute is the Relative Distinguished Name (RDN). This provides a unique name for entries that have the same "parent DN" ("cn=domain1.com, ou=Sales, o=MyCompany" in the following examples).

cn=domain1.com, ou = Sales, o=MyCompany, c=US
cn=domain1.com, ou = Sales, o=MyCompany, c=JP 

Base DN

A base DN specifies a directory. A base DN usually contains information such as the name of an organization, a domain name and/or country. For example, o=MyCompany, c=UK where o means organization and c means country.

Bind DN

A bind DN is used to authenticate with an LDAP/AD server. For example a bind DN of cn=zywallAdmin allows the ZyWALL to log into the LDAP/AD server using the user name of zywallAdmin. The bind DN is used in conjunction with a bind password. When a bind DN is not specified, the ZyWALL will try to log in as an anonymous user. If the bind password is incorrect, the login will fail.

40.2.1 Configuring Active Directory or LDAP Default Server Settings

To configure the Active Directory or LDAP default server settings, click Object > AAA Server > Active Directory (or LDAP) to display the screen as shown.

Figure 428 Object > AAA Server > Active Directory (or LDAP) > Default
ZYXEL ZYWALL USG 2000 - Configuring Active Directory or LDAP Default Server Settings - 1

text_image Active Directory LDAP RADIUS Default Group General Setup Host (IP or FQDN) Port 389 (1-65535) Bind DN (Optional) Password (Optional) Base DN CN Identifier sAMAccountName Search time limit 5 (1-300) □ Use SSL Apply Reset

The following table describes the labels in this screen.

Table 202 Object > AAA Server > Active Directory (or LDAP) > Default

LABELDESCRIPTION
HostEnter the IP address (in dotted decimal notation) or the fully-qualified domain name (up to 63 alphanumerical characters) of an AD or LDAP server.
PortSpecify the port number on the AD or LDAP server to which the ZyWALL sends authentication requests. Enter a number between 1 and 65535. The default is 389.
Bind DNSpecify the bind DN for logging into the LDAP server. Enter up to 63 alphanumerical characters.For example, cn=zywallAdmin specifies zywallAdmin as the user name.
PasswordIf required, enter the password (up to 15 alphanumerical characters) for the ZyWALL to bind (or log in) to the AD or LDAP server.
Base DNSpecify the directory (up to 63 alphanumerical characters). For example, o=ZyXEL, c=US.
CN IdentifierSpecify the unique common name that uniquely identifies a record in the AD or LDAP directory. Enter up to 63 alphanumerical characters.
Search time limitSpecify the timeout period (between 1 and 300 seconds) before the ZyWALL disconnects from the AD or LDAP server. In this case, user authentication fails.The search timeout occurs when either the user information is not in the LDAP server or the server is down.
Use SSLSelect Use SSL to establish a secure connection to the AD or LDAP server.
ApplyClick Apply to save the changes.
ResetClick Reset to start configuring this screen again.

40.3 Active Directory or LDAP Group Summary Screen

You can configure a group of AD or LDAP servers in the Active Directory (or LDAP) > Group screen. This is useful if you have more than one AD server or more than one LDAP server for user authentication in a network. You can create up to 16 AD server groups with up to four members in each group on the ZyWALL. You can also create up to 16 LDAP server groups with up to four members in each group on the ZyWALL.

Click Object > AAA Server > Active Directory (or LDAP) > Group to display the Active Directory (or LDAP) > Group screen.

Figure 429 Object > AAA Server > Active Directory (or LDAP) > Group
ZYXEL ZYWALL USG 2000 - Active Directory or LDAP Group Summary Screen - 1

text_image Active Directory LDAP RADIUS Default Group Configuration # Group Name

The following table describes the labels in this screen.

Table 203 Object > AAA Server > Active Directory (or LDAP) > Group

LABELDESCRIPTION
#This field displays the index number.
Group NameThis field displays the descriptive name for identification purposes.
Add iconClick Add to add a new entry.Click Edit to edit the settings of an entry.Click Delete to remove an entry.

40.3.1 Creating an Active Directory or LDAP Group

Click Object > AAA Server > Active Directory (or LDAP) > Group to display the Active Directory (or LDAP) > Group screen. Click the Add icon or an Edit icon to display the configuration fields.

Figure 430 Object > AAA Server > Active Directory (or LDAP) > Group > Add
ZYXEL ZYWALL USG 2000 - Creating an Active Directory or LDAP Group - 1

text_image Active Directory LDAP RADIUS Default Group General Settings Name Port 389 (1-65535) Bind DN (Optional) Password (Optional) Base DN CN Identifier uid Search time limit 60 (1-300) Use SSL Host Members

Members(IP or FQDN)

1 OK Cancel

The following table describes the labels in this screen.

Table 204 Object > AAA Server > Active Directory (or LDAP) > Group > Add

LABELDESCRIPTION
General SettingsAll AD or LDAP servers in a group share the same settings in the fields below.
NameEnter a descriptive name (up to 63 alphanumeric characters). for identification purposes.
PortSpecify the port number on the LDAP server(s) to which the ZyWALL sends authentication requests. Enter a number between 1 and 65535.This port number should be the same on all AD or LDAP server(s) in this group.
Bind DNIf required, enter the password (up to 15 alphanumeric characters) the ZyWALL uses to log into the AD or LDAP server(s).
PasswordSpecify the top level directory in the directory. For example, o=ZyXEL, c=US.
Base DNSpecify the bind DN for logging into the AD or LDAP server(s). For example, cn=zywallAdmin specifies zywallAdmin as the user name.
CN IdentifierSpecify the unique common name that uniquely identifies a record in the AD or LDAP directory. Enter up to 63 alphanumeric characters.

Table 204 Object > AAA Server > Active Directory (or LDAP) > Group > Add

LABELDESCRIPTION
Search time limitSpecify the timeout period (between 1 and 300 seconds) before the ZyWALL disconnects from the AD or LDAP server. In this case, user authentication fails.Search timeout occurs when either the user information is not in the AD or LDAP server(s) or the AD or LDAP server(s) is down.
Use SSLSelect Use SSL to establish a secure connection to the AD or LDAP server(s).
Host MembersThe ordering of the LDAP servers is important as the ZyWALL uses the AD or LDAP servers for user authentication in the order they appear in this table.
#This field displays the index number.
MembersSpecify the URI (Uniform Resource Identifier) of an AD or LDAP server. You can enter the IP address (in dotted decimal notation) or the fully qualified domain name (FQDN; up to 63 alphanumerical characters) of the AD or LDAP server.
Add iconClick Add to add a new AD or LDAP server. You can add up to four AD or LDAP member servers.Click Delete to remove an AD or LDAP server.
OKClick OK to save the changes.
CancelClick Cancel to discard the changes.

40.4 Configuring a Default RADIUS Server

To configure the default external RADIUS server to use for user authentication, click Object > AAA Server > RADIUS to display the screen as shown.

Figure 431 Object > AAA Server > RADIUS > Default
ZYXEL ZYWALL USG 2000 - Configuring a Default RADIUS Server - 1

text_image Active Directory LDAP RADIUS Default Group General Setup Host (IP or FQDN) Authentication Port Key Timeout 5 (1-300) Apply Reset

The following table describes the labels in this screen.

Table 205 Object > AAA Server > RADIUS > Default

LABELDESCRIPTION
HostEnter the IP address (in dotted decimal notation) or the domain name (up to 63 alphanumeric characters) of a RADIUS server.
Authentication PortThe default port of the RADIUS server for authentication is 1812.You need not change this value unless your network administrator instructs you to do so with additional information.
KeyEnter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the ZyWALL.The key is not sent over the network. This key must be the same on the external authentication server and the ZyWALL.
TimeoutSpecify the timeout period (between 1 and 300 seconds) before the ZyWALL disconnects from the RADIUS server. In this case, user authentication fails.Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down.
ApplyClick Apply to save the changes.
ResetClick Reset to start configuring this screen again.

40.5 Configuring a Group of RADIUS Servers

You can configure a group of RADIUS servers in the RADIUS > Group screen. This is useful if you have more than one authentication server for user authentication in a network.

Click Object > AAA Server > RADIUS > Group to display the RADIUS > Group screen.

Figure 432 Object > AAA Server > RADIUS > Group
ZYXEL ZYWALL USG 2000 - Configuring a Group of RADIUS Servers - 1

text_image Active Directory LDAP RADIUS Default Group Configuration # Group Name

The following table describes the labels in this screen.

Table 206 Object > AAA Server > RADIUS > Group

LABELDESCRIPTION
#This field displays the index number.
Group NameThis field displays the descriptive name for identification purposes.
Add iconClick Add to add a new entry.Click Edit to edit the settings of an entry.Click Delete to remove an entry.

40.5.1 Adding a RADIUS Server Member

Click Object > AAA Server > RADIUS > Group to display the RADIUS > Group screen. Click the Add icon or an Edit icon to display the configuration fields.

Figure 433 Object > AAA Server > RADIUS > Group > Add
ZYXEL ZYWALL USG 2000 - Adding a RADIUS Server Member - 1

text_image Active Directory LDAP RADIUS Default Group General Settings Name Key Timeout 60 (1~300) Host Members # Members Authentication Port 1 1812 OK Cancel

The following table describes the labels in this screen.

Table 207 Object > AAA Server > RADIUS > Group > Add

LABELDESCRIPTION
General SettingsAll RADIUS servers in a group share the same settings in the fields below.
NameEnter a descriptive name (up to 63 alphanumeric characters) for identification purposes.
KeyEnter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the ZyWALL.The key is not sent over the network. This key must be the same on the external authentication server and the ZyWALL.
TimeoutSpecify the timeout period (between 1 and 300 seconds) before the ZyWALL disconnects from the RADIUS server. In this case, user authentication fails.Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down.
Host MembersThe ordering of the RADIUS servers is important as the ZyWALL uses the RADIUS servers for user authentication in the order they appear in this table.
#This field displays the index number.
MembersEnter the IP address (in dotted decimal notation) or the domain name (up to 63 alphanumeric characters) of a RADIUS server.
Authentication PortThe default port of the RADIUS server for authentication is 1812.You need not change this value unless your network administrator instructs you to do so with additional information.
Add iconClick Add to add a new RADIUS server. You can add up to four RADIUS member servers.Click Delete to remove a RADIUS server.
OKClick OK to save the changes.
CancelClick Cancel to discard the changes.

Authentication Method

41.1 Overview

Authentication method objects set how the ZyWALL authenticates HTTP/HTTPS clients, peer IPSec routers (extended authentication), L2TP VPN, and wireless clients. Configure authentication method objects to have the ZyWALL use the local user database, and/or the authentication servers and authentication server groups specified by AAA server objects. By default, user accounts created and stored on the ZyWALL are authenticated locally.

41.1.1 What You Can Do Using The Auth. Method Screens

  • Use the Object > Auth. Method screen (Section 41.2 on page 660) to view authentication method objects.
  • Use the Object > Auth. Method > Add screen (Section 41.3 on page 661) to create a new authentication method object.

Finding Out More

See Section 6.4.3 on page 129 for an example of how to set up user authentication using a radius server.

41.1.2 Before You Begin

Configure AAA server objects (see Chapter 40 on page 647) before you configure authentication method objects.

41.1.3 Example: Selecting a VPN Authentication Method

After you set up an authentication method object in the Auth. Method screens, you can use it in the VPN Gateway screen to authenticate VPN users for establishing a VPN connection. Refer to the chapter on VPN for more information.

Follow the steps below to specify the authentication method for a VPN connection.

1 Access the VPN > IPSec VPN > VPN Gateway > Edit screen.

2 Select Enable Extended Authentication.
3 Select Server Mode and select an authentication method object from the dropdown list box.
4 Click OK to save the settings.

Figure 434 Example: Using Authentication Method in VPN
ZYXEL ZYWALL USG 2000 - Example: Selecting a VPN Authentication Method - 1

text_image VPN Gateway VPN Gateway Name IKE Phase 1 Negotiation Mode Proposal Main

Encryption Authentication

Extended Authentication Enable Extended Authentication Server Mode default Client Mode User Name Password OK Cancel

41.2 Viewing Authentication Method Objects

Click Object > Auth. Method to display the screen as shown.

Note: You can create up to 16 authentication method objects.

Figure 435 Object > Auth. Method
ZYXEL ZYWALL USG 2000 - Viewing Authentication Method Objects - 1

text_image Configuration

Method Name Method List

1 default local

The following table describes the labels in this screen.

Table 208 Object > Auth. Method

LABELDESCRIPTION
#This field displays the index number.
Method NameThis field displays a descriptive name for identification purposes.
Method ListThis field displays the authentication method(s) for this entry.
Add iconClick Add to add a new entry.Click Edit to edit the settings of an entry.Click Delete to remove an entry.

41.3 Creating an Authentication Method Object

Follow the steps below to create an authentication method object.

1 Click Object > Auth. Method.
2 Click Add.
3 Specify a descriptive name for identification purposes in the Name field. You may use 1-31 alphanumeric characters, underscores(_, or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, "My_Device".
4 Click Add to insert an authentication method in the table.
5 Select a server object from the Method List drop-down list box.
6 You can add up to four server objects to the table. The ordering of the Method List column is important. The ZyWALL authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.
If two accounts with the same username exist on two authentication servers you specify, the ZyWALL does not continue the search on the second authentication server when you enter the username and password that doesn't match the one on the first authentication server.

Note: You can NOT select two server objects of the same type.

7 Click OK to save the settings or click Cancel to discard all changes and return to the previous screen.

Figure 436 Object > Auth. Method > Add
ZYXEL ZYWALL USG 2000 - Creating an Authentication Method Object - 1

text_image General Settings Name

Method List

1 local OK Cancel

The following table describes the labels in this screen.

Table 209 Object > Auth. Method > Add

LABELDESCRIPTION
NameSpecify a descriptive name for identification purposes.You may use 1-31 alphanumeric characters, underscores(_) , or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, "My_Device".
Method ListSelect a server object from the drop-down list box. You can create a server object in the AAA Server screen (see Chapter 40 on page 647 for more information).The ZyWALL authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.If two accounts with the same username exist on two authentication servers you specify, the ZyWALL does not continue the search on the second authentication server when you enter the username and password that doesn't match the one on the first authentication server.
Add iconClick Add to add a new entry.Click Edit to edit the settings of an entry.Click Delete to delete an entry.
OKClick OK to save the changes.
CancelClick Cancel to discard the changes.

Certificates

42.1 Overview

The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner's identity and public key. Certificates provide a way to exchange public keys for use in authentication.

42.1.1 What You Can Do in the Certificate Screens

  • Use the My Certificate screens (see Section 42.2 on page 667 to Section 42.2.3 on page 676) to generate and export self-signed certificates or certification requests and import the ZyWALL's CA-signed certificates.
  • Use the Trusted Certificates screens (see Section 42.3 on page 677 to Section 42.3.2 on page 682) to save CA certificates and trusted remote host certificates to the ZyWALL. The ZyWALL will trust any valid certificate that you have imported as a trusted certificate. It will also trust any valid certificate signed by any of the certificates that you have imported as a trusted certificate.

42.1.2 What You Need to Know About Certificates

When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure.

These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key “writes” your digital signature and your public key allows people to verify whether data was signed by you, or by someone else. This process works as follows.

1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way. Tim generates a public key pair (one public key and one private key).

2 Tim keeps the private key and makes the public key openly available. This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not.
3 Tim uses his private key to sign the message and sends it to Jenny.
4 Jenny receives the message and uses Tim's public key to verify it. Jenny knows that the message is from Tim, and that although other people may have been able to read the message, no-one can have altered it (because they cannot re-sign the message with Tim's private key).
5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny's public key to verify the message.

The ZyWALL uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm.

The certification authority uses its private key to sign certificates. Anyone can then use the certification authority's public key to verify the certificates.

A certification path is the hierarchy of certification authority certificates that validate a certificate. The ZyWALL does not trust a certificate if any certificate on its path has expired or been revoked.

Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The ZyWALL can check a peer's certificate against a directory server's list of revoked certificates. The framework of servers, software, procedures and policies that handles keys is called PKI (public-key infrastructure).

Advantages of Certificates

Certificates offer the following benefits.

  • The ZyWALL only has to store the certificates of the certification authorities that you decide to trust, no matter how many devices you need to authenticate.
  • Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys.

Self-signed Certificates

You can have the ZyWALL act as a certification authority and sign its own certificates.

Factory Default Certificate

The ZyWALL generates its own unique self-signed certificate when you first turn it on. This certificate is referred to in the GUI as the factory default certificate.

Certificate File Formats

Any certificate that you want to import has to be in one of these file formats:

  • Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.
  • PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
  • Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The ZyWALL currently allows the importation of a PKS#7 file that contains a single certificate.
  • PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses lowercase letters, uppercase letters and numerals to convert a binary PKCS#7 certificate into a printable form.
  • Binary PKCS#12: This is a format for transferring public key and private key certificates. The private key in a PKCS #12 file is within a password-encrypted envelope. The file's password is not connected to your certificate's public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the ZyWALL.

Note: Be careful not to convert a binary file to text during the transfer process. It is easy for this to occur since many programs use text files by default.

Finding Out More

• See Section 5.5 on page 115 for related information on these screens.
• See Section 42.4 on page 683 for certificate background information.

42.1.3 Verifying a Certificate

Before you import a trusted certificate into the ZyWALL, you should verify that you have the correct certificate. You can do this using the certificate's fingerprint. A certificate's fingerprint is a message digest calculated using the MD5 or SHA1 algorithm. The following procedure describes how to check a certificate's fingerprint to verify that you have the actual certificate.

1 Browse to where you have the certificate saved on your computer.

2 Make sure that the certificate has a ".cer" or ".crt" file name extension.

Figure 437 Remote Host Certificates
ZYXEL ZYWALL USG 2000 - Verifying a Certificate - 1

text_image London-Office.cer LA-Office.crt Certificates

3 Double-click the certificate's icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.

Figure 438 Certificate Details
ZYXEL ZYWALL USG 2000 - Verifying a Certificate - 2

text_image Certificate General Details Certification Path Show: Field Value Subject Glenn Public key RSA (1024 Bits) Key Usage Digital Signature , Certificate Signing(... Subject Alternative Name DNS Name=Glenn Basic Constraints Subject Type=CA, Path Length Cons... Thumbprint algorithm sha1 Thumbprint B0A7 22B6 7960 FF92 52F4 6B4C A2... Edit Properties... Copy to File... OK

4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.

42.2 The My Certificates Screen

Click Object > Certificate > My Certificates to open the My Certificates screen. This is the ZyWALL's summary list of certificates and certification requests.

Figure 439 Object > Certificate > My Certificates
ZYXEL ZYWALL USG 2000 - The My Certificates Screen - 1

text_image My Certificates Trusted Certificates PKI Storage Space in Use 0 % My Certificates Setting

Name Type Subject Issuer Valid From Valid To

1 example_certificate SELF CN=mydevice@mycompany-example.com CN=mydevice@mycompany-example.com 2007-12-13 02:24:28 2010-12-12 02:24:28 Import Refresh

The following table describes the labels in this screen.

Table 210 Object > Certificate > My Certificates

LABELDESCRIPTION
PKI Storage Space in UseThis bar displays the percentage of the ZyWALL's PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
My Certificates Setting
#This field displays the certificate index number. The certificates are listed in alphabetical order.
NameThis field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name.
TypeThis field displays what kind of certificate this is.REQrepresents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate. Use theMy Certificate Importscreen to import the certificate and replace the request.SELFrepresents a self-signed certificate.CERTrepresents a certificate issued by a certification authority.
SubjectThis field displays identifying information about the certificate's owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
IssuerThis field displays identifying information about the certificate's issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in theSubjectfield.
Valid FromThis field displays the date that the certificate becomes applicable.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
Add iconClick the Add icon to go to the screen where you can have the ZyWALL generate a certificate or a certification request.Click the Edit icon to open a screen with an in-depth list of information about the certificate.The ZyWALL keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates.Click the Delete icon to remove a certificate. A window displays asking you to confirm that you want to delete the certificate. Subsequent certificates move up by one when you take this action.You cannot delete certificates that any of the ZyWALL's features are configured to use.
ImportClick Import to open a screen where you can save a certificate to the ZyWALL.
RefreshClick Refresh to display the current validity status of the certificates.

42.2.1 The My Certificates Add Screen

Click Object > Certificate > My Certificates and then the Add icon to open the My Certificates Add screen. Use this screen to have the ZyWALL create a self-

signed certificate, enroll a certificate with a certification authority or generate a certification request.

Figure 440 Object > Certificate > My Certificates > Add
ZYXEL ZYWALL USG 2000 - The My Certificates Add Screen - 1

text_image Name Subject Information Common Name Host IP Address 0.0.0.0 Host Domain Name E-Mail Organizational Unit (Optional) Organization (Optional) Country (Optional) Key Type RSA Key Length 512 bits Enrollment Options Create a self-signed certificate Create a certification request and save it locally for later manual enrollment Create a certification request and enroll for a certificate immediately online Enrollment Protocol Certificate Management Protocol (CMP) CA Server Address CA Certificate (See Trusted CAs) Request Authentication Reference Number Key OK Cancel

The following table describes the labels in this screen.

Table 211 Object > Certificate > My Certificates > Add

LABELDESCRIPTION
NameType a name to identify this certificate. You can use up to 31 alphanumeric and ;'~!@#%^&()_+[]',.=- characters.
Subject InformationUse these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although the Common Name is mandatory. The certification authority may add fields (such as a serial number) to the subject information when it issues a certificate. It is recommended that each certificate have unique subject information.
Common NameSelect a radio button to identify the certificate's owner by IP address, domain name or e-mail address. Type the IP address (in dotted decimal notation), domain name or e-mail address in the field provided. The domain name or e-mail address is for identification purposes only and can be any string.A domain name can be up to 255 characters. You can use alphanumeric characters, the hyphen and periods.An e-mail address can be up to 63 characters. You can use alphanumeric characters, the hyphen, the @ symbol, periods and the underscore.
Organizational UnitIdentify the organizational unit or department to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
OrganizationIdentify the company or group to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
CountryIdentify the nation where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Key TypeSelect RSA to use the Rivest, Shamir and Adleman public-key algorithm.Select DSA to use the Digital Signature Algorithm public-key algorithm.
Key LengthSelect a number from the drop-down list box to determine how many bits the key should use (512 to 2048). The longer the key, the more secure it is. A longer key also uses more PKI storage space.
Enrollment OptionsThese radio buttons deal with how and when the certificate is to be generated.
Create a self-signed certificateSelect Create a self-signed certificate to have the ZyWALL generate the certificate and act as the Certification Authority (CA) itself. This way you do not need to apply to a certification authority for certificates.
Create a certification request and save it locally for later manual enrollmentSelect Create a certification request and save it locally for later manual enrollment to have the ZyWALL generate and store a request for a certificate. Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority.Copy the certification request from the My Certificate Details screen (see Section 42.2.2 on page 673) and then send it to the certification authority.
Create a certification request and enroll for a certificate immediately onlineSelect Create a certification request and enroll for a certificate immediately online to have the ZyWALL generate a request for a certificate and apply to a certification authority for a certificate.You must have the certification authority's certificate already imported in the Trusted Certificates screen.When you select this option, you must select the certification authority's enrollment protocol and the certification authority's certificate from the drop-down list boxes and enter the certification authority's server address. You also need to fill in the Reference Number and Key if the certification authority requires them.
Enrollment ProtocolThis field applies when you select Create a certification request and enroll for a certificate immediately online. Select the certification authority's enrollment protocol from the drop-down list box.Simple Certificate Enrollment Protocol (SCEP) is a TCP-based enrollment protocol that was developed by VeriSign and Cisco.Certificate Management Protocol (CMP) is a TCP-based enrollment protocol that was developed by the Public Key Infrastructure X.509 working group of the Internet Engineering Task Force (IETF) and is specified in RFC 2510.
CA Server AddressThis field applies when you select Create a certification request and enroll for a certificate immediately online. Enter the IP address (or URL) of the certification authority server.For a URL, you can use up to 511 of the following characters. a-zA-Z0-9'()+,/:.=?;!*#@_%-
CA CertificateThis field applies when you select Create a certification request and enroll for a certificate immediately online. Select the certification authority's certificate from the CA Certificate drop-down list box.You must have the certification authority's certificate already imported in the Trusted Certificates screen. Click Trusted CAs to go to the Trusted Certificates screen where you can view (and manage) the ZyWALL's list of certificates of trusted certification authorities.
Request AuthenticationWhen you select Create a certification request and enroll for a certificate immediately online, the certification authority may want you to include a reference number and key to identify you when you send a certification request.Fill in both the Reference Number and the Key fields if your certification authority uses CMP enrollment protocol. Just the Key field displays if your certification authority uses the SCEP enrollment protocol.For the reference number, use 0 to 99999999.For the key, use up to 31 of the following characters. a-zA-Z0-9;|^~!@#$%^&*()_+\{\}':./<>=-
OKClick OK to begin certificate or certification request generation.
CancelClick Cancel to quit and return to the My Certificates screen.

If you configured the My Certificate Create screen to have the ZyWALL enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen. Click Return and check your information in the My Certificate Create screen. Make sure that the certification authority information is correct and that your Internet connection is working properly if you want the ZyWALL to enroll a certificate online.

42.2.2 The My Certificates Edit Screen

Click Object > Certificate > My Certificates and then the Edit icon to open the My Certificate Edit screen. You can use this screen to view in-depth certificate information and change the certificate's name.

Figure 441 Object > Certificate > My Certificates > Edit
ZYXEL ZYWALL USG 2000 - The My Certificates Edit Screen - 1

text_image Name example_certificate Certification Path CN=mydevice@mycompany-example.com Refresh Certificate Information Type Self-signed X.509 Certificate Version V3 Serial Number 1197512668 Subject CN=mydevice@mycompany-example.com Issuer CN=mydevice@mycompany-example.com Signature Algorithm rsa-pkcs1-sha1 Valid From 2007-12-13 02:24:28 Valid To 2010-12-12 02:24:28 Key Algorithm rsaEncryption ( 512 bits) Subject Alternative Name undefined Key Usage DigitalSignature, KeyEncipherment, KeyCertSign Basic Constraint Subject Type=CA, Path Length Constraint=1 MD5 Fingerprint ec:59:d2:80:33:1b:87:12:68:3e:c1:62:08:11:df:5c SHA1 Fingerprint 7a:bd:2d:fc:bb:2c:35:74:16:ad:ed:2c:8e:67:07:d8:ee:8c:70:3f Certificate in PEM (Base-64) Encoded Format ----BEGIN X509 CERTIFICATE---- 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 ----END X509 CERTIFICATE---- Password: Export Certificate Only Export Certificate with Private Key OK Cancel

The following table describes the labels in this screen.

Table 212 Object > Certificate > My Certificates > Edit

LABELDESCRIPTION
NameThis field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;'~!@#$%^&()_+[]{}',=- characters.
Certification PathThis field displays for a certificate, not a certification request.Click theRefreshbutton to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list (along with the certificate itself). If the certificate is a self-signed certificate, the certificate itself is the only one in the list. The ZyWALL does not trust the certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked.
RefreshClickRefreshto display the certification path.
Certificate InformationThese read-only fields display detailed information about the certificate.
TypeThis field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate's owner signed the certificate (not a certification authority). “X.509” means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
VersionThis field displays the X.509 version number. “
Serial NumberThis field displays the certificate's identification number given by the certification authority or generated by the ZyWALL.
SubjectThis field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
IssuerThis field displays identifying information about the certificate's issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.With self-signed certificates, this is the same as theSubject Namefield."none" displays for a certification request.
Signature AlgorithmThis field displays the type of algorithm that was used to sign the certificate. The ZyWALL uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid FromThis field displays the date that the certificate becomes applicable. “none” displays for a certification request.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. “none” displays for a certification request.

Table 212 Object > Certificate > My Certificates > Edit

LABELDESCRIPTION
Key AlgorithmThis field displays the type of algorithm that was used to generate the certificate's key pair (the ZyWALL uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative NameThis field displays the certificate owner's IP address (IP), domain name (DNS) or e-mail address (EMAIL).
Key UsageThis field displays for what functions the certificate's key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text.
Basic ConstraintThis field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority's certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate's path. This field does not display for a certification request.
MD5 FingerprintThis is the certificate's message digest that the ZyWALL calculated using the MD5 algorithm.
SHA1 FingerprintThis is the certificate's message digest that the ZyWALL calculated using the SHA1 algorithm.
Certificate in PEM (Base-64)Encoded FormatThis read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.You can copy and paste a certification request into a certification authority's web page, an e-mail that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment.You can copy and paste a certificate into an e-mail to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution (via floppy disk for example).
ExportThis button displays for a certification request. Use this button to save a copy of the request without its private key. Click this button and thenSavein the File Downloadscreen. The Save As screen opens, browse to the location that you want to use and clickSave.
Export Certificate OnlyUse this button to save a copy of the certificate without its private key. Click this button and thenSavein the File Downloadscreen. The Save As screen opens, browse to the location that you want to use and clickSave.
PasswordIf you want to export the certificate with its private key, create a password and type it here. Make sure you keep this password in a safe place. You will need to use it if you import the certificate to another device.
Export Certificate with Private KeyUse this button to save a copy of the certificate with its private key. Type the certificate's password and click this button. ClickSavein the File Downloadscreen. The Save As screen opens, browse to the location that you want to use and clickSave.

Table 212 Object > Certificate > My Certificates > Edit

LABELDESCRIPTION
OKClick OK to save your changes back to the ZyWALL. You can only change the name.
CancelClick Cancel to quit and return to the My Certificates screen.

42.2.3 The My Certificates Import Screen

Click Object > Certificate > My Certificates > Import to open the My Certificate Import screen. Follow the instructions in this screen to save an existing certificate to the ZyWALL.

Note: You can import a certificate that matches a corresponding certification request that was generated by the ZyWALL. You can also import a certificate in PKCS#12 format, including the certificate's public and private keys.

The certificate you import replaces the corresponding request in the My Certificates screen.

You must remove any spaces from the certificate's filename before you can import it.

Figure 442 Object > Certificate > My Certificates > Import
ZYXEL ZYWALL USG 2000 - The My Certificates Import Screen - 1

text_image Please specify the location of the certificate file to be imported. The certificate file must be in one of the following formats. • Binary X.509 • PEM (Base-64) encoded X.509 • Binary PKCS#7 • PEM (Base-64) encoded PKCS#7 • Binary PKCS#12 For my certificate importation to be successful, a certification request corresponding to the imported certificate must already exist on ZyWALL. After the importation, the certification request will automatically be deleted. File Path: Browse... Password: (PKCS#12 only) OK Cancel

The following table describes the labels in this screen.

Table 213 Object > Certificate > My Certificates > Import

LABELDESCRIPTION
File PathType in the location of the file you want to upload in this field or clickBrowseto find it.You cannot import a certificate with the same name as a certificate that is already in the ZyWALL.
BrowseClickBrowseto find the certificate file you want to upload.
PasswordThis field only applies when you import a binary PKCS#12 format file. Type the file's password that was created when the PKCS #12 file was exported.
OKClick OK to save the certificate on the ZyWALL.
CancelClick Cancel to quit and return to the My Certificates screen.

42.3 The Trusted Certificates Screen

Click Object > Certificate > Trusted Certificates to open the Trusted Certificates screen. This screen displays a summary list of certificates that you have set the ZyWALL to accept as trusted. The ZyWALL also accepts any valid certificate signed by a certificate on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certificates.

Figure 443 Object > Certificate > Trusted Certificates
ZYXEL ZYWALL USG 2000 - The Trusted Certificates Screen - 1

text_image My Certificates Trusted Certificates PKI Storage Space in Use 0 % Trusted Certificates Setting Name Subject Issuer Valid From Valid To 1 zw1050.cer456 CN=ZyWALL-1050_Factory_Default_Certificate CN=ZyWALL-1050_Factory_Default_Certificate 2003-01-01 00:38:30 2022-12-27 00:38:30 Import Refresh

The following table describes the labels in this screen.

Table 214 Object > Certificate > Trusted Certificates

LABELDESCRIPTION
PKI Storage Space in UseThis bar displays the percentage of the ZyWALL's PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
#This field displays the certificate index number. The certificates are listed in alphabetical order.
NameThis field displays the name used to identify this certificate.
SubjectThis field displays identifying information about the certificate's owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
IssuerThis field displays identifying information about the certificate's issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
Valid FromThis field displays the date that the certificate becomes applicable.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
IconsClick the Edit icon to open a screen with an in-depth list of information about the certificate.The ZyWALL keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates.Click the Delete icon to remove a certificate. A window displays asking you to confirm that you want to delete the certificates. Note that subsequent certificates move up by one when you take this action.
ImportClick Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the ZyWALL.
RefreshClick this button to display the current validity status of the certificates.

42.3.1 The Trusted Certificates Edit Screen

Click Object > Certificate > Trusted Certificates and then a certificate's Edit icon to open the Trusted Certificates Edit screen. Use this screen to view in-depth information about the certificate, change the certificate's name and set whether or not you want the ZyWALL to check a certification authority's list of revoked certificates before trusting a certificate issued by the certification authority.

Figure 444 Object > Certificate > Trusted Certificates > Edit
ZYXEL ZYWALL USG 2000 - The Trusted Certificates Edit Screen - 1

text_image Name zw1050.cer456 Certification Path CN=ZyWALL-1050_Factory_Default_Certificate Refresh Certificate Validation Enable X.509v3 CRL Distribution Points and OCSP checking OCSP Server URL ID Password LDAP Server Address Port ID Password Certificate Information Type Self-signed X.509 Certificate Version V3 Serial Number 0 Subject CN=ZyWALL-1050_Factory_Default_Certificate Issuer CN=ZyWALL-1050_Factory_Default_Certificate Signature Algorithm rsa-pkcs1-sha1 Valid From 2003-01-01 00:38:30 Valid To 2022-12-27 00:38:30 Key Algorithm rsaEncryption (1024 bits) Subject Alternative Name undefined Key Usage DigitalSignature, KeyEncipherment, KeyCertSign Basic Constraint Subject Type=CA, Path Length Constraint=1 MD5 Fingerprint 40:12:0b:b1:f1:42:24:b1:8d:e6:d4:41:09:22:0a:92 SHA1 Fingerprint df:96:8a:88:5e:b7:2e:0e:b3:45:d6:e8:3b:df:db:c0:d0:7c:ae:92 Certificate in PEM (Base-64) Encoded Format ----BEGIN X509 CERTIFICATE---- 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 Export Certificate OK Cancel

The following table describes the labels in this screen.

Table 215 Object > Certificate > Trusted Certificates > Edit

LABELDESCRIPTION
NameThis field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;'~!@#$%^&()_+[]{}',=- characters.
Certification PathClick the Refresh button to have this read-only text box display the end entity's certificate and a list of certification authority certificates that shows the hierarchy of certification authorities that validate the end entity's certificate. If the issuing certification authority is one that you have imported as a trusted certificate, it may be the only certification authority in the list (along with the end entity's own certificate). The ZyWALL does not trust the end entity's certificate and displays "Not trusted" in this field if any certificate on the path has expired or been revoked.
RefreshClick Refresh to display the certification path.
Certificate Validation
Enable X.509v3 CRL Distribution Points and OCSP checkingSelect this check box to have the ZyWALL check incoming certificates that are signed by this certificate against a Certificate Revocation List (CRL) or an OCSP server. You also need to configure the OSCP or LDAP server details.
OCSP ServerSelect this check box if the directory server uses OCSP (Online Certificate Status Protocol).
URLType the protocol, IP address and pathname of the OCSP server.
IDThe ZyWALL may need to authenticate itself in order to assess the OCSP server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
PasswordType the password (up to 31 ASCII characters) from the entity maintaining the OCSP server (usually a certification authority).
LDAP ServerSelect this check box if the directory server uses LDAP (Lightweight Directory Access Protocol). LDAP is a protocol over TCP that specifies how clients access directories of certificates and lists of revoked certificates.
AddressType the IP address (in dotted decimal notation) of the directory server.
PortUse this field to specify the LDAP server port number.You must use the same server port number that the directory server uses.389 is the default server port number for LDAP.
IDThe ZyWALL may need to authenticate itself in order to assess the CRL directory server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
PasswordType the password (up to 31 ASCII characters) from the entity maintaining the CRL directory server (usually a certification authority).
Certificate InformationThese read-only fields display detailed information about the certificate.
TypeThis field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate's owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
VersionThis field displays the X.509 version number.
Serial NumberThis field displays the certificate's identification number given by the certification authority.
SubjectThis field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
IssuerThis field displays identifying information about the certificate's issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.With self-signed certificates, this is the same information as in the Subject Name field.
Signature AlgorithmThis field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid FromThis field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired.
Key AlgorithmThis field displays the type of algorithm that was used to generate the certificate's key pair (the ZyWALL uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative NameThis field displays the certificate's owner's IP address (IP), domain name (DNS) or e-mail address (EMAIL).
Key UsageThis field displays for what functions the certificate's key can be used. For example, "DigitalSignature" means that the key can be used to sign certificates and "KeyEncipherment" means that the key can be used to encrypt text.
Basic ConstraintThis field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority's certificate and "Path Length Constraint=1" means that there can only be one certification authority in the certificate's path.
MD5 FingerprintThis is the certificate's message digest that the ZyWALL calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
SHA1 FingerprintThis is the certificate's message digest that the ZyWALL calculated using the SHA1 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
Certificate in PEM(Base-64)Encoded FormatThis read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.You can copy and paste the certificate into an e-mail to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (via floppy disk for example).
Export CertificateClick this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
OKClick OK to save your changes back to the ZyWALL. You can only change the name.
CancelClick Cancel to quit and return to the Trusted Certificates screen.

42.3.2 The Trusted Certificates Import Screen

Click Object > Certificate > Trusted Certificates > Import to open the Trusted Certificates Import screen. Follow the instructions in this screen to save a trusted certificate to the ZyWALL.

Note: You must remove any spaces from the certificate's filename before you can import the certificate.

Figure 445 Object > Certificate > Trusted Certificates > Import
ZYXEL ZYWALL USG 2000 - The Trusted Certificates Import Screen - 1

text_image Please specify the location of the certificate file to be imported. The certificate file must be in one of the following formats. • Binary X.509 • PEM (Base-64) encoded X.509 • Binary PKCS#7 • PEM (Base-64) encoded PKCS#7 File Path: Browse... OK Cancel

The following table describes the labels in this screen.

Table 216 Object > Certificate > Trusted Certificates > Import

LABELDESCRIPTION
File PathType in the location of the file you want to upload in this field or clickBrowseto find it.You cannot import a certificate with the same name as a certificate that is already in the ZyWALL.
BrowseClickBrowseto find the certificate file you want to upload.
OKClickOKto save the certificate on the ZyWALL.
CancelClickCancelto quit and return to the previous screen.

42.4 Certificates Technical Reference

42.4.1 OCSP

OCSP (Online Certificate Status Protocol) allows an application or device to check whether a certificate is valid. With OCSP the ZyWALL checks the status of individual certificates instead of downloading a Certificate Revocation List (CRL). OCSP has two main advantages over a CRL. The first is real-time status information. The second is a reduction in network traffic since the ZyWALL only gets information on the certificates that it needs to verify, not a huge list. When the ZyWALL requests certificate status information, the OCSP server returns a "expired", "current" or "unknown" response.

ISP Accounts

43.1 Overview

Use ISP accounts to manage Internet Service Provider (ISP) account information for PPPoE/PPTP interfaces. An ISP account is a profile of settings for Internet access using PPPoE or PPTP.

Finding Out More

• See Section 10.6 on page 198 for information about PPPoE/PPTP interfaces.
• See Section 5.5 on page 115 for related information on these screens.

43.1.1 What You Can Do in the ISP Account Screens

- Use the Object > ISP Account screens (Section 43.2 on page 685) to create and manage ISP accounts in the ZyWALL.

43.2 ISP Account Summary

This screen provides a summary of ISP accounts in the ZyWALL. To access this screen, click Object > ISP Account.

Figure 446 Object > ISP Account
ZYXEL ZYWALL USG 2000 - ISP Account Summary - 1

text_image Configuration Profile Name Protocol-Augentication Type User Name SunnyISP pppoe chap-pap hello SunnierISP pppoe chap-pap there

The following table describes the labels in this screen. See the ISP Account Edit section below for more information as well.

Table 217 Object > ISP Account

LABELDESCRIPTION
Profile NameThis field displays the profile name of the ISP account. This name is used to identify the ISP account.
ProtocolThis field displays the protocol used by the ISP account.
Authentication TypeThis field displays the authentication type used by the ISP account.
User NameThis field displays the user name of the ISP account.
Add iconThis column provides icons to add, edit, and remove ISP accounts.To add information about a new ISP account, click the Add icon at the top of the column. The ISP Account Edit screen appears.To edit information about an existing account, click the Edit icon next to the ISP account. The ISP Account Edit screen appears.To remove information about an existing account, click the Remove icon next to the ISP account. The web configurator confirms that you want to delete the account before doing so.

43.2.1 ISP Account Edit

The ISP Account Edit screen lets you add information about new accounts and edit information about existing accounts. To open this window, open the ISP Account screen. (See Section 43.2 on page 685.) Then, click on an Add icon or Edit icon to open the ISP Account Edit screen below.

Figure 447 Object > ISP Account > Edit
ZYXEL ZYWALL USG 2000 - ISP Account Edit - 1

text_image General Settings Profile Name Protocol Authentication Type User Name Password Retype to confirm Service Name Compression Idle timeout pppoe Chap/PAP On Off 0 (Seconds) OK Cancel (Optional)

The following table describes the labels in this screen.

Table 218 Object > ISP Account > Edit

LABELDESCRIPTION
Profile NameThis field is read-only if you are editing an existing account. Type in the profile name of the ISP account. The profile name is used to refer to the ISP account. You may use 1-31 alphanumeric characters, underscores( ), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
ProtocolThis field is read-only if you are editing an existing account. Select the protocol used by the ISP account. Options are:pppoe - This ISP account uses the PPPoE protocol.pptp - This ISP account uses the PPTP protocol.
Encryption MethodThis field is available if this ISP account uses the PPTP protocol. Use the drop-down list box to select the type of Microsoft Point-to-Point Encryption (MPPE). Options are:nomppe - This ISP account does not use MPPE.mppe-40 - This ISP account uses 40-bit MPPE.mppe-128 - This ISP account uses 128-bit MMPE.
Authentication TypeUse the drop-down list box to select an authentication protocol for outgoing calls. Options are:CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by this remote node.CHAP - Your ZyWALL accepts CHAP only.PAP - Your ZyWALL accepts PAP only.MSCHAP - Your ZyWALL accepts MSCHAP only.MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
User NameType the user name given to you by your ISP.
PasswordType the password associated with the user name above. The password can only consist of alphanumeric characters (A-Z, a-z, 0-9). This field can be blank.
Retype to confirmType your password again to make sure that you have entered is correctly.
Server IPIf this ISP account uses the PPPoE protocol, this field is not displayed.If this ISP account uses the PPTP protocol, type the IP address of the PPTP server.
Connection IDThis field is available if this ISP account uses the PPTP protocol. Type your identification name for the PPTP server. This field can be blank.
Service NameIf this ISP account uses the PPPoE protocol, type the PPPoE service name to access. PPPoE uses the specified service name to identify and reach the PPPoE server. This field can be blank.If this ISP account uses the PPTP protocol, this field is not displayed.
CompressionSelect On button to turn on stac compression, and select Off to turn off stac compression. Stac compression is a data compression technique capable of compressing data by a factor of about four.
Idle TimeoutThis value specifies the number of seconds that must elapse without outbound traffic before the ZyWALL automatically disconnects from the PPPoE/PPTP server. This value must be an integer between 0 and 360. If this value is zero, this timeout is disabled.
OKClick OK to save your changes back to the ZyWALL. If there are no errors, the program returns to the ISP Account screen. If there are errors, a message box explains the error, and the program stays in the ISP Account Edit screen.
CancelClick Cancel to return to the ISP Account screen without creating the profile (if it is new) or saving any changes to the profile (if it already exists).

SSL Application

44.1 Overview

You use SSL application objects in SSL VPN. Configure an SSL application object to specify a service and a corresponding IP address of the server on the local network. You can apply one or more SSL application objects in the VPN > SSL VPN screen for a user account/user group.

44.1.1 What You Can Do in the SSL Application Screens

  • Use the SSL Application screen (Section 44.2 on page 691) to view the ZyWALL's configured SSL application objects.
  • Use the SSL Application Edit screen to create or edit web-based application objects to allow remote users to access an application via standard web browsers (Section 44.2.1 on page 691).
  • You can also use the SSL Application Edit screen to specify the name of a folder on a Linux or Windows file server which remote users can access using a standard web browser (Section 44.2.2 on page 693).

44.1.2 What You Need to Know About SSL Application Objects

Application Types

You can configure the following types of SSL applications on the ZyWALL.

  • Web-based
    A web-based application allows remote users to access an intranet site using standard web browsers.
  • File sharing
    Configure file sharing to allow users to access files on the intranet.

Available SSL application names are displayed as links in remote user screens. Depending on the application type, remote users can simply click the links or follow the steps in the pop-up dialog box to access.

44.1.3 Example: Specifying a Web Site for Access

This example shows you how to create a web-based application for an internal web site. The address of the web site is http://info with web page encryption.

1 Click Object > SSL Application in the navigation panel.
2 Click the Add button and select Web Application in the Type field.
3 In the Server Type field, select Web Server.
4 Enter a descriptive name in the Name field. For example, "CompanyIntranet".
5 In the URL field, enter "http://info".
6 Select Web Page Encryption to prevent users from saving the web content.
7 Click OK to save the settings.

The configuration screen should look similar to the following figure.

Figure 448 Example: SSL Application: Specifying a Web Site for Access
ZYXEL ZYWALL USG 2000 - Example: Specifying a Web Site for Access - 1

text_image Object Type Web Application Web Application Server Type Web Server Name CompanyIntranet URL http://info Entry Point (Optional) ✓ Web Page Encryption OK Cancel

44.2 The SSL Application Screen

The main SSL Application screen displays a list of the configured SSL application objects. Click Object > SSL Application in the navigation panel.

Figure 449 Object > SSL Application

The following table describes the labels in this screen.

Table 219 Object > SSL Application

LABELDESCRIPTION
#This field displays the index number.
NameThis field displays the name of the object.
AddressThis field displays the IP address/URL of the application server or the location of a file share.
TypeThis field display the application type.
Add iconThis column provides icons to add, edit, and remove SSL application objects.To add an object, click the Add icon at the top of the column.To edit an object, click the Edit icon next to the object.To delete an object, click the Remove icon next to the object.

44.2.1 Creating/Editing a Web-based SSL Application Object

A web-based application allows remote users to access an application via standard web browsers.

To configure a web-based application, click the Add or Edit button in the SSL Application screen and select Web Application in the Type field to display the configuration screen as shown.

Figure 450 Object > SSL Application > Add/Edit: Web Application
ZYXEL ZYWALL USG 2000 - Creating/Editing a Web-based SSL Application Object - 1

text_image Object Type Web Application Web Application Server Type Web Server Name New URL Entry Point (Optional) ✓ Web Page Encryption OK Cancel

The following table describes the labels in this screen.

Table 220 Object > SSL Application > Add/Edit: Web Application

LABELDESCRIPTION
Object
TypeSelect Web Application from the drop-down list box.
Web Application
Server TypeSpecify the type of service for this SSL application.Select Web Server to allow access to the specified web site hosted on the local network.Select OWA (Outlook Web Access) to allow users to access e-mails, contacts, calenders via Microsoft Outlook-like interface using supported web browsers. The ZyWALL supports one OWA object.
NameEnter a descriptive name to identify this object. You can enter up to 31 characters ("0-9", "a-z", "A-Z", "-" and它"). Spaces are not allowed.
URLEnter the fully qualified domain name (FQDN) or IP address of the application server.Note: You must enter the "http://" or "https://" prefix.Remote users are restricted to access only files in this directory. For example, if you enter "\remote\" in this field, emote users can only access files in the "remote" directory.If a link contains a file that is not within this domain, then remote users cannot access it.
PreviewClick Preview to access the URL you specified in a new IE web browser.
Entry PointThis field is optional. You only need to configure this field if you need to specify the name of the directory or file on the local server as the home page or home directory on the user screen.

Table 220 Object > SSL Application > Add/Edit: Web Application

LABELDESCRIPTION
Web Page EncryptionSelect this option to prevent users from saving the web content.
OKClick OK to save the changes and return to the main SSL Application Configuration screen.
CancelClick Cancel to discard the changes and return to the main SSL Application Configuration screen.

44.2.2 Creating/Editing a File Sharing SSL Application Object

You can specify the name of a folder on a file server (Linux or Windows) which remote users can access. Remote users can access files using a standard web browser and files are displayed as links on the screen.

To configure a file share, click the Add or Edit button in the SSL Application screen and select File Sharing in the Type field. The configuration screen displays as shown.

Figure 451 Object > SSL Application > Add/Edit: File Sharing
ZYXEL ZYWALL USG 2000 - Creating/Editing a File Sharing SSL Application Object - 1

text_image Object Type File Sharing File Sharing Name FileShareExample Shared Path \my-home\share Preview OK Cancel

The following table describes the labels in this screen.

Table 221 Object > SSL Application > Add/Edit: Web Application

LABELDESCRIPTION
Object
TypeSelect File Sharing to create a file share application for VPN SSL.
File Sharing
NameEnter a descriptive name to identify this object. You can enter up to 31 characters ("0-9", "a-z", "A-Z", "-" and "_"). Spaces are not allowed.

Table 221 Object > SSL Application > Add/Edit: Web Application

LABELDESCRIPTION
Shared PathSpecify the IP address, domain name or NetBIOS name (computer name) of the file server and the name of the share to which you want to allow user access. Enter the path in one of the following formats."\\<IP address>\”\"\\<domain name>\”\"\\<computer name>\”For example, if you enter “\my-server\Tmp”, this allows remote users to access all files and/or folders in the “\Tmp” share on the “my-server” computer.
PreviewClick Preview to display the file share in a new web browser.
OKClick OK to save the changes and return to the main SSL Application Configuration screen.
CancelClick Cancel to discard the changes and return to the main SSL Application Configuration screen.

Note: You must then configure the shared folder on the file server for remote access. Refer to the document that comes with your file server.

PART IX

System

System (697)

45.1 Overview

Use the system screens to configure general ZyWALL settings.

45.1.1 What You Can Do In The System Screens

  • Use the System > Host Name screen (Figure 452 on page 698) to configure a unique name for the ZyWALL in your network.
  • Use the System > Date/Time screen (Figure 453 on page 699) to configure the date and time for the ZyWALL.
  • Use the System > Console Speed screen (Figure 455 on page 703) to configure the console port speed when you connect to the ZyWALL via the console port using a terminal emulation program.
  • Use the System > DNS screen (Figure 456 on page 704) to configure the DNS (Domain Name System) server used for mapping a domain name to its corresponding IP address and vice versa.
  • Use the System > WWW screen (Figure 465 on page 717) to specify from which zones you can access the ZyWALL using HTTP or HTTPS. You can also specify which IP addresses the access can come from.
  • Use the System > SSH screen (Figure 485 on page 731) to configure SSH (Secure SHEll) used to securely access the ZyWALL's command line interface. You can specify which zones allow SSH access and from which IP address the access can come.
  • Use the System > TELNET screen (Figure 489 on page 734) to configure Telnet to access the ZyWALL's command line interface. Specify which zones allow Telnet access and from which IP address the access can come.
  • Use the System > FTP screen (Figure 490 on page 736) to specify from which zones FTP can be used to access the ZyWALL. You can also specify from which IP addresses the access can come. You can upload and download the ZyWALL's firmware and configuration files using FTP. Please also see Chapter 46 on page 749 for more information about firmware and configuration files.
  • Your ZyWALL can act as an SNMP agent, which allows a manager station to manage and monitor the ZyWALL through the network. Use the System > SNMP screen (Figure 492 on page 740) to configure SNMP settings, including from which zones SNMP can be used to access the ZyWALL. You can also specify from which IP addresses the access can come.

  • Connect an external serial modem to the AUX port to provide a management connection in case the ZyWALL's other WAN connections are down. Use the System > Dial-in Mgmt. screen (Figure 493 on page 742) to configure the external serial modem.

  • Vantage CNM (Centralized Network Management) is a browser-based global management tool that allows an administrator to manage ZyXEL devices. Use the System > Vantage CNM screen (Figure 494 on page 743) to allow your ZyWALL to be managed by the Vantage CNM server.
  • Use the System > Language screen (Figure 495 on page 744) to set a language for the ZyWALL's web configurator screens.

Note: See each section for related background information and term definitions.

45.2 Host Name

A host name is the unique name by which a device is known on a network. Click System > Host Name to open the Host Name screen.

Figure 452 System > Host Name
ZYXEL ZYWALL USG 2000 - Host Name - 1

text_image General Settings System Name zywall-usg-2000(Optional) Domain Name (Optional) Apply Reset

The following table describes the labels in this screen.

Table 222 System > Host Name

LABELDESCRIPTION
System NameChoose a descriptive name to identify your ZyWALL device. This name can be up to 64 alphanumeric characters long. Spaces are not allowed, but dashes “-” are accepted.
Domain NameEnter the domain name (if you know it) here. This name is propagated to DHCP clients connected to interfaces with the DHCP server enabled. This name can be up to 254 alphanumeric characters long. Spaces are not allowed, but dashes “-” are accepted.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.3 Date and Time

For effective scheduling and logging, the ZyWALL system time must be accurate. The ZyWALL's Real Time Chip (RTC) keeps track of the time and date. There is also

a software mechanism to set the time manually or get the current time and date from an external server.

To change your ZyWALL's time based on your local time zone and date, click System > Date/Time. The screen displays as shown. You can manually set the ZyWALL's time and date or have the ZyWALL get the date and time from a time server.

Figure 453 System > Date and Time
ZYXEL ZYWALL USG 2000 - Date and Time - 1

text_image Current Time and Date Current Time 09:23:57 GMT+08:00 Current Date 2007-03-05 Time and Date Setup ○ Manual New Time (hh:mm:ss) 09 : 23 : 52 New Date (yyyy-mm-dd) 2007 - 03 - 05 ● Get from Time Server Time Server Address* 0.pool.ntp.org Synchronize Now *Optional. There is a pre-defined NTP time server list. Time Zone Setup Time Zone (GMT+08:00) Beijing, Hong Kong, Perth, Singapore, Taipei □ Enable Daylight Saving Start Date First Monday of January at 12 : 00 End Date First Monday of January at 12 : 00 Offset 1 hours Apply Reset

The following table describes the labels in this screen.

Table 223 System > Date and Time

LABELDESCRIPTION
Current Time and Date
Current TimeThis field displays the present time of your ZyWALL.
Current DateThis field displays the present date of your ZyWALL.
Time and Date Setup
ManualSelect this radio button to enter the time and date manually. If you configure a new time and date, time zone and daylight saving at the same time, the time zone and daylight saving will affect the new time and date you entered. When you enter the time settings manually, the ZyWALL uses the new setting once you click Apply.
New Time (hh-mm-ss)This field displays the last updated time from the time server or the last time configured manually.When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply.
New Date (yyyy-mm-dd)This field displays the last updated date from the time server or the last date configured manually.When you set Time and Date Setup to Manual, enter the new date in this field and then click Apply.
Get from Time ServerSelect this radio button to have the ZyWALL get the time and date from the time server you specify below. The ZyWALL requests time and date settings from the time server under the following circumstances.When the ZyWALL starts up.When you clickApplyor Synchronize Nowin this screen.24-hour intervals after starting up.
Time Server AddressEnter the IP address or URL of your time server. Check with your ISP/ network administrator if you are unsure of this information.
Synchronize NowClick this button to have the ZyWALL get the time and date from a time server (see the Time Server Address field). This also saves your changes (except the daylight saving settings).
Time Zone Setup
Time ZoneChoose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
Enable Daylight SavingDaylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.Select this option if you use Daylight Saving Time.
Start DateConfigure the day and time when Daylight Saving Time starts if you selectedEnable Daylight Saving.The atfield uses the 24 hour format. Here are a couple of examples:Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would selectSecond, Sunday, Marchand type 2 in theatfield.Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would selectLast, Sunday, March. The time you type in theatfield depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
End DateConfigure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving. The at field uses the 24 hour format. Here are a couple of examples:Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select First, Sunday, November and type 2 in the at field.Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, October. The time you type in the at field depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
OffsetSpecify how much the clock changes when daylight saving begins and ends.Enter a number from 1 to 5.5 (by 0.5 increments).For example, if you set this field to 3.5, a log occurred at 6 P.M. in local official time will appear as if it had occurred at 10:30 P.M.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.3.1 Pre-defined NTP Time Servers List

When you turn on the ZyWALL for the first time, the date and time start at 2003-01-01 00:00:00. The ZyWALL then attempts to synchronize with one of the following pre-defined list of Network Time Protocol (NTP) time servers.

The ZyWALL continues to use the following pre-defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified.

Table 224 Default Time Servers

0.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org

When the ZyWALL uses the pre-defined list of NTP time servers, it randomly selects one server and tries to synchronize with it. If the synchronization fails, then the ZyWALL goes through the rest of the list in order from the first one tried until either it is successful or all the pre-defined NTP time servers have been tried.

45.3.2 Time Server Synchronization

Click the Synchronize Now button to get the time and date from the time server you specified in the Time Server Address field.

When the Please Wait... screen appears, you may have to wait up to one minute.

Figure 454 Synchronization in Process
ZYXEL ZYWALL USG 2000 - Time Server Synchronization - 1

text_image Please Wait ...

The Current Time and Current Date fields will display the appropriate settings if the synchronization is successful.

If the synchronization was not successful, a log displays in the View Log screen. Try reconfiguring the Date/Time screen.

To manually set the ZyWALL date and time.

1 Click System > Date/Time.
2 Select Manual under Time and Date Setup.
3 Enter the ZyWALL's time in the New Time field.
4 Enter the ZyWALL's date in the New Date field.
5 Under Time Zone Setup, select your Time Zone from the list.
6 As an option you can select the Enable Daylight Saving check box to adjust the ZyWALL clock for daylight savings.
7 Click Apply.
To get the ZyWALL date and time from a time server
1 Click System > Date/Time.
2 Select Get from Time Server under Time and Date Setup.
3 Under Time Zone Setup, select your Time Zone from the list.
4 As an option you can select the Enable Daylight Saving check box to adjust the ZyWALL clock for daylight savings.

5 Under Time and Date Setup, enter a Time Server Address (Table 224 on page 701).
6 Click Apply.

45.4 Console Port Speed

This section shows you how to set the console port speed when you connect to the ZyWALL via the console port using a terminal emulation program. See Table 2 on page 37 for default console port settings.

Click System > Console Speed to open the Console Speed screen.

Figure 455 System > Console Speed
ZYXEL ZYWALL USG 2000 - Console Port Speed - 1

text_image General Settings Console Port Speed 115200 Apply Reset

The following table describes the labels in this screen.

Table 225 System > Console Speed

LABELDESCRIPTION
Console Port SpeedUse the drop-down list box to change the speed of the console port. Your ZyWALL supports 9600, 19200, 38400, 57600, and 115200 bps (default) for the console port.The Console Port Speed applies to a console port connection using terminal emulation software and NOT the Console in the ZyWALL web configurator Status screen.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.5 DNS Overview

DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it.

45.5.1 DNS Server Address Assignment

The ZyWALL can get the DNS server addresses in the following ways.

  • The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, manually enter them in the DNS server fields.
  • If your ISP dynamically assigns the DNS server IP addresses (along with the ZyWALL's WAN IP address), set the DNS server fields to get the DNS server address from the ISP.
  • You can manually enter the IP addresses of other DNS servers.

45.5.2 Configuring the DNS Screen

Click System > DNS to change your ZyWALL's DNS settings. Use the DNS screen to configure the ZyWALL to use a DNS server to resolve domain names for ZyWALL system features like VPN, DDNS and the time server. You can also configure the ZyWALL to accept or discard DNS queries. Use the Network > Interface screens to configure the DNS server information that the ZyWALL sends to the specified DHCP client devices.

Figure 456 System > DNS
ZYXEL ZYWALL USG 2000 - Configuring the DNS Screen - 1

text_image Address/PTR Record

FQDN IP Address

Domain Zone Forwarder

Domain Zone From DNS Server

- * Default 172.23.5.2 172.23.5.1 N/A 172.16.1.1 MX Record (for My FQDN)

Domain Name IP/FQDN

Service Control

Zone Address Action

1 ALL ALL Accept PN - ALL ALL Accept

The following table describes the labels in this screen.

Table 226 System > DNS

LABELDESCRIPTION
Address/PTR RecordThis record specifies the mapping of a fully qualified domain name (FQDN) to an IP address. An FQDN consists of a host and domain name. For example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host, “zyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain.
#This is the index number of the address/PTR record.
FQDNThis is a host’s fully qualified domain name.
IP AddressThis is the IP address of a host.
Add iconClick the Add icon in the heading row to open a screen where you can add a new address/PTR record. Refer to Table 227 on page 707 for information on the fields.Click the Edit icon to go to the screen where you can edit the record.Click the Delete icon to remove an existing record. A window display asking you to confirm that you want to delete the record. Note that subsequent records move up by one when you take this action.
Domain Zone ForwarderThis specifies a DNS server's IP address. The ZyWALL can query the DNS server to resolve domain zones for features like VPN, DDNS and the time server.When the ZyWALL needs to resolve a domain zone, it checks it against the domain zone forwarder entries in the order that they appear in this list.
#This is the index number of the domain zone forwarder record. The ordering of your rules is important as rules are applied in sequence.A hyphen (-) displays for the default domain zone forwarder record. The default record is not configurable. The ZyWALL uses this default record if the domain zone that needs to be resolved does not match any of the other domain zone forwarder records.
Domain ZoneA domain zone is a fully qualified domain name without the host. For example, zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified domain name.A “*” means all domain zones.
FromThis displays whether the DNS server IP address is assigned by the ISP dynamically through a specified interface or configured manually.
DNS ServerThis is the IP address of a DNS server. This field displays N/A if you have the ZyWALL get a DNS server IP address from the ISP dynamically but the specified interface is not active.
Add iconClick the Add icon in the heading row to open a screen where you can add a new domain zone forwarder record. Refer to Table 228 on page 708 for information on the fields.Click the Edit icon to go to the screen where you can edit the record.Click the Add icon in an entry to add a record below the current entry.Click the Delete icon to remove an existing record. A window display asking you to confirm that you want to delete the record. Note that subsequent records move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that record and press [ENTER] to move the record to the number that you typed.
MX Record (for My FQDN)A MX (Mail eXchange) record identifies a mail server that handles the mail for a particular domain.
#This is the index number of the MX record.
Domain NameThis is the domain name where the mail is destined for.
IP/FQDNThis is the IP address or fully qualified domain name of a mail server that handles the mail for the domain specified in the field above.
Add iconClick the Add icon in the heading row to open a screen where you can add a new MX record. Refer to Table 229 on page 709 for information on the fields.Click the Edit icon to go to the screen where you can edit the record.Click the Delete icon to remove an existing record. A window display asking you to confirm that you want to delete the record. Note that subsequent records move up by one when you take this action.
Service ControlThis specifies from which computers and zones you can send DNS queries to the ZyWALL.
#This the index number of the service control rule. The ordering of your rules is important as rules are applied in sequence.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to send DNS queries.
ActionThis displays whether the ZyWALL accepts DNS queries from the computer with the IP address specified above through the specified zone (Accept) or discards them (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 230 on page 710 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.

45.5.3 Address Record

An address record contains the mapping of a fully qualified domain name (FQDN) to an IP address. An FQDN consists of a host and domain name. For example, www.zyxel.com is a fully qualified domain name, where "www" is the host, "zyxel" is the second-level domain, and "com" is the top level domain.

mail.myZyXEL.com.tw is also a FQDN, where "mail" is the host, "myZyXEL" is the

third-level domain, "com" is the second-level domain, and "tw" is the top level domain.

The ZyWALL allows you to configure address records about the ZyWALL itself or another device. This way you can keep a record of DNS names and addresses that people on your network may use frequently. If the ZyWALL receives a DNS query for an FQDN for which the ZyWALL has an address record, the ZyWALL can send the IP address in a DNS response without having to query a DNS name server.

45.5.4 PTR Record

A PTR (pointer) record is also called a reverse record or a reverse lookup record. It is a mapping of an IP address to a domain name.

45.5.5 Adding an Address/PTR Record

Click the Add icon in the Address/PTR Record table to add an address/PTR record.

Figure 457 System > DNS > Address/PTR Record Edit
ZYXEL ZYWALL USG 2000 - Adding an Address/PTR Record - 1

text_image Configuration FQDN IP Address OK Cancel

The following table describes the labels in this screen.

Table 227 System > DNS > Address/PTR Record Edit

LABELDESCRIPTION
FQDNType a fully qualified domain name (FQDN) of a server. An FQDN starts with a host name and continues all the way up to the top-level domain name. For example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host, “zyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain. Underscores are not allowed.
IP AddressEnter the IP address of the host in dotted decimal notation.
OKClick OK to save your customized settings and exit this screen.
CancelClick Cancel to exit this screen without saving

45.5.6 Domain Zone Forwarder

A domain zone forwarder contains a DNS server's IP address. The ZyWALL can query the DNS server to resolve domain zones for features like VPN, DDNS and the time server. A domain zone is a fully qualified domain name without the host.

For example, zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified domain name.

45.5.7 Adding a Domain Zone Forwarder

Click the Add icon in the Domain Zone Forwarder table to add a domain zone forwarder record.

Figure 458 System > DNS > Domain Zone Forwarder Add
ZYXEL ZYWALL USG 2000 - Adding a Domain Zone Forwarder - 1

text_image Configuration Domain Zone DNS Server ● DNS Server(s) from ISP aux First DNS Server Second DNS Server Third DNS Server n/a n/a n/a ○ Public DNS Server ○ Private DNS Server OK Cancel

The following table describes the labels in this screen.

Table 228 System > DNS > Domain Zone Forwarder Add

LABELDESCRIPTION
Domain ZoneA domain zone is a fully qualified domain name without the host. For example, zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified domain name. For example, whenever the ZyWALL receives needs to resolve a zyxel.com.tw domain name, it can send a query to the recorded name server IP address.Enter * if all domain zones are served by the specified DNS server(s).
DNS ServerSelect DNS Server(s) from ISP if your ISP dynamically assigns DNS server information. You also need to select an interface through which the ISP provides the DNS server IP address(es). The interface should be activated and set to be a DHCP client. The fields below display the (read-only) DNS server IP address(es) that the ISP assigns. N/A displays for any DNS server IP address fields for which the ISP does not assign an IP address.Select Public DNS Server if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. The ZyWALL must be able to connect to the DNS server without using a VPN tunnel. The DNS server could be on the Internet or one of the ZyWALL's local networks. You cannot use 0.0.0.0.Select Private DNS Server if you have the IP address of a DNS server to which the ZyWALL connects through a VPN tunnel. Enter the DNS server's IP address in the field to the right. You cannot use 0.0.0.0.
OKClick OK to save your customized settings and exit this screen.
CancelClick Cancel to exit this screen without saving

45.5.8 MX Record

A MX (Mail eXchange) record indicates which host is responsible for the mail for a particular domain, that is, controls where mail is sent for that domain. If you do not configure proper MX records for your domain or other domain, external e-mail from other mail servers will not be able to be delivered to your mail server and vice versa. Each host or domain can have only one MX record, that is, one domain is mapping to one host.

45.5.9 Adding a MX Record

Click the Add icon in the MX Record table to add a MX record.

Figure 459 System > DNS > MX Record Add
ZYXEL ZYWALL USG 2000 - Adding a MX Record - 1

text_image Configuration Domain Name IP Address/FQDN OK Cancel

The following table describes the labels in this screen.

Table 229 System > DNS > MX Record Add

LABELDESCRIPTION
Domain NameEnter the domain name where the mail is destined for.
IP Address/FQDNEnter the IP address or fully qualified domain name of a mail server that handles the mail for the domain specified in the field above.
OKClick OK to save your customized settings and exit this screen.
CancelClick Cancel to exit this screen without saving

45.5.10 Adding a DNS Service Control Rule

Click the Add icon in the Service Control table to add a service control rule.

Figure 460 System > DNS > Service Control Rule Add
ZYXEL ZYWALL USG 2000 - Adding a DNS Service Control Rule - 1

text_image Service Control Address Object ALL Zone ALL Action Accept OK Cancel

The following table describes the labels in this screen.

Table 230 System > DNS > Service Control Rule Add

LABELDESCRIPTION
Address ObjectSelectALLto allow or deny any computer to send DNS queries to the ZyWALL.Select a predefined address object to just allow or deny the computer with the IP address that you specified to send DNS queries to the ZyWALL.
ZoneSelectALLto allow or prevent DNS queries through any zones.Select a predefined zone on which a DNS query to the ZyWALL is allowed or denied.
ActionSelectAcceptto have the ZyWALL allow the DNS queries from the specified computer.SelectDenyto have the ZyWALL reject the DNS queries from the specified computer.
OKClickOKto save your customized settings and exit this screen.
CancelClickCancelto exit this screen without saving

45.6 WWW Overview

The following figure shows secure and insecure management of the ZyWALL coming in from the WAN. HTTPS and SSH access are secure. HTTP, Telnet, and dial-in management access are not secure.

Figure 461 Secure and Insecure Service Access From the WAN
ZYXEL ZYWALL USG 2000 - WWW Overview - 1

flowchart
graph TD
    A["LAN"] --> B["Router"]
    B --> C["Internet"]
    C --> D["WAN"]
    D --> E["HTTPS"]
    D --> F["SSH"]
    D --> G["HTTP"]
    D --> H["Telnet"]
    B --> I["Dial-in Mgmt"]

• See Section 5.6.1 on page 116 for related information on these screens.

Note: To allow the ZyWALL to be accessed from a specified computer using a service, make sure you do not have a service control rule or to-ZyWALL firewall rule to block that traffic.

• See To-ZyWALL Rules on page 322 for more on To-ZyWALL firewall rules.

- See Section 6.5 on page 135 for an example of configuring service control to block administrator HTTPS access from all zones except the LAN.

To stop a service from accessing the ZyWALL, clear Enable in the corresponding service screen.

45.6.1 Service Access Limitations

A service cannot be used to access the ZyWALL when:

1 You have disabled that service in the corresponding screen.
2 The allowed IP address (address object) in the Service Control table does not match the client IP address (the ZyWALL disallows the session).
3 The IP address (address object) in the Service Control table is not in the allowed zone or the action is set to Deny.
4 There is a firewall rule that blocks it.

45.6.2 System Timeout

There is a lease timeout for administrators. The ZyWALL automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling.

Each user is also forced to log in the ZyWALL for authentication again when the reauthentication time expires.

You can change the timeout settings in the User/Group screens.

45.6.3 HTTPS

You can set the ZyWALL to use HTTP or HTTPS (HTTPS adds security) for web configurator sessions. Specify which zones allow web configurator access and from which IP address the access can come.

HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data by ensuring confidentiality (an unauthorized party cannot read the transferred data), authentication (one party can identify the other party) and data integrity (you know if data has been changed).

It relies upon certificates, public keys, and private keys (see Chapter 42 on page 663 for more information).

HTTPS on the ZyWALL is used so that you can securely access the ZyWALL using the web configurator. The SSL protocol specifies that the HTTPS server (the ZyWALL) must always authenticate itself to the HTTPS client (the computer which requests the HTTPS connection with the ZyWALL), whereas the HTTPS client only should authenticate itself when the HTTPS server requires it to do so (select

Authenticate Client Certificates in the WWW screen). Authenticate Client Certificates is optional and if selected means the HTTPS client must send the ZyWALL a certificate. You must apply for a certificate for the browser from a CA that is a trusted CA on the ZyWALL.

Please refer to the following figure.

1 HTTPS connection requests from an SSL-aware web browser go to port 443 (by default) on the ZyWALL's web server.
2 HTTP connection requests from a web browser go to port 80 (by default) on the ZyWALL's web server.

Figure 462 HTTP/HTTPS Implementation
ZYXEL ZYWALL USG 2000 - HTTPS - 1

flowchart
graph TD
    A["Web Server"] --> B["443 HTTPS"]
    A --> C["80 HTTP"]

Note: If you disable HTTP in the WWW screen, then the ZyWALL blocks all HTTP connection attempts.

45.6.4 Configuring WWW

Click System > WWW to open the WWW screen. Use this screen to specify from which zones you can access the ZyWALL using HTTP or HTTPS. You can also specify which IP addresses the access can come from.

Note: Admin Service Control deals with management access (to the web configurator).

User Service Control deals with user access to the ZyWALL (logging into SSL VPN for example).

Figure 463 System > WWW
ZYXEL ZYWALL USG 2000 - Configuring WWW - 1

text_image HTTPS Enable Server Port 443 Authenticate Client Certificates (See Trusted CAs) Server Certificate default Redirect HTTP to HTTPS Admin Service Control

Zone Address Action

- ALL ALL Accept User Service Control

Zone Address Action

- ALL ALL Accept HTTP Enable Server Port 80 Admin Service Control

Zone Address Action

- ALL ALL Accept User Service Control

Zone Address Action

- ALL ALL Accept Authentication Client Authentication Method default Apply Reset

The following table describes the labels in this screen.

Table 231 System > WWW

LABELDESCRIPTION
HTTPS
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ZyWALL web configurator using secure HTTPS connections.
Server PortThe HTTPS server listens on port 443 by default. If you change the HTTPS server port to a different number on the ZyWALL, for example 8443, then you must notify people who need to access the ZyWALL web configurator to use “https://ZyWALL IP Address:8443” as the URL.
Authenticate Client CertificatesSelect Authenticate Client Certificates (optional) to require the SSL client to authenticate itself to the ZyWALL by sending the ZyWALL a certificate. To do that the SSL client must have a CA-signed certificate from a CA that has been imported as a trusted CA on the ZyWALL (see Section 45.6.7.5 on page 723 on importing certificates for details).
Server CertificateSelect a certificate the HTTPS server (the ZyWALL) uses to authenticate itself to the HTTPS client. You must have certificates already configured in theMy Certificatescreen.
Redirect HTTP to HTTPSTo allow only secure web configurator access, select this to redirect all HTTP connection requests to the HTTPS server.
Admin/User Service ControlAdmin Service Control specifies from which zones an administrator can use HTTPS to manage the ZyWALL (using the web configurator). You can also specify the IP addresses from which the administrators can manage the ZyWALL.User Service Control specifies from which zones a user can use HTTPS to log into the ZyWALL (to log into SSL VPN for example). You can also specify the IP addresses from which the users can access the ZyWALL.
#This is the index number of the service control rule.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in theZonefield (Accept) or not (Deny).
Add iconClick theAddicon in the heading row to open a screen where you can add a new rule. Refer toTable 232 on page 716for information on the fields.Click theEditicon to go to the screen where you can edit the rule.Click theAddicon in an entry to add a rule below the current entry.Click theDeleteicon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click theMove to Nicon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
HTTP
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in theService Controltable to access the ZyWALL web configurator using HTTP connections.
Server PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service to access the ZyWALL.
Admin/User Service ControlAdmin Service Control specifies from which zones an administrator can use HTTP to manage the ZyWALL (using the web configurator). You can also specify the IP addresses from which the administrators can manage the ZyWALL.User Service Control specifies from which zones a user can use HTTP to log into the ZyWALL (to log into SSL VPN for example). You can also specify the IP addresses from which the users can access the ZyWALL.
#This is the index number of the service control rule.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in the Zone field (Accept) or not (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 232 on page 716 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
Authentication
Client Authentication MethodSelect a method the HTTPS or HTTP server uses to authenticate a client.You must have configured the authentication methods in the Auth.method screen.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.6.5 Service Control Rules

Click Add or Edit in the Service Control table in a WWW, SSH, Telnet, FTP or SNMP screen to add a service control rule.

Figure 464 System > Service Control Rule Edit
ZYXEL ZYWALL USG 2000 - Service Control Rules - 1

text_image Admin Service Control Address Object ALL Zone ALL Action Accept OK Cancel

The following table describes the labels in this screen.

Table 232 Edit Service Control Rule

LABELDESCRIPTION
Address ObjectSelect ALL to allow or deny any computer to communicate with the ZyWALL using this service.Select a predefined address object to just allow or deny the computer with the IP address that you specified to access the ZyWALL using this service.
ZoneSelect ALL to allow or prevent any ZyWALL zones from being accessed using this service.Select a predefined ZyWALL zone on which a incoming service is allowed or denied.
ActionSelect Accept to allow the user to access the ZyWALL from the specified computers.Select Deny to block the user's access to the ZyWALL from the specified computers.
OKClick OK to save your customized settings and exit this screen.
CancelClick Cancel to exit this screen without saving

45.6.6 Customizing the WWW Login Page

Click System > WWW > Login Page to open the Login Page screen. Use this screen to customize the Web Configurator login screen. You can also customize the page that displays after an access user logs into the Web Configurator to

access network services like the Internet. See Chapter 36 on page 613 for more on access user accounts.

Figure 465 System > WWW > Login Page
ZYXEL ZYWALL USG 2000 - Customizing the WWW Login Page - 1

text_image Service Control Login Page Select Type Use Default Login Page Use Customized Login Page Logo File To upload a logo file (*.gif/png/jpg), browse to the location of the file and then click Upload. File Path Browse... Upload Banner Color #0C2F83 Color (CSS color code) Banner Floor Color #AA1931 Color (CSS color code) Customized Login Page Title ZyWALL USG 2000 Message Color black Color (CSS color code) Note Message Background Picture Browse... Upload Color Color (CSS color code) Window Background Picture Browse... Upload Color Color (CSS color code) Customized Access Page Title You now have logged in. Message Color black Color (CSS color code) Note Message none Window Background Picture Browse... Upload Color Color (CSS color code) Application Reset ZyWALL USG 2000 Enter User Name/Password and click to login. User Name: Password: One-Time Password: Log into SSL VPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. Login Reset ZyWELL You now have logged in. Click the logout button to terminate the access session. You could renew your lease time by clicking the Renew button. For security reason you must login again after 24 hours 00 minutes. Logout

The following figures identify the parts you can customize in the login and access pages.

Figure 466 Login Page Customization
ZYXEL ZYWALL USG 2000 - Customizing the WWW Login Page - 2

text_image 1. Logo ZyXEL ZyWALL USG 2000 Enter User Name/Password and click to login. User Name: Password: One-Time Password: Log into SSL YPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. Login Reset 2. Banner 3. Banner Floor 4. Title 5. Message (color of all text) 6. Note Message (third line of text) 7. Background 8. Window Background

Figure 467 Access Page Customization
ZYXEL ZYWALL USG 2000 - Customizing the WWW Login Page - 3

flowchart
graph TD
    A["1. Logo"] --> B["ZyXEL"]
    B --> C["2. Banner"]
    B --> D["3. Banner Floor"]
    B --> E["4. Title"]
    B --> F["5. Message (color of all text)"]
    B --> G["6. Note Message"]
    B --> H["7. Window Background"]
    B --> I["Welcome"]
    I --> J["Click the logout button to terminate the access session.<br>You could renew your lease time by clicking the Renew button.<br>For security reason you must login again after 24 hours 00 minutes.<br>This is the Note Message"]
    J --> K["Logout"]

You can specify colors in one of the following ways:

  • Click Color to display a screen of web-safe colors from which to choose.
  • Enter the name of the desired color.
  • Enter a pound sign (#) followed by the six-digit hexadecimal number that represents the desired color. For example, use “#000000” for black.

- Enter "rgb" followed by red, green, and blue values in parenthesis and separate by commas. For example, use "rgb(0,0,0)" for black.

Your desired color should display in the preview screen on the right after you click in another field, click Apply, or press [ENTER]. If your desired color does not display, your browser may not support it. Try selecting another color.

The following table describes the labels in the screen.

Table 233 System > WWW > Login Page

LABELDESCRIPTION
Select TypeSelect whether the Web Configurator uses the default login screen or one that you customize in the rest of this screen.
Logo FileYou can upload a graphic logo to be displayed on the upper left corner of the Web Configurator login screen and access page.Specify the location and file name of the logo graphic or clickBrowseto locate it.Note: Use a GIF, JPG, or PNG of 100 kilobytes or less.
BrowseClickBrowseto locate the graphic file on your computer.
UploadClickUploadto transfer the specified graphic file from your computer to the ZyWALL.
Banner ColorSpecify the color of the banner across the top of the login screen and access page.
Banner Floor ColorSpecify the color of the line below the banner that goes across the top of the login screen and access page.
Customized Login PageUse this section to set how the Web Configurator login screen looks.
TitleEnter the title for the top of the screen. Use up to 64 printable ASCII characters. Spaces are allowed.
Message ColorSpecify the color of the screen's text.
Note MessageEnter a note to display at the bottom of the screen. Use up to 64 printable ASCII characters. Spaces are allowed.
BackgroundSet how the screen background looks.To use a graphic, selectPictureand upload a graphic. Specify the location and file name of the logo graphic or clickBrowseto locate it.Note: Use a GIF, JPG, or PNG of 100 kilobytes or less.To use a color, selectColorand specify the color.
Window BackgroundSet how the window's background looks.To use a graphic, selectPictureand upload a graphic. Specify the location and file name of the logo graphic or clickBrowseto locate it.Note: Use a GIF, JPG, or PNG of 100 kilobytes or less.To use a color, selectColorand specify the color.

Table 233 System > WWW > Login Page

LABELDESCRIPTION
Customized Access PageUse this section to customize the page that displays after an access user logs into the Web Configurator to access network services like the Internet.
TitleEnter the title for the top of the screen. Use up to 64 printable ASCII characters. Spaces are allowed.
Message ColorSpecify the color of the screen's text.
Note MessageEnter a note to display below the title. Use up to 64 printable ASCII characters. Spaces are allowed.
Window BackgroundSet how the window's background looks.To use a graphic, selectPictureand upload a graphic. Specify the location and file name of the logo graphic or clickBrowseto locate it.Note: Use a GIF, JPG, or PNG of 100 kilobytes or less.To use a color, selectColorand specify the color.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.

45.6.7 HTTPS Example

If you haven't changed the default HTTPS port on the ZyWALL, then in your browser enter "https://ZyWALL IP Address/" as the web site address where "ZyWALL IP Address" is the IP address or domain name of the ZyWALL you wish to access.

45.6.7.1 Internet Explorer Warning Messages

When you attempt to access the ZyWALL HTTPS server, a Windows dialog box pops up asking if you trust the server certificate. Click View Certificate if you want to verify that the certificate is from the ZyWALL.

You see the following Security Alert screen in Internet Explorer. Select Yes to proceed to the web configurator login screen; if you select No, then web configurator access is blocked.

Figure 468 Security Alert Dialog Box (Internet Explorer)
ZYXEL ZYWALL USG 2000 - Internet Explorer Warning Messages - 1

text_image Security Alert Information you exchange with this site cannot be viewed or changed by others. However, there is a problem with the site's security certificate. The security certificate was issued by a company you have not chosen to trust. View the certificate to determine whether you want to trust the certifying authority. The security certificate date is valid. The name on the security certificate is invalid or does not match the name of the site Do you want to proceed? Yes No View Certificate

45.6.7.2 Netscape Navigator Warning Messages

When you attempt to access the ZyWALL HTTPS server, a Website Certified by an Unknown Authority screen pops up asking if you trust the server certificate. Click Examine Certificate if you want to verify that the certificate is from the ZyWALL.

If Accept this certificate temporarily for this session is selected, then click OK to continue in Netscape.

Select Accept this certificate permanently to import the ZyWALL's certificate into the SSL client.

Figure 469 Security Certificate 1 (Netscape)
ZYXEL ZYWALL USG 2000 - Netscape Navigator Warning Messages - 1

text_image Web Site Certified by an Unknown Authority Unable to verify the identity of ZyWALL_Factory_Default_Certificate as a trusted site. Possible reasons for this error: - Your browser does not recognize the Certificate Authority that issued the site's certificate. - The site's certificate is incomplete due to a server misconfiguration. - You are connected to a site pretending to be ZyWALL_Factory_Default_Certificate, possibly to obtain your confidential information. Please notify the site's webmaster about this problem. Before accepting this certificate, you should examine this site's certificate carefully. Are you willing to to accept this certificate for the purpose of identifying the web site ZyWALL_Factory_Default_Certificate? Examine Certificate... Accept this certificate permanently Accept this certificate temporarily for this session Do not accept this certificate and do not connect to this web site OK Cancel Help

Figure 470 Security Certificate 2 (Netscape)
ZYXEL ZYWALL USG 2000 - Netscape Navigator Warning Messages - 2

text_image Security Error: Domain Name Mismatch You have attempted to establish a connection with "172.23.19.224". However, the security certificate presented belongs to "ZyWALL_Factory_Default_Certificate". It is possible, though unlikely, that someone may be trying to intercept your communication with this web site. If you suspect the certificate shown does not belong to "172.23.19.224", please cancel the connection and notify the site administrator. View Certificate OK Cancel Help

45.6.7.3 Avoiding Browser Warning Messages

The following describes the main reasons that your browser displays warnings about the ZyWALL's HTTPS server certificate and what you can do to avoid seeing the warnings.

  • The issuing certificate authority of the ZyWALL's HTTPS server certificate is not one of the browser's trusted certificate authorities. The issuing certificate authority of the ZyWALL's factory default certificate is the ZyWALL itself since the certificate is a self-signed certificate.
  • For the browser to trust a self-signed certificate, import the self-signed certificate into your operating system as a trusted certificate.
  • To have the browser trust the certificates issued by a certificate authority, import the certificate authority's certificate into your operating system as a trusted certificate. Refer to Appendix D on page 881 for details.

45.6.7.4 Login Screen

After you accept the certificate, the ZyWALL login screen appears. The lock displayed in the bottom of the browser status bar denotes a secure connection.

Figure 471 Login Screen (Internet Explorer)
ZYXEL ZYWALL USG 2000 - Login Screen - 1

text_image Enter User Name/Password and click to login. User Name: Password: ( max. 31 alphanumeric, printable characters and no spaces ) Login to SSL VPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. 3. Turn on Java Runtime Environment (JRE) in your web browser. Login Reset Done Internet

45.6.7.5 Enrolling and Importing SSL Client Certificates

The SSL client needs a certificate if Authenticate Client Certificates is selected on the ZyWALL.

You must have imported at least one trusted CA to the ZyWALL in order for the Authenticate Client Certificates to be active (see the Certificates chapter for details).

Apply for a certificate from a Certification Authority (CA) that is trusted by the ZyWALL (see the ZyWALL's Trusted CA web configurator screen).

Figure 472 ZyWALL Trusted CA Screen
ZYXEL ZYWALL USG 2000 - Enrolling and Importing SSL Client Certificates - 1

text_image My Certificates Trusted Certificates PKI Storage Space in Use 0 % Trusted Certificates Setting

Name Subject Issuer Valid From Valid To

1 zw1050.cer456 CN=ZyWALL_Factory_Default_Certificate CN=ZyWALL_Factory_Default_Certificate 2003-01-01 00:38:30 2022-12-27 00:38:30 Import Refresh

The CA sends you a package containing the CA's trusted certificate(s), your personal certificate(s) and a password to install the personal certificate(s).

45.6.7.5.1 Installing the CA's Certificate

1 Double click the CA's trusted certificate to produce a screen similar to the one shown next.

Figure 473 CA Certificate Example
ZYXEL ZYWALL USG 2000 - Installing the CA's Certificate - 1

text_image Certificate General Details Certification Path Certificate Information This certificate is intended to: • Ensures the identity of a remote computer • Proves your identity to a remote computer • Ensures software came from software publisher • Protects software from alteration after publication • Protects e-mail messages • Allows data to be signed with the current time Issued to: CSO-CA Issued by: CSO-CA Valid from 8/30/2003 to 8/30/2005 Install Certificate... Issuer Statement OK

2 Click Install Certificate and follow the wizard as shown earlier in this appendix.

45.6.7.5.2 Installing Your Personal Certificate(s)

You need a password in advance. The CA may issue the password or you may have to specify it during the enrollment. Double-click the personal certificate given to you by the CA to produce a screen similar to the one shown next

1 Click Next to begin the wizard.

Figure 474 Personal Certificate Import Wizard 1
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 1

text_image Certificate Import Wizard Welcome to the Certificate Import Wizard This wizard helps you copy certificates, certificate trust lists, and certificate revocation lists from your disk to a certificate store. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information used to protect data or to establish secure network connections. A certificate store is the system area where certificates are kept. To continue, click Next.

2 The file name and path of the certificate you double-clicked should automatically appear in the File name text box. Click Browse if you wish to import a different certificate.

Figure 475 Personal Certificate Import Wizard 2
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 2

text_image Certificate Import Wizard File to Import Specify the file you want to import. File name: Browse... Note: More than one certificate can be stored in a single file in the following formats: Personal Information Exchange- PKCS #12 (.PFX,.P12) Cryptographic Message Syntax Standard- PKCS #7 Certificates (.P7B) Microsoft Serialized Certificate Store (.SST) < Back Next > Cancel

3 Enter the password given to you by the CA.

Figure 476 Personal Certificate Import Wizard 3
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 3

text_image Certificate Import Wizard Password To maintain security, the private key was protected with a password. Type the password for the private key. Password: Enable strong private key protection. You will be prompted every time the private key is used by an application if you enable this option. Mark the private key as exportable < Back Next > Cancel

4 Have the wizard determine where the certificate should be saved on your computer or select Place all certificates in the following store and choose a different location.

Figure 477 Personal Certificate Import Wizard 4
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 4

text_image Certificate Import Wizard Certificate Store Certificate stores are system areas where certificates are kept. Windows can automatically select a certificate store, or you can specify a location for • Automatically select the certificate store based on the type of certificate • Place all certificates in the following store Certificate store: Browse... < Back Next > Cancel

5 Click Finish to complete the wizard and begin the import process.

Figure 478 Personal Certificate Import Wizard 5
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 5

text_image Certificate Import Wizard Completing the Certificate Import Wizard You have successfully completed the Certificate Import wizard. You have specified the following settings: Certificate Store Selected Automatically determined by t Content PFX File Name D:\Projects_2003-10\CPE2\cp < Back Finish Cancel

6 You should see the following screen when the certificate is correctly installed on your computer.

Figure 479 Personal Certificate Import Wizard 6
ZYXEL ZYWALL USG 2000 - Click Next to begin the wizard. - 6

text_image Certificate Import Wizard The import was successful. OK

45.6.7.6 Using a Certificate When Accessing the ZyWALL Example

Use the following procedure to access the ZyWALL via HTTPS.

1 Enter 'https://ZyWALL IP Address/ in your browser's web address field.

Figure 480 Access the ZyWALL Via HTTPS
ZYXEL ZYWALL USG 2000 - Using a Certificate When Accessing the ZyWALL Example - 1

text_image about:blank - Microsoft Internet Explorer File Edit View Favorites Tools Help Back Search Favorites History Address https://192.168.1.1

2 When Authenticate Client Certificates is selected on the ZyWALL, the following screen asks you to select a personal certificate to send to the ZyWALL. This screen displays even if you only have a single certificate as in the example.

Figure 481 SSL Client Authentication
ZYXEL ZYWALL USG 2000 - Using a Certificate When Accessing the ZyWALL Example - 2

text_image Client Authentication Identification The Web site you want to view requests identification. Select the certificate to use when connecting. testtls More Info... View Certificate... OK Cancel

3 You next see the web configurator login screen.

Figure 482 Secure Web Configurator Login Screen
ZYXEL ZYWALL USG 2000 - Using a Certificate When Accessing the ZyWALL Example - 3

text_image Enter User Name/Password and click to login. User Name: Password: ( max. 31 alphanumeric, printable characters and no spaces ) Login to SSL VPN Note: 1. Turn on Javascript and Cookie setting in your web browser. 2. Turn off Popup Window Blocking in your web browser. 2. Turn on Java Runtime Environment (JRE) in your web browser. Login Reset Done Internet

45.7 SSH

You can use SSH (Secure SHell) to securely access the ZyWALL's command line interface. Specify which zones allow SSH access and from which IP address the access can come.

SSH is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. In the following figure, computer A on the Internet uses SSH to securely connect to the WAN port of the ZyWALL for a management session.

Figure 483 SSH Communication Over the WAN Example
ZYXEL ZYWALL USG 2000 - SSH - 1

flowchart
graph LR
    A["Device A"] --> B["Router"]
    B --> C["InternetNet Secure Connection"]
    C --> D["Router"]
    D --> E["Computer"]

45.7.1 How SSH Works

The following figure is an example of how a secure connection is established between two remote hosts using SSH v1.

Figure 484 How SSH v1 Works Example
ZYXEL ZYWALL USG 2000 - How SSH Works - 1

flowchart
graph TD
    A["SSH Server"] -->|Connection request| B["SSH Client"]
    B -->|Host Key, Server Key| A
    A -->|Session Key| B
    B -->|Host Identification Pass / Fail| A
    A -->|Encryption method to use| B
    B -->|Password / User name| A
    A -->|Authentication Pass / Fail| B
    B -->|Data Transmission| A

1 Host Identification

The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server.

The client automatically saves any new server public keys. In subsequent connections, the server public key is checked against the saved version on the client computer.

2 Encryption Method

Once the identification is verified, both the client and server must agree on the type of encryption method to use.

3 Authentication and Data Transmission

After the identification is verified and data encryption activated, a secure tunnel is established between the client and the server. The client then sends its authentication information (user name and password) to the server to log in to the server.

45.7.2 SSH Implementation on the ZyWALL

Your ZyWALL supports SSH versions 1 and 2 using RSA authentication and four encryption methods (AES, 3DES, Archfour and Blowfish). The SSH server is implemented on the ZyWALL for management using port 22 (by default).

45.7.3 Requirements for Using SSH

You must install an SSH client program on a client computer (Windows or Linux operating system) that is used to connect to the ZyWALL over SSH.

45.7.4 Configuring SSH

Click System > SSH to change your ZyWALL's Secure Shell settings. Use this screen to specify from which zones SSH can be used to manage the ZyWALL. You can also specify from which IP addresses the access can come.

Note: It is recommended that you disable Telnet and FTP when you configure SSH for secure connections.

Figure 485 System > SSH
ZYXEL ZYWALL USG 2000 - Configuring SSH - 1

text_image SSH Enable Version 1 Server Port 22 Server Certificate default (See My Certificates) Service Control

Zone Address Action

1 ALL ALL Accept Apply Reset

The following table describes the labels in this screen.

Table 234 System > SSH

LABELDESCRIPTION
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ZyWALL CLI using this service.
Version 1Select the check box to have the ZyWALL use both SSH version 1 and version 2 protocols. If you clear the check box, the ZyWALL uses only SSH version 2 protocol.
Server PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Server CertificateSelect the certificate whose corresponding private key is to be used to identify the ZyWALL for SSH connections. You must have certificates already configured in the My Certificates screen (Click My Certificates and see Chapter 42 on page 663 for details).
Service ControlThis specifies from which computers you can access which ZyWALL zones.
#This the index number of the service control rule.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in the Zone field (Accept) or not (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 232 on page 716 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.7.5 Secure Telnet Using SSH Examples

This section shows two examples using a command interface and a graphical interface SSH client program to remotely access the ZyWALL. The configuration and connection steps are similar for most SSH client programs. Refer to your SSH client program user's guide.

45.7.5.1 Example 1: Microsoft Windows

This section describes how to access the ZyWALL using the Secure Shell Client program.

1 Launch the SSH client and specify the connection information (IP address, port number) for the ZyWALL.
2 Configure the SSH client to accept connection using SSH version 1.

3 A window displays prompting you to store the host key in you computer. Click Yes to continue.

Figure 486 SSH Example 1: Store Host Key
ZYXEL ZYWALL USG 2000 - Example 1: Microsoft Windows - 1

text_image Host Identification You are connecting to the host "192.168.1.1" for the first time. The host has provided you its identification, a host public key. The fingerprint of the host public key is: "xevac-bycor-kubyz-dipah-ravut-fyduz-kazuk-goler-cavom-hifot-sexox" You can save the host key to the local database by clicking Yes. You can continue without saving the host key by clicking No. You can also cancel the connection by clicking Cancel. Do you want to save the new host key to the local database? Yes No Cancel Help

Enter the password to log in to the ZyWALL. The CLI screen displays next.

45.7.5.2 Example 2: Linux

This section describes how to access the ZyWALL using the OpenSSH client program that comes with most Linux distributions.

1 Test whether the SSH service is available on the ZyWALL.

Enter "telnet 192.168.1.1 22" at a terminal prompt and press [ENTER]. The computer attempts to connect to port 22 on the ZyWALL (using the default IP address of 192.168.1.1).

A message displays indicating the SSH protocol version supported by the ZyWALL.

Figure 487 SSH Example 2: Test

$ telnet 192.168.1.1 22
Trying 192.168.1.1...
Connected to 192.168.1.1.
Escape character is '^]'.
SSH-1.5-1.0.0 

2 Enter "ssh -1 192.168.1.1". This command forces your computer to connect to the ZyWALL using SSH version 1. If this is the first time you are connecting to the ZyWALL using SSH, a message displays prompting you to save the host information of the ZyWALL. Type "yes" and press [ENTER].

Then enter the password to log in to the ZyWALL.

Figure 488 SSH Example 2: Log in

$ ssh -1 192.168.1.1
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be established.
RSA1 key fingerprint is 21:6c:07:25:7e:f4:75:80:ec:af:bd:d4:3d:80:53:d1.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.1.1' (RSA1) to the list of known hosts.
Administrator@192.168.1.1's password: 

3 The CLI screen displays next.

45.8 Telnet

You can use Telnet to access the ZyWALL's command line interface. Specify which zones allow Telnet access and from which IP address the access can come.

45.8.1 Configuring Telnet

Click System > TELNET to configure your ZyWALL for remote Telnet access. Use this screen to specify from which zones Telnet can be used to manage the ZyWALL. You can also specify from which IP addresses the access can come.

Figure 489 System > Telnet
ZYXEL ZYWALL USG 2000 - Configuring Telnet - 1

text_image TELNET Enable Server Port 23 Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept Apply Reset

The following table describes the labels in this screen.

Table 235 System > Telnet

LABELDESCRIPTION
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ZyWALL CLI using this service.
Server PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Service ControlThis specifies from which computers you can access which ZyWALL zones.
#This the index number of the service control rule.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in the Zone field (Accept) or not (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 232 on page 716 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.9 FTP

You can upload and download the ZyWALL's firmware and configuration files using FTP. To use this feature, your computer must have an FTP client. Please see Chapter 46 on page 749 for more information about firmware and configuration files.

45.9.1 Configuring FTP

To change your ZyWALL's FTP settings, click System > FTP tab. The screen appears as shown. Use this screen to specify from which zones FTP can be used to access the ZyWALL. You can also specify from which IP addresses the access can come.

Figure 490 System > FTP
ZYXEL ZYWALL USG 2000 - Configuring FTP - 1

text_image FTP Enable TLS required Server Port 21 Server Certificate default Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept Apply Reset

The following table describes the labels in this screen.

Table 236 System > FTP

LABELDESCRIPTION
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ZyWALL using this service.
TLS requiredSelect the check box to use FTP over TLS (Transport Layer Security) to encrypt communication.This implements TLS as a security mechanism to secure FTP clients and/or servers.
Server PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Server CertificateSelect the certificate whose corresponding private key is to be used to identify the ZyWALL for FTP connections. You must have certificates already configured in the My Certificates screen (Click My Certificates and see Chapter 42 on page 663 for details).
Service ControlThis specifies from which computers you can access which ZyWALL zones.
#This the index number of the service control rule.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in the Zone field (Accept) or not (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 232 on page 716 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.10 SNMP

Simple Network Management Protocol is a protocol used for exchanging management information between network devices. Your ZyWALL supports SNMP agent functionality, which allows a manager station to manage and monitor the ZyWALL through the network. The ZyWALL supports SNMP version one (SNMPv1)

and version two (SNMPv2c). The next figure illustrates an SNMP management operation.

Figure 491 SNMP Management Model
ZYXEL ZYWALL USG 2000 - SNMP - 1

flowchart
graph TD
    A["MANAGER"] --> B["AGENT"]
    A --> C["AGENT"]
    A --> D["AGENT"]
    B --> E["Managed Device"]
    C --> F["Managed Device"]
    D --> G["Managed Device"]
    style A fill:#f9f,stroke:#333
    style B fill:#ccf,stroke:#333
    style C fill:#ccf,stroke:#333
    style D fill:#ccf,stroke:#333
    linkStyle 0 stroke:#000,stroke-width:2px
    linkStyle 1 stroke:#000,stroke-width:2px
    linkStyle 2 stroke:#000,stroke-width:2px
    linkStyle 3 stroke:#000,stroke-width:2px
    linkStyle 4 stroke:#000,stroke-width:2px
    linkStyle 5 stroke:#000,stroke-width:2px
    linkStyle 6 stroke:#000,stroke-width:2px
    linkStyle 7 stroke:#000,stroke-width:2px
    linkStyle 8 stroke:#000,stroke-width:2px
    linkStyle 9 stroke:#000,stroke-width:2px
    linkStyle 10 stroke:#000,stroke-width:2px
    linkStyle 11 stroke:#000,stroke-width:2px
    linkStyle 12 stroke:#000,stroke-width:2px
    linkStyle 13 stroke:#000,stroke-width:2px
    linkStyle 14 stroke:#000,stroke-width:2px
    linkStyle 15 stroke:#000,stroke-width:2px
    linkStyle 16 stroke:#000,stroke-width:2px
    linkStyle 17 stroke:#000,stroke-width:2px
    linkStyle 18 stroke:#000,stroke-width:2px
    linkStyle 19 stroke:#000,stroke-width:2px
    linkStyle 20 stroke:#000,stroke-width:2px
    linkStyle 21 stroke:#000,stroke-width:2px
    linkStyle 22 stroke:#000,stroke-width:2px
    linkStyle 23 stroke:#000,stroke-width:2px
    linkStyle 24 stroke:#000,stroke-width:2px
    linkStyle 25 stroke:#000,stroke-width:2px
    linkStyle 26 stroke:#000,stroke-width:2px
    linkStyle 27 stroke:#000,stroke-width:2px
    linkStyle 28 stroke:#000,stroke-width:2px
    linkStyle 29 stroke:#000,stroke-width:2px
    linkStyle 30 stroke:#000,stroke-width:2px
    linkStyle 31 stroke:#000,stroke-width:2px
    linkStyle 32 stroke:#000,stroke-width:2px
    linkStyle 33 stroke:#000,stroke-width:2px
    linkStyle 34 stroke:#000,stroke-width:2px
    linkStyle 35 stroke:#000,stroke-width:2px
    linkStyle 36 stroke:#000,stroke-width:2px
    linkStyle 37 stroke:#000,stroke-width:2px
    linkStyle 38 stroke:#000,stroke-width:2px
    linkStyle 39 stroke:#000,stroke-width:2px
    linkStyle 40 stroke:#000,stroke-width:2px
    linkStyle 41 stroke:#000,stroke-width:2px
    linkStyle 42 stroke:#000,stroke-width:2px
    linkStyle 43 stroke:#000,stroke-width:2px
    linkStyle 44 stroke:#000,stroke-width:2px
    linkStyle 45 stroke:#000,stroke-width:2px
    linkStyle 46 stroke:#000,stroke-width:2px
    linkStyle 47 stroke:#000,stroke-width:2px
    linkStyle 48 stroke:#000,stroke-width:2px
    linkStyle 49 stroke:#000,stroke-width:2px
    linkStyle 50 stroke:#000,stroke-width:2px

An SNMP managed network consists of two main types of component: agents and a manager.

An agent is a management software module that resides in a managed device (the ZyWALL). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.

The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects.

SNMP itself is a simple request/response protocol based on the manager/agent model. The manager issues a request and the agent returns responses using the following protocol operations:

- Get - Allows the manager to retrieve an object variable from the agent.

  • GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations.
  • Set - Allows the manager to set values for object variables within an agent.
  • Trap - Used by the agent to inform the manager of some events.

45.10.1 Supported MIBs

The ZyWALL supports MIB II that is defined in RFC-1213 and RFC-1215. The ZyWALL also supports private MIBs (zywall.mib and zyxel-zywall-ZLD-Common.mib) to collect information about CPU and memory usage and VPN total throughput. The focus of the MIBs is to let administrators collect statistical data and monitor status and performance. You can download the ZyWALL's MIBs from www.zyxel.com.

45.10.2 SNMP Traps

The ZyWALL will send traps to the SNMP manager when any one of the following events occurs.

Table 237 SNMP Traps

OBJECT LABELOBJECT IDDESCRIPTION
Cold Start1.3.6.1.6.3.1.1.5.1This trap is sent when the ZyWALL is turned on or an agent restarts.
linkDown1.3.6.1.6.3.1.1.5.3This trap is sent when the Ethernet link is down.
linkUp1.3.6.1.6.3.1.1.5.4This trap is sent when the Ethernet link is up.
authenticationFailure1.3.6.1.6.3.1.1.5.5This trap is sent when an SNMP request comes from non-authenticated hosts.

45.10.3 Configuring SNMP

To change your ZyWALL's SNMP settings, click System > SNMP tab. The screen appears as shown. Use this screen to configure your SNMP settings, including from

which zones SNMP can be used to access the ZyWALL. You can also specify from which IP addresses the access can come.

Figure 492 System > SNMP
ZYXEL ZYWALL USG 2000 - Configuring SNMP - 1

text_image SNMP Configuration Enable Server Port 161 Get Community public Set Community private Trap: Community (Optional) Destination 0.0.0.0 (Optional) Service Control

Zone Address Action

1 ALL ALL Accept - ALL ALL Accept Apply Reset

The following table describes the labels in this screen.

Table 238 System > SNMP

LABELDESCRIPTION
EnableSelect the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ZyWALL using this service.
Server PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Get CommunityEnter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests.
Set CommunityEnter the Set community, which is the password for incoming Set requests from the management station. The default is private and allows all requests.
Trap
CommunityType the trap community, which is the password sent with each trap to the SNMP manager. The default is public and allows all requests.
DestinationType the IP address of the station to send your SNMP traps to.
Service ControlThis specifies from which computers you can access which ZyWALL zones.
#This the index number of the service control rule.The entry with a hyphen (-) instead of a number is the ZyWALL's (non-configurable) default policy. The ZyWALL applies this to traffic that does not match any other configured rule. It is not an editable rule. To apply other behavior, configure a rule that traffic will match so the ZyWALL will not have to use the default policy.
ZoneThis is the zone on the ZyWALL the user is allowed or denied to access.
AddressThis is the object name of the IP address(es) with which the computer is allowed or denied to access.
ActionThis displays whether the computer with the IP address specified above can access the ZyWALL zone(s) configured in the Zone field (Accept) or not (Deny).
Add iconClick the Add icon in the heading row to open a screen where you can add a new rule. Refer to Table 232 on page 716 for information on the fields.Click the Edit icon to go to the screen where you can edit the rule.Click the Add icon in an entry to add a rule below the current entry.Click the Delete icon to remove an existing rule. A window display asking you to confirm that you want to delete the rule. Note that subsequent rules move up by one when you take this action.Click the Move to N icon to display a field to type a number for where you want to put that rule and press [ENTER] to move the rule to the number that you typed.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.11 Dial-in Management

Connect an external serial modem to the AUX port to provide a management connection in case the ZyWALL's other WAN connections are down. This is like an auxiliary interface, except it is used for management connections coming into the ZyWALL instead of as a backup WAN connection.

AT Command Strings

For regular telephone lines, the default Dial string tells the modem that the line uses tone dialing. ATDT is the command for a switch that requires tone dialing. If your switch requires pulse dialing, change the string to ATDP.

DTR Signal

The majority of WAN devices default to hanging up the current call when the DTR (Data Terminal Ready) signal is dropped by the DTE. When the Drop DTR When Hang Up check box is selected, the ZyWALL uses this hardware signal to force the WAN device to hang up, in addition to issuing the drop command ATH.

Response Strings

The response strings tell the ZyWALL the tags, or labels, immediately preceding the various call parameters sent from the serial modem. The response strings

have not been standardized; please consult the documentation of your serial modem to find the correct tags.

45.11.1 Configuring Dial-in Mgmt

Click System > Dial-in Mgmt to display the following screen. Configure this screen for dial-in management connections.

Figure 493 System > Dial-in Mgmt
ZYXEL ZYWALL USG 2000 - Configuring Dial-in Mgmt - 1

text_image Dial-in Server Properties Enable Description (Optonal) Mute Answer Rings 1 (Rings) Port Speed 115200 Initial String Apply Reset Basic

The following table describes the labels in this screen.

Table 239 System > Dial-in Mgmt

LABELDESCRIPTION
Dial-in Server PropertiesClick Advanced to display more configuration fields and edit the details of your dial-in management setup. Click Basic to display fewer fields.
EnableSelect this check box to turn on dial-in management.
DescriptionEnter some information about this connection.
MuteSelect this check box to stop the external serial modem from making audible sounds during a dial-in management session.
Answer RingsSet how many times the ZyWALL lets the incoming dial-in management session ring before processing it.
Port SpeedUse the drop-down list box to select the speed of the connection between the ZyWALL's auxiliary port and the external modem.Available speeds are: 9600, 19200, 38400, 57600, or 115200 bps.
Initial StringType the AT command string that the ZyWALL returns to the external serial modem connected to the ZyWALL's auxiliary port during connection initialization.Note: Consult the manual of your external serial modem connected to your ZyWALL's auxiliary port for specific AT commands.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.12 Vantage CNM

Vantage CNM (Centralized Network Management) is a browser-based global management solution that allows an administrator from any location to easily configure, manage, monitor and troubleshoot ZyXEL devices located worldwide. See the Vantage CNM User's Guide for details.

If you allow your ZyWALL to be managed by the Vantage CNM server, then you should not do any configurations directly to the ZyWALL (using either the web configurator or commands) without notifying the Vantage CNM administrator.

45.12.1 Configuring Vantage CNM

Vantage CNM is disabled on the device by default. Click System > Vantage CNM to configure your device's Vantage CNM settings.

Figure 494 System > Vantage CNM
ZYXEL ZYWALL USG 2000 - Configuring Vantage CNM - 1

text_image Vantage CNM Enable Server IP Address/FQDN Transfer Protocol Device Management IP Keepalive Interval Periodic Inform Interval HTTPS Authentication Vantage Certificate HTTPS Auto 20 (10-90 seconds) 3600 (10-86400 seconds) (See Trusted CAs) Apply Reset Basic

The following table describes the labels in this screen.

Table 240 System > Vantage CNM

LABELDESCRIPTION
Vantage CNMClick Advanced to display more configuration fields or click Basic to display fewer fields.
EnableSelect this check box to allow Vantage CNM to manage your ZyWALL.
Server IP Address/FQDNEnter the IP address or fully qualified domain name of the Vantage server.If the Vantage CNM server is on a different subnet to the ZyWALL and is behind a NAT router, enter the WAN IP address of the NAT router here and configure the NAT router to forward UDP port 11864 traffic to the Vantage CNM server.If the Vantage CNM server is behind a firewall, you may have to create a rule on the firewall to allow UDP port 11864 traffic through to the Vantage CNM server (most (new) ZyXEL firewalls automatically allow this).
Transfer ProtocolSelect whether the Vantage CNM sessions should use regular HTTP connections or secure HTTPS connections.Note: HTTPS is recommended.The Vantage CNM server must use the same setting.
Device Management IPSelect Auto to have the ZyWALL allow Vantage CNM sessions to connect to any of the ZyWALL's IP addresses.Select Custom to specify the ZyWALL's IP address that allows Vantage CNM sessions. Configure the Custom IP field if you select this. You might for example need to specify the IP address when using a WAN trunk that uses multiple WAN IP addresses.
Custom IPSpecify the ZyWALL's IP address that allows Vantage CNM sessions. This field applies when you select Custom in the Device Management IP field.
Keepalive IntervalSet how often the ZyWALL sends a keep alive packet to the Vantage CNM server if there is no other traffic. The keep alive packets maintain the Vantage CNM server's control session.
Periodic Inform IntervalSelect this option to have the ZyWALL periodically send "Inform" messages to the Vantage CNM server.
HTTPS AuthenticationWhen you are using HTTPS, select this option to have the ZyWALL authenticate the Vantage CNM server's certificate. In order to do this you need to import the Vantage CNM server's public key (certificate) into the ZyWALL's trusted certificates.
Vantage CertificateSelect the Vantage CNM server's certificate. This applies when you enable HTTPS authentication.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

45.13 Language Screen

Click System > Language to open the following screen. Use this screen to select a display language for the ZyWALL's web configurator screens.

Figure 495 System > Language
ZYXEL ZYWALL USG 2000 - Language Screen - 1

text_image General Settings Language Setting English Apply Reset

The following table describes the labels in this screen.

Table 241 System > Language

LABELDESCRIPTION
Language SettingSelect a display language for the ZyWALL's web configurator screens. You also need to open a new browser session to display the screens in the new language.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

PART X

Maintenance,

Troubleshooting, & Specifications

File Manager (749)

Logs (761)

Reports (775)

Diagnostics (793)

Reboot (795)

Troubleshooting (797)

Product Specifications (803)

File Manager

46.1 Overview

Configuration files define the ZyWALL's settings. Shell scripts are files of commands that you can store on the ZyWALL and run when you need them. You can apply a configuration file or run a shell script without the ZyWALL restarting. You can store multiple configuration files and shell script files on the ZyWALL. You can edit configuration files or shell scripts in a text editor and upload them to the ZyWALL. Configuration files use a .conf extension and shell scripts use a .zysh extension.

46.1.1 What You Can Do in the File Manager Screens

  • Use the Configuration File screen (see Section 46.2 on page 752) to store and name configuration files. You can also download configuration files from the ZyWALL to your computer and upload configuration files from your computer to the ZyWALL.
  • Use the Firmware Package screen (see Section 46.3 on page 756) to check your current firmware version and upload firmware to the ZyWALL.
  • Use the Shell Script screen (see Section 46.4 on page 758) to store, name, download, upload and run shell script files.

46.1.2 What you Need to Know About the File Manager

Configuration Files and Shell Scripts

When you apply a configuration file, the ZyWALL uses the factory default settings for any features that the configuration file does not include. When you run a shell script, the ZyWALL only applies the commands that it contains. Other settings do not change.

These files have the same syntax, which is also identical to the way you run CLI commands manually. An example is shown below.

Figure 496 Configuration File / Shell Script: Example

<h1 id="enter-configuration-mode">enter configuration mode</h1>
configure terminal
<h1 id="change-administrator-password">change administrator password</h1>
username admin password 4321 user-type admin
<h1 id="configure-ge3">configure ge3</h1>
interface ge3
ip address 172.23.37.240 255.255.255.0
ip gateway 172.23.37.254 metric 1
exit
<h1 id="create-address-objects-for-remote-management-to-zywall-firewall-rules">create address objects for remote management / to-ZyWALL firewall rules</h1>
<h1 id="use-the-address-group-in-case-we-want-to-open-up-remote-management-later">use the address group in case we want to open up remote management later</h1>
address-object TW_SUBNET 172.23.37.0/24
object-group address TW_TEAM
address-object TW_SUBNET
exit
<h1 id="enable-telnet-access-not-enabled-by-default-unlike-other-services">enable Telnet access (not enabled by default, unlike other services)</h1>
ip telnet server
<h1 id="open-wan-to-zywall-firewall-for-tw_team-for-remote-management">open WAN-to-ZyWALL firewall for TW_TEAM for remote management</h1>
firewall WAN ZyWALL insert 4
sourceip TW_TEAM
service TELNET
action allow
exit
write 

While configuration files and shell scripts have the same syntax, the ZyWALL applies configuration files differently than it runs shell scripts. This is explained below.

Table 242 Configuration Files and Shell Scripts in the ZyWALL

Configuration Files (.conf) Shell Scripts (.zysh)
• Resets to default configuration.
• Goes into CLI Configuration mode.
• Runs the commands in the configuration file.
• Goes into CLI Privilege mode.
• Runs the commands in the shell script. 

You have to run the example in Figure 496 on page 750 as a shell script because the first command is run in Privilege mode. If you remove the first command, you have to run the example as a configuration file because the rest of the commands are executed in Configuration mode.

Comments in Configuration Files or Shell Scripts

In a configuration file or shell script, use “#” or “!” as the first character of a command line to have the ZyWALL treat the line as a comment.

Your configuration files or shell scripts can use "exit" or a command line consisting of a single "!" to have the ZyWALL exit sub command mode.

Note: “exit” or “!” must follow sub commands if it is to make the ZyWALL exit sub command mode.

Line 3 in the following example exits sub command mode.

interface gel
ip address dhcp
! 

Lines 1 and 3 in the following example are comments and line 4 exits sub command mode.

!
interface gel
<h1 id="this-interface-is-a-dhcp-client">this interface is a DHCP client</h1>
! 

Lines 1 and 2 are comments. Line 5 exits sub command mode.

! this is from Joe
<h1 id="on-20080405">on 2008/04/05</h1>
interface gel
ip address dhcp
! 

Errors in Configuration Files or Shell Scripts

When you apply a configuration file or run a shell script, the ZyWALL processes the file line-by-line. The ZyWALL checks the first line and applies the line if no errors are detected. Then it continues with the next line. If the ZyWALL finds an error, it stops applying the configuration file or shell script and generates a log.

You can change the way a configuration file or shell script is applied. Include setenv stop-on-error off in the configuration file or shell script. The ZyWALL ignores any errors in the configuration file or shell script and applies all of the valid commands. The ZyWALL still generates a log for any errors.

46.2 The Configuration File Screen

Click Maintenance > File Manager > Configuration File to open the Configuration File screen. Use the Configuration File screen to store, run, and name configuration files. You can also download configuration files from the ZyWALL to your computer and upload configuration files from your computer to the ZyWALL.

Once your ZyWALL is configured and functioning properly, it is highly recommended that you back up your configuration file before making further configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.

Configuration File Flow at Restart

  • If there is not a startup-config.conf when you restart the ZyWALL (whether through a management interface or by physically turning the power off and back on), the ZyWALL uses the system-default.conf configuration file with the ZyWALL's default settings.
  • If there is a startup-config.conf, the ZyWALL checks it for errors and applies it. If there are no errors, the ZyWALL uses it and copies it to the lastgood.conf configuration file as a back up file. If there is an error, the ZyWALL generates a log and copies the startup-config.conf configuration file to the startup-config-bad.conf configuration file and tries the existing lastgood.conf configuration file. If there isn't a lastgood.conf configuration file or it also has an error, the ZyWALL applies the system-default.conf configuration file.

- You can change the way the startup-config.conf file is applied. Include the setenv-startup stop-on-error off command. The ZyWALL ignores any errors in the startup-config.conf file and applies all of the valid commands. The ZyWALL still generates a log for any errors.

Figure 497 Maintenance > File Manager > Configuration File
ZYXEL ZYWALL USG 2000 - Configuration File Flow at Restart - 1

text_image Configuration File Firmware Package Shell Script Configuration Files Select the file # File Name Size Last Modified 1 system-default.conf 8169 2007-02-28 03:10:45 2startup-config.conf 26457 2007-03-23 14:06:02 3lastgood.conf 26457 2007-03-28 15:56:11 4startup-config-back.conf 17601 2003-01-03 10:28:17 5startup-config-bad.conf 12730 2007-03-01 10:40:51 6backup.conf 23422 2006-05-30 09:30:26 Download Copy Rename Delete Run Upload Configuration File To upload a configuration file, browse to the location of the file (.conf) and then click Upload. File Path: Browse... Upload

Do not turn off the ZyWALL while configuration file upload is in progress.

The following table describes the labels in this screen.

Table 243 Maintenance > File Manager > Configuration File

LABELDESCRIPTION
Configuration Files
#This column displays the number for each configuration file entry. The total number of configuration files that you can save depends on the sizes of the configuration files and the available flash storage space.
File NameThis column displays the label that identifies a configuration file.You cannot delete the following configuration files or change their file names.Thesystem-default.conffile contains the ZyWALL's default settings.Select this file and clickApplyto reset all of the ZyWALL settings to the factory defaults. This configuration file is included when you upload a firmware package.Thestartup-config.conffile is the configuration file that the ZyWALL is currently using. If you make and save changes during your management session, the changes are applied to this configuration file. The ZyWALL applies configuration changes made in the web configurator to the configuration file when you clickApplyorOK. It applies configuration changes made via commands when you use the write command.Thelastgood.confis the most recently used (valid) configuration file that was saved when the device last restarted. If you upload and apply a configuration file with an error, you can apply lastgood.conf to return to a valid configuration.
SizeThis column displays the size (in KB) of a configuration file.
Last ModifiedThis column displays the date and time that the individual configuration files were last changed or saved.
DownloadClick a configuration file's row to select it and clickDownloadto save the configuration to your computer.
CopyRenameUse this button to save a duplicate of a configuration file on the ZyWALL.Click a configuration file's row to select it and clickCopyto open theCopy File screen.Figure 498 Maintenance > File Manager > Configuration File > CopyZYXEL ZYWALL USG 2000 - Do not turn off the ZyWALL while configuration file upload is in progress. - 1Specify a name for the duplicate configuration file. Use up to 25 characters (including a-zA-Z0-9;‘~!@#%^&()_+[]'.',=-.ClickOKto save the duplicate or clickCancelto close the screen without saving a duplicate of the configuration file.Use this button to change the label of a configuration file on the ZyWALL. You can only rename manually saved configuration files. You cannot rename the lastgood.conf, system-default.conf and startup-config.conf files.You cannot rename a configuration file to the name of another configuration file in the ZyWALL.Click a configuration file's row to select it and click Rename to open the Rename File screen.Figure 499 Maintenance > File Manager > Configuration File > RenameZYXEL ZYWALL USG 2000 - Do not turn off the ZyWALL while configuration file upload is in progress. - 2Specify the new name for the configuration file. Use up to 25 characters (including a-zA-Z0-9; '~!@#%^&()_+[]{''.=-).Click OK to save the duplicate or click Cancel to close the screen without saving a duplicate of the configuration file.
DeleteClick a configuration file's row to select it and click Delete to remove the configuration file from the ZyWALL. You can only delete manually saved configuration files. You cannot delete the system-default.conf, startup-config.conf and lastgood.conf files.A pop-up window asks you to confirm that you want to delete the configuration file. Click OK to delete the configuration file or click Cancel to close the screen without deleting the configuration file.
RunUse this button to have the ZyWALL use a specific configuration file.Click a configuration file's row to select it and click Run to have the ZyWALL use that configuration file. The ZyWALL does not have to restart in order to use a different configuration file, although you will need to wait for a few minutes while the system reconfigures.
Upload Configurati on FileThe bottom part of the screen allows you to upload a new or previously saved configuration file from your computer to your ZyWALLYou cannot upload a configuration file named system-default.conf or lastgood.conf.If you upload startup-config.conf, it will replace the current configuration and immediately apply the new settings.
File PathType in the location of the file you want to upload in this field or click Browse ... to find it.
Browse...Click Browse... to find the .conf file you want to upload. The configuration file must use a “.conf” filename extension. You will receive an error message if you try to upload a fie of a different format. Remember that you must decompress compressed (.zip) files before you can upload them.
UploadClick Upload to begin the upload process. This process may take up to two minutes.

46.3 The Firmware Package Screen

Click Maintenance > File Manager > Firmware Package to open the Firmware Package screen. Use the Firmware Package screen to check your current firmware version and upload firmware to the ZyWALL.

Note: The web configurator is the recommended method for uploading firmware. You only need to use the command line interface if you need to recover the firmware. See the CLI Reference Guide for how to determine if you need to recover the firmware and how to recover it.

Find the firmware package at www.zyxel.com in a file that (usually) uses the system model name with a .bin extension, for example, "zywall.bin".

The ZyWALL's firmware package cannot go through the ZyWALL when you enable the anti-virus Destroy compressed files that could not be decompressed option. The ZyWALL classifies the firmware package as not being able to be decompressed and deletes it. You can upload the firmware package to the ZyWALL with the option enabled, so you only need to clear the Destroy compressed files that could not be decompressed option while you download the firmware package. See Section 29.2.1 on page 479 for more on the anti-virus Destroy compressed files that could not be decompressed option.

The firmware update can take up to five minutes. Do not turn off or reset the ZyWALL while the firmware update is in progress!

Figure 500 Maintenance > File Manager > Firmware Package
ZYXEL ZYWALL USG 2000 - The firmware update can take up to five minutes. Do not turn off or reset the ZyWALL while the firmware update is in progress! - 1

text_image Configuration File Firmware Package Shell Script Version Boot Module: 1.13 Current Version: 2.11(AQW.0)Preb4-20081029 Released Date: 2008-10-29 13:47:48 Upload File To upload firmware package, browse to the location of the file and then click Upload. File Path: Browse... Upload

The following table describes the labels in this screen.

Table 244 Maintenance > File Manager > Firmware Package

LABELDESCRIPTION
Version
Boot ModuleThis is the version of the boot module that is currently on the ZyWALL.
Current VersionThis is the firmware version and the date created.
Released DateThis is the date that the version of the firmware was created.
Upload File
File PathType in the location of the file you want to upload in this field or click Browse ... to find it.
Browse...Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them.
UploadClick Upload to begin the upload process. This process may take up to two minutes.

After you see the Firmware Upload in Process screen, wait two minutes before logging into the ZyWALL again.

Figure 501 Firmware Upload In Process
ZYXEL ZYWALL USG 2000 - The firmware update can take up to five minutes. Do not turn off or reset the ZyWALL while the firmware update is in progress! - 2

text_image Please Wait ...

Note: The ZyWALL automatically reboots after a successful upload.

The ZyWALL automatically restarts causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.

Figure 502 Network Temporarily Disconnected
ZYXEL ZYWALL USG 2000 - The firmware update can take up to five minutes. Do not turn off or reset the ZyWALL while the firmware update is in progress! - 3

text_image Local Area Connection Network cable unplugged 10:44

After five minutes, log in again and check your new firmware version in the HOME screen.

If the upload was not successful, the following message appears in the status bar at the bottom of the screen.

Figure 503 Firmware Upload Error
ZYXEL ZYWALL USG 2000 - The firmware update can take up to five minutes. Do not turn off or reset the ZyWALL while the firmware update is in progress! - 4

text_image Message Error: [-42007], Firmware content error!

46.4 The Shell Script Screen

Use shell script files to have the ZyWALL use commands that you specify. Use a text editor to create the shell script files. They must use a ".zysh" filename extension.

Click Maintenance > File Manager > Shell Script to open the Shell Script screen. Use the Shell Script screen to store, name, download, upload and run shell script files. You can store multiple shell script files on the ZyWALL at the same time.

Note: You should include write commands in your scripts. If you do not use the write command, the changes will be lost when the ZyWALL restarts. You could use multiple write commands in a long script.

Figure 504 Maintenance > File Manager > Shell Script
ZYXEL ZYWALL USG 2000 - The Shell Script Screen - 1

text_image Configuration File Firmware Package Shell Script Shell Scripts Select the file

File Name Size Last Modified

1 a_100_qqqqq.zysh 74609 2007-11-13 09:23:15 2 a_100_vpn.zysh 74609 2007-11-13 09:26:03 Download Copy Rename Delete Run Upload Shell Script "To upload a shell script, browse to the location of the file (.zysh) and then click Upload." File Path: Browse... Upload

Each field is described in the following table.

Table 245 Maintenance > File Manager > Shell Script

LABELDESCRIPTION
Shell Scripts
#This column displays the number for each shell script file entry.
File NameThis column displays the label that identifies a shell script file.
SizeThis column displays the size (in KB) of a shell script file.
Last ModifiedThis column displays the date and time that the individual shell script files were last changed or saved.
DownloadClick a shell script file's row to select it and clickDownloadto save the configuration to your computer.
CopyUse this button to save a duplicate of a shell script file on the ZyWALL.Click a shell script file's row to select it and clickCopyto open theCopy File screen.Figure 505 Maintenance >File Manager > Shell Script > CopyZYXEL ZYWALL USG 2000 - File Name Size    Last Modified - 1Specify a name for the duplicate file. Use up to 25 characters (including a-zA-Z0-9; '~!@#%^&()_+[]'.',= -).ClickOKto save the duplicate or clickCancelto close the screen without saving a duplicate of the configuration file.
RenameUse this button to change the label of a shell script file on the ZyWALL.You cannot rename a shell script to the name of another shell script in the ZyWALL.Click a shell script's row to select it and clickRenameto open theRename File screen.Figure 506 Maintenance >File Manager > Shell Script > RenameZYXEL ZYWALL USG 2000 - File Name Size    Last Modified - 2Specify the new name for the shell script file. Use up to 25 characters (including a-zA-Z0-9; '~!@#%^&()_+[]{'',= -).ClickOKto save the duplicate or clickCancelto close the screen without saving a duplicate of the configuration file.
DeleteClick a shell script file's row to select it and clickDeleteto delete the shell script file from the ZyWALL.A pop-up window asks you to confirm that you want to delete the shell script file. ClickOKto delete the shell script file or clickCancelto close the screen without deleting the shell script file.
RunUse this button to have the ZyWALL use a specific shell script file.Click a shell script file's row to select it and clickRunto have the ZyWALL use that shell script file. You may need to wait awhile for the ZyWALL to finish applying the commands.
Upload Shell ScriptThe bottom part of the screen allows you to upload a new or previously saved shell script file from your computer to your ZyWALL.
File PathType in the location of the file you want to upload in this field or clickBrowse... to find it.
Browse...ClickBrowse... to find the .zysh file you want to upload.
UploadClickUploadto begin the upload process. This process may take up to several minutes.

47.1 Overview

This chapter provides general information about the ZyWALL's log feature.

Note: When a log reaches the maximum number of log messages, new log messages automatically overwrite existing log messages, starting with the oldest existing log message first.

  • For individual log descriptions, see Appendix A on page 811.
  • For the maximum number of log messages in the ZyWALL, see Table 262 on page 804.

47.2 What You Can Do In The Log Screens

  • Use the Maintenance > View Log screen (Section 47.3 on page 761) to view current log messages. You can change the way the log is displayed, you can e-mail the log, and you can also clear the log in this screen.
  • Use the Maintenance > Log Settings screen (Section 47.4 on page 764) to specify which log messages are e-mailed, where they are e-mailed, and how often they are e-mailed.

47.3 View Log Screen

- Log messages are stored in two separate logs, one for regular log messages and one for debugging messages. In the regular log, you can look at all the log messages by selecting All Logs, or you can select a specific category of log messages (for example, firewall or user). You can also look at the debugging log by selecting Debug Log. All debugging messages have the same priority.

To access this screen, click Maintenance > View Log. The log is displayed in the following screen.

Figure 507 Maintenance > Log > View Log
ZYXEL ZYWALL USG 2000 - View Log Screen - 1

text_image View Log Log Setting Logs Hide Filter Display All Logs Source Address Service Any Search Column Setting Total logging entries: 134 30 entries per page Page: 16 1 of 5 Time Priority Category Message Source Destination Note 2 2007-01-01 08:29:47 warn ADP from Any to ZyWALL, [type=Scan-Detection(0122023)] UDP Filtered Port Sweep Action: No Action Severity: medium [count=3] 2 2007-01-01 08:28:22 warn ADP from Any to ZyWALL, [type=Scan-Detection(0122023)] UDP Filtered Port Sweep Action: No Action Severity: medium [count=6] 2 2007-01-01 08:24:47 notice User Administrator admin from Http/Https has logged in ZyWALL 192.168.1.34 192.168.1.25S ACCESS FORWARD 2 2007-01-01 08:24:39 info DHCP DHCP server assigned 192.168.1.34 to twpc13477(00:OF:FE:32:B4:12) 2 2007-01-01 08:24:38 info DHCP Requested 192.168.1.34 from twpc13477(00:OF:FE:32:B4:12) 2 2007-01-01 08:24:39 info DHCP DHCP server offered 192.168.1.34 to twpc13477(00:OF:FE:32:B4:12) 2 2007-01-01 08:24:36 info DHCP Requested 172.23.37.49 from (00:OF:FE:32:B4:12) 2 2007-01-01 08:24:32 alert System Port 1 is up!! 2 2007-01-01 08:14:15 alert System Port 1 is down!! 2 2007-01-01 08:14:07 notice User Administrator admin from Http/Https has logged out ZyWALL 192.168.1.34 192.168.1.1 Account: admin 2 2007-01-01 07:39:13 warn ADP from Any to ZyWALL, [type=Scan-Detection(0122023)] UDP Filtered Port Sweep Action: No Action Severity: medium 2 2007-01-01 08:24:39 info DHCP DHCP server offered 192.168.1.34 to twpc13477(00:OF:FE:32:B4:12) 2 2007-01-01 08:24:36 info DHCP Requested 172.33.37.49 from (00:OF:FE:32:B4:12) 2 2007-01-01 08:24:32 alert System Port 1 is up!! 2 2007-01-01 08:14:15 alert System Port 1 is down!! 2 2007-01-01 08:14:07 notice User Administrator admin from Http/Https has logged out ZyWALL 192.168.1.34 192.168.1.1 Account: admin

Events that generate an alert (as well as a log message) display in red. Regular logs display in black. The following table describes the labels in this screen.

Table 246 Maintenance > Log > View Log

LABELDESCRIPTION
Show Filter / Hide FilterClick this button to show or hide the filter settings.If the filter settings are hidden, the Display, Email Log Now, Refresh, and Clear Log fields are available.If the filter settings are shown, the Display, Priority, Source Address, Destination Address, Service, Keyword, and Search fields are available.
No FilterThese fields and buttons display when you hide the filter.
DisplaySelect the log(s) you want to view. You can also view All Logs on one screen, or you can view the Debug Log. The screen is updated right after you change the selection.
Email Log NowClick this button to send the selected log message(s) to the Active e-mail address(es) specified in the Send Log To field on the Log Settings page. (See Section 47.4.1 on page 765 or Section 47.4.2 on page 766 for more information about these fields.)
RefreshClick this button to update the information on the log screen.
Clear LogClick this button to clear the whole log, regardless of what is currently displayed on the screen.
FilterThese fields are displayed when you show the filter. When the filter is shown, the filter criteria are not applied until you click the Search button.
DisplaySelect the log message(s) you want to view. You can also view All Logs at one time, or you can view the Debug Log.
PriorityThis field is read-only if the Category is Debug Log. Select the lowest-priority log messages you would like to see. The log will display every log message with this priority or higher. Choices are: any, emerg, alert, crit, error, warn, notice, and info, from highest priority to lowest priority.
Source AddressType the IP address of the source of the incoming packet when the log message was generated. Do not include the port in this filter.
Destination AddressType the IP address of the destination of the incoming packet when the log message was generated. Do not include the port in this filter.
ServiceSelect the service whose log messages you would like to see. The web configurator uses the protocol and destination port number(s) of the service to select which log messages you see.
KeywordType a keyword to look for in theMessage, Source, DestinationandNotefields. If a match is found in any field, the log message is displayed. You can use up to 63 alphanumeric characters and the underscore, as well as punctuation marks ()',:;?! +-*/= #$% @ ; the period, double quotes, and brackets are not allowed.
SearchClick this button to update the log using the current filter settings.
Column SettingClick this icon to open a screen where you can configure how the columns in the log table display.Select the titles of any columns you don't want to display and use the left-arrow button to move them to the left column to hide them. Select titles and use theMove UpandMove Downbuttons to arrange their display sequence.Figure 508 Maintenance > Log > View Log > Column SettingZYXEL ZYWALL USG 2000 - View Log Screen - 2
Total logging entriesThis is the number of logs recorded in the ZyWALL.
entries per pageSelect the number of log messages you would like to see on one screen.Choices are:30,50,and80.
Page x of xThis is the number of the page of entries currently displayed and the total number of pages of entries. Type a page number to go to or use the arrows to navigate the pages of entries.
#This field is a sequential value, and it is not associated with a specific log message.
TimeThis field displays the time the log message was recorded.
PriorityThis field displays the priority of the log message. It has the same range of values as thePriorityfield above.
CategoryThis field displays the log that generated the log message. It is the same value used in theDisplayand (other)Categoryfields.
MessageThis field displays the reason the log message was generated. The text “[count=x]”, where x is a number, appears at the end of the Message field if log consolidation is turned on (see Log Consolidation in Table 248 on page 768) and multiple entries were aggregated to generate into this one.
SourceThis field displays the source IP address and the port number in the event that generated the log message.
DestinationThis field displays the destination IP address and the port number of the event that generated the log message.
NoteThis field displays any additional information about the log message.

The web configurator saves the filter settings if you leave the View Log screen and return to it later.

47.4 Log Setting Screens

The Log Setting screens control log messages and alerts. A log message stores the information for viewing (for example, in the View Log tab) or regular e-mailing later, and an alert is e-mailed immediately. Usually, alerts are used for events that require more serious attention, such as system errors and attacks.

The ZyWALL provides a system log and supports e-mail profiles and remote syslog servers. The system log is available on the View Log tab, the e-mail profiles are used to mail log messages to the specified destinations, and the other four logs are stored on specified syslog servers.

The Log Setting tab also controls what information is saved in each log. For the system log, you can also specify which log messages are e-mailed, where they are e-mailed, and how often they are e-mailed.

For alerts, the Log Settings tab controls which events generate alerts and where alerts are e-mailed.

The Log Settings Summary screen provides a summary of all the settings. You can use the Log Settings Edit screen to maintain the detailed settings (such as log categories, e-mail addresses, server names, etc.) for any log. Alternatively, if you want to edit what events is included in each log, you can also use the Active Log Summary screen to edit this information for all logs at the same time.

47.4.1 Log Setting Summary

To access this screen, click Maintenance > Log > Log Setting.

Figure 509 Maintenance > Log > Log Setting
ZYXEL ZYWALL USG 2000 - Log Setting Summary - 1

text_image View Log Log Setting Log Setting

Name Log Format Summary Modify

1 System Log Internal E-mail Server 1 Mail Server : Mail Subject : Send From : Send Log to : Send Alert to : Schedule : Send log when full. E-mail Server 2 Mail Server : Mail Subject : Send From : Send Log to : Send Alert to : Schedule : Send log when full. 2 Remote Server 1 VRPT/Syslog Server Address: Log Facility: Local 1 3 Remote Server 2 VRPT/Syslog Server Address: Log Facility: Local 1 4 Remote Server 3 VRPT/Syslog Server Address: Log Facility: Local 1 5 Remote Server 4 VRPT/Syslog Server Address: Log Facility: Local 1 Active Log Summary Apply

The following table describes the labels in this screen.

Table 247 Maintenance > Log > Log Setting

LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific log.
NameThis field displays the name of the log (system log or one of the remote servers).
Log FormatThis field displays the format of the log.Internal - system log; you can view the log on theView Log tab.VRPT/Syslog - ZyXEL's Vantage Report, syslog-compatible format.CEF/Syslog - Common Event Format, syslog-compatible format.
SummaryThis field is a summary of the settings for each log. Please seeSection 47.4.2 on page 766for more information.
ModifyThis column provides icons to activate or deactivate logs and to modify the settings.To activate or deactivate a log, click theActiveicon. Make sure you clickApplyto save and apply the change.To edit the settings, click theEditicon next to the associated log. TheLog Settings Editscreen appears.
Active Log SummaryClick this button to open the Active Log Summary Edit screen.
ApplyClick this button to save your changes (activate and deactivate logs) and make them take effect.

47.4.2 Edit System Log Settings

The Log Settings Edit screen controls the detailed settings for each log in the system log (which includes the e-mail profiles). Go to the Log Settings Summary screen (see Section 47.4.1 on page 765), and click the system log Edit icon.

Figure 510 Maintenance > Log > Log Setting > Edit (System Log)
ZYXEL ZYWALL USG 2000 - Edit System Log Settings - 1

text_image E-mail Server 1 Active Mail Server Mail Subject Send From Send Log to Send Alerts to Sending Log Day for Sending Log Time for Sending Log SMTP Authentication User Name Password (Outgoing SMTP Server Name or IP Address) (E-Mail Address) (E-Mail Address) (E-Mail Address) (When Full) Sunday 00 (Hour) 00 (Minute) Password (When Full) Sunday 00 (Hour) 00 (Minute) E-mail Server 2 Active Mail Server Mail Subject Send From Send Log to Send Alerts to Sending Log Day for Sending Log Time for Sending Log SMTP Authentication User Name Password (Outgoing SMTP Server Name or IP Address) (E-Mail Address) (E-Mail Address) (E-Mail Address) (When Full) Sunday 00 (Hour) 00 (Minute) Password (When Full) Sunday 00 (Hour) 00 (Minute) Active Log and Alert Log Category System Log E-mail Server 1 E-mail Server 2 All Logs □ □ □ □ □ □ □ Account C ○ ○ □ □ □ □ ADP C ○ ○ □ □ □ □ Anti-Spam C ○ ○ □ □ □ □ Anti-Virus C ○ ○ □ □ □ □ Application Patrol C ○ ○ □ □ □ □ Blocked web sites C ○ ○ □ □ □ □ Built-in Service C ○ ○ □ □ □ □ cellular C ○ ○ □ □ □ □ Connectivity Check C ○ ○ □ □ □ □ Content Filter C ○ ○ □ □ □ □ daily-report C ○ ○ □ □ □ □ Default C ○ ○ □ □ □ □ Device HA C ○ ○ □ □ □ □ Dial-in Mgmt. File Manager C ○ ○ □ □ □ □ Firewall C ○ ○ □ □ □ □ Force Authentication C ○ ○ □ □ □ □ Forward web sites C ○ ○ □ □ □ □ IDP C ○ ○ □ □ □ □ IKE C ○ ○ □ □ □ □ Interface C ○ ○ □ □ □ □ IPSec C ○ ○ □ □ □ □ L2TP Over IPSec C ○ ○ □ □ □ □ myZyXEL.com C ○ ○ □ □ □ □ NAT C ○ ○ □ □ □ □ PKI C ○ ○ □ □ □ □ Policy Route C ○ ○ □ □ □ □ Port Grouping C ○ ○ □ □ □ □ Routing Protocol C ○ ○ □ □ □ □ Sessions Limit C ○ ○ □ □ □ □ SSL VPN C ○ ○ □ □ □ □ System C ○ ○ □ □ □ □ User C ○ ○ □ □ □ □ Vantage CNM C ○ ○ □ □ □ □ wlan C ○ ○ □ □ □ □ ZySH C ○ ○ □ □ □ □ Log Consolidation Active Log Consolidation Interval (seconds) 10 (10 - 600) OK Cancel

The following table describes the labels in this screen.

Table 248 Maintenance > Log > Log Setting > Edit (System Log)

LABELDESCRIPTION
E-Mail Server 1/2
ActiveSelect this to send log messages and alerts according to the information in this section. You specify what kinds of log messages are included in log information and what kinds of log messages are included in alerts in the Active Log and Alert section.
Mail ServerType the name or IP address of the outgoing SMTP server.
Mail SubjectType the subject line for the outgoing e-mail.
Send FromType the e-mail address from which the outgoing e-mail is delivered. This address is used in replies.
Send Log ToType the e-mail address to which the outgoing e-mail is delivered.
Send Alerts ToType the e-mail address to which alerts are delivered.
Sending LogSelect how often log information is e-mailed. Choices are: When Full, Hourly and When Full, Daily and When Full, and Weekly and When Full.
Day for Sending LogThis field is available if the log is e-mailed weekly. Select the day of the week the log is e-mailed.
Time for Sending LogThis field is available if the log is e-mailed weekly or daily. Select the time of day (hours and minutes) when the log is e-mailed. Use 24-hour notation.
SMTP AuthenticationSelect this check box if it is necessary to provide a user name and password to the SMTP server.
User NameThis box is effective when you select the SMTP Authentication check box. Type the user name to provide to the SMTP server when the log is e-mailed.
PasswordThis box is effective when you select the SMTP Authentication check box. Type the password to provide to the SMTP server when the log is e-mailed.
Active Log and Alert
Log CategoryThis field displays each category of messages. It is the same value used in the Display and Category fields in the View Log tab. The Default category includes debugging messages generated by open source software.
System logSelect which events you want to log by Log Category (except All Logs; see below). There are three choices:disable all logs(red X) - do not log any information from this categoryenable normal logs(green checkmark) - create log messages and alerts from this categoryenable normal logs and debug logs(yellow checkmark) - create log messages, alerts, and debugging information from this category; the ZyWALL does not e-mail debugging information, however, even if this setting is selected.If you select one of the check boxes for All Logs, it affects the settings for every category.
E-mail Server 1Select whether this category of events should be included in the log messages when it is e-mailed (green checkmark) and/or in alerts (yellow exclamation point) for the e-mail settings specified in E-Mail Server 1. The ZyWALL does not e-mail debugging information, even if it is recorded in the System log.
E-mail Server 2Select whether this category of events should be included in log messages when it is e-mailed (green checkmark) and/or in alerts (yellow exclamation point) for the e-mail settings specified in E-Mail Server 2. The ZyWALL does not e-mail debugging information, even if it is recorded in the System log.
Log Consolidation
ActiveSelect this to activate log consolidation. Log consolidation aggregates multiple log messages that arrive within the specified Log Consolidation Interval. In the View Log tab, the text "[count=x]", where x is the number of original log messages, is appended at the end of the Message field, when multiple log messages were aggregated.
Log Consolidation IntervalType how often, in seconds, to consolidate log information. If the same log message appears multiple times, it is aggregated into one log message with the text "[count=x]", where x is the number of original log messages, appended at the end of the Message field.
OKClick this to save your changes and return to the previous screen.
CancelClick this to return to the previous screen without saving your changes.

47.4.3 Edit Remote Server Log Settings

The Log Settings Edit screen controls the detailed settings for each log in the remote server (syslog). Go to the Log Settings Summary screen (see Section 47.4.1 on page 765), and click a remote server Edit icon.

Figure 511 Maintenance > Log > Log Setting > Edit (Remote Server)
ZYXEL ZYWALL USG 2000 - Edit Remote Server Log Settings - 1

The following table describes the labels in this screen.

Table 249 Maintenance > Log > Log Setting > Edit (Remote Server)

LABELDESCRIPTION
Log Settings for Remote Server 1
ActiveSelect this check box to send log information according to the information in this section. You specify what kinds of messages are included in log information in the Active Log section.
Log FormatThis field displays the format of the log information. It is read-only.VRPT/Syslog - ZyXEL's Vantage Report, syslog-compatible format.CEF/Syslog - Common Event Format, syslog-compatible format.
Server AddressType the server name or the IP address of the syslog server to which to send log information.
Log FacilitySelect a log facility. The log facility allows you to log the messages to different files in the syslog server. Please see the documentation for your syslog program for more information.
Active Log
Log CategoryThis field displays each category of messages. It is the same value used in the Display and Category fields in the View Log tab. The Default category includes debugging messages generated by open source software.
SelectionSelect what information you want to log from each Log Category (except All Logs; see below). Choices are:disable all logs(red X) - do not log any information from this categoryenable normal logs(green checkmark) - log regular information and alerts from this categoryenable normal logs and debug logs(yellow checkmark) - log regular information, alerts, and debugging information from this categoryIf you check one of the check boxes for All Logs, it affects the settings for every category.
OKClick this to save your changes and return to the previous screen.
CancelClick this to return to the previous screen without saving your changes.

47.4.4 Active Log Summary Screen

The Active Log Summary screen allows you to view and to edit what information is included in the system log, e-mail profiles, and remote servers at the same time. It does not let you change other log settings (for example, where and how often log information is e-mailed or remote server names). To access this screen,

go to the Log Settings Summary screen (see Section 47.4.1 on page 765), and click the Active Log Summary button.

Figure 512 Active Log Summary

Active Log Summary
Log CategorySystem logE-mail Server 1E-mail Server 2Remote Server 1Remote Server 2Remote Server 3Remote Server 4
-E-mailE-mailSyslogSyslogSyslogSyslog
✘ ✓ ✓✓ 1✓ 1✘ ✓ ✓✘ ✓ ✓✘ ✓ ✓✘ ✓ ✓
All Logs
AccountC C C 6 C C6 C C6 C C6 C C
ADPC C C 6 C C6 C C6 C C6 C C
Anti-SpamC C C 6 C C6 C C6 C C6 C C
Anti-VirusC C C 6 C C6 C C6 C C6 C C
Application PatrolC C C 6 C C6 C C6 C C6 C C
Blocked web sitesC C C 6 C C6 C C6 C C6 C C
Built-in ServiceC C C 6 C C6 C C6 C C6 C C
cellularC C C 6 C C6 C C6 C C6 C C
Connectivity CheckC C C 6 C C6 C C6 C C6 C C
Content FilterC C C 6 C C6 C C6 C C6 C C
daily-reportC C C 6 C C6 C C6 C C6 C C
DefaultC O O 6 O O6 O O6 O O6 O O
Device HAC O O 6 O O6 O O6 O O6 O O
Dial-in Mgmt.
File Manager
Firewall
Force Authentication

This screen provides a different view and a different way of indicating which messages are included in each log and each alert. Please see Section 47.4.2 on page 766, where this process is discussed. (The Default category includes debugging messages generated by open source software.)

The following table describes the fields in this screen.

Table 250 Maintenance > Log > Log Setting > Active Log Summary

LABELDESCRIPTION
Log CategoryThis field displays each category of messages. It is the same value used in the Display and Category fields in the View Log tab. The Default category includes debugging messages generated by open source software.
SelectionSelect what information you want to log from each Log Category (except All Logs; see below). Choices are:disable all logs(red X) - do not log any information from this categoryenable normal logs(green checkmark) - log regular information and alerts from this categoryenable all logs(yellow checkmark) - log regular information, alerts, and debugging information from this categoryIf you check one of the check boxes for All Logs, it affects the settings for every category.
OKClick this to save your changes and return to the previous screen.
CancelClick this to return to the previous screen without saving your changes.

48.1 Overview

This chapter provides information about the report screens. Use the Report screens to start or stop data collection and view various statistics about traffic passing through your ZyWALL.

Note: Data collection may decrease the ZyWALL's traffic throughput rate.

48.1.1 What You Can Do in the Report Screens

  • Use the Traffic Statistics screen (see Section 48.2 on page 775) to start or stop data collection and view statistics.
  • Use the Session screen (see Section 48.3 on page 778) to view sessions by user or service.
  • Use the Anti-Virus screen (see Section 48.4 on page 781) to start or stop data collection and view virus statistics.
  • Use the IDP screen (Section 48.5 on page 783) to start or stop data collection and view IDP statistics.
  • Use the Anti-Spam screen (Section 48.7 on page 787) to start or stop data collection and view spam statistics.
  • Use the Email Daily Report screen (Section 48.8 on page 790) to configure where and how to send daily reports and what reports to send.

48.2 The Traffic Statistics Screen

Click Maintenance > Report > Traffic Statistics to display the Traffic

Statistics screen. This screen provides basic information about the following for example:

  • Most-visited Web sites and the number of times each one was visited. This count may not be accurate in some cases because the ZyWALL counts HTTP GET packets. Please see Table 251 on page 776 for more information.
  • Most-used protocols or service ports and the amount of traffic on each one

• LAN IP with heaviest traffic and how much traffic has been sent to and from each one

You use the Traffic Statistics screen to tell the ZyWALL when to start and when to stop collecting information for these reports. You cannot schedule data collection; you have to start and stop it manually in the Traffic Statistics screen.

Figure 513 Maintenance > Report > Traffic Statistics
ZYXEL ZYWALL USG 2000 - The Traffic Statistics Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Ema Data Collection ✓ Collect Statistics since 2008-04-02 Wed 07:14:55 to 2008-04-02 Wed 07:15:00 Apply Reset Statistics Interface ge1 Top Host IP Address/User Refresh Flush Data # Direction IP Address/User Amount 1 Rx From 192.168.1.33(admin) 40(Bytes) 2 Tx To 192.168.1.33(admin) 40(Bytes)

There is a limit on the number of records shown in the report. Please see Table 252 on page 778 for more information. The following table describes the labels in this screen.

Table 251 Maintenance > Report > Traffic Statistics

LABELDESCRIPTION
Data Collection
Collect StatisticsSelect this to have the ZyWALL collect data for the report. If the ZyWALL has already been collecting data, the collection period displays to the right. The progress is not tracked here real-time, but you can click the Refresh button to update it.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
Statistics
InterfaceSelect the interface from which to collect information. You can collect information from Ethernet, VLAN, bridge, PPPoE/PPTP, and auxiliary interfaces.
Traffic TypeSelect the type of report to display. Choices are:Host IP Address/User - displays the IP addresses or users with the most traffic and how much traffic has been sent to and from each one.Service/Port - displays the most-used protocols or service ports and the amount of traffic for each one.Web Site Hits - displays the most-visited Web sites and how many times each one has been visited.Each type of report has different information in the report (below).
RefreshClick this button to update the report display.
Flush DataClick this button to discard all of the screen's statistics and update the report display.
These fields are available when the Traffic Type is Host IP Address/User.
#This field is the rank of each record. The IP addresses and users are sorted by the amount of traffic.
DirectionThis field indicates whether the IP address or user is sending or receiving traffic.Ingress-traffic is coming from the IP address or user to the ZyWALL.Egress-traffic is going from the ZyWALL to the IP address or user.
IP Address/UserThis field displays the IP address or user in this record. The maximum number of IP addresses or users in this report is indicated in Table 252 on page 778.
AmountThis field displays how much traffic was sent or received from the indicated IP address or user. If the Direction is Ingress, a red bar is displayed; if the Direction is Egress, a blue bar is displayed. The unit of measure is bytes, Kbytes, Mbytes or Gbytes, depending on the amount of traffic for the particular IP address or user. The count starts over at zero if the number of bytes passes the byte count limit. See Table 252 on page 778.
These fields are available when the Traffic Type is Service/Port.
#This field is the rank of each record. The protocols and service ports are sorted by the amount of traffic.
Service/PortThis field displays the service and port in this record. The maximum number of services and service ports in this report is indicated in Table 252 on page 778.
ProtocolThis field indicates what protocol the service was using.
DirectionThis field indicates whether the indicated protocol or service port is sending or receiving traffic.Incoming-traffic is coming into the router through the interfaceOutgoing-traffic is going out from the router through the interface
AmountThis field displays how much traffic was sent or received from the indicated service / port. If the Direction is Ingress, a red bar is displayed; if the Direction is Egress, a blue bar is displayed. The unit of measure is bytes, Kbytes, Mbytes, Gbytes, or Tbytes, depending on the amount of traffic for the particular protocol or service port. The count starts over at zero if the number of bytes passes the byte count limit. See Table 252 on page 778.
These fields are available when the Traffic Type is Web Site Hits.
#This field is the rank of each record. The domain names are sorted by the number of hits.
Web SiteThis field displays the domain names most often visited. The ZyWALL counts each page viewed on a Web site as another hit. The maximum number of domain names in this report is indicated in Table 252 on page 778.
HitsThis field displays how many hits the Web site received. The ZyWALL counts hits by counting HTTP GET packets. Many Web sites have HTTP GET references to other Web sites, and the ZyWALL counts these as hits too. The count starts over at zero if the number of hits passes the hit count limit. See Table 252 on page 778.

The following table displays the maximum number of records shown in the report, the byte count limit, and the hit count limit.

Table 252 Maximum Values for Reports

LABELDESCRIPTION
Maximum Number of Records20
Byte Count Limit 2^64 bytes; this is just less than 17 million terabytes.
Hit Count Limit 2^64 hits; this is over 1.8 × 10^19 hits.

48.3 The Session Monitor Screen

The Session Monitor screen displays information about active sessions for debugging or statistical analysis. It is not possible to manage sessions in this screen. The following information is displayed.

  • User who started the session
  • Protocol or service port used
  • Source address
  • Destination address
    • Number of bytes received (so far)
    • Number of bytes transmitted (so far)
  • Duration (so far)

You can look at all the active sessions by user or by service, or you can filter the information by user, protocol / service or service group, source address, and/or destination address and view it by user.

To access this screen, login to the web configurator. When the main screen appears, click Maintenance > Report > Session Monitor. The following screen appears.

Figure 514 Maintenance > Report > Session Monitor
ZYXEL ZYWALL USG 2000 - The Session Monitor Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report Session View sessions by users Refresh User Service Source Destination Rx Tx Duration Count

The following table describes the labels in this screen.

Table 253 Maintenance > Report > Session Monitor

LABELDESCRIPTION
ViewSelect how you want the information to be displayed. Choices are:sessions by users - display all active sessions grouped by usersessions by services - display all active sessions grouped by service or protocolsessions by source IP - display all active sessions grouped by source IP addresssessions by destination IP - display all active sessions grouped by destination IP addressall sessions - filter the active sessions by the User, Service, Source Address, and Destination Address, and display each session individually (sorted by user).
RefreshClick this button to update the information on the screen. The screen also refreshes automatically when you open and close the screen.
The User, Service, Source Address, and Destination Address fields display if you view all sessions. Select your desired filter criteria and click the Search button to filter the list of sessions.
UserThis field displays when View is set to all sessions. Type the user whose sessions you want to view. It is not possible to type part of the user name or use wildcards in this field; you must enter the whole user name.
ServiceThis field displays when View is set to all sessions. Select the service or service group whose sessions you want to view. The ZyWALL identifies the service by comparing the protocol and destination port of each packet to the protocol and port of each services that is defined. (See Appendix B on page 871 for more information about services.)
Source AddressThis field displays when View is set to all sessions. Type the source IP address whose sessions you want to view. You cannot include the source port.
Destination AddressThis field displays when View is set to all sessions. Type the destination IP address whose sessions you want to view. You cannot include the destination port.
SearchThis button displays whenViewis set to all sessions. Click this button to update the information on the screen using the filter criteria in theUser, Service, Source Address, and Destination Addressfields.
Active SessionsThis is the total number of active sessions that matched the search criteria.
sessions per pageSelect the number of active sessions displayed on each page. You can use the arrow keys on the right to change pages.
UserThis field displays the user in each active session.If you are looking at the sessions by users (or all sessions) report, click + or - to display or hide details about a user's sessions.
ServiceThis field displays the protocol used in each active session.If you are looking at the sessions by services report, click + or - to display or hide details about a protocol's sessions.
SourceThis field displays the source IP address and port in each active session.If you are looking at the sessions by source IP report, click + or - to display or hide details about a source IP address's sessions.
DestinationThis field displays the destination IP address and port in each active session.If you are looking at the sessions by destination IP report, click + or - to display or hide details about a destination IP address's sessions.
RxThis field displays the amount of information received by the source in the active session.
TxThis field displays the amount of information transmitted by the source in the active session.
DurationThis field displays the length of the active session in seconds.
CountThis field displays the number of active sessions for each user, service, or IP address. This field does not display when you are viewing all sessions (since each session is displayed individually).

48.4 The Anti-Virus Report Screen

Click Maintenance > Report > Anti-Virus to display the following screen. This screen displays anti-virus statistics.

Figure 515 Maintenance > Report > Anti-Virus: Virus Name
ZYXEL ZYWALL USG 2000 - The Anti-Virus Report Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report Setup Collect Statistics Apply Reset Refresh Flush Data Summary Total Files Scanned 0 Total Viruses Detected 0 Statistics Top Entry By Virus Name

Virus Name Occurrence

Total: 0

The following table describes the labels in this screen.

Table 254 Maintenance > Report > Anti-Virus

LABELDESCRIPTION
Setup
Collect StatisticsSelect this check box to have the ZyWALL collect anti-virus statistics.The collection starting time displays after you clickApply. All of the statistics in this screen are for the time period starting at the time displayed here. The format is year, month, day and hour, minute, second. All of the statistics are erased if you restart the ZyWALL or clickFlush Data. Collecting starts over and a new collection start time displays.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.
RefreshClick this button to update the report display.
Flush DataClick this button to discard all of the screen's statistics and update the report display.
Summary
Total Files ScannedThis field displays the number of files that the ZyWALL has scanned.
Total Viruses DetectedThis field displays the number of different viruses that the ZyWALL has detected.
Statistics
Top Entry ByUse this field to have the following (read-only) table display the top anti-virus entries by Virus Name, Source or Destination.Select Virus Name to list the most common viruses that the ZyWALL has detected.Select Source to list the source IP addresses from which the ZyWALL has detected the most virus-infected files.Select Destination to list the most common destination IP addresses for virus-infected files that ZyWALL has detected.
#This field displays the entry's rank in the list of the top entries.
Virus nameThis column displays when you display the entries by Virus Name. This displays the name of a detected virus.
Source IPThis column displays when you display the entries by Source. It shows the source IP address of virus-infected files that the ZyWALL has detected.
Destination IPThis column displays when you display the entries by Destination. It shows the destination IP address of virus-infected files that the ZyWALL has detected.
OccurrencesThis field displays how many times the ZyWALL has detected the event described in the entry.
TotalThis field displays the sum of the occurrences of the events in the entries.

The statistics display as follows when you display the top entries by source.

Figure 516 Maintenance > Report > Anti-Virus: Source
ZYXEL ZYWALL USG 2000 - Virus Name Occurrence - 1

text_image Statistics Top Entry By Source # Source IP Occurrence 1 172.23.39.33 150 Total: 150

The statistics display as follows when you display the top entries by destination.

Figure 517 Maintenance > Report > Anti-Virus: Destination
ZYXEL ZYWALL USG 2000 - Virus Name Occurrence - 2

text_image Statistics Top Entry By Destination

Destination IP Occurrence

1 192.168.105.47 137 2 192.168.105.36 12 3 192.168.105.56 1 Total: 150

48.5 The IDP Report Screen

Click Maintenance > Report > IDP to display the following screen. This screen displays IDP (Intrusion Detection and Prevention) statistics.

Figure 518 Maintenance > Report > IDP: Signature Name
ZYXEL ZYWALL USG 2000 - The IDP Report Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report Setup Collect Statistics Apply Reset Refresh Flush Data Summary Total Session Scanned 0 Total Packet Dropped 0 Total Packet Reset 0 Statistics Top Entry By Signature Name

Signature Name Type Severity Occurrence

Total: 0

The following table describes the labels in this screen.

Table 255 Maintenance > Report > IDP

LABELDESCRIPTION
Setup
Collect StatisticsSelect this check box to have the ZyWALL collect IDP statistics.The collection starting time displays after you clickApply. All of the statistics in this screen are for the time period starting at the time displayed here. The format is year, month, day and hour, minute, second. All of the statistics are erased if you restart the ZyWALL or clickFlush Data. Collecting starts over and a new collection start time displays.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.
RefreshClick this button to update the report display.
Flush DataClick this button to discard all of the screen's statistics and update the report display.
Summary
Total Session ScannedThis field displays the number of sessions that the ZyWALL has checked for intrusion characteristics.
Total Packet DroppedThe ZyWALL can detect and drop malicious packets from network traffic. This field displays the number of packets that the ZyWALL has dropped.
Total Packet ResetThe ZyWALL can detect and drop malicious packets from network traffic. This field displays the number of packets that the ZyWALL has reset.
Statistics
Top Entry ByUse this field to have the following (read-only) table display the top IDP entries by Signature Name, Source or Destination.Select Signature Name to list the most common signatures that the ZyWALL has detected.Select Source to list the source IP addresses from which the ZyWALL has detected the most intrusion attempts.Select Destination to list the most common destination IP addresses for intrusion attempts that the ZyWALL has detected.
#This field displays the entry's rank in the list of the top entries.
Signature NameThis column displays when you display the entries by Signature Name. The signature name identifies a specific intrusion pattern. Click the hyperlink for more detailed information on the intrusion.
TypeThis column displays when you display the entries by Signature Name. It shows the categories of intrusions. See Table 148 on page 501 for more information.
SeverityThis column displays when you display the entries by Signature Name. It shows the level of threat that the intrusions may pose. See Table 147 on page 499 for more information.
Source IPThis column displays when you display the entries by Source. It shows the source IP address of the intrusion attempts.
Destination IPThis column displays when you display the entries by Destination. It shows the destination IP address at which intrusion attempts were targeted.
OccurrencesThis field displays how many times the ZyWALL has detected the event described in the entry.
TotalThis field displays the sum of the occurrences of the events in the entries.

The statistics display as follows when you display the top entries by source.

Figure 519 Maintenance > Report > IDP: Source

#Source IPOccurrence
1192.168.105.33872
2172.23.5.5612
3172.20.0.55411
464.125.132.44389
5192.168.105.123309
6172.23.5.19134
772.246.51.7381
8172.23.39.3375
960.254.185.2753
10192.168.105.7546
Total: 2982

The statistics display as follows when you display the top entries by destination.

Figure 520 Maintenance > Report > IDP: Destination

#Destination IPOccurrence
1172.23.5.5873
2192.168.105.33596
3192.168.105.75444
4192.168.105.57411
5172.23.5.58375
6192.168.105.3787
7192.168.105.4984
8192.168.105.6069
9192.168.105.4766
10172.23.5.1954
Total: 3059

48.6 The Content Filter Report Screen

Click Maintenance > Report > Content Filter to display the following screen. This screen displays content filter statistics.

Figure 521 Maintenance > Report > Content Filter
ZYXEL ZYWALL USG 2000 - The Content Filter Report Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report General Settings Collect Statistics Apply Reset Refresh Flush Data Summary Total Web Pages Inspected 0 Web Pages Warned by Category Service 0 Web Pages Blocked by Category Service 0 Web Pages Blocked by Custom Service 0 Restricted Web Features 0 Forbidden Web Sites 0 URL Keywords 0 Web Pages Blocked Without Policy 0 Web Pages Passed 0 Unsafe Web Pages 0 Managed Web Pages 0 Visit Report Server for Detail

The following table describes the labels in this screen.

Table 256 Maintenance > Report > Content Filter

LABELDESCRIPTION
General Settings
Collect StatisticsSelect this check box to have the ZyWALL collect content filtering statistics.The collection starting time displays after you clickApply. All of the statistics in this screen are for the time period starting at the time displayed here. The format is year, month, day and hour, minute, second. All of the statistics are erased if you restart the ZyWALL or clickFlush Data. Collecting starts over and a new collection start time displays.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.
RefreshClick this button to update the report display.
Flush DataClick this button to discard all of the screen's statistics and update the report display.
Summary
Total Web Pages InspectedThis field displays the number of web pages that the ZyWALL's content filter feature has checked.
Web Pages Warned by Category ServiceThis is the number of web pages that matched an external database content filtering category selected in the ZyWALL and for which the ZyWALL displayed a warning before allowing users access.
Web Pages Blocked by Category ServiceThis is the number of web pages to which the ZyWALL did not allow access because they matched an external database content filtering category to which the ZyWALL was configured to block access.
Web Pages Blocked by Custom ServiceThis is the number of web pages to which the ZyWALL did not allow access due to the content filtering custom service configuration.
Restricted Web FeaturesThis is the number of web pages to which the ZyWALL did not allow access due to the content filtering custom service's restricted web features configuration.
Forbidden Web SitesThis is the number of web pages to which the ZyWALL did not allow access because they matched the content filtering custom service's forbidden web sites list.
URL KeywordsThis is the number of web pages to which the ZyWALL did not allow access because they contained one of the content filtering custom service's list of forbidden keywords.
Web Pages Blocked Without PolicyThis is the number of web pages to which the ZyWALL did not allow access because they were not rated by the external database content filtering service.
Web Pages PassedThis is the number of web pages to which the ZyWALL allowed access.
Unsafe Web PagesThis is the number of requested web pages that the ZyWALL's content filtering service identified as posing a threat to users.
Managed Web PagesThis is the number of requested web pages that the ZyWALL's content filtering service identified as belonging to a category that was selected to be managed.
Report ServerClick this link to go to http://www.myZyXEL.com where you can view content filtering reports after you have activated the category-based content filtering subscription service.

48.7 The Anti-Spam Report Screen

Click Maintenance > Report > Anti-Spam to display the following screen. This screen displays spam statistics.

Figure 522 Maintenance > Report > Anti-Spam: Sender IP
ZYXEL ZYWALL USG 2000 - The Anti-Spam Report Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report General Settings Collect Statistics Apply Reset Refresh Flush Data Email Summary Total Mails Scanned 0 Clear Mails 0 Spam Mails 0 Spam Mails Detected by Black List 0 Spam Mails Detected by DNSBL 0 DNSBL Timeout 0 When mail session threshold is reached Mail Sessions Forwarded 0 Mail Sessions Dropped 0 Statistics Top Sender By Sender IP

Sender IP Occurrence

Total: 0

The following table describes the labels in this screen.

Table 257 Maintenance > Report > Anti-Spam

LABELDESCRIPTION
General Settings
Collect StatisticsSelect this check box to have the ZyWALL collect anti-spam statistics.The collection starting time displays after you clickApply. All of the statistics in this screen are for the time period starting at the time displayed here. The format is year, month, day and hour, minute, second. All of the statistics are erased if you restart the ZyWALL or clickFlush Data. Collecting starts over and a new collection start time displays.
ApplyClickApplyto save your changes back to the ZyWALL.
ResetClickResetto begin configuring this screen afresh.
RefreshClick this button to update the report display.
Flush DataClick this button to discard all of the screen's statistics and update the report display.
Email Summary
Total Mails ScannedThis field displays the number of e-mails that the ZyWALL's anti-spam feature has checked.
Clear MailsThis is the number of e-mails that the ZyWALL has determined to not be spam.
Spam MailsThis is the number of e-mails that the ZyWALL has determined to be spam.
Spam Mails Detected by Black ListThis is the number of e-mails that matched an entry in the ZyWALL's anti-spam black list.
Spam Mails Detected by DNSBLThe ZyWALL can check the sender and relay IP addresses in an e-mail's header against DNS (Domain Name Service)-based spam Black Lists (DNSBLs). This is the number of e-mails that had a sender or relay IP address in the header which matched one of the DNSBLs that the ZyWALL uses.
DSNBL TimeoutThis is how many queries that were sent to the ZyWALL's configured list of DNSBL domains and did not receive a response in time.
Mail Sessions ForwardedThis is how many e-mail sessions the ZyWALL allowed because they exceeded the maximum number of e-mail sessions that the anti-spam feature can check at a time.You can see the ZyWALL's threshold of concurrent e-mail sessions in theAnti-Spam > Status screen.Use theAnti-Spam > Generalscreen to set whether the ZyWALL forwards or drops sessions that exceed this threshold.
Mail Sessions DroppedThis is how many e-mail sessions the ZyWALL dropped because they exceeded the maximum number of e-mail sessions that the anti-spam feature can check at a time.You can see the ZyWALL's threshold of concurrent e-mail sessions in the Anti-Spam > Status screen.Use the Anti-Spam > General screen to set whether the ZyWALL forwards or drops sessions that exceed this threshold.
Statistics
Top Sender ByUse this field to list the top e-mail or IP addresses from which the ZyWALL has detected the most spam.SelectSender IP to list the source IP addresses from which the ZyWALL has detected the most spam.SelectSender Email Address to list the top e-mail addresses from which the ZyWALL has detected the most spam.
#This field displays the entry's rank in the list of the top entries.
Sender IPThis column displays when you display the entries bySender IP. It shows the source IP address of spam e-mails that the ZyWALL has detected.
Sender Mail AddressThis column displays when you display the entries bySender Mail Address. This column displays the e-mail addresses from which the ZyWALL has detected the most spam.
OccurrenceThis field displays how many spam e-mails the ZyWALL detected from the sender.
TotalThis field displays the sum of the occurrences of the events in the entries.

48.8 The Email Daily Report Screen

Click Maintenance > Report > Email Daily Report to display the following screen. Configure this screen to have the ZyWALL e-mail you system statistics every day.

Figure 523 Maintenance > Report > Email Daily Report
ZYXEL ZYWALL USG 2000 - The Email Daily Report Screen - 1

text_image Traffic Statistics Session Monitor Anti-Virus IDP Content Filter Anti-Spam Email Daily Report General Settings Enable Email Daily Report Email Settings Mail Server (Outgoing SMTP Server Name or IP Address) Mail Subject Append system name Append date time Mail From (Email Address) Mail To (Email Address) SMTP Authentication (Email Address) User Name (Email Address) Password (Email Address) Send Report Now Schedule Time for sending report 00 (hours) 00 (minutes) Report Items System Resource Usage CPU Usage Memory Usage Session Usage Port Usage Threat Report Intrusion Detection Prevention Anti-Virus Anti-Spam Content Filter Interface Traffic Statistics Reset counters after sending report successfully Reset All Counters Apply Reset

The following table describes the labels in this screen.

Table 258 Maintenance > Report > Email Daily Report

LABELDESCRIPTION
General Settings
Enable Email Daily ReportSelect this to send reports by e-mail every day.
Email Settings
Mail ServerType the name or IP address of the outgoing SMTP server.
Mail SubjectType the subject line for the outgoing e-mail. Select Append system name to add the ZyWALL's system name to the subject. Select Append date time to add the ZyWALL's system date and time to the subject.
Mail FromType the e-mail address from which the outgoing e-mail is delivered. This address is used in replies.
Mail ToType the e-mail address (or addresses) to which the outgoing e-mail is delivered.
SMTP AuthenticationSelect this check box if it is necessary to provide a user name and password to the SMTP server.
User NameThis box is effective when you select the SMTP Authentication check box. Type the user name to provide to the SMTP server when the log is e-mailed.
PasswordThis box is effective when you select the SMTP Authentication check box. Type the password to provide to the SMTP server when the log is e-mailed.
Send Report NowClick this button to have the ZyWALL send the daily e-mail report immediately.
Schedule
Time for sending reportSelect the time of day (hours and minutes) when the log is e-mailed. Use 24-hour notation.
Report ItemsSelect which information you want included in the report. Select Reset counters after sending report successfully if you only want to see statistics for a 24 hour period.
Reset All CountersClick this to discard all report data and start all of the counters over at zero.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.

Diagnostics

49.1 The Diagnostics Screen

The Diagnostics screen provides an easy way for you to generate a file containing the ZyWALL's configuration and diagnostic information. You may need to generate this file and send it to customer support during troubleshooting.

Click Maintenance > Diagnostics to open the Diagnostics screen.

Figure 524 Maintenance > Diagnostics
ZYXEL ZYWALL USG 2000 - The Diagnostics Screen - 1

text_image Diagnostic Information Collector Filename: diaginfo-20080409.tar.bz2 Last modified: 2008-04-09 01:09:32 Size: 180 KB Collect Now Download

The following table describes the labels in this screen.

Table 259 Maintenance > Diagnostics

LABELDESCRIPTION
FilenameThis is the name of the most recently created diagnostic file.
Last modifiedThis is the date and time that the last diagnostic file was created. The format is yyyy-mm-dd hh:mm:ss.
SizeThis is the size of the most recently created diagnostic file.
Collect NowClick this to have the ZyWALL create a new diagnostic file.
DownloadClick this to save the most recent diagnostic file to a computer.

50.1 Overview

Use this to restart the device (for example, if the device begins behaving erratically). See also Section 1.4 on page 37 for information on different ways to start and stop the ZyWALL.

50.1.1 What You Need To Know About Reboot

If you applied changes in the Web configurator, these were saved automatically and do not change when you reboot. If you made changes in the CLI, however, you have to use the write command to save the configuration before you reboot. Otherwise, the changes are lost when you reboot.

Reboot is different to reset; (see Section 51.1 on page 799) reset returns the device to its default configuration.

50.2 The Reboot Screen

The Reboot screen is part of the Web configurator so that remote users can restart the device. To access this screen, click Maintenance > Reboot.

Figure 525 Maintenance > Reboot
ZYXEL ZYWALL USG 2000 - The Reboot Screen - 1

text_image Reboot Click the Reboot button to reboot the device. Please wait a few minutes until the login screen appears. If the login screen does not appear, type the IP address of the device in your Web browser. Reboot

Click the Reboot button to restart the ZyWALL. Wait a few minutes until the login screen appears. If the login screen does not appear, type the IP address of the device in your Web browser.

You can also use the CLI command reboot to restart the ZyWALL.

Troubleshooting

This chapter offers some suggestions to solve problems you might encounter.

  • You can also refer to the logs (see Chapter 51 on page 797).
  • For individual log descriptions, Appendix A on page 811.

For the order in which the ZyWALL applies its features and checks, see Section 2.2 on page 41. I cannot set up an IPSec VPN tunnel to another device.

If the IPSec tunnel does not build properly, the problem is likely a configuration error at one of the IPSec routers. Log into both ZyXEL IPSec routers and check the settings in each field methodically and slowly. Make sure both the ZyWALL and remote IPSec router have the same security settings for the VPN tunnel. It may help to display the settings for both routers side-by-side.

Here are some general suggestions. See also Chapter 21 on page 339.

  • The system log can often help to identify a configuration problem.
  • If the sites are/were previously connected using a leased line or ISDN router, physically disconnect these devices from the network before testing your new VPN connection. The old route may have been learnt by RIP and would take priority over the new VPN connection.
  • To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other.
    Before doing so, ensure that both computers have Internet access (via the IPSec routers).
  • It is also helpful to have a way to look at the packets that are being sent and received by the ZyWALL and remote IPSec router (for example, by using a packet sniffer).

Check the configuration for the following ZyWALL features.

  • The ZyWALL does not put IPSec SAs in the routing table. You must create a policy route for each VPN tunnel. See Chapter 12 on page 249.
  • Make sure the To-ZyWALL firewall rules allow IPSec VPN traffic to the ZyWALL. IKE uses UDP port 500, AH uses IP protocol 51, and ESP uses IP protocol 50.

  • The ZyWALL supports UDP port 500 and UDP port 4500 for NAT traversal. If you enable this, make sure the To-ZyWALL firewall rules allow UDP port 4500 too.

  • Make sure regular firewall rules allow traffic between the VPN tunnel and the rest of the network. Regular firewall rules check packets the ZyWALL sends before the ZyWALL encrypts them and check packets the ZyWALL receives after the ZyWALL decrypts them. This depends on the zone to which you assign the VPN tunnel and the zone from which and to which traffic may be routed.
  • If you set up a VPN tunnel across the Internet, make sure your ISP supports AH or ESP (whichever you are using).
  • If you have the ZyWALL and remote IPSec router use certificates to authenticate each other, make sure they trust each other's certificates. If the ZyWALL's certificate is self-signed, import it into the remote IPsec router. If it is signed by a CA, make sure the remote IPsec router trusts that CA. The ZyWALL uses one of its Trusted Certificates to authenticate the remote IPSec router's certificate. The trusted certificate can be the remote IPSec router's self-signed certificate or that of a trusted CA that signed the remote IPSec router's certificate.

I cannot set up an L2TP VPN tunnel.

1 Make sure you have configured L2TP correctly on the remote user computers. See Section 27.6 on page 420 for examples.
2 Make sure you configured an appropriate policy route on the ZyWALL.
3 Make sure there is not a firewall or NAT router between the ZyWALL and the remote users.
4 Make sure the remote users are using public IP addresses.

The VPN connection is up but VPN traffic cannot be transmitted through the VPN tunnel.

Routing policies define how the ZyWALL forwards packets to their destinations. You must create a policy route for the ZyWALL to route VPN traffic through a VPN tunnel to the remote network.

The VPN wizard automatically creates a corresponding policy route. If you use the VPN > IPSec VPN or VPN > L2TP VPN screens to set up a VPN tunnel, you need to manually configure a policy route for the VPN tunnel.

I cannot download the ZyWALL's firmware package.

The ZyWALL's firmware package cannot go through the ZyWALL when you enable the anti-virus Destroy compressed files that could not be decompressed option. The ZyWALL classifies the firmware package as not being able to be decompressed and deletes it.

You can upload the firmware package to the ZyWALL with the option enabled, so you only need to clear the Destroy compressed files that could not be decompressed option while you download the firmware package. See Section 29.2.1 on page 479 for more on the anti-virus Destroy compressed files that could not be decompressed option.

I changed the LAN IP address and can no longer access the Internet.

The ZyWALL automatically updates address objects based on an interface's IP address, subnet, or gateway if the interface's IP address settings change. However, you need to manually edit any address objects for your LAN that are not based on the interface.

There is an audible alarm and one of the PWR lights is red.

One of the power modules is not supplying power. Press the BUZZER RESET button on the ZyWALL's front panel to stop the audible alarm.

Check the power connections. Make sure that you have both power cords connected to the ZyWALL and plugged into appropriate power sources. Also make sure you have the power sources and both of the ZyWALL's power switches turned on.

Replace the ZyWALL power module that has a red PWR light. See Section 51.2 on page 800 for how to replace a power module.

51.1 Resetting the ZyWALL

If you cannot access the ZyWALL by any method, try restarting it by disconnecting and reconnecting the power. If you still cannot access the ZyWALL by any method

or you forget the administrator password(s), you can reset the ZyWALL to its factory-default settings. Any configuration files or shell scripts that you saved on the ZyWALL should still be available afterwards.

Use the following procedure to reset the ZyWALL to its factory-default settings. This overwrites the settings in the startup-config.conf file with the settings in the system-default.conf file.

Note: This procedure removes the current configuration.

If you want to reboot the device without changing the current configuration, see Chapter 50 on page 795.

1 Make sure the SYS LED is on and not blinking.
2 Press the RESET button and hold it until the SYS LED begins to blink. (This usually takes about five seconds.)
3 Release the RESET button, and wait for the ZyWALL to restart.

You should be able to access the ZyWALL using the default settings.

51.2 Changing a Power Module

The ZyWALL has two power modules. It can continue operating on a single power module if one fails. The power modules are near the top of the front panel of the main chassis. Obtain ZyWALL power modules from your local vendor. Use the following procedure to change a power module.

1 Make sure that the power module you want to disconnect has the power switch in the off position. You only need to turn off the power module that has failed. The ZyWALL can continue operating on power from the other power module.
2 Disconnect the power cord from the power outlet.
3 Disconnect the power cord from the ZyWALL's power module.

4 Use a Philips screwdriver to remove the power module's retaining screw.

Figure 526 Removing the Power Module Retaining Screw
ZYXEL ZYWALL USG 2000 - Changing a Power Module - 1

natural_image Diagram showing a screwdriver inserted into a socket with internal components, illustrating the process (no text or symbols present)

5 Use the handle to slide out the power module and remove it.

Figure 527 Removing the Power Module
ZYXEL ZYWALL USG 2000 - Changing a Power Module - 2

natural_image Technical line drawing of an electronic device with ports and connectors, showing internal components and a red arrow indicating direction (no text or symbols)

6 Install the new ZyWALL power module.

Figure 528 Installing the Replacement Power Module
ZYXEL ZYWALL USG 2000 - Changing a Power Module - 3

natural_image Technical line drawing of an electronic device casing with internal components and a red arrow indicating direction (no text or symbols)

7 Tighten the power module's retaining screw.

Figure 529 Replacing the Power Module Retaining Screw
ZYXEL ZYWALL USG 2000 - Changing a Power Module - 4

natural_image Diagram of a screwdriver inserted into a grid socket on an electrical panel (no text or symbols visible)

8 Connect the power cord to the new ZyWALL power module.
9 Reconnect the power cord to the power outlet.
10 Push the ZyWALL power module switch to the on position.

51.3 Getting More Troubleshooting Help

Search for support information for your model at www.zyxel.com for more troubleshooting suggestions.

Product Specifications

The following specifications are subject to change without notice. See Chapter 2 on page 39 for a general overview of key features.

This table provides basic device specifications.

Table 260 Default Login Information

ATTRIBUTESPECIFICATION
Default IP Address (ge1)192.168.1.1
Default Subnet Mask (ge1)255.255.255.0 (24 bits)
Default Password1234

This table provides hardware specifications.

Table 261 Hardware Specifications

FEATURESPECIFICATION
Number of MAC addresses8
Ethernet InterfacesNumber of Ethernet interfaces: 86 Ethernet interfaces are Gigabit Ethernet, full duplex RJ-45 connectors, auto-negotiation, auto-MDI/MDIX (auto-crossover)2 Ethernet interfaces are dual-personality (combo) ports. Each consists of a Gigabit RJ-45 Ethernet port and SFP slot pair. The -45 connectors support auto-negotiation and auto-MDI/MDIX (auto-crossover).
Compatible SFP TransceiversSFP-SX (Multi-mode, distance: 550m, wavelength: 850nm)SFP-LX-10 (Single-mode, distance: 10Km, wavelength: 1,310nm)SFP-LHX1310-40 (Single-mode, distance: 40Km, wavelength: 1,310nm)SFP-ZX-80 (Single-mode, distance: 80Km, wavelength: 1,550nm)
Management interfaceRS-232, DB9F connector
AUX portRS-232, DB9M connector
USB Slots2, 2.0 plug and play (reserved for future use)
HDD SlotSlot for an optional 2.5” SATA hard drive (reserved for future use)
Card SlotSlot for optional hardware accessories (reserved for future use)
Power Requirements100-240 V, 50/60 Hz, 3 to 6 AThe ZyWALL has dual power modules. One power module is redundant. The ZyWALL can be fully powered by just one power module so the system can keep running while you replace a power module.
Operating EnvironmentTemperature: 5°C to 40°CHumidity: 5% to 90% (non-condensing)
Storage EnvironmentTemperature: -30°C to 60° CHumidity: 5% to 90% (non-condensing)
MTBFMean Time Between Failures: 99,141 hours
Dimensions430 (W) x 487 (D) x 89 (H) mm
Weight10.5 kg
Rack-mountingRack-mountable (rack-mount kit included)

This table gives details about the ZyWALL's features.

Table 262 Feature Specifications

VERSION #FEATUREV2.10V2.11
# of MAC88
Flash Size256256
DRAM Size20482048
INTERFACE
VLAN512512
Virtual (alias)4 per interface4 per interface
PPP1212
Bridge1212
ROUTING
Static Routes10,000 (shared with the policy routes)10,000 (shared with the policy routes)
Policy Routes10,000 (shared with the static routes)10,000 (shared with the static routes)
Sessions1,000,0001,000,000
NAT
Virtual Serversup to 1,024up to 1,024
Trigger Port Rulesup to 8 per PR ruleup to 8 per PR rule
HTTP Redirectup to interface limitup to interface limit
New Session Rate (sessions per second)20,00025,000
FIREWALL
Firewall ACL Rules10,00010,000
APPLICATION PATROL
Maximum Rules for Other Protocols6464
Maximum Exception Rules6464
Allowed Ports88
Default Ports88
Address Space Number640001640001
USER PROFILES
Maximum Local Users40964096
Maximum Admin Users2020
Maximum User Groups256256
Maximum Users in One User Group40964096
OBJECTS
Address Objects10,00010,000
Address Groups2,0002,000
Service Objects10,00010,000
Service Groups2,0002,000
Schedule Objects10241024
ISP Accounts128128
Maximum Number of LDAP Groups3232
Maximum Number of LDAP Servers for Each LDAP Group44
Maximum Number of RADIUS Groups3232
Maximum Number of RADIUS Servers for Each RADIUS Group44
Maximum Number of AD Groups3232
Maximum Number of AD Servers for Each AD Group44
Maximum Number of Authentication Methods1616
Maximum Number of Zones3232
Maximum Number of Trunks128128
IPSEC VPN
Maximum Number of VPN Tunnels1000 (without the SEM)1000 (without the SEM)
2000 (with the SEM)2000 (with the SEM)
Maximum Number of VPN Concentrators6464
CERTIFICATES
Certificate Buffer Size4 MB4 MB
BUILT-IN SERVICES
A record20482048
NS record3232
MX record3232
Maximum Number of Service Control Entries32 per service32 per service
Maximum Number of DHCP Network Pools3232
Maximum DHCP Host Pool20482048
Maximum Number of DDNS Profiles2020
DHCP Relay2 per interface2 per interface
CENTRALIZED LOG
Log Entries10241024
Debug Log Entries10241024
Admin E-mail Addresses22
Syslog Servers44
IDP
Maximum Number of IDP Profiles3232
Custom Signatures512512
ADP
Maximum Number of ADP Profiles3232
Maximum Number of ADP Rules6464
Maximum Number of ADP Blocked Hosts1,0001,000
Maximum Blocking Period3,6003,600
CONTENT FILTER
Maximum Number of Content Filter Policies6464
Maximum Number of Content Filter Profiles6464
Maximum Number of Forbidden Domain Entries512 per profile512 per profile
Maximum Number of Trusted Domain Entries512 per profile512 per profile
Maximum Number of Keywords that Can Be Blocked512 per profile512 per profile
Local Cache Size81928192
Maximum Number of Connections10241024
ANTI-SPAM
Maximum Number of Concurrent Mail Sessions1,0001,000
Maximum Number of Anti-Spam Rules6464
Maximum Number of White List Entries10241024
Maximum Number of Black List Entries10241024
Maximum Number of DNSBLs55
Maximum Number of Anti-Spam Statistics500500
Maximum Anti-Spam Statistics Ranking1010
ANTI-VIRUS
Maximum Number of Concurrent ZIP File Decompression Sessions200 ZIP files32 RAR-LZSS or 4 RAR-PPM200 ZIP files32 RAR-LZSS or 4 RAR-PPM
SSL VPN
OTHERS
Maximum Number of Device HA VRRP Groups3232
Maximum Number of OSPF Areas3232

The following table, which is not exhaustive, lists standards referenced by ZyWALL features.

Table 263 Standards Referenced by Features

FEATURESTANDARDS REFERENCED
Interface-BridgeA subset of the ANSI/IEEE 802.1d standard
InterfaceRFCs 2131, 2132, 1541
Interface-PPPRFCs 1144, 1321, 1332, 1334, 1661, 1662, 2472
Interface-PPTPRFCs 2637, 3078
Interface-PPPOERFC 2516
Interface-VLANIEEE 802.1Q
Dynamic Route, Show IP routeRFCs 1058, 2082, 2453, 2328, 3101, 3137
Telnet serverRFCs 1408, 1572
SSH serverRFCs 4250, 4251, 4252, 4253, 4254
Built-in service, DNS serverRFCs 1034, 1035, 1123, 1183, 1535, 1536, 1706, 1712, 1750, 1876, 1982, 1995, 1996, 2136, 2163, 2181, 2230, 2308, 2535, 2536, 2537, 2538, 2539, 2671, 2672, 2673, 2782, 3007, 3090
Built-in service, DHCP serverRFCs 1542, 2131, 2132, 2485, 2489
Built-in service, HTTP serverRFCs 1945, 2616, 2965, 2732, 2295
Built-in service, SNMP agentRFCs 1067, 1213, 2576, 2578, 2579, 2580, 2741, 2667, 2981, 3371
Login, LDAP support.RFCs 2251, 2252, 2253, 2254, 2255, 2256, 2589, 2829, 2830
Used by ApacheRFCs 2437, 2246, 2560, 2712, 3268, 3280, 3820, 4132
Built-in service, FTP serverRFCs 959, 2228, 2389, 2865, 2138, 2640
Used by Centralized logRFC 3164
Login, new PAM moduleOSF-RFC 86.0, 1321
Built-in service, NTP clientRFCs 958, 1059, 1119, 1305
Used by SSH serviceRFCs 4250, 4251, 4252, 4253, 4254
Used by Time serviceRFCs 3339
Used by Telnet serviceRFCs 318, 854, 1413
Used by SIP ALGRFCs 3261, 3264
DHCP relayRFC 1541
ZySHW3C XML standard
ARPRFC 826
IP/IPv4RFC 791
TCPRFC 793

PART XI

Appendices and Index

Common Services (871)

Displaying Anti-Virus Alert Messages in Windows (875)

Open Software Announcements (887)

Legal Information (933)

Index (937)

Log Descriptions

This appendix provides descriptions of example log messages.

Table 264 Content Filter Logs

LOG MESSAGEDESCRIPTION
Content filter has been enabledAn administrator turned the content filter on.
Content filter has been disabledAn administrator turned the content filter off.
Content filter report has been disabledThe content filter report was turned off.
Content filter has been enabledThe content filter was report turned on.
Content filter has been changed zsb port to 80The content filtering checking for unsafe web sites has been changed to use port 80 due to a configuration change.
Content filter has been changed zsb port to 23The content filtering checking for unsafe web sites has been changed to use port 23 due to a configuration change.

Table 265 Forward Web Site Logs

LOG MESSAGEDESCRIPTION
%s: Trusted Web siteThe device allowed access to a web site in a trusted domain.%s: website host
%sThe device allowed access to a web site. The content filtering service is registered and activated or the service is not activated in a profile, this is a web site that is not blocked according to a profile and the default policy is not set to block.%s: website host
%s: Service is not registeredThe device allowed access to a web site. The content filtering service is unregistered and the default policy is not set to block.%s: website host

Table 266 Blocked Web Site Logs

LOG MESSAGEDESCRIPTION
%s :%sThe rating server responded that the web site is in a specified category and access was blocked according to a content filter profile.1st %s: website host2nd %s: website category
%s: UnratedThe rating server responded that the web site cannot be categorized and access was blocked according to a content filter profile.%s: website host
%s: Service is unavailableContent filter rating service is temporarily unavailable and access to the web site was blocked due to:1. Can't resolve rating server IP (No DNS)2. Invalid service license4. Rating service is restarting5. Can't connect to rating server6. Query failed7. Query timeout8. Too many queries9. Unknown reason%s: website host
%s: %s(cache hit)The web site's category exists in the device's local cache and access was blocked according to a content filter profile.1st %s: website host2nd %s: website category
%s: Not in trusted web listThe web site is not a trusted host/domain, and the device blocks all traffic except for trusted web sites.%s: website host
%s: Contains ActiveXThe web site contains ActiveX and access was blocked according to a profile.%s: website host
%s: Contains Java appletThe web site contains Java applet and access was blocked according to a profile.%s: website host
%s: Contains cookieThe web site contains a cookie and access was blocked according to a profile.%s: website host
%s: Proxy mode is detectedThe system detected a proxy connection and blocked access according to a profile.%s: website host
%s: Forbidden Web siteThe web site is in forbidden web site list.%s: website host
%s: Keyword blockingThe web content matched a user defined keyword.%s: website host
%s: Blocking by default policyNo content filter policy is applied and access was blocked since the default action is block.%s: website host

Table 267 Anti-Spam Logs

LOG MESSAGEDESCRIPTION
Anti-Spam has been activated.The anti-spam feature has been turned on.
Anti-Spam has been deactivated.The anti-spam feature has been turned off.
Anti-Spam policy %d has been modified.The anti-spam policy with the specified index number (%d) has been changed.
Anti-Spam policy %d has been inserted.The anti-spam policy with the specified index number (%d) has been added into the list.
Anti-Spam policy %d has been appended.The anti-spam policy with the specified index number (%d) has been added to the end of the list.
Anti-Spam policy %d has been deleted.The anti-spam policy with the specified index number (%d) has been removed.
Anti-Spam policy %d has been moved to %d.The anti-spam policy with the specified index number (first %d) was moved to the specified index number (second %d).
White List checking has been activated.The anti-spam white list has been turned on.
White List checking has been deactivated.The anti-spam white list has been turned off.
White List rule %d has been added.The anti-spam white list rule with the specified index number (%d) has been added.
White List rule %d has been modified.The anti-spam white list rule with the specified index number (%d) has been changed.
White List rule %d has been deleted.The anti-spam white list rule with the specified index number (%d) has been removed.
White List rule %d has been activated.The anti-spam white list rule with the specified index number (%d) has been turned on.
White List rule %d has been deactivated.The anti-spam white list rule with the specified index number (%d) has been turned off.
Black List checking has been activated.The anti-spam black list has been turned on.
Black List checking has been deactivated.The anti-spam black list has been turned off.
Black List rule %d has been added.The anti-spam black list rule with the specified index number (%d) has been added.
Black List rule %d has been modified.The anti-spam black list rule with the specified index number (%d) has been changed.
Black List rule %d has been deleted.The anti-spam black list rule with the specified index number (%d) has been removed.
Black List rule %d has been activated.The anti-spam black list rule with the specified index number (%d) has been turned on.
Black List rule %d has been deactivated.The anti-spam black list rule with the specified index number (%d) has been turned off.
DNSBL checking has been activated.anti-spam DNSBL (DNS Black List) server checking has been turned on.
DNSBL checking has been deactivated.The anti-spam DNSBL checking has been turned off.
DNSBL domain %s has been added.The specified DNSBL domain name (%s) has been added.
DNSBL domain %s has been modified to %s.The specified DNSBL domain name (first %s) has been changed to the second %s.
DNSBL domain %s has been deleted.The specified DNSBL domain name (%s) has been removed.
DNSBL domain %s has been activated.The specified DNSBL domain name (%s) has been turned on.
DNSBL domain %s has been deactivated.The specified DNSBL domain name (%s) has been turned off.
Match White List: %d. From:%s Subject:%sAn e-mail matched the specified white list rule (%d). The e-mail's From (first %s) and Subject (second %s) header values are listed.
Match Black List: %d. From:%s Subject:%sAn e-mail matched the specified black list rule (%d). The e-mail's From (first %s) and Subject (second %s) header values are listed.
IP %s in DNSBL %s. From:%s Subject:%sThe listed IP address (the first %s) was listed in the specified DNSBL (second %s). The e-mail's From (third %s) and Subject (fourth %s) header values are listed.
DNSBL timeout. Mail From:%s Subject:%sQueries to the DSNBL timed out. The e-mail's From (first %s) and Subject (second %s) header values are listed.
Mail sessions have reached the maximum threshold of %d.The number of concurrent e-mail sessions has exceeded the maximum number of concurrent e-mail sessions that the anti-spam feature can handle (%d).

Table 268 SSL VPN Logs

LOG MESSAGEDESCRIPTION
%s %s from %s has logged in SSLVPNA user has logged into SSL VPN.The first %s is the type of user account.The second %s is the user's user name.The third %s is the name of the service the user is using (HTTP or HTTPS).
%s %s from %s has logged out SSLVPNA user has logged out of SSL VPN.The first %s is the type of user account.The second %s is the user's user name.The third %s is the name of the service the user is using (HTTP or HTTPS).The Note field's %s is the user name.
%s accesses web application %sThe specified user (first %s) has logged into the specified SSL VPN web application (second %s).
SSL tunnel is establishedAn SSL tunnel has been built. The source is the login IP address. The destination is the IP address given to the SSL user.
SSL tunnel is disconnectedAn SSL tunnel has been disconnected. The source is the login IP address. The destination is the IP address given to the SSL user.
The %s address-object is invalid IP in SSL Policy %s.The listed address object (first %s) is not an allowed IP for the listed SSL policy (second %s).
The %s address-object does not have assignable IP in SSL Policy %s.There are no more assignable IP addresses in the listed address object (first %s). The address object is used by the listed SSL policy (second %s).
The %s address-object is wrong type for '1st-dns' in SSL Policy %s.The listed address object (first %s) is not the right kind for the first DNS server specified in the listed SSL VPN policy (second %s).
The %s address-object is wrong type for '2nd-dns' in SSL Policy %s.The listed address object (first %s) is not the right kind for the second DNS server specified in the listed SSL VPN policy (second %s).
The %s address-object is wrong type for '1st-wins' in SSL Policy %s.The listed address object (first %s) is not the right kind for the first WINS server specified in the listed SSL VPN policy (second %s).
The %s address-object is wrong type for '2nd-wins' in SSL Policy %s.The listed address object (first %s) is not the right kind for the second WINS server specified in the listed SSL VPN policy (second %s).
The %s address-object is wrong type for 'network' in SSL Policy %s.The listed address object (first %s) is not the right kind to be specified as a network in the listed SSL VPN policy (second %s).
The SSL VPN policy %s has been changed 'ip-pool' value.The IP pool setting has been modified in the specified SSL VPN policy (%s).
The SSL VPN policy %s has been changed '1st-dns' value.The first DNS server setting has been modified in the specified SSL VPN policy (%s).
The SSL VPN policy %s has been changed '2nd-dns' value.The second DNS server setting has been modified in the specified SSL VPN policy (%s).
The SSL VPN policy %s has been changed '1st-wins' value.The first WINS server setting has been modified in the specified SSL VPN policy (%s).
The SSL VPN policy %s has been changed 'network' value.The list of networks has been modified in the specified SSL VPN policy (%s).
The SSL VPN policy %s has been changed '2nd-wins' value.The second WINS server setting has been modified in the specified SSL VPN policy (%s).
The IP pool is same subnet with %s in SSL VPN policy %s. So %s will not be injected to client side.The IP pool is in the same subnet as the specified address object (first %s) in the listed SSL VPN policy (second %s), so the listed address (third %s) will not be given to an SSL VPN client.
The %s is same subnet with IP pool in SSL VPN policy %s. So %s will not be injected to client side.The specified address object (first %s) is in the same subnet as the IP pool in the listed SSL VPN policy (second %s), so the listed address (third %s) will not be given to an SSL VPN client.
The SSL VPN policy %s does not configure users or user groups.There are no users or user groups configured for the listed SSL VPN policy (%s).
SSL VPN policy rule %s has been inserted.The listed SSL VPN policy (%s) has been inserted in the list of SSL VPN policy rules.
SSL VPN policy rule %s has been appended.The listed SSL VPN policy (%s) has been added to the end of the list.
SSL VPN policy rule %s has been modified.The configuration of the listed SSL VPN policy (%s) has been changed.
SSL VPN policy rule %s has been moved to %d.The listed SSL VPN policy (%s) has been moved to the listed position (%d) in the list of SSL VPN policies.
SSL VPN policy rule %s has been deleted.The listed SSL VPN policy has been removed.
%s %s is accessed. sent=<bytes> rcvd=<bytes>The listed SSL VPN access was used to send and receive the listed numbers of bytes.The first %s is the type of SSL VPN access (web application, file sharing, or network extension).The second %s is the name of the application. This is N/A for a network extension.
%s %s from %s has been logged out SSLVPN (re-auth timeout)The specified user was signed out by the device due to a re-authentication timeout.The first %s is the type of user account.The second %s is the user's user name.The third %s is the name of the service the user is using (HTTP or HTTPS).
%s %s from %s has been logged out SSLVPN (lease timeout)The specified user was signed out by the device due to a lease timeout.The first %s is the type of user account.The second %s is the user's user name.The third %s is the name of the service the user is using (HTTP or HTTPS).
%s %s from %s has been logged out SSLVPN (idle timeout)The specified user was signed out by the device due to an idle timeout.The first %s is the type of user account.The second %s is the user's user name.The third %s is the name of the service the user is using (HTTP or HTTPS).
Failed login attempt to SSLVPN from %s (login on a lockout address)An SSL VPN login attempt from the listed user (%s) was blocked due to too many failed login attempts.
Failed login attempt to SSLVPN from %s (reach the max. number of user)The listed user (%s) failed to log into SSL VPN because the maximum number of users were already logged in.
Failed login attempt to SSLVPN from %s (reach the max. number of simultaneous logon)The listed user (%s) failed to log into SSL VPN because the maximum number of simultaneous logons was already reached.
Failed login attempt to SSLVPN from %s (incorrect password or inexistent username)The listed user (%s) failed to log into SSL VPN because of entering an incorrect password or a user name that does not exist.

Table 269 L2TP Over IPSec Logs

LOG MESSAGEDESCRIPTION
The configuration of L2TP over IPSec has been changed.The L2TP over IPSec configuration has been modified.
L2TP over IPSec may not work since Crypto Map %s using Manual Key.L2TP over IPSec does not support manual key management. L2TP over IPSec may not work because the IPSec VPN connection it uses (Crypto Map %s) has been set to use manual key management.
L2TP over IPSec may not work since Crypto Map %s using Tunnel Mode.L2TP over IPSec does not support tunnel mode encapsulation. L2TP over IPSec may not work because the IPSec VPN connection it uses (Crypto Map %s) has been set to use tunnel mode encapsulation.
L2TP over IPSec may not work since Crypto Map %s is deactivated.L2TP over IPSec may not work because the IPSec VPN connection it uses (Crypto Map %s) has been turned off.
User %s has been denied from L2TP service. (Inexistent User)A user with the specified user name (%s) was denied access to the L2TP over IPSec service because the user name does not exist.
User %s has been denied from L2TP service. (Disallowed User)A user with the specified user name (%s) was denied access to the L2TP over IPSec service because the user name is not specified in the L2TP over IPSec configuration.
User %s has been denied from L2TP service. (Incorrect Password)A user with the specified user name (%s) was denied access to the L2TP over IPSec service because the correct password was not provided.
User %s has been denied from L2TP service. (Incorrect Username or Password)A user with the specified user name (%s) was denied access to the L2TP over IPSec service because an incorrect user name or password was provided.
User has been denied from L2TP service. (address pool exhausted)An attempted login to the L2TP over IPSec service failed because the L2TP over IPSec IP address pool does not have any more IP addresses to give out.
User %s has been granted an L2TP over IPSec session.A user with the specified user name (%s) was given access to the L2TP over IPSec service.
L2TP over IPSec sessions have been all disconnected since configuration of Tunnel %s has been changedL2TP over IPSec may not work because the configuration of the IPSec VPN connection it uses (Crypto Map %s) has been changed.

The ZySH logs deal with internal system errors.

Table 270 ZySH Logs

LOG MESSAGEDESCRIPTION
Invalid message queue. Maybe someone starts another zysh daemon.
ZySH daemon is instructed to reset by %d1st: pid num
System integrity error!
Group OPS
cannot close property group
cannot close group
%s: cannot get size of group1st: zysh group name
%s: cannot specify properties for entry %s1st: zysh group name, 2st: zysh entry name
%s: cannot join group %s, loop detected1st: zysh group name, 2st: zysh group name
cannot create, too many groups (> %d)1st: max group num
%s: cannot find entry %s1st: zysh group name, 2st: zysh entry name
%s: cannot remove entry %s1st: zysh group name, 2st: zysh entry name
List OPS
can't alloc entry: %s!1st: zysh entry name
can't retrieve entry: %s!1st: zysh entry name
can't get entry: %s!1st: zysh entry name
can't print entry: %s!1st: zysh entry name
%s: cannot retrieve entries from list!1st: zysh list name
can't get name for entry %d!1st: zysh entry index
can't get reference count: %s!1st: zysh list name
can't print entry name: %s!1st: zysh entry name
Can't append entry: %s!1st: zysh entry name
Can't set entry: %s!1st: zysh entry name
Can't define entry: %s!1st: zysh entry name
%s: list is full!1st: zysh list name
Can't undefined %s1st: zysh list name
Can't remove %s1st: zysh list name
Table OPS
%s: cannot retrieve entries from table!1st: zysh table name
%s: index is out of range!1st: zysh table name
%s: cannot set entry #%d1st: zysh table name,2st: zysh entry num
%s: table is full!1st: zysh table name
%s: invalid old/new index!1st: zysh table name
Unable to move entry #%d!1st: zysh entry num
%s: invalid index!1st: zysh table name
Unable to delete entry #%d!1st: zysh entry num
Unable to change entry #%d!1st: zysh entry num
%s: cannot retrieve entries from table!1st: zysh table name
%s: invalid old/new index!1st: zysh table name
Unable to move entry #%d!1st: zysh entry num
%s: apply failed at initial stage!1st: zysh table name
%s: apply failed at main stage!1st: zysh table name
%s: apply failed at closing stage!1st: zysh table name

Table 271 ADP Logs

LOG MESSAGEDESCRIPTION
fromto[type=], Action:, Severity:The ZyWALL detected an anomaly in traffic traveling between the specified zones.The = {scan-detection() | flood-detection() | http-inspection() | tcp-decoder)}.The gives details about the attack, although the message is dropped if the log is more than 128 characters.The is what the ZyWALL did with the packet.The is the threat level (very low, low, medium, high, or severe).
Enable ADP succeeded.ADP was turned on.
Disable ADP succeeded.ADP was turned off.
ADP rulehas been deleted.The specified ADP rule has been deleted.
ADP rulehas been moved to.The ADP rule with the specified index number (first num) was moved to the specified index number (second num).
New ADP rule has been appended.An ADP rule has been added to the end of the list.
ADP rulehas been inserted.An ADP rule has been inserted.is the number of the new rule.
ADP rulehas been modified.The ADP rule of the specified number has been changed.
ADP profilehas been deleted.The ADP rule with the specified name has been removed.
ADP profilehas been changed to.An ADP rule's name has been changed from first to the second.
ADP profilehas been created.An ADP profile with the specified name has been added.
ADP profilehas been modified.The ADP rule with the specified name has been changed.
Packet payload length is over the maximum system handle lengthThe ZyWALL's ADP feature detected a packet with a length over 16000 bytes.
LAND attack packet.Source IP is the same as Destination IP.The ZyWALL's ADP feature detected traffic with the same IP address set as both the source and the destination.

Table 272 Anti-Virus Logs

LOG MESSAGEDESCRIPTION
Initializing Anti-Virus signature reference table has failed.The ZyWALL failed to initialize the anti-virus signatures due to an internal error.
Reloading Anti-Virus signature database has failed.The ZyWALL failed to reload the anti-virus signatures due to an internal error.
Reloading Anti-Virus signature reference table has failed.The ZyWALL failed to reload the anti-virus signatures due to an internal error.
%s Virus infected - ID:%d,%s,%s.The ZyWALL's anti-virus feature detected a virus-infected file.1st %s: The protocol of the infected packet.2nd %d: virus ID3rd %s: name of the virus4th %s: name of the infected file
%s, due to over maximum compressed file, %s could not be decompressed.The ZyWALL could not decompress a compressed file because there were too many compressed files at the same time.1st %s: The protocol of the packet.2nd %s: The filename of the related file.
%s, due to more than one layer compressed file, %s could not be decompressed.The ZyWALL could not decompress a compressed file because it contained other compressed files.1st %s: The protocol of the packet.2nd %s: The filename of the related file.
%s, due to password protected compressed file, %s could not be decompressed.The ZyWALL could not decompress a compressed file because it had password protection.1st %s: The protocol of the packet.2nd %s: The filename of the related file.
%s, %s matched White-List %sA file matched a file pattern in the anti-virus white list.1st %s: The protocol of the packet.2nd %s: The filename of the related file.3rd %s: The file pattern that the file matched.
%s, %s matched the Black-List %sA file matched a file pattern in the anti-virus black list.1st %s: The protocol of the packet.2nd %s: The filename of the related file.3rd %s: The file pattern that the file matched.
AV signature update has failed. Can not update last update time.The anti-virus signatures update did not succeed.
AV signature update has failed. (Replacement failure)Anti-virus signatures update failed because the ZyWALL was not able to replace the old set of anti-virus signatures with the new one.
AV signature update has failed. (Unknown signature package).Anti-virus signatures update failed because the ZyWALL was not able to identify whether the downloaded signature package was an incremental or full update.
AV signature update from version %s to version %s has succeededThe ZyWALL updated the anti-virus signatures from the listed version to the second listed version.
AV signature update has failed. (File damaged)An anti-virus signatures update failed because the signature file has been corrupted.
AV signature update has failed. (Memory not enough)An anti-virus signatures update failed because the ZyWALL did not have enough system resources free to finish the signature update.
AV signature size is over system limitationAn anti-virus signatures update failed because the anti-virus signature file was too large.
AV signature update has failed.An anti-virus signatures update failed for unknown reasons.
Anti-Virus signatures missing, refer to your user documentation to recover the default database file.When the ZyWALL started it could not find the anti-virus signature file. See the CLI reference guide for how to restore the default system database.
Update signature version has failed.An attempt to update the anti-virus signature version failed. cannot update signature version
AV signature update from %s version %s to %s version %s has succeeded.The anti-virus signatures have been updated.1st %s: The anti-virus engine type before the update.2nd %s: The signature version before the update.3rd %s: The anti-virus engine type after the update.4th %s: The signature version after the update.
AV signature size is over system limitationThe anti-virus signature file size is too large.
AV has been activatedAnti-virus has been turned on.
AV has been deactivatedAnti-virus has been turned off.
Anti-Virus rule %d has been moved to %dThe anti-virus rule with the specified index number (1st %d) was moved to the specified index number (2nd %d).
Anti-Virus rules have been flushed.All of the anti-virus rules have been deleted.
Anti-Virus rule %d has been deleted.The anti-virus rule of the specified number has been deleted.
Anti-Virus rule %d has been modified.The anti-virus rule of the specified number has been changed.
Anti-Virus rule %d has been inserted.An anti-virus rule has been inserted. %d is the number of the new rule.
Anti-Virus rule %d has been appended.The anti-virus rule with the listed number (%d) has been added to the end of the list.
File pattern %s has been modified to %s in %sA anti-virus file pattern was changed in the white list or the black list.1st%s: The original file pattern.2ed %s: The new file pattern.3rd %s The white list or black list.
File pattern %s has been deleted from %sAn anti-virus file pattern was deleted from the white or black list.1st %s: The file pattern.2nd %s: The white list or black list.
File pattern %s has been added in %sAn anti-virus file pattern was added to the white or black list.1st %s: The file pattern.2nd %s: The white list or black list.
%s has been %sAn anti-virus file pattern white list or black list was turned on or off.1st %s: The white list or black list.2nd %s: Activated/deactivated.
%s, due to decompress malfunction, %s could not be decompressed.Action on file: %sFile decompression failed due to an internal error.1st %s: The protocol of the packet.2nd %s: The filename of the related file.3rd %s: Whether the file was deleted (DESTROY) or forwarded (PASS).
Update signature info has failed.Updating of the signature file information failed due to an internal error.

Table 273 User Logs

LOG MESSAGEDESCRIPTION
%s %s from %s has logged in ZyWALLA user logged into the ZyWALL.1st %s: The type of user account.2nd %s: The user's user name.3rd %s: The name of the service the user is using (HTTP, HTTPS, FTP, Telnet, SSH, or console).
%s %s from %s has logged out ZyWALLA user logged out of the ZyWALL.1st %s: The type of user account.2nd %s: The user's user name.3rd %s: The name of the service the user is using (HTTP, HTTPS, FTP, Telnet, SSH, or console).
%s %s from %s has been logged out ZyWALL (re-auth timeout)The ZyWALL is signing the specified user out due to a re-authentication timeout.1st %s: The type of user account.2nd %s: The user's user name.3rd %s: The name of the service the user is using (HTTP, HTTPS, FTP, Telnet, SSH, or console).
%s %s from %s has been logged out ZyWALL (lease timeout)The ZyWALL is signing the specified user out due to a lease timeout.1st %s: The type of user account.2nd %s: The user's user name.3rd %s: The name of the service the user is using (HTTP, HTTPS, FTP, Telnet, SSH, or console).
%s %s from %s has been logged out ZyWALL (idle timeout)The ZyWALL is signing the specified user out due to an idle timeout.1st %s: The type of user account.2nd %s: The user's user name.3rd %s: The name of the service the user is using (HTTP, HTTPS, FTP, Telnet, SSH, or console).
Console has been put into lockout stateToo many failed login attempts were made on the console port so the ZyWALL is blocking login attempts on the console port.
Address %u.%u.%u.%u has been put into lockout stateToo many failed login attempts were made from an IP address so the ZyWALL is blocking login attempts from that IP address.%u.%u.%u.%u: the source address of the user's login attempt
Failed login attempt to ZyWALL from %s (login on a lockout address)A login attempt came from an IP address that the ZyWALL has locked out.%u.%u.%u.%u: the source address of the user's login attempt
Failed login attempt to ZyWALL from %s (reach the max. number of user)The ZyWALL blocked a login because the maximum login capacity for the particular service has already been reached.%s: service name
Failed login attempt to ZyWALL from %s (reach the max. number of simultaneous logon)The ZyWALL blocked a login because the maximum simultaneous login capacity for the administrator or access account has already been reached.%s: service name
User %s has been denied access from %sThe ZyWALL blocked a login according to the access control configuration.%s: service name
User %s has been denied access from %sThe ZyWALL blocked a login attempt by the specified user name because of an invalid user name or password.2nd %s: service name

Table 274 myZyXEL.com Logs

LOG MESSAGEDESCRIPTION
Send registration message to MyZyXEL.com server has failed.The device was not able to send a registration message to MyZyXEL.com.
Get server response has failed.The device sent packets to the MyZyXEL.com server, but did not receive a response. The root cause may be that the connection is abnormal.
Timeout for get server response.zysh need to catch MyZyXEL.com agent's return code, this log will be shown when timeout.
User has existed.The user name already exists in MyZyXEL.com's database. So the user can't use it for device registration and needs to specify another one.
User does not exist.The user name does not yet exist in MyZyXEL.com's database. So the user can use it for device registration.
Internal server error.MyZyXEL.com's database had an error when checking the user name.
Device registration has failed:%s.Device registration failed, an error message returned by the MyZyXEL.com server will be appended to this log.%s: error message returned by the myZyXEL.com server
Device registration has succeeded.The device registered successfully with the myZyXEL.com server.
Registration has failed. Because of lack must fields.The device received an incomplete response from the myZyXEL.com server and it caused a parsing error for the device.
%s:Trial service activation has failed:%s.Trail service activation failed for the specified service, an error message returned by the MyZyXEL.com server will be appended to this log.1st %s: service name2nd %s: error message returned by the myZyXEL.com server
%s:Trial service activation has succeeded.Trail service was activated successfully for the specified service.%s: service name
Trial service activation has failed. Because of lack must fields.The device received an incomplete response from the myZyXEL.com server and it caused a parsing error for the device.
Standard service activation has failed:%s.Standard service activation failed, this log will append an error message returned by the MyZyXEL.com server.%s: error message returned by the myZyXEL.com server
Standard service activation has succeeded.Standard service activation has succeeded.
Standard service activation has failed. Because of lack must fields.The device received an incomplete response from the myZyXEL.com server and it caused a parsing error for the device.
Service expiration check has failed:%s.The service expiration day check failed, this log will append an error message returned by the MyZyXEL.com server.%s: error message returned by myZyXEL.com server
Service expiration check has succeeded.The service expiration day check was successful.
Service expiration check has failed. Because of lack must fields.The device received an incomplete response from the myZyXEL.com server and it caused a parsing error for the device.
Server setting error.The device could not retrieve the myZyXEL.com server's IP address or FQDN from local.
Resolve server IP has failed.The device could not resolve the myZyXEL.com server's FQDN to an IP address through gethostbyname().
Verify server's certificate has failed.The device could not process an HTTPS connection because it could not verify the myZyXEL.com server's certificate.
Connect to MyZyXEL.com server has failed.The device could not connect to the MyZyXEL.com server.
Do account check.The device started to check whether or not the user name in MyZyXEL.com's database.
Do device register.The device started device registration.
Do trial service activation.The device started trail service activation.
Do standard service activation.The device started standard service activation.
Do expiration check.The device started the service expiration day check.
Build query message has failed.Some information was missing in the packets that the device sent to the MyZyXEL.com server.
Parse receive message has failed.The device cannot parse the response returned by the MyZyXEL.com server. Maybe some required fields are missing.
Change Anti-Virus engine.The device started to change the type of anti-virus engine.
Change Anti-Virus engine has failed:%s.The device failed to change the type of anti-virus engine. %s is the server response error message.
Change Anti-Virus engine has succeeded.The device successfully changed the type of anti-virus engine.
Change Anti-Virus engine type has failed. Because of lack must fields.The device failed to change the type of anti-virus engine because the response from the server is missing required fields.
Resolve server IP has failed. Update stop.The update has stopped because the device couldn't resolve the myZyXEL.com server's FQDN to an IP address through gethostbyname().
Verify server's certificate has failed. Update stop.The device could not process an HTTPS connection because it could not verify the myZyXEL.com server's certificate. The update has stopped.
Send download request to update server has failed.The device's attempt to send a download message to the update server failed.
Get server response has failed.The device sent packets to the MyZyXEL.com server, but did not receive a response. The root cause may be that the connection is abnormal.
Timeout for get server response.zysh need to catch MyZyXEL.com agent's return code, this log will be shown when timeout.
Send update request to update server has failed.The device could not send an update message to the update server.
Update has failed. Because of lack must fields.The device received an incomplete response from the update server and it caused a parsing error for the device.
Update server is busy now. File download after %d seconds.The update server was busy so the device will wait for the specified number of seconds and send the download request to the update server again.
Device has latest file. No need to update.The device already has the latest version of the file so no update is needed.
Device has latest signature file; no need to updateThe device already has the latest version of the signature file so no update is needed.
Connect to update server has failed.The device cannot connect to the update server.
Wrong format for packets received.The device cannot parse the response returned by the server. Maybe some required fields are missing.
Server setting error. Update stop.The device could not resolve the update server's FQDN to an IP address through gethostbyname(). The update process stopped.
Build query message failed.Some information was missing in the packets that the device sent to the server.
Starting signature update.The device started an IDP signature update.
IDP signature download has succeeded.The device successfully downloaded an IDP signature file.
IDP signature update has succeeded.The device successfully downloaded and applied an IDP signature file.
IDP signature download has failed.The device still cannot download the IDP signature after 3 retries.
Anti-Virus signature download has succeeded.The device successfully downloaded an anti-virus signature file.
Anti-Virus signature update has succeeded.The device successfully downloaded and applied an anti-virus signature file.
Anti-Virus signature download has failed.The device still cannot download the anti-virus signature after 3 retries.
System protect signature download has succeeded.The device successfully downloaded the system protect signature file.
System protect signature update has succeeded.The device successfully downloaded and applied a system protect signature file.
System protect signature download has failed.The device still cannot download the system protect signature file after 3 retries.
Resolve server IP has failed.The device could not resolve the myZyXEL.com server's FQDN to an IP address through gethostbyname().
Connect to MyZyXEL.com server has failed.The device could not connect to the MyZyXEL.com server.
Build query message has failed.Some information was missing in the packets that the device sent to the server.
Verify server's certificate has failed.The device could not process an HTTPS connection because it could not verify the server's certificate.
Get server response has failed.The device sent packets to the server, but did not receive a response. The root cause may be that the connection is abnormal.
Expiration daily-check has failed:%s.The daily check for service expiration failed, an error message returned by the MyZyXEL.com server will be appended to this log.%s: error message returned by myZyXEL.com server
Do expiration daily-check has failed.Because of lack must fields.The device received an incomplete response to the daily service expiration check and the packets caused a parsing error for the device.
Server setting error.The device could not retrieve the server's IP address or FQDN from local.
Do expiration daily-check has failed.The daily check for service expiration failed.
Do expiration daily-check has succeeded.The daily check for service expiration was successful.
Expiration daily-check will trigger PPP interface. Do self-check.Before the device sends an expiration day check packet, it needs to check whether or not it will trigger a PPP connection.
System bootup. Do expiration daily-check.The device processes a service expiration day check immediately after it starts up.
After register. Do expiration daily-check immediately.The device processes a service expiration day check immediately after device registration.
Time is up. Do expiration daily-check.The processes a service expiration day check every 24 hrs.
Read MyZyXEL.com storage has failed.Read data from EEPROM has failed.
Open /proc/MRD has failed.This error message is shown when getting MAC address.
IDP service has expired.The IDP service period has expired. The device can find this through either a service expiration day check via MyZyXEL.com server or by the device's own count.
Content-Filter service has expired.The content filtering service period has expired. The device can find this through either a service expiration day check via MyZyXEL.com server or by the device's own count.
Unknown TLS/SSL version: %d.The device only supports SSLv3 protocol. %d: SSL version assigned by client.
Load trusted root certificates has failed.The device needs to load the trusted root certificate before the device can verify a server's certificate. This log displays if the device failed to load it.
Certificate has expired.Verification of a server's certificate failed because it has expired.
Self signed certificate.Verification of a server's certificate failed because it is self-signed.
Self signed certificate in certificate chain.Verification of a server's certificate failed because there is a self-signed certificate in the server's certificate chain.
Verify peer certificates has succeeded.The device verified a server's certificate while processing an HTTPS connection.
Certification verification failed: Depth: %d, Error Number(%d):%s.Verification of a server's certificate failed while processing an HTTPS connection. This log identifies the reason for the failure.1st %d: certificate chain level2nd %d: error number%s: error message
Certificate issuer name:%s.Verification of the specified certificate failed because the device could not get the certificate's issuer name. %s is the certificate name.
The wrong format for HTTP header.The header format of a packet returned by a server is wrong.
Timeout for get server response.After the device sent packets to a server, the device did not receive any response from the server. The root cause may be a network delay issue.
Download file size is wrong.The file size downloaded for AS is not identical with content-length
Parse HTTP header has failed.Device can't parse the HTTP header in a response returned by a server. Maybe some HTTP headers are missing.

Table 275 IDP Logs

LOG MESSAGEDESCRIPTION
System internal error. Detect IDP engine status failed.There was an internal system error. The device failed in checking whether or not IDP is activated.
System internal error. Enable IDP failed.There was an internal system error. The device failed in turning on IDP.
System internal error. Disable IDP failed.There was an internal system error. The device failed in turning off IDP.
Enable IDP succeeded.The device turned on the use of the IDP signature file.
Disable IDP succeeded.The device turned off the use of the IDP signature file.
Enable IDP engine failed.The device failed to turn on the IDP engine.
Disable IDP engine failed.The device failed to turn off the IDP engine.
Enable IDP engine succeeded.The device turned on the IDP engine.
Disable IDP engine succeeded.The device turned off the IDP engine.
IDP service is not registered. IDP will not be activated.The IDP service could has not been turned on and the IDP signatures will not be updated because the IDP service is not registered.
IDP service standard license is expired. Update signature failed.The IDP standard service license expired so the device cannot update the IDP signatures.
IDP service standard license is not registered. Update signature failed.A IDP standard service license has not been registered. The device cannot update the IDP signatures.
IDP service trial license is expired. Update signature failed.The IDP service trial license has expired. The device cannot update the IDP signatures.
IDP service trial license is not registered. Update signature failed.The IDP service trial license has not been registered yet. The device cannot update the IDP signatures.
Custom signature add error: sid,.An attempt to add a custom IDP signature failed. The error sid and message are displayed.
Custom signature import error: line, sid,,.An attempt to import a custom IDP signature failed. The errored line number in the file, the error sid and error message are displayed.
Custom signature replace error: line, sid,.Custom IDP signature replacing failed. Error line number of file, sid and message will be shown
Custom signature edit error: sid,.An attempt to edit a custom IDP signature failed. The error sid and message are displayed.
Custom signature more than . Replacement custom signature number is.An attempt to replace a custom IDP signature failed. The maximum number of custom signatures (first num) and the number of the replacement signature (second num) display.
Custom signature more than . Remaining custom signature number is. Adding custom signature number is.An attempt to add a custom IDP signature failed. The maximum number of custom signatures (first num), the number of remaining capacity for custom signatures (second num), and the number of the custom signature (third num) that was not added display.
Get custom signature number error.The device failed to get the custom IDP signature number.
Add custom signature error: signature <sid> is over length.An attempt to add a custom IDP signature failed because the signature's contents were too long.
Edit custom signature error: signature <sid> is over length.An attempt to edit a custom IDP signature failed because the signature's contents were too long.
IDP off-line update failed. File damaged.An update attempt for the IDP signatures failed. The signature file may be corrupt.
IDP signature update failed. File crashed.An attempt to update the IDP signature file failed because the device could not decrypt the signature file.
IDP signature update failed. File damaged.An attempt to update the IDP signature file failed because the device could not decompress the signature file.
IDP signature update failed. File update failed.An attempt to update the IDP signatures failed. Updating the signature file failed.
IDP signature update failed. Can not update last update time.An attempt to update the IDP signatures failed. Updating the time for the last signature file update failed.
IDP signature update failed. Can not update synchronized file.An attempt to update the IDP signatures failed. Rebuilding of the IDP device HA synchronized file failed.
IDP signature update from version <version> to version <version> has succeeded.An IDP signature update succeeded. The previous and updated IDP signature versions are listed.
IDP system-protect signature update from version <version> to version <version> has succeeded.An update of the IDP system-protect signatures succeeded. The previous and updated signature versions are listed.
System-protect error. Create IDP debug directory failedThe IDP system-protect function had an error. Creation of the IDP debug directory failed.
System internal error. Create IDP statistics entry failed.There was an internal system error. Creation of an IDP statistics entry failed.
System-protect error. Out of memory. IDP activation unchanged.The IDP system-protect function had an error. The device did not have enough available memory. The setting for IDP activation has not changed.
System-protect error. Create IDP proc failed. IDP activation failed.Activation of the IDP system-protect function failed due to an internal system error.
fromto[type=], Action:, Severity:The ZyWALL detected an intrusion in traffic traveling between the specified zones.The = {scan-detection() | flood-detection() | http-inspection() | tcp-decoder)}.The gives details about the attack, although the message is dropped if the log is more than 128 characters.Theis the threat level (very low, low, medium, high, or severe).
Program DFA failed.There was an internal system error. The IDP search engine failed.
IDP signature update failed. Fail to extract temporary file.An attempt to update the IDP signatures failed because the device could not extract the signature package's temporary file.
IDP signature update failed.An attempt to update the IDP signatures failed due to an internal system error.
IDP signature update failed. Invalid signature content.An attempt to update the IDP signatures failed due to an internal system error.
System internal error. Create IDP traffic anomaly entry failed.There was an internal system error.
Query signature version failed.The device could not get the signature version from the new signature package it downloaded from the update server.
Can not get signature version.The device could not get the signature version from the new signature package it downloaded from the update server.
IDP system-protect signature update failed. Invalid IDP config file.An IDP system-protect signature update failed.
IDP system-protect signature update failed. Invalid signature content.An IDP system-protect signature update failed.
Enable IDP system-protect succeeded.The IDP system-protect feature was successfully turned on.
Disable IDP system-protect succeeded.The IDP system-protect feature was successfully turned off.
Check duplicate sid failed. Allocate memory error.Checking for duplicated signature IDs failed. There was an error while allocating memory.
Check duplicate sid failed. Open file error.Checking for duplicated signature IDs failed. Opening a temporary file failed.
Duplicate sidin import file at line.The listed signature ID is duplicated at the listed line number in the signature file.
IDP rulehas been deleted.The listed IDP rule has been removed.
IDP rulehas been moved to.The IDP rule with the specified index number (first num) was moved to the specified index number (second num).
New IDP rule has been appended.An IDP rule has been added to the end of the list.
IDP rulehas been inserted.An IDP rule has been inserted.is the number of the new rule.
IDP rulehas been modified.The IDP rule of the specified number has been changed.
IDP profilehas been deleted.The IDP profile with the specified name has been removed.
IDP profilehas been changed to.An IDP profile's name has been changed from firstto the second.
IDP profilehas been created.The IDP profile with the specified name has been added.
IDP profilehas been modified.IDP profile has been modified.is profile name.
IDP signatures missing, please refer to your user documentation to recover the default database fileWhen the ZyWALL started it could not find the IDP signature file. See the CLI reference guide for how to restore the default system database.
IDP signature size is over system limitation.The IDP signature set is too large (exceeds the ZyWALL's system limitation).

Table 276 Application Patrol

MESSAGEEXPLANATION
Service=%s Mode=%sRule=%s Access=%sCommon packet logging. 1st %s: Protocol Name, 2nd %s:"port-less" or "port-base", 3rd %s: Rule Index, 4th %s:"forward", "drop" or "reject".
Service=%s Rule=%sAction=%s Access=dropSpecial packet logging for IM action. 1st %s: Protocol Name, 2nd %s: "port-less" or "port-base", 3rd %s: "login","message", "audio", "video" or "file-transfer".
Initialize App. Patrolhas succeeded.Application patrol was successfully initiated.
Rule %s:%s has beenmodifiedAn application patrol rule has been modified. 1st %s:Protocol Name, 2nd: Rule Index.
App. Patrol has beenactivated.Application patrol was turned on.
App. Patrol has beendeactivated.Application patrol was turned off.
Protocol %s has been enabled.The listed protocol has been turned on in the application patrol.
Protocol %s has been disabled.The listed protocol has been turned off in the application patrol.
Classification mode of protocol %s has been modified to portless.The device will now use the portless classification mode to identify the listed protocol's traffic.
Classification mode of protocol %s has been modified to portbase.The device will now use the port-based classification mode to identify the listed protocol's traffic.
Bandwidth graph of protocol %s has been enabled.The bandwidth graph has been turned on for the listed protocol's traffic.
Bandwidth graph of protocol %s has been disabled.The bandwidth graph has been turned off for the listed protocol's traffic.
Default port %s of protocol %s has been added.The listed default port (first %s) has been added for the listed protocol (second %s).
Default port %s of protocol %s has been removed.The listed default port (first %s) has been deleted for the listed protocol (second %s).
Rule %s:%s has been moved to index %s.An application patrol rule has been moved.1st %s: Protocol name2nd %s: From rule index number3rd %s: To rule index number
Rule %s:%s has been removed.An application patrol rule has been deleted.1st %s: Protocol name2nd %s: From rule index number3rd %s: To rule index number
System fatal error: 60011001.The device failed to initiate the application patrol daemon.
System fatal error: 60011002.The device failed to get the application patrol protocol list.
System fatal error: 60011003.The device failed to initiate XML.
System fatal error: 60011004.The device failed to turn application patrol off while the system was initiating.

Table 277 IKE Logs

LOG MESSAGEDESCRIPTION
Peer has not announced DPD capabilityThe remote IPSec router has not announced its dead peer detection (DPD) capability to this device.
[COOKIE] Invalid cookie, no sa foundCannot find SA according to the cookie.
[DPD] No response from peer. Using existing Phase-1 SA in %u seconds. Trying with Phase-1 rekey.The device's DPD feature has not detected a response from the remote IPSec router. %u is the retry time.
[HASH] : Tunnel [%s] Phase 1 hash mismatch%s is the tunnel name. When negotiating Phase-1, the exchange hash did not match.
[HASH] : Tunnel [%s] Phase 2 hash mismatch"%s is the tunnel name. When negotiating Phase-2, the calculated quick mode authentication hash did not match.
[ID] : Invalid ID informationID payload is not valid (in Phase-1 is local/peer ID, in Phase-2 is local/remote policy).
[ID] : Tunnel [%s] Local IP mismatch%s is the tunnel name. When negotiating Phase-1, the local tunnel IP did not match the My IP in VPN gateway.
[ID] : Tunnel [%s] My IP mismatch%s is the tunnel name. When negotiating Phase-1 and selecting matched proposal, My IP Address could not be resolved.
[ID] : Tunnel [%s] Phase 1 ID mismatch%s is the tunnel name. When negotiating Phase-1, the peer ID did not match.
[ID] : Tunnel [%s] Phase 2 Local ID mismatch%s is the tunnel name. When negotiating Phase-2 and checking IPsec SAs or the ID is IPv6 ID.
[ID] : Tunnel [%s] Phase 2 Remote ID mismatch%s is the tunnel name. When negotiating Phase-2 and checking IPsec SAs or the ID is IPv6 ID.
[ID] : Tunnel [%s] Remote IP mismatch%s is the tunnel name. When negotiating Phase-1, the peer tunnel IP did not match the secure gateway address in VPN gateway.
[SA] : Malformed IPSec SA proposalWhen selecting a matched proposal, some protocol was given more than once.
[SA] : No proposal chosenWhen selecting a matched proposal in phase-1 or phase-2, so proposal was selected.
[SA] : Tunnel [%s] Phase 1 authentication algorithm mismatch%s is the tunnel name. When negotiating Phase-1, the authentication algorithm did not match.
[SA] : Tunnel [%s] Phase 1 authentication method mismatch%s is the tunnel name. When negotiating Phase-1, the authentication method did not match.
[SA] : Tunnel [%s] Phase 1 encryption algorithm mismatch%s is the tunnel name. When negotiating Phase-1, the encryption algorithm did not match.
[SA] : Tunnel [%s]Phase 1 invalid protocol%s is the tunnel name. When negotiating Phase-1, the packet was not a ISKAMP packet in the protocol field.
[SA] : Tunnel [%s]Phase 1 invalid transform%s is the tunnel name. When negotiating Phase-1, the transform ID was invalid.
[SA] : Tunnel [%s]Phase 1 key group mismatch%s is the tunnel name. When negotiating Phase-1, the DH group of the attribute list `attrs' did not match the security policy.
[SA] : Tunnel [%s]Phase 1 negotiation mode mismatch%s is the tunnel name. When negotiating Phase-1, the negotiation mode did not match.
[SA] : Tunnel [%s]Phase 2 authentication algorithm mismatch%s is the tunnel name. When negotiating Phase-2, the authentication algorithm did not match.
[SA] : Tunnel [%s]Phase 2 encapsulation mismatch%s is the tunnel name. When negotiating Phase-2, the encapsulation did not match.
[SA] : Tunnel [%s]Phase 2 encryption algorithm mismatch%s is the tunnel name. When negotiating Phase-2, the encryption algorithm did not match.
[SA] : Tunnel [%s]Phase 2 pfs mismatch%s is the tunnel name. When negotiating Phase-2, the PFS specified did not match.
[SA] : Tunnel [%s]Phase 2 pfs unsupported: %d%s is the tunnel name. When negotiating Phase-2, this device does not support the PFS specified.
[SA] : Tunnel [%s]Phase 2 SA encapsulation mismatch%s is the tunnel name. When negotiating Phase-2, the SA encapsulation did not match.
[SA] : Tunnel [%s]Phase 2 SA protocol mismatch%s is the tunnel name. When negotiating Phase-2, the SA protocol did not match.
[SA] : Tunnel [%s] SA sequence size mismatch%s is the tunnel name. When negotiating Phase-2, the SA sequence size did not match.
[XCHG] exchange type is not IP, AGGR, or INFOThis device is the responder and this is the initiator's first packet, but exchange type is not IP, AGGR, or INFO and the packet is ignored.
Cannot resolve My IP Addr %s for Tunnel [%s]1st %s is my ip address. 2nd %s is the tunnel name. When selecting a matched proposal in phase-1, the engine could not get My-IP address.
Cannot resolve Secure Gateway Addr %s for Tunnel [%s]1st %s is my ip address. 2nd %s is the tunnel name; When selecting a matched proposal in phase-1, the engine could not get the correct secure gateway address.
Could not dial dynamic tunnel "%s"%s is the tunnel name. The tunnel is a dynamic tunnel and the device cannot dial it.
Could not dial incomplete tunnel "%s"%s is the tunnel name. The tunnel setting is not complete.
Could not dial manual key tunnel "%s"%s is the tunnel name. The manual key tunnel cannot be dialed.
DPD response with invalid IDWhen receiving a DPD response with invalid ID ignored.
DPD response with no active requestWhen receiving a DPD response with no active query.
IKE Packet RetransmitWhen retransmitting the IKE packets.
Phase 1 IKE SA process doneWhen Phase 1 negotiation is complete.
Recv Main Mode request from [%s]%s is the remote name; When receiving a request to enter Main mode.
Recv Aggressive Mode request from [%s]%s is the remote name; When receiving a request to enter Aggressive mode.
Recv:[SA][KE][ID][CERT][CR][HASH][SIG][NONCE][DEL][VID][ATTR][NOTFY:%s]This is a combined message for incoming IKE packets
Send Main Mode request to [%s]%s is the remote name. The device sent a request to enter Main Mode.
Send Aggressive Mode request to [%s]%s is the remote name. The device sent a request to enter Aggressive Mode.
Send:[SA][KE][ID][CERT][CR][HASH][SIG][NONCE][DEL][VID][ATTR][NOTFY:%s]This is a combined message for outgoing IKE packets.
Start Phase 2: Quick ModeIndicates the beginning of phase 2 using quick mode.
The cookie pair is : 0x%08x%08x / 0x%08x%08xIndicates the initiator/responder cookie pair.
The IPSec tunnel "%s" is already established%s is the tunnel name. When dialing a tunnel, the tunnel is already dialed.
Tunnel [%s] built successfully%s is the tunnel name. The phase-2 tunnel negotiation is complete.
Tunnel [%s] Phase 1 pre-shared key mismatch%s is the tunnel name. When negotiating phase-1, the pre-shared key did not match.
Tunnel [%s] Recving IKE request%s is the tunnel name. The device received an IKE request.
Tunnel [%s] Sending IKE request%s is the tunnel name. The device sent an IKE request.
Tunnel [%s] IKE Negotiation is in process%s is the tunnel name. When IKE request is already sent but still attempting to dial a tunnel.
VPN gateway %s was disabled%s is the gateway name. An administrator disabled the VPN gateway.
VPN gateway %s was enabled%s is the gateway name. An administrator enabled the VPN gateway.
XAUTH fail! My name: %s%s is the my xauth name. This indicates that my name is invalid.
XAUTH fail! Remote user: %s%s is the remote xauth name. This indicates that a remote user's name is invalid.
XAUTH succeed! My name: %s%s is the my xauth name. This indicates that my name is valid.
XAUTH succeed! Remote user: %s%s is the remote xauth name. This indicate that a remote user's name is valid
Dynamic Tunnel [%s:%s:0x%x:%s] built successfullyThe variables represent the phase 1 name, tunnel name, SPI and the xauth name (optional). The phase-2 tunnel negotiation is complete.
Dynamic Tunnel [%s:%s:0x%x:0x%x:%s] rekeyed successfullyThe variables represent the phase 1 name, tunnel name, old SPI, new SPI and the xauth name (optional). The tunnel was rekeyed successfully.
Tunnel [%s:%s:0x%x:%s] built successfullyThe variables represent the phase 1 name, tunnel name, SPI and the xauth name (optional). The phase-2 tunnel negotiation is complete.
Tunnel [%s:%s:0x%x:0x%x:%s] rekeyed successfullyThe variables represent the phase 1 name, tunnel name, old SPI, new SPI and the xauth name (optional). The tunnel was rekeyed successfully.
Tunnel [%s:%s] Phase 1 pre-shared key mismatchThe variables represent the phase 1 name and tunnel name. When negotiating phase-1, the pre-shared keys did not match.
Tunnel [%s:%s] Recving IKE requestThe variables represent the phase 1 name and tunnel name. The device received an IKE request.
Tunnel [%s:%s] Sending IKE requestThe variables represent the phase 1 name and tunnel name. The device sent an IKE request.
Tunnel [%s:0x%x] is disconnectedThe variables represent the tunnel name and the SPI of a tunnel that was disconnected.
Tunnel [%s] rekeyed successfully%s is the tunnel name. The tunnel was rekeyed successfully.

Table 278 IPSec Logs

LOG MESSAGEDESCRIPTION
Corrupt packet, Inbound transform operation failThe device received corrupt IPsec packets and could not process them.
Encapsulated packet too big with lengthAn outgoing packet needed to be transformed but was longer than 65535.
Get inbound transform failWhen performing inbound processing for incoming IPSEC packets and ICMPs related to them, the engine cannot obtain the transform context.
Get outbound transform failWhen outgoing packet need to be transformed, the engine cannot obtain the transform context.
Inbound transform operation failAfter encryption or hardware accelerated processing, the hardware accelerator dropped a packet (resource shortage, corrupt packet, invalid MAC, and so on).
Outbound transform operation failAfter encryption or hardware accelerated processing, the hardware accelerator dropped a packet (e.g., resource overflow, corrupt packet, and so on).
Packet too big with Fragment OffAn outgoing packet needed to be transformed, but the fragment flag was off and the packet was too big.
SPI:0x%x SEQ:0x%x Execute transform step fail, ret=%dThe variables represent the SPI, sequence number and the error number. When trying to perform transforming, the engine returned an error.
SPI:0x%x SEQ:0x%x No rule found, Dropping packetThe variables represent the SPI and the sequence number. The packet did not match the tunnel policy and was dropped.
SPI:0x%x SEQ:0x%x Packet Anti-Replay detectedThe variables represent the SPI and the sequence number. The device received a packet again (that it had already received).
VPN connection %s was disabled.%s is the VPN connection name. An administrator disabled the VPN connection.
VPN connection %s was enabled.%s is the VPN connection name. An administrator enabled the VPN connection.
Due to active connection allowed exceeded, %s was deleted.%s is the VPN connection name. The number of active connections exceeded the maximum allowed.

Table 279 Firewall Logs

LOG MESSAGEDESCRIPTION
priority:%lu, from %sto %s, service %s, %s1st variable is the global index of rule, 2nd is the from zone,3rd is the to zone, 4th is the service name, 5th is ACCEPT/DROP/REJECT.
%s:%d: in %s():Firewall is dead, trace to %s is which file, %d is which line,%s is which function
Firewall has been %s.%s is enabled/disabled
Firewall rule %d hasbeen moved to %d.1st %d is the old global index of rule, 2nd %d is the newglobal index of rule
Firewall rule %d hasbeen deleted.%d is the global index of rule
Firewall rules havebeen flushed.Firewall rules were flushed
Firewall rule %d was%s.%d is the global index of rule, %s is appended/inserted/modified
Firewall %s %s rule %d was %s.1st %s is from zone, 2nd %s is to zone, %d is the index of the rule3rd %s is appended/inserted/modified
Firewall %s %s rule %d has been moved to %d.1st %s is from zone, 2nd %s is to zone, 1st %d is the old index of the rule2nd %d is the new index of the rule
Firewall %s %s rule %d has been deleted.1st %s is from zone, 2nd %s is to zone, %d is the index of the rule
Firewall %s %s rules have been flushed.1st %s is from zone, 2nd %s is to zone
abnormal TCP flag attack detectedAbnormal TCP flag attack detected
invalid state detectedInvalid state detected
The Asymmetrical Route has been enabled.Asymmetrical route has been turned on.
The Asymmetrical Route has been disabled.Asymmetrical Route has been turned off.

Table 280 Sessions Limit Logs

LOG MESSAGEDESCRIPTION
Maximum sessions per host (%d) was exceeded.%d is maximum sessions per host.

Table 281 Policy Route Logs

LOG MESSAGEDESCRIPTION
Can't open bwm_entriesPolicy routing can't activate BWM feature.
Can't open link_downPolicy routing can't detect link up/down status.
Cannot get handle from UAM, user-aware PR is disabledUser-aware policy routing is disabled due to some reason.
mblock: allocate memory failed!Allocating policy routing rule fails: insufficient memory.
pt: allocate memory failed!Allocating policy routing rule fails: insufficient memory.
To send message to policy route daemon failed!Failed to send control message to policy routing manager.
The policy route %d allocates memory fail!Allocating policy routing rule fails: insufficient memory.%d: the policy route rule number
The policy route %d uses empty user group!Use an empty object group.%d: the policy route rule number
The policy route %d uses empty source address group!Use an empty object group.%d: the policy route rule number
The policy route %d uses empty destination address group!Use an empty object group.%d: the policy route rule number
The policy route %d uses empty service groupUse an empty object group.%d: the policy route rule number
Policy-route rule %d was inserted.Rules is inserted into system.%d: the policy route rule number
Policy-route rule %d was appended.Rules is appended into system.%d: the policy route rule number
Policy-route rule %d was modified.Rule is modified.%d: the policy route rule number
Policy-route rule %d was moved to %d.Rule is moved.1st %d: the original policy route rule number2nd %d: the new policy route rule number
Policy-route rule %d was deleted.Rule is deleted.%d: the policy route rule number
Policy-route rules were flushed.Policy routing rules are cleared.
BWM has been activated.The global setting for bandwidth management on the ZyWALL has been turned on.
BWM has been deactivated.The global setting for bandwidth management on the ZyWALL has been turned off.

Table 282 Built-in Services Logs

LOG MESSAGEDESCRIPTION
User on %u.%u.%u.%u has been denied access from %sHTTP/HTTPS/TELNET/SSH/FTP/SNMP access to the device was denied.%u.%u.%u.%u is IP address%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET
HTTPS certificate:%s does not exist. HTTPS service will not work.An administrator assigned a nonexistent certificate to HTTPS.%s is certificate name assigned by user
HTTPS port has been changed to port %s.An administrator changed the port number for HTTPS.%s is port number
HTTPS port has been changed to default port.An administrator changed the port number for HTTPS back to the default (443).
HTTP port has changed to port %s.An administrator changed the port number for HTTP.%s is port number assigned by user
HTTP port has changed to default port.An administrator changed the port number for HTTP back to the default (80).
SSH port has been changed to port %s.An administrator changed the port number for SSH.%s is port number assigned by user
SSH port has been changed to default port.An administrator changed the port number for SSH back to the default (22).
SSH certificate:%s does not exist. SSH service will not work.An administrator assigned a nonexistent certificate to SSH.%s is certificate name assigned by user
SSH certificate:%s format is wrong. SSH service will not work.After an administrator assigns a certificate for SSH, the device needs to convert it to a key used for SSH.%s is certificate name assigned by user
TELNET port has been changed to port %s.An administrator changed the port number for TELNET.%s is port number assigned by user
TELNET port has been changed to default port.An administrator changed the port number for TELNET back to the default (23).
FTP certificate:%s does not exist.An administrator assigned a nonexistent certificate to FTP.%s is certificate name assigned by user
FTP port has been changed to port %s.An administrator changed the port number for FTP.%s is port number assigned by user
FTP port has been changed to default port.An administrator changed the port number for FTP back to the default (21).
SNMP port has been changed to port %s.An administrator changed the port number for SNMP.%s is port number assigned by user
SNMP port has been changed to default port.An administrator changed the port number for SNMP back to the default (161).
Console baud has been changed to %s.An administrator changed the console port baud rate.%s is baud rate assigned by user
Console baud has been reset to %d.An administrator changed the console port baud rate back to the default (115200).%d is default baud rate
DHCP Server on Interface %s will not work due to Device HA status is Stand-ByIf interface is stand-by mode for device HA, DHCP server can't be run. Otherwise it has conflict with the interface in master mode.%s is interface name
DHCP Server on Interface %s will be reapplied due to Device HA status is ActiveWhen an interface has become the HA master, the DHCP server needs to start operating.%s is interface name
DHCP's DNS option:%s has changed.DHCP pool's DNS option support from WAN interface. If this interface is unlink/disconnect or link/connect, this log will be shown.%s is interface name. The DNS option of DHCP pool has retrieved from it
Set timezone to %s.An administrator changed the time zone.%s is time zone value
Set timezone to default.An administrator changed the time zone back to the default (0).
Enable daylight saving.An administrator turned on daylight saving.
Disable daylight saving.An administrator turned off daylight saving.
DNS access control rules have been reached the maximum number.An administrator tried to add more than the maximum number of DNS access control rules (64).
DNS access control rule %u of DNS has been appended.An administrator added a new rule.%u is rule number
DNS access control rule %u has been inserted.An administrator inserted a new rule.%u is rule number
DNS access control rule %u has been appendedAn administrator appended a new rule.%u is rule number
DNS access control rule %u has been modifiedAn administrator modified the rule %u.%u is rule number
DNS access control rule %u has been deleted.An administrator removed the rule %u.%u is rule number
DNS access control rule %u has been moved to %d.An administrator moved the rule %u to index %d.%u is previous index%d variable is current index
The default record of Zone Forwarder have reached the maximum number of 128 DNS servers.The default record DNS servers is more than 128.
Interface %s ping check is successful.Zone Forwarder adds DNS servers in records.Ping check ok, add DNS servers in bind.%s is interface name
Interface %s ping check is failed. Zone Forwarder removes DNS servers in records.Ping check failed, remove DNS servers from bind.%s is interface name
Interface %s ping check is disabled.Zone Forwarder adds DNS servers in records.Ping check disabled, add DNS servers in bind.%s is interface name
Wizard apply DNS server failed.Wizard apply DNS server failed.
Wizard adds DNS server %s failed because DNS zone setting has conflictd.Wizard apply DNS server failed because DNS zone conflicted.%s is the IP address of the DNS server
Wizard adds DNS server %s failed because Zone Forwarder numbers have reached the maximum number of 32.Wizard apply DNS server fail because the device already has the maximum number of DNS records configured.%s is IP address of the DNS server.
Access control rules of %s have reached the maximum number of %uThe maximum number of allowable rules has been reached.%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.%u is the maximum number of access control rules.
Access control rule %u of %s was appended.A new built-in service access control rule was appended.%u is the index of the access control rule.%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u of %s was inserted.An access control rule was inserted successfully.%u is the index of the access control rule.%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u of %s was modified.An access control rule was modified successfully.%u is the index of the access control rule.%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u of %s was deleted.An access control rule was removed successfully.%u is the index of the access control rule.%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %d of %s was moved to %d.An access control rule was moved successfully.1st %d is the previous index .%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.2nd %d is current previous index.
SNMP trap can not be sent successfullyCannot send a SNMP trap to a remote host due to network error

Table 283 System Logs

LOG MESSAGEDESCRIPTION
Port %d is up!!When LINK is up, %d is the port number.
Port %d is down!!When LINK is down, %d is the port number.
%s is dead at %sA daemon (process) is gone (was killed by the operating system).1st %s: Daemon Name, 2nd %s: date and time
%s process count is incorrect at %sThe count of the listed process is incorrect.1st %s: Daemon Name, 2nd %s: date and time
%s becomes Zombie at %sA process is present but not functioning.1st %s: Daemon Name, 2nd %s: date and timeWhen memory usage exceeds threshold-max, memory usage reaches %d%% :mem-threshold-max.When local storage usage exceeds threshold-max, %s: Partition name file system usage reaches %d%%: disk-threshold-max.When memory usage drops below threshold-min, System Memory usage drops below the threshold of %d%%: mem-threshold-min.When local storage usage drops below threshold-min, %s: partition_name file system drops below the threshold of %d%%: disk-threshold-min.
DHCP Server executed with cautious mode enabledDHCP Server executed with cautious mode enabled.
DHCP Server executed with cautious mode disabledDHCP Server executed with cautious mode disabled.
Received packet is not an ARP response packetA packet was received but it is not an ARP response packet.
Receive an ARP responseThe device received an ARP response.
Receive ARP response from %s (%s)The device received an ARP response from the listed source.
The request IP is: %s, sent from %sThe device accepted a request.
Received ARP response NOT for the request IP addressThe device received an ARP response that is NOT for the requested IP address.
Receive an ARP response from the client issuing the DHCP requestThe device received an ARP response from the client issuing the DHCP request.
Receive an ARP response from an unknown clientThe device received an ARP response from an unknown client.
In total, received %d arp response packets for the requested IP addressThe device received the specified total number of ARP response packets for the requested IP address.
Clear arp cache successfully.The ARP cache was cleared successfully.
Client MAC address is not an Ethernet addressA client MAC address is not an Ethernet address.
DHCP request received via interface %s (%s:%s), src_mac: %s with requested IP: %sThe device received a DHCP request through the specified interface.
IP conflict is detected. Send back DHCP-NAK.IP conflict was detected. Send back DHCP-NAK.
Clear ARP cache doneClear ARP cache done.
NTP update successful, current time is %sThe device successfully synchronized with a NTP time server . %s is the time format.
NTP update failedThe device was not able to synchronize with the NTP time server successfully.
Device is rebooted by administrator!An administrator restarted the device.
Insufficient memory.Cannot allocate system memory.
Connect to dyndns server has failed.Cannot connect to members.dyndns.org to update DDNS.
Update the profile %s has failed because of strange server response.Update profile failed because the response was strange, %s is the profile name.
Update the profile %s has succeeded because the IP address of FQDN %s was not changed.Update profile succeeded, because the IP address of profile is unchanged, %s is the profile name.
Update the profile %s has succeeded.Update profile succeeded, %s is the profile name.
Update the profile %s has failed because the FQDN %s is invalid.Update profile failed because FQDN for the profile is invalid for DynDNS, 1st %s is the profile name, 2nd %s is the FQDN of the profile.
Update the profile %s has failed because the FQDN %s is malformed.The FQDN format is malformed for DynDNS server, 1st %s is the profile name, 2nd %s is the FQDN of the profile.
Update the profile %s has failed because the FQDN %s is not under your control.The owner of this FQDN is not the user, 1st %s is the profile name, 2nd %s is the FQDN of the profile.
Update the profile %s has failed because the FQDN %s was blocked for abuse.The FQDN is blocked by DynDNS, 1st %s is the profile name, 2nd %s is the FQDN of the profile.
Update the profile %s has failed because of authentication fail.Try to update profile, but failed, because of authentication fail, %s is the profile name.
Update the profile %s has failed because of invalid system parameters.Some system parameters are invalid to update FQDN, %s is the profile name.
Update the profile %s has failed because the FQDN %s was blocked.The FQDN is blocked by DynDNS, 1st %s is the profile name, 2nd %s is the FQDN of the profile.
Update the profile %s has failed because too many or too few hosts found.%s is the profile name.
Update the profile %s has failed because of dyndns internal errorUpdate profile failed because of a dynsdns internal error, %s is the profile name.
Update the profile %s has failed because the feature requested is only available to donors.Update profile failed because the feature requested is only available to donors, %s is the profile name.
Update the profile %s has failed because of error response.Update profile failed because the response is incorrect, %s is the profile name.
Update the profile %s has failed because %s.Update profile failed, and show the response message, 1st %s is the profile name, 2nd %s is the reason.
Update the profile %s has failed because of unknown error.Update profile failed because unknown error. Sometimes, the force authentication will result in this error, 1st %s is the profile name.
Update the profile %s has failed because Username was empty.DDNS profile needs username, %s is the profile name.
Update the profile %s has failed because Password was empty.DDNS profile needs password, %s is the profile name.
Update the profile %s has failed because Domain name was empty.DDNS profile needs domain name, %s is the profile name.
Update the profile %s has failed because Custom IP was empty.The DDNS profile's IP select type is custom, and a custom IP was not defined, %s is the profile name.
Update the profile %s has failed because WAN interface was empty.If the DDNS profile's IP select type is iface, it needs a WAN iface, %s is the profile name.
The profile %s has been paused because the VRRP status of WAN interface was standby.The profile is paused by device-HA, because the VRRP status of that iface is standby, %s is the profile name.
Update the profile %s has failed because WAN interface was link-down.DDNS profile cannot be updated for WAN IP because WAN iface is link-down, %s is the profile name.
Update the profile %s has failed because WAN interface was not connected.DDNS profile cannot be updated for WAN IP because WAN iface is PPP and not connected, %s is the profile name.
Update the profile %s has failed because IP address of WAN interface was empty.DDNS profile cannot be updated because the IP of WAN iface is 0.0.0.0, 1st %s is the profile name.
Update the profile %s has failed because ping-check of WAN interface has failed.DDNS profile cannot be updated because the ping-check for WAN iface failed, %s is the profile name.
The profile %s has been paused because the HA interface of VRRP status was standby.The profile is paused by Device-HA, because the VRRP status of that HA iface is standby, %s is the profile name.
Update the profile %shas failed because HA interface was link-down.DDNS profile cannot be updated for HA IP address because HA iface is link-down, %s is the profile name.
Update the profile %shas failed because the HA interface was not connected.DDNS profile cannot be updated for HA IP address because HA iface is PPP and not connected, %s is the profile name.
Update the profile %shas failed because IP address of HA interface was empty.DDNS profile cannot be updated because the IP address of HA iface is 0.0.0.0, %s is the profile name.
Update the profile %shas failed because ping-check of HA interface has failed.DDNS profile cannot be updated because the fail of ping-check for HA iface, %s is the profile name
DDNS has been disabled by Device-HA.DDNS is disabled by Device-HA, because all VRRP groups are standby.
DDNS has been enabled by Device-HA.DDNS is enabled by Device-HA, because one of VRRP groups is active.
Disable DDNS has succeeded.Disable DDNS.
Enable DDNS has succeeded.Enable DDNS.
DDNS profile %s has been renamed as %s.Rename DDNS profile, 1st %s is the original profile name, 2nd %s is the new profile name.
DDNS profile %s has been deleted.Delete DDNS profile, %s is the profile name,
DDNS Initialization has failed.Initialize DDNS failed,
All DDNS profiles are deletedAll DDNS profiles have been removed.
Collect Diagnostic Information has failed - Server did not respond.There was an error and the diagnostics were not completed.
Collect Diagnostic Infomation has succeeded.The diagnostics scripts were executed successfully.
Port %d is up!!The specified port has it's link up.
Port %d is down!!The specified port has it's link down.

Table 284 Connectivity Check Logs

LOG MESSAGEDESCRIPTION
Can't open link_up2Cannot recover routing status which is link-down.
Can not open %s.pidCannot open connectivity check process ID file.%s: interface name
Can not open %s.argCannot open configuration file for connectivity check process.%s: interface name
The connectivity-check is activate for %s interfaceThe link status of interface is still activate after check of connectivity check process.%s: interface name
The connectivity-check is fail for %s interfaceThe link status of interface is fail after check of connectivity check process.%s: interface name
Can't get gateway IP of %s interfaceThe connectivity check process can't get the gateway IP address for the specified interface.%s: interface name
Can't alloc memoryThe connectivity check process can't get memory from OS.
Can't load %s moduleThe connectivity check process can't load module for check link-status.%s: the connectivity module, currently only ICMP available.
Can't handle 'isalive' function of %s moduleThe connectivity check process can't execute 'isalive' function from module for check link-status.%s: the connectivity module, currently only ICMP available.
Create socket errorThe connectivity check process can't get socket to send packet.
Can't get IP address of %s interfaceThe connectivity check process can't get IP address of interface.%s: interface name.
Can't get flags of %s interfaceThe connectivity check process can't get interface configuration.%s: interface name
Can't get remote address of %s interfaceThe connectivity check process can't get remote address of PPP interface%s: interface name
Can't get NETMASK address of %s interfaceThe connectivity check process can't get netmask address of interface.%s: interface name
Can't get BROADCAST address of %s interfaceThe connectivity check process can't get broadcast address of interface%s: interface name
Can't use MULTICAST IP for destinationThe connectivity check process can't use multicast address to check link-status.
The destination is invalid, because destination IP is broadcast IPThe connectivity check process can't use broadcast address to check link-status.
Can't get MAC address of %s interface!The connectivity check process can't get MAC address of interface.%s: interface name
To send ARP REQUEST error!The connectivity check process can't send ARP request packet.
The %s routing status seted to DEAD by connectivity-checkThe interface routing can't forward packet.%s: interface name
The %s routing status seted ACTIVATE by connectivity-checkThe interface routing can forward packet.%s: interface name
The link status of %s interface is inactiveThe specified interface failed a connectivity check.

Table 285 Device HA Logs

LOG MESSAGEDESCRIPTION
Device HA VRRP Group %s has been added.An VRRP group has been created, %s: the name of VRRP group.
Device HA VRRP group %s has been modified.An VRRP group has been modified, %s: the name of VRRP group.
Device HA VRRP group %s has been deleted.An VRRP group has been deleted, %s: the name of VRRP group.
Device HA VRRP interface %s for VRRP Group %s has changed.Configuration of an interface that belonged to a VRRP group has been changed, 1st %s: VRRP interface name, 2ed %s: %s: the name of VRRP group.
Device HA syncing from %s starts.Device HA Syncing from Master starts when user click "Sync Now" using Auto Sync, %s: The IP of FQDN of Master.
%s has no file to sync, Skip syncing it for %s.There is no file to be synchronized from the Master when syncing a object (AV/AS/IDP/Certificate/System Configuration), But in fact, there should be something in the Master for the device to synchronize with, 1st %s: The syncing object, 2ed %s: The feature name for the syncing object.
Master configuration is the same with Backup. Skip updating it.The System Startup configuration file synchronized from the Master is the same with the one in the Backup, so the configuration does not have to be updated.
%s file not existed, Skip syncing it for %sThere is no file to be synchronized from the Master when syncing a object (AV/AS/IDP/Certificate/System Configuration), But in fact, there should be something in the Master for the device to synchronize with, 1st %s: The syncing object, 2ed %s: The feature name for the syncing object.
Master firmware version can not be recognized. Stop syncing from Master.Synchronizing stopped because the firmware version file was not found in the Master. A Backup device only synchronizes from the Master if the firmware versions are the same between the Master and the Backup.
Device HA Sync has failed when syncing %s for %s due to bad \"Sync Password\".The synchronization password was incorrect when attempting to synchronize a certain object (AV/AS/IDP/Certificate/System Configuration).1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized.
Device HA Sync has failed when syncing %s for %s due to bad \"Sync From\" or \"Sync Port\".The Sync From IP address or Sync Port may be incorrect when synchronizing a certain object (AV/AS/IDP/Certificate/System Configuration).
Device HA Sync has failed when syncing %s for %s.Synchronization failed when synchronizing a certain object (AV/AS/IDP/Certificate/System Configuration) due to an unknown reason, 1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized.
Sync Failed: Cannot connect to Master when syncing %s for %s.Synchronization failed because the Backup could not connect to the Master. The object to be synchronized, 2ed %s: The feature name for the object to be synchronized.
Backup firmware version can not be recognized. Stop syncing from Master.The firmware version on the Backup cannot be resolved to check if it is the same as on the Master. A Backup device only synchronizes from the Master if the Master and the Backup have the same firmware versions.
Sync failed: Remote Firmware Version UnknownThe firmware version on the Master cannot be resolved to check if it is the same as on the Master. A Backup device only synchronizes from the Master if the Master and the Backup have the same firmware versions.
Master firmware version should be the same with Backup.The Backup and Master have different firmware versions. A Backup device only synchronizes from the Master if the Master and the Backup have the same firmware versions.
Update %s for %s has failed.Updating a certain object failed when updating (AS/AV/IDP/Certificate/System Configuration). 1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized.
Update %s for %s has failed: %s.Updating a certain object failed when updating (AS/AV/IDP/Certificate/System Configuration) due to some reason. 1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized.
Device HA has skipped syncing %s since %s is %s.A certain service has no license or the license is expired, so it was not synchronized from the Master. 1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized, 3rd %s: unlicensed or license expired.
Device HA authentication type for VRRP group %s maybe wrong.A VRRP group's Authentication Type (Md5 or IPSec AH) configuration may not match between the Backup and the Master. %s: The name of the VRRP group.
Device HA authenticaton string of text for VRRP group %s maybe wrong.A VRRP group's Simple String (Md5) configuration may not match between the Backup and the Master. %s: The name of the VRRP group.
Device HA authentication string of AH for VRRP group %s maybe wrong.A VRRP group's AH String (IPSec AH) configuration may not match between the Backup and the Master. %s: The name of the VRRP group.
Retrying to update %s for %s. Retry: %d.An update failed. Retrying to update the failed object again. 1st %s: The object to be synchronized, 2ed %s: The feature name for the object to be synchronized, %d: the retry count.
Recovering to Backup original state for %s has failed.An update failed. The device will try to recover the failed update feature to the original state before Device HA synchronizes the specified object.
Recovering to Backup original state for %s has succeeded.Recovery succeeded when an update for the specified object failed.
One of VRRP groups has became avtive. Device HA Sync has aborted from Master %s.%s: IP or FQDN of Master
Master configuration file does not exist. Skip updating ZySH Startup Configuration.
System internal error: %s. Skip updating %s.1st %s: error string, 2ed %s: the syncing object
Master configuration file is empty. Skip updating ZySH Startup Configuration.
Device HA Sync has failed when syncing %s for %s due to transmission timeout.1st %s: the syncing object, 2ed %s: the feature name for the syncing object
VRRP interface %s has been shutdown.%s: The name of the VRRP interface.
VRRP interface %s has been brought up.%s: The name of the VRRP interface.

Table 286 Routing Protocol Logs

LOG MESSAGEDESCRIPTION
RIP on interface %s has been stopped because Device-HA binds this interface.Device-HA is currently running on the interface %s, so all the local service have to be stopped including RIP. %s: Interface Name
RIP on all interfaces have been stoppedGot the CLI command 'no router rip' to shut down RIP on all interfaces
Invalid RIP md5 authenticationRIP md5 authentication has been set without setting md5 authentication id and key first
Invalid RIP text authentication.RIP text authentication has been set without setting authentication key first
RIP on interface %s has been activated.RIP on interface %s has been activated. %s: Interface Name
RIP direction on interface %s has been changed to In-Only.RIP direction on interface %s has been changed to In-Only. %s: Interface Name
RIP direction on interface %s has been changed to Out-Only.RIP direction on interface %s has been changed to Out-Only. %s: Interface Name
RIP authentication mode has been changed to %s.RIP authentication mode has been changed to text or md5.
RIP text authentication key has been changed.RIP text authentication key has been changed.
RIP md5 authentication id and key have been changed.RIP md5 authentication id and key have been changed.
RIP global version has been changed to %s.RIP global version has been changed to version 1 or 2.
RIP redistribute OSPF routes has been enabled.RIP redistribute OSPF routes has been enabled.
RIP redistribute static routes has been enabled.RIP redistribute static routes has been enabled.
RIP on interface %s has been deactivated.RIP on interface %s has been deactivated. %s: Interface Name
RIP direction on interface %s has been changed to BiDir.RIP direction on interface %s has been changed to BiDir. %s: Interface Name
RIP authentication has been disabled.RIP text or md5 authentication has been disabled.
RIP text authentication key has been deleted.RIP text authentication key has been deleted.
RIP md5 authentication id and key have been deleted.RIP md5 authentication id and key have been deleted.
RIP global version has been deleted.RIP global version has been deleted.
RIP redistribute OSPF routes has been disabled.RIP redistribute OSPF routes has been disabled.
RIP redistribute static routes has been disabled.RIP redistribute static routes has been disabled.
RIP v2-broadcast on interface %s has been enabled.RIP v2-broadcast on interface %s has been enabled. %s: Interface Name.
RIP send-version on interface %s has been changed to %s.RIP send-version on interface %s has been changed to version 1 or 2 or both 1 2. %s: Interface Name.
RIP receive-version on interface %s has been changed to %s.RIP receive-version on interface %s has been changed to version 1 or 2 or both 1 2. 2nd%s: Interface Name.
RIP send-version on interface %s has been reset to current global version %s.RIP send-version on interface %s has been reset to current global version %s. 1st %s: Interface Name, 2nd %s: RIP Version
RIP receive-version on interface %s has been reset to current global version %s.RIP receive-version on interface %s has been reset to current global version %s. 1st %s: Interface Name, 2nd %s: RIP
RIP v2-broadcast on interface %s has been disabled.RIP v2-broadcast on interface %s has been disabled. %s: Interface Name
OSPF on interface %s has been stopped because Device-HA binds this interface.Device-HA is currently running on the interface %s, so all the local service have to be stopped including OSPF. %s: Interface Name
Area %s cannot be removed. This area is in use.One or more interfaces are still using this area, so area %s cannot be removed. %s: OSPF Area
Invalid OSPF %s authentication of area %s.OSPF md5 or text authentication has been set without setting md5 authentication id and key, or text authentication key first.
Invalid OSPF virtual-link %d md5 authentication of area %s.Virtual-link %s md5 authentication has been set without setting md5 authentication id and key first. %s: Virtual-Link ID
Invalid OSPF virtual-link %s text authentication of area %s.Virtual-link %s text authentication has been set without setting text authentication key first. %s: Virtual-Link ID
Invalid OSPF virtual-link %s authentication of area %s.Virtual-link %s authentication has been set to same-as-area but the area has invalid authentication configuration. %s: Virtual-Link ID
Invalid OSPF md5 authentication on interface %s.Invalid OSPF md5 authentication is set on interface %s. %s: Interface Name
Invalid OSPF text authentication on interface %s.Invalid OSPF text authentication is set on interface %s. %s: Interface Name
Interface %s does not belong to any OSPF area.Interface %s has been set OSPF authentication same-as-area, however the interface does not belong to any OSPF area. %s: Interface Name
Invalid OSPF authentication of area %s on interface %s.Interface %s has been set OSPF authentication same-as-area, however the area has invalid text authentication configuration. %s: Interface Name

Table 287 NAT Logs

LOG MESSAGEDESCRIPTION
The NAT range is fullThe NAT mapping table is full.
%s FTP ALG has succeeded.The FTP Application Layer Gateway (ALG) has been turned on or off.%s: Enable or Disable
Extra signal port of FTP ALG has been modified.Extra FTP ALG port has been changed.
Signal port of FTP ALG has been modified.Default FTP ALG port has been changed.
%s H.323 ALG has succeeded.The H.323 ALG has been turned on or off. %s: Enable or Disable
Extra signal port of H.323 ALG has been modified.Extra H.323 ALG port has been changed.
Signal port of H.323 ALG has been modified.Default H.323 ALG port has been changed.
%s SIP ALG has succeeded.The SIP ALG has been turned on or off. %s: Enable or Disable
Extra signal port of SIP ALG has been modified.Extra SIP ALG port has been changed.
Signal port of SIP ALG has been modified.Default SIP ALG port has been changed.
Register SIP ALG extra port=%d failed.SIP ALG apply additional signal port failed.%d: Port number
Register SIP ALG signal port=%d failed.SIP ALG apply signal port failed.%d: Port number
Register H.323 ALG extra port=%d failed.H323 ALG apply additional signal port failed.%d: Port number
Register H.323 ALG signal port=%d failed.H323 ALG apply signal port failed.%d: Port number
Register FTP ALG extra port=%d failed.FTP ALG apply additional signal port failed.%d: Port number
Register FTP ALG signal port=%d failed.FTP ALG apply signal port failed.%d: Port number

Table 288 PKI Logs

LOG MESSAGEDESCRIPTION
Generate X509 certificate "%s" successfullyThe router created an X509 format certificate with the specified name.
Generate X509 certificate "%s" failed, errno %dThe router was not able to create an X509 format certificate with the specified name. See Table 301 on page 861 for details about the error number.
Generate certificate request "%s" successfullyThe router created a certificate request with the specified name.
Generate certificate request "%s" failed, errno %dThe router was not able to create a certificate request with the specified name. See Table 301 on page 861 for details about the error number.
Generate PKCS#12 certificate "%s" successfullyThe router created a PKCS#12 format certificate with the specified name.
Generate PKCS#12 certificate "%s" failed, errno %dThe router was not able to create anPKCS#12 format certificate with the specified name. See Table 301 on page 861 for details about the error number.
Prepare to import "%s" into "My Certificate"%s is the name of a certificate request.
Prepare to import "%s" into Trusted Certificate"%s is the name of a certificate request.
CMP enrollment "%s" successfully, CA "%s", URL "%s"The device used CMP to enroll a certificate. 1st %s is a request name, 2nd %s is the CA name, 3rd %s is the URL .
CMP enrollment "%s" failed, CA "%s", URL "%s"The device was unable to use CMP to enroll a certificate. 1st %s is a request name, 2nd %s is the CA name, 3rd %s is the URL
SCEP enrollment "%s" successfully, CA "%s", URL "%s"The device used SCEP to enroll a certificate. 1st %s is a request name, 2nd %s is the CA name, 3rd %s is the URL .
SCEP enrollment "%s" failed, CA "%s", URL "%s"The device was unable to use SCEP to enroll a certificate. 1st %s is a request name, 2nd %s is the CA name, 3rd %s is the URL
Import X509 certificate "%s" into My Certificate successfullyThe device imported a x509 format certificate into My Certificates. %s is the certificate request name.
Import X509 certificate "%s" into Trusted Certificate successfullyThe device imported a x509 format certificate into Trusted Certificates. %s is the certificate request name.
Import PKCS#12 certificate "%s" into "My Certificate" successfullyThe device imported a PKCS#12 format certificate into My Certificates. %s is the certificate request name.
Import PKCS#7 certificate "%s" into "My Certificate" successfullyThe device imported a PKCS#7 format certificate into My Certificates. %s is the certificate request name.
Import PKCS#7 certificate "%s" into "Trusted Certificate" successfullyThe device imported a PKCS#7 format certificate into Trusted Certificates. %s is the certificate request name.
Decode imported certificate "%s" failedThe device was not able to decode an imported certificate. %s is certificate the request name
Export PKCS#12 certificate "%s" from "My Certificate" successfullyThe device exported a PKCS#12 format certificate from My Certificates. %s is the certificate request name.
Export PKCS#12 certificate "%s" from "My Certificate" failedThe device was not able to export a PKCS#12 format certificate from My Certificates. %s is the certificate request name.
Export X509 certificate "%s" from "My Certificate" failedThe device was not able to export a x509 format certificate from My Certificates. %s is the certificate request name.
Export X509 certificate "%s" from "Trusted Certificate" failedThe device was not able to export a x509 format certificate from Trusted Certificates. %s is the certificate request name.
Export X509 certificate "%s" from "My Certificate" successfullyThe device exported a x509 format certificate from My Certificates. %s is the certificate request name.
Export X509 certificate "%s" from "Trusted Certificate" successfullyThe device exported a x509 format certificate from Trusted Certificates. %s is the certificate request name.
Export X509 certificate "%s" from "My Certificate" failedThe device was not able to export a x509 format certificate from My Certificates. %s is the certificate request name.
Import PKCS#12 certificate "%s" with incorrect passwordAn administrator used the wrong password when trying to import a PKCS#12 format certificate. %s is the certificate name.
Cert trusted: %s%s is the subject.
Due to %d, cert not trusted: %s%d is an error number (see Table 301 on page 861), %s is the certificate subject.
CODEDESCRIPTION
1Algorithm mismatch between the certificate and the search constraints.
2Key usage mismatch between the certificate and the search constraints.
3Certificate was not valid in the time interval.
4(Not used)
5Certificate is not valid.
6Certificate signature was not verified correctly.
7Certificate was revoked by a CRL.
8Certificate was not added to the cache.
9Certificate decoding failed.
10Certificate was not found (anywhere).
11Certificate chain looped (did not find trusted root).
12Certificate contains critical extension that was not handled.
13Certificate issuer was not valid (CA specific information missing).
14(Not used)
15CRL is too old.
16CRL is not valid.
17CRL signature was not verified correctly.
18CRL was not found (anywhere).
19CRL was not added to the cache.
20CRL decoding failed.
21CRL is not currently valid, but in the future.
22CRL contains duplicate serial numbers.
23Time interval is not continuous.
24Time information not available.
25Database method failed due to timeout.
26Database method failed.
27Path was not verified.
28Maximum path length reached.

Table 289 Interface Logs

LOG MESSAGEDESCRIPTION
Interface %s has been deleted.An administrator deleted an interface. %s is the interface name.
AUX Interface dialing failed. This AUX interface is not enabled.A user tried to dial the AUX interface, but the AUX interface is not enabled.
AUX Interface disconnecting failed. This AUX interface is not enabled.The AUX interface is not enabled and a user tried to use the disconnect aux command.
Please type phone number of interface AUX first then dial again.A user tried to dial the AUX interface, but the AUX interface does not have a phone number set.
Please type phone number of Interface AUX first then disconnect again.The AUX interface does not have a phone number set and a user tried to use the disconnect aux command.
Interface %s will reapply because Device HA become active status.Device-ha became active and is using a PPP base interface, the PPP interface must reapply, %s is the interface name.
Interface %s will reapply because Device HA is not running.Device-ha was deleted and free PPP base interface, PPP interface must reapply, %s is the interface name.
Interface %s will stop connect because Device HA become standby status.When device-ha is stand-by and use PPP base interface, PPP interface connection will stop, %s: interface name.
Create interface %s has been failed.When PPP can't running fail, %s: interface name.
Base interface %s is disabled. Interface %s is disabled now.When user disable ethernet, vlan or bridge interface and this interface is base interface of PPP or virtual interface. PPP and virtual will disable too. 1st %s is interface name, 2nd %s is interface.
Interface %s has been changed.An administrator changed an interface's configuration. %s: interface name.
Interface %s has been added.An administrator added a new interface. %s: interface name.
Interface %s is enabled.An administrator enabled an interface. %s: interface name.
Interface %s is disabled.An administrator disabled an interface. %s: interface name.
%s MTU > (%s MTU - 8),%s may not work correctly.An administrator configured a PPP interface, PPP interface MTU > (base interface MTU - 8), PPP interface may not run correctly because PPP packets will be fragmented by base interface and the peer will not receive correct PPP packets.1st %s: PPP interface name, 2nd %s: ethernet interface name.
(%s MTU - 8) < %s MTU,%s may not work correctly.An administrator configured ethernet, vlan or bridge and this interface is base interface of PPP interface. PPP interface MTU > (base interface MTU - 8), PPP interface may not run correctly because PPP packets will be fragmented by base interface and peer will not receive correct PPP packets.1st %s: Ethernet interface name, 2nd %s: PPP interface name.
Interface %s links down. Default route will not apply until interface %s links up.An administrator set a static gateway in interface but this interface is link down. At this time the configuration will be saved but route will not take effect until the link becomes up.1st %s: interface name, 2nd %s: interface name.
name=%s,status=%s,TxPkts=%u,RxPkts=%u,Colli.=%u,TxB/s=%u,RxB/s=%u,UpTime=%sPort statistics log. This log will be sent to the VRPT server.1st %s: physical port name, 2nd %s: physical port status, 1st %u: physical port Tx packets, 2nd %u: physical port Rx packets, 3rd %u: physical port packets collisions, 4th %u: physical port Tx Bytes/s, 5th %u: physical port Rx Bytes/s, 3rd %s: physical port up time.
name=%s,status=%s,TxPkts=%u,RxPkts=%u,Colli.=%u,TxB/s=%u,RxB/s=%uInterface statistics log. This log will be sent to the VRPT server.1st %s: interface name, 2nd %s: interface status, 1st %u variable: interface Tx packets, 2nd %u variable: interface Rx packets, 3rd %u: interface packets collisions, 4th %u: interface Tx Bytes/s, 5th %u: interface Rx Bytes/s.
Interface %s start dailing.A PPP or aux interface started dialing to a server. %s: interface name.
Interface %s connect failed: Connect to server failed.A PPTP interface failed to connect to the PPTP server. %s: interface name.
Interface %s connection terminated.A PPP or AUX connection will terminate. %s: interface name.
Interface %s connection terminated: idle timeout.An idle PPP or AUX connection timed out.1%s: interface name.
Interface %s connect failed: MS-CHAPv2 mutual authentication failed.MS-CHAPv2 authentication failed (the server must support mS-CHAPv2 and verify that the authentication failed, this does not include cases where the servers does not support MS-CHAPv2). %s: interface name.
Interface %s connect failed: MS-CHAP authentication failed.MS-CHAP authentication failed (the server must support MS-CHAP and verify that the authentication failed, this does not include cases where the server does not support MS-CHAP). %s: interface name.
Interface %s connect failed: CHAP authentication failed.CHAP authentication failed (the server must support CHAP and verify that the authentication failed, this does not include cases where the server does not support CHAP). CHAP: interface name.
Interface %s is connected.A PPP or AUX interface connected successfully. %s: interface name.
Interface %s is disconnected.A PPP or AUX interface disconnected successfully. %s: interface name.
Interface %s connect failed: Peer not responding.The interface's connection will be terminated because the server did not send any LCP packets. %s: interface name.
Interface %s connect failed: PAP authentication failed.PAP authentication failed (the server must support PAP and verify verify that the authentication failed, this does not include cases where the server does not support PAP). %s: PPP interface name.
Interface %s connect failed: Connect timeout.A PPPOE connection timed out due to a lack of response from the PPPOE server. %s: PPP interface name.
Interface %s create failed because has no member.A bridge interface has no member. %s: bridge interface name.
"Interface cellular Application Error Code %d\n.The listed error code (%d) was generated due to an internal cellular interface error.
"An error [%d] occurred while negotiating with the device in %s. Please try to remove then insert the device.The listed error code (%d) happened when the ZyWALL attempted to negotiate with the cellular device installed in (or connected to) the listed slot (%s). Remove and reinstall the device.
"Unable to negotiate with the device in %s. Please try to remove then insert the device.The ZyWALL could not negotiate with the cellular device installed in (or connected to) the listed slot (%s). Remove and reinstall the device.
"Unable to configure the selected frequency band to the device in %s. Please try to remove then insert the device.The ZyWALL failed to set the cellular device installed in (or connected to) the listed slot (%s) to use the frequency band you configured. The cellular device may not support the band or you may need to try removing and reinstalling the device.
"PIN code is required for interface cellular%d. Please check the PIN code setting.The PIN code configured for the listed cellular interface (%d) is incorrect or missing.
"SIM card has been successfully unlocked by PUK code on interface cellular%d.You entered the correct PUK code and unlocked the SIM card for the cellular device associated with the listed cellular interface (%d).
"Incorrect PUK code of interface cellular%d. Please check the PUK code setting.You entered an incorrect PUK code so you were not able to unlock the SIM card for the cellular device associated with the listed cellular interface (%d).
"SIM card of interface cellular%d in %s is damaged or not inserted. Please remove the device, then check the SIM card.The SIM card for the cellular device associated with the listed cellular interface (%d) cannot be detected. The SIM card may be missing, not inserted properly, or damaged. Remove the device and check its SIM card. If it does not appear to be damaged, try re-inserting the SIM card.
"SIM card of interface cellular%d in %s is locked. Please enter PUK code to unlock.The SIM card for the cellular device associated with the listed cellular interface (%d) is locked. This may be because the PIN code was entered incorrectly more than three times. You need to enter the PUK code to unlock the SIM card. .
"Incorrect PIN code of interface cellular%d. Please check the PIN code setting.The listed cellular interface (%d) does has the wrong PIN code configured.
"Unable to query the signal quality from the device in %s. Please try to remove then insert the device.The ZyWALL could not check the signal strength for the listed cellular interface (%d). This could be due to an error or being out of range of the ISP's cellular station.
"Interface cellular%d cannot connect to the service provider.The listed cellular interface (%d) cannot connect to the ISP. This could be due to an error or being out of range of the ISP's cellular station.
"Interface cellular%d is configured with incorrect APN.The listed cellular interface (%d) does not have the correct APN (Access Point Name) configured.
"Interface cellular%d is configured with incorrect phone number.The listed cellular interface (%d) does not have the correct phone number configured.
"Interface cellular%d is configured with incorrect username or password.The listed cellular interface (%d) does not have the correct user name and password configured.
"Interface cellular%d is configured with device %s, but current inserted device is %s.The listed cellular interface (%d) is configured for a particular cellular device (first %s), but a different cellular device (second %s) is inserted.
"Cellular device [%s %s] has been inserted into %s.The cellular device (identified by its manufacturer and model) has been inserted in or connected to the specified slot.
"Cellular device [%s %s] has been removed from %s.The cellular device (identified by its manufacturer and model) has been removed from the specified slot.
Interface cellular%d required authentication password.Please set password in cellular%d edit page.You need to manually enter the password for the listed cellular interface (%d).

Table 290 WLAN Logs

LOG MESSAGEDESCRIPTION
Wlan %s is enabled.The WLAN (IEEE 802.11 b and or g) feature has been turned on. %s is the slot number where the WLAN card is or can be installed.
Wlan %s is disabled.The WLAN (IEEE 802.11 b and or g) feature has been turned off. %s is the slot number where the WLAN card is or can be installed.
Wlan %s has been configured.The WLAN (IEEE 802.11 b and or g) feature's configuration has been changed. %s is the slot number where the WLAN card is or can be installed.
Interface %s has been configured.The configuration of the specified WLAN interface (%s) has been changed.
Interface %s has been deleted.The specified WLAN interface (%s) has been removed.
Create interface %s has failed. Wlan device does not exist.The wireless device failed to create the specified WLAN interface (%s). Remove the wireless device and reinstall it.
System internal error. No 802.1X or WPA enabled!IEEE 802.1x or WPA is not enabled.
System internal error. Error configuring WPA state!The ZyWALL was not able to configure the wireless device to use WPA. Remove the wireless device and reinstall it.
System internal error. Error enabling WPA/802.1X!The ZyWALL was not able to enable WPA/IEEE 802.1X.
Station has associated. Interface: %s, MAC: %s.A wireless client with the specified MAC address (second %s) associated with the specified WLAN interface (first %s).
WPA or WPA2 enterprise EAP timeout. Interface: %s, MAC: %s.There was an EAP timeout for a wireless client connected to the specified WLAN interface (first %s). The MAC address of the wireless client is listed (second %s).
Station association has failed. Maximum associations have reached the maximum number. Interface: %s, MAC: %s.A wireless client with the specified MAC address (second %s) failed to connect to the specified WLAN interface (first %s) because the WLAN interface already has its maximum number of wireless clients.
WPA authentication has failed. Interface: %s, MAC: %s.A wireless client used an incorrect WPA key and thus failed to connect to the specified WLAN interface (first %s). The MAC address of the wireless client is listed (second %s).
Incorrect password for WPA or WPA2 enterprise internal authentication. Interface: %s, MAC: %s.A wireless client used an incorrect WPA or WPA2 user password and failed authentication by the ZyWALL's local user database while trying to connect to the specified WLAN interface (first %s). The MAC address of the wireless client is listed (second %s).
Incorrect username or password for WPA or WPA2 enterprise internal authentication. Interface: %s, MAC: %s.A wireless client used an incorrect WPA or WPA2 user name or user password and failed authentication by the ZyWALL's local user database while trying to connect to the specified WLAN interface (first %s). The MAC address of the wireless client is listed (second %s).
System internal error. %s: STA %s could not extract EAP-Message from RADIUS messageThere was an error when attempting to extract the EAP-Message from a RADIUS message. The first %s is the WLAN interface. The second %s is the MAC address of the wireless client.

Table 291 Account Logs

LOG MESSAGEDESCRIPTION
Account %s %s has been deleted.A user deleted an ISP account profile.1st %s: profile type, 2nd %se: profile name.
Account %s %s has been changed.A user changed an ISP account profile's options.1st %s: profile type, 2nd %s: profile name.
Account %s %s has been added.A user added a new ISP account profile.1st %s: profile type, 2nd %s: profile name.

Table 292 Port Grouping Logs

LOG MESSAGEDESCRIPTION
Interface %s links up because of changing Port Group. Enable DHCP client.An administrator used port-grouping to assign a port to a representative Interface and this representative interface is set to DHCP client and only has one member. In this case the DHCP client will be enabled. %s: interface name.
Interface %s links down because of changing Port Group. Disable DHCP client.An administrator used port-grouping to assign a port to a representative interface and this representative interface is set to DHCP client and has no members in its group. In this case the DHCP client will be disabled. %s: interface name.
Port Group on %s is changed. Renew DHCP client.An administrator used port-grouping to assign a port to a representative interface and this representative interface is set to DHCP client and has more than one member in its group. In this case the DHCP client will renew. %s: interface name.
Port Grouping %s has been changed.An administrator configured port-grouping, %s: interface name.

Table 293 Force Authentication Logs

LOG MESSAGEDESCRIPTION
Force User Authentication will be enabled due to http server is enabled.Force user authentication will be turned on because HTTP server was turned on.
Force User Authentication will be disabled due to http server is disabled.Force user authentication will be turned off because HTTP server was turned off.
Force User Authentication may not work properly!

Table 294 File Manager Logs

LOG MESSAGEDESCRIPTION
ERROR:#%s, %sApply configuration failed, this log will be what CLI command is and what error message is.1st %s is CLI command.2nd %s is error message when apply CLI command.
WARNING:#%s, %sApply configuration failed, this log will be what CLI command is and what warning message is.1st %s is CLI command.2nd %s is warning message when apply CLI command.
ERROR: #%s, %sRun script failed, this log will be what wrong CLI command is and what error message is.1st %s is CLI command.2nd %s is error message when apply CLI command.
WARNING: #%s, %sRun script failed, this log will be what wrong CLI command is and what warning message is.1st %s is CLI command.2nd %s is warning message when apply CLI command.
Resetting system...Before apply configuration file.
System resetted. Now apply %s..After the system reset, it started to apply the configuration file.%s is configuration file name.
Running %s...An administrator ran the listed shell script.%s is script file name.

Table 295 DHCP Logs

LOG MESSAGEDESCRIPTION
Can't find any lease for this client - %s, DHCP pool full!All of the IP addresses in the DHCP pool are already assigned to DHCP clients, so there is no IP address to give to the listed DHCP client.
DHCP server offered %s to %s(%s)The DHCP server feature gave the listed IP address to the computer with the listed hostname and MAC address.
Requested %s from %s(%s)The ZyWALL received a DHCP request for the specified IP address from the computer with the listed hostname and MAC address.
No applicable lease found for DHCP request - %s !There is no matching DHCP lease for a DHCP client's request for the specified IP address.
DHCP released %s with %s(%s)A DHCP client released the specified IP address. The DHCP client's hostname and MAC address are listed.
Sending ACK to %sThe DHCP server feature received a DHCP client's inform packet and is sending an ACK to the client.
DHCP server assigned %s to %s(%s)The DHCP server feature assigned a client the IP address that it requested. The DHCP client's hostname and MAC address are listed.

Table 296 E-mail Daily Report Logs

LOG MESSAGEDESCRIPTION
Email Daily Report has been activated.The daily e-mail report function has been turned on. The ZyWALL will e-mail a daily report about the selected items at the scheduled time if the required settings are configured correctly.
Email Daily Report has been deactivated.The daily e-mail report function has been turned off. The ZyWALL will not e-mail daily reports.
Email daily report has been sent successfully.The ZyWALL sent a daily e-mail report mail successfully.
Cannot resolve mail server address %s.The (listed) SMTP address configured for the daily e-mail report function is incorrect.
Mail server authentication failed.The user name or password configured for authenticating with the e-mail server is incorrect.
Failed to send report.Mail From address %s1 is inconsistent with SMTP account %s2.The user name and password configured for authenticating with the e-mail server are correct, but the (listed) sender e-mail address does not match the (listed) SMTP e-mail account.
Failed to connect to mail server %s.The ZyWALL could not connect to the SMTP e-mail server (%s). The address configured for the server may be incorrect or there may be a problem with the ZyWALL's or the server's network connection.

Table 297 IP-MAC Binding Logs

LOG MESSAGEDESCRIPTION
Drop packet %s-%u.%u.%u.%u-%02X:%02X:%02X:%02X:%02X:The IP-MAC binding feature dropped an Ethernet packet. The interface the packet came in through and the sender's IP address and MAC address are also shown.
Cannot bind ip-mac from dhcp:%s#%u.%u.%u.%u#%02X:%02X:%02X:%02X:%02X:The IP-MAC binding feature could not create an IP-MAC binding hash table entry. The interface the packet came in through, the sender's IP address and MAC address, are also shown along with the binding type ("s" for static or "d" for dynamic).
Cannot remove ip-mac binding from dhcp:%s#%u.%u.%u.%u#%02X:%02X:%02X:%02X:%02X:%02X:The IP-MAC binding feature could not delete an IP-MAC binding hash table entry. The interface the packet came in through, the sender's IP address and MAC address, are also shown along with the binding type ("s" for static or "d" for dynamic).

Common Services

The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.

  • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like.
  • Protocol: This is the type of IP protocol used by the service. If this is TCP/UDP, then the service uses the same port number with TCP and UDP. If this is USER-DEFINED, the Port(s) is the IP protocol number, not the port number.
  • Port(s): This value depends on the Protocol. Please refer to RFC 1700 for further information about port numbers.

  • If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number.

  • If the Protocol is USER, this is the IP protocol number.

- Description: This is a brief explanation of the applications that use this service or the situations in which this service is used.

Table 298 Commonly Used Services

NAMEPROTOCOLPORT(S)DESCRIPTION
AH (IPSEC_TUNNEL)User-Defined51The IPSEC AH (Authentication Header) tunneling protocol uses this service.
AIM/New-ICQTCP5190AOL's Internet Messenger service. It is also used as a listening port by ICQ.
AUTHTCP113Authentication protocol used by some servers.
BGPTCP179Border Gateway Protocol.
BOOTP_CLIENTUDP68DHCP Client.
BOOTP_SERVERUDP67DHCP Server.
CU-SEEMETCP7648A popular videoconferencing solution from White Pines Software.
UDP24032
DNSTCP/UDP53Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers.
ESP (IPSEC_TUNNEL)User-Defined50The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service.
FINGERTCP79Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
FTPTCPTCP2021File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail.
H.323TCP1720NetMeeting uses this protocol.
HTTPTCP80Hyper Text Transfer Protocol - a client/server protocol for the world wide web.
HTTPSTCP443HTTPS is a secured http session often used in e-commerce.
ICMPUser-Defined1Internet Control Message Protocol is often used for diagnostic or routing purposes.
ICQUDP4000This is a popular Internet chat program.
IGMP (MULTICAST)User-Defined2Internet Group Management Protocol is used when sending packets to a specific group of hosts.
IKEUDP500The Internet Key Exchange algorithm is used for key distribution and management.
IRCTCP/UDP6667This is another popular Internet chat program.
MSN MessengerTCP1863Microsoft Networks' messenger service uses this protocol.
NEW-ICQTCP5190An Internet chat program.
NEWSTCP144A protocol for news groups.
NFSUDP2049Network File System - NFS is a client/server distributed file service that provides transparent file sharing for network environments.
NNTPTCP119Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service.
PINGUser-Defined1Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable.
POP3TCP110Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other).
PPTPTCP1723Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel.
PPTP_TUNNEL (GRE)User-Defined47PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel.
RCMDTCP512Remote Command Service.
REAL_AUDIOTCP7070A streaming audio service that enables real time sound over the web.
REXECTCP514Remote Execution Daemon.
RLOGINTCP513Remote Login.
RTELNETTCP107Remote Telnet.
RTSPTCP/UDP554The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet.
SFTPTCP115Simple File Transfer Protocol.
SMTPTCP25Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another.
SNMPTCP/UDP161Simple Network Management Program.
SNMP-TRAPSTCP/UDP162Traps for use with the SNMP (RFC: 1215).
SQL-NETTCP1521Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers.
SSHTCP/UDP22Secure Shell Remote Login Program.
STRM WORKSUDP1558Stream Works Protocol.
SYSLOGUDP514Syslog allows you to send system logs to a UNIX server.
TACACSUDP49Login Host Protocol used for (Terminal Access Controller Access Control System).
TELNETTCP23Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
TFTPUDP69Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
VDOLIVETCP7000Another videoconferencing solution.

Displaying Anti-Virus Alert Messages in Windows

With the anti-virus packet scan, when a virus is detected, you can have the ZyWALL display an alert message on Microsoft Windows-based computers. If the log shows that virus files are being detected but your Microsoft Windows-based computer is not displaying an alert message, use one of the following procedures to make sure your computer is set to display the messages.

Windows XP

1 Click Start > Control Panel > Administrative Tools > Services.

Figure 530 Windows XP: Opening the Services Window
ZYXEL ZYWALL USG 2000 - Windows XP - 1

text_image Windows Explorer Notepad Launch Internet Explorer Browser CuteFTP Microsoft Office Word 2003 Microsoft Office Excel 2003 NSA-2400 Discovery Utility DiMiM Media Client PLA-400 Configuration Utility ZyXEL PLA-4xx Series Configuration Microsoft Office PowerPoint 2003 Adobe FrameMaker 7.1 All Programs Log Off Shut Down Administrative Tools Automatic Updates Date and Time Display Folder Options Fonts Game Controllers Internet Options Java Plug-in Keyboard Mail Mouse Network Connections Phone and Modem Options Power Options Printers and Faxes Program Updates Regional and Language Options Scanners and Cameras Scheduled Tasks Sounds and Audio Devices Speech System Taskbar and Start Menu User Accounts Wireless Link Component Services Computer Management Data Sources (ODBC) Event Viewer Local Security Policy Microsoft .NET Framework 1.1 Configuration Microsoft .NET Framework 1.1 Wizards Performance Services EN 100%

2 Select the Messenger service and click Start.

Figure 531 Windows XP: Starting the Messenger Service
ZYXEL ZYWALL USG 2000 - Select the Messenger service and click Start. - 1

text_image Services File Action View Help Services (Local) Services (Local) Messenger Start the service Description: Transmits net send and Alerter service messages between clients and servers. This service is not related to Windows Messenger. If this service is stopped, Alerter messages will not be transmitted. If this service is disabled, any services that explicitly depend on it will fail to start. Name Description Status Startup Type Log On As Logical Disk Manager Detects an... Manual Local System Logical Disk Manage... Configures... Manual Local System Macromedia Licenci Provides a... Manual Local System Messenger Transmits ... Automatic Local System MS Software Shado... Manages s... Manual Local System Net Logon Supports p... Manual Local System NetMeeting Remote... Enables an... Manual Local System Network Connections Manages o... Started Manual Local System Network DDE Provides n... Manual Local System Network DDE DSDM Manages D... Manual Local System Network Location A... Collects an... Started Manual Local System

3 Close the window when you are done.

Windows 2000

1 Click Start > Settings > Control Panel > Administrative Tools > Services.

Figure 532 Windows 2000: Opening the Services Window
ZYXEL ZYWALL USG 2000 - Click Start &gt; Settings &gt; Control Panel &gt; Administrative Tools &gt; Services. - 1

text_image My Network Places HyperSnap-DX 5 Microsoft XML 4.0 Parser ... TunesSetu... AllNetic Working Ti... Weekly_Ba... Recycle Bin Adobe Photoshop ... Administrative Tools Automatic Updates Date/Time Display Folder Options Fonts Game Controllers Intel(R) GMA Driver Internet Options Java Keyboard Mail Mouse Network and Dial-up Connections Phone and Modem Options Power Options Printers Regional Options Scanners and Cameras Scheduled Tasks Sounds and Multimedia System Users and Passwords QuickTime Components Services Computer Management Data Sources (ODBC) Event Viewer Local Security Policy Microsoft .NET Framework 1.1 Configuration Microsoft .NET Framework 1.1 Wizards Performance Server Extensions Administrator Services Telnet Server Administration Set Program Access and Defaults Windows Update New Office Document Open Office Document UltraEdit-32 SolarWinds 2003 Standard Edition Programs Documents Settings Search Help Run... Shut Down... Control Panel Network and Dial-up Connections Printers Taskbar & Start Menu... Windows 2000 Professional

2 Select the Messenger service and click Start Service.

Figure 533 Windows 2000: Starting the Messenger Service
ZYXEL ZYWALL USG 2000 - Select the Messenger service and click Start Service. - 1

text_image Services Action View Tree Services (Local) Name Description Start Service Startup TypeLoad On As Logical Disk Manager Logical Disk... Started Automatic Localsystem Logical Disk Manage... Administrat... Manual LocalSystem Macromedia Licensi... Provides a... Manual LocalSystem Memo AutoBackup Memo pro... Started Automatic Localsystem Messenger Sends and ... Automatic Localsystem Net Logon Supports p... Manual LocalSystem NetMeeting Remote... Allows aut... Manual LocalSystem

3 Close the window when you are done.

Windows 98 SE/Me

For Windows 98 SE/Me, you must open the WinPopup window in order to view real-time alert messages.

Click Start > Run and enter "winpopup" in the field provided and click OK. The WinPopup window displays as shown.

Figure 534 Windows 98 SE: WinPopup
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 1

text_image WinPopup Messages Help No messages Current message: 0 Total number of messages: 0

If you want to display the WinPopup window at startup, follow the steps below for Windows 98 SE (steps are similar for Windows Me).

1 Right-click on the program task bar and click Properties.

Figure 535 Windows 98 SE: Program Task Bar
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 2

text_image Outlook Express Online Services Toolbars Cascade Windows Tile Windows Horizontally Tile Windows Vertically Minimize All Windows Properties Start 9:21 AM

2 Click the Start Menu Programs tab and click Advanced ...

Figure 536 Windows 98 SE: Task Bar Properties
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 3

text_image Taskbar Properties Taskbar Options Start Menu Programs Customize Start menu You can customize your Start menu by adding or removing items from it. Add... Remove... Advanced... Documents menu Click the Clear button to remove the contents of the Documents menu and other personal history lists. Clear OK Cancel Apply

3 Double-click Programs and click StartUp.

4 Right-click in the StartUp pane and click New, Shortcut.

Figure 537 Windows 98 SE: StartUp
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 4

text_image Exploring - StartUp File Edit View Go Favorites Tools Help Back Forward Up Cut Copy Paste Undo Delete Address C:\WINDOWS\Start Menu\Programs\StartUp All Folders Start Menu Programs Accessories Internet Explorer Online Services StartUp View Customize this Folder... Arrange Icons Line Up Icons Refresh Paste Paste Shortcut Undo Copy New Properties Startup Folder Shortcut Text Document WordPad Document Bitmap Image Wave Sound

5 A Create Shortcut window displays. Enter "winpopup" in the Command line field and click Next.

Figure 538 Windows 98 SE: Startup: Create Shortcut
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 5

text_image Create Shortcut Type the location and name of the item you want to create a shortcut to. Or, search for the item by clicking Browse. Command line: winpopup Browse... < Back Next > Cancel

6 Specify a name for the shortcut or accept the default and click Finish.

Figure 539 Windows 98 SE: Startup: Select a Title for the Program
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 6

text_image Select a Title for the Program Select a name for the shortcut: Winpopulation < Back Finish Cancel

7 A shortcut is created in the StartUp pane. Restart the computer when prompted.

Figure 540 Windows 98 SE: Startup: Shortcut
ZYXEL ZYWALL USG 2000 - Windows 98 SE/Me - 7

text_image Exploring - StartUp File Edit View Go Favorites Tools Help Back Forward Up Cut Copy Paste Undo Delete Address C:\WINDOWS\Start Menu\Programs\StartUp All Folders Start Menu Programs Accessories Internet Explorer Online Services StartUp StartUp Winpopup

Note: The WinPopup window displays after the computer finishes the startup process (see Figure 534 on page 877).

Importing Certificates

This appendix shows importing certificates examples using Netscape Navigator and Internet Explorer 5. This appendix uses the ZyWALL 70 as an example. Other models should be similar.

Import ZyWALL Certificates into Netscape Navigator

In Netscape Navigator, you can permanently trust the ZyWALL's server certificate by importing it into your operating system as a trusted certification authority.

Select Accept This Certificate Permanently in the following screen to do this.

Figure 541 Security Certificate
ZYXEL ZYWALL USG 2000 - Import ZyWALL Certificates into Netscape Navigator - 1

text_image Possible reasons for this error: - Your browser does not recognize the Certificate Authority that issued the site's certificate. - The site's certificate is incomplete due to a server misconfiguration. - You are connected to a site pretending to be ZyWALL 70 Factory Default Certificate, possibly to obtain your confidential information. Please notify the site's webmaster about this problem. Before accepting this certificate, you should examine this site's certificate carefully. Are you willing to to accept this certificate for the purpose of identifying the Web site ZyWALL 70 Factory Default Certificate? Examine Certificate... ○ Accept this certificate permanently ● Accept this certificate temporarily for this session ○ Do not accept this certificate and do not connect to this Web site OK Cancel Help

Importing the ZyWALL's Certificate into Internet Explorer

For Internet Explorer to trust a self-signed certificate from the ZyWALL, simply import the self-signed certificate into your operating system as a trusted certification authority.

To have Internet Explorer trust a ZyWALL certificate issued by a certificate authority, import the certificate authority's certificate into your operating system as a trusted certification authority.

The following example procedure shows how to import the ZyWALL's (self-signed) server certificate into your operating system as a trusted certification authority.

1 In Internet Explorer, double click the lock shown in the following screen.

Figure 542 Login Screen
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 1

text_image Done Internet

2 Click Install Certificate to open the Install Certificate wizard.

Figure 543 Certificate General Information before Import
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 2

text_image Certificate General Details Certification Path Certificate Information This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities store. Issued to: 00A0C559B52B Issued by: 00A0C559B52B Valid from 12/31/1999 to 12/24/2029 Install Certificate... Issuer Statement OK

3 Click Next to begin the Install Certificate wizard.

Figure 544 Certificate Import Wizard 1
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 3

text_image Certificate Import Wizard Welcome to the Certificate Import Wizard This wizard helps you copy certificates, certificate trust lists, and certificate revocation lists from your disk to a certificate store. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information used to protect data or to establish secure network connections. A certificate store is the system area where certificates are kept. To continue, click Next.

4 Select where you would like to store the certificate and then click Next.

Figure 545 Certificate Import Wizard 2
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 4

text_image Certificate Import Wizard Certificate Store Certificate stores are system areas where certificates are kept. Windows can automatically select a certificate store, or you can specify a location for • Automatically select the certificate store based on the type of certificate • Place all certificates in the following store Certificate store: Browse... < Back Next > Cancel

5 Click Finish to complete the Import Certificate wizard.

Figure 546 Certificate Import Wizard 3
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 5

text_image Certificate Import Wizard Completing the Certificate Import Wizard You have successfully completed the Certificate Import wizard. You have specified the following settings: Certificate Store Selected Automatically determined by t Content Certificate < Back Finish Cancel

6 Click Yes to add the ZyWALL certificate to the root store.

Figure 547 Root Certificate Store
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 6

text_image Do you want to ADD the following certificate to the Root Store? Subject : ZyWALL 70 00A0C559B52B Issuer : Self Issued Time Validity : Friday, December 31, 1999 through Monday, December 24, 2029 Serial Number : 386D4386 Thumbprint (sha1) : 4BD15E93 45778C9F DA3F9AD5 ACD5C1BC 574308CE Thumbprint (md5) : D3458DB5 CC3748BE AB50CF81 A79472D2 Yes No

Figure 548 Certificate General Information after Import
ZYXEL ZYWALL USG 2000 - Importing the ZyWALL's Certificate into Internet Explorer - 7

text_image Certificate General Details Certification Path Certificate Information This certificate is intended to: •Ensures the identity of a remote computer Issued to: 00A0C559B52B Issued by: 00A0C559B52B Valid from 12/31/1999 to 12/24/2029 Install Certificate... Issuer Statement OK

Open Software Announcements

Notice

Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation.

Note: This Product includes ppp-2.4.2 software under the PPP License

PPP License

Copyright (c) 1993 The Australian National University. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the Australian National University. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Copyright (c) 1989 Carnegie Mellon University. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived from this software without specific prior

written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Note: This Product includes Netkit Telnet -0.17 software under the Netkit Telnet License

Netkit Telnet License

Copyright (c) 1989 Regents of the University of California.

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Note: This Product includes ntp-4.1.2 software under the NTP License

NTP License

Copyright (c) David L. Mills 1992-2004

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that

the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty.

Note: This Product includes expat-1.95.6 software under the Expat License

Expat License

Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Note: This Product includes libtecla-1.6.1 software under the an X11-style License

an X11-style license

This is a Free Software License

  • This license is compatible with The GNU General Public License, Version 1
  • This license is compatible with The GNU General Public License, Version 2

This is just like a Simple Permissive license, but it requires that a copyright notice be maintained.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

Note: This Product includes openssl-0.9.8d-ocf software under the OpenSSL License

OpenSSL

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License

Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
  5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

  6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License

Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, Ihash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic

software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).

  1. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]

Note: This Product includes libevent-1.1a and xinetd-2.3.14 software under the a 3-clause BSD License

a 3-clause BSD-style license

This is a Free Software License

  • This license is compatible with The GNU General Public License, Version 1
  • This license is compatible with The GNU General Public License, Version 2

This is the BSD license without the obnoxious advertising clause. It's also known as the "modified BSD license." Note that the University of California now prefers this license to the BSD license with advertising clause, and now allows BSD itself to be used under the three-clause license.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of [original copyright holder] nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Note: This Product includes bind-9.2.3 software under the Internet Software Consortium and Nominum License

Copyright (C) 1996-2002 Internet Software Consortium.

Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

\Id: COPYRIGHT,v 1.6.2.2 2002/02/12 06:05:48 marka Exp \

Portions Copyright (C) 1996-2001 Nominum, Inc.

Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Note: This Product includes dhcp-3.0.3 software under the ISC License

ISC license

Copyright (c) 2004-2005 by Internet Systems Consortium, Inc. ("ISC")

Copyright (c) 1995-2003 by Internet Software Consortium

Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Internet Systems Consortium, Inc.

950 Charter Street

Redwood City, CA 94063

info@isc.org

http://www.isc.org/

Note: This Product includes httpd-2.0.55 software developed by the Apache Software Foundation under Apache License.

Apache License

Version 2.0, January 2004

http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1. Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed

by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

  1. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

  2. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

  3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works hereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

(b) You must cause any modified files to carry prominent notices stating that You changed the files; and

(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works;

within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

  1. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

  2. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

  3. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

  4. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

  5. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or

rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

Version 1.1

Copyright (c) 1999-2003 The Apache Software Foundation. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

The end-user documentation included with the redistribution, if any, must include the following acknowledgment: "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear.

The names “Apache” and “Apache Software Foundation” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact apache@apache.org.

Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation.

THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation. For more information on the Apache Software Foundation, please see http://www.apache.org/.

Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.

Note: This Product includes libosip2, libgcgi-0.9.5 and gmp-4.1 software under LGPL license.

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.

59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get

it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions

translate to certain responsibilities for you if you distribute copies of the library or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.

When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.

We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.

The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.

GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  1. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").

Each licensee is addressed as "you".

A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)

"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they

are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

  1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

  2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote

it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

  1. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

  2. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not

compelled to copy the source along with the object code.

  1. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

  1. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding

machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

  1. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of

the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

  1. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

  2. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

  3. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

  4. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the

wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

  1. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

  2. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.

  3. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

  1. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR

CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS.

Note: This Product includes bridge-utils 0.9.5, dhcpd-1.3.22-pl4, pptp-linux-1.4.0, rpppoe-3.5, vlan-1.8, keepalived-1.1.11-p1, dietlibc 0.27, quagga-0.99.2, ezipupdate-3.0.11b7, libol-0.3.14, proftpd-1.2.10, syslog-ng-1.6.5, pam-0.76, tzcode2006c, iproute2, iptables-1.2.11/netfilter(kernel), dhcp-helper, busybox, Linux kernel, hostapd-0.5.7, wireless_tools.28, arp-sk-0.0.16, pcmcia-cs-3.2.8, libeeprog, mgetty-1.1.35, and ipset software under GPL license.

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.

59 Temple Place - Suite 330, Boston, MA 02111-1307, USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you

modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  1. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

  2. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

  3. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications

or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

  1. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the

information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the

scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

  1. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

  2. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

  3. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

  4. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit

royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

  1. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

  2. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.

  3. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

  1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF

ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  1. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.

Note: This Product includes pcmcia-cs-3.2.8 software under MPL license.

Mozilla Public License Version 1.1

  1. Definitions.

1.0.1. "Commercial Use"

means distribution or otherwise making the Covered Code available to a third party.

1.1. "Contributor"

means each entity that creates or contributes to the creation of Modifications.

1.2. "Contributor Version"

means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor.

1.3. "Covered Code"

means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof.

1.4. "Electronic Distribution Mechanism"

means a mechanism generally accepted in the software development community for the electronic transfer of data.

1.5. "Executable"

means Covered Code in any form other than Source Code.

1.6. "Initial Developer"

means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A.

1.7. "Larger Work"

means a work which combines Covered Code or portions thereof with code not governed by the terms of this License.

1.8. "License"

means this document.

1.8.1. "Licensable"

means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

1.9. "Modifications"

means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is:

Any addition to or deletion from the contents of a file containing Original Code or previous Modifications.

Any new file that contains any part of the Original Code or previous Modifications.

1.10. "Original Code"

means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License.

1.10.1. "Patent Claims"

means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.11. "Source Code"

means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge.

1.12. "You" (or "Your")

means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. Source Code License.

2.1. The Initial Developer Grant.

The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims:

under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and

under Patents Claims infringed by the making, using or selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof).

the licenses granted in this Section 2.1 (a) and (b) are effective on the date Initial Developer first distributes Original Code under the terms of this License.

Notwithstanding Section 2.1 (b) above, no patent license is granted: 1) for code that You delete from the Original Code; 2) separate from the Original Code; or 3) for infringements caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other software or devices.

2.2. Contributor Grant.

Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license

under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and

under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination).

the licenses granted in Sections 2.2 (a) and 2.2 (b) are effective on the date Contributor first makes Commercial Use of the Covered Code.

Notwithstanding Section 2.2 (b) above, no patent license is granted: 1) for any code that Contributor has deleted from the Contributor Version; 2) separate from the Contributor Version; 3) for infringements caused by: i) third party modifications of Contributor Version or ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or 4) under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor.

3. Distribution Obligations.

3.1. Application of License.

The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5.

3.2. Availability of Source Code.

Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution

Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic Distribution Mechanism, must remain available for at least twelve (12) months after the date it initially became available, or at least six (6) months after a subsequent version of that particular Modification has been made available to such recipients. You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party.

3.3. Description of Modifications.

You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code.

3.4. Intellectual Property Matters

(a) Third Party Claims

If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained.

(b) Contributor APIs

If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the legal file.

(c) Representations.

Contributor represents that, except as disclosed pursuant to Section 3.4 (a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License.

3.5. Required Notices.

You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.6. Distribution of Executable Versions.

You may distribute Covered Code in Executable form only if the requirements of Sections 3.1, 3.2, 3.3, 3.4 and 3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2. The notice must be conspicuously included in any notice in an Executable version, related documentation or collateral in which You describe recipients' rights relating to the Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.7. Larger Works.

You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code.

4. Inability to Comply Due to Statute or Regulation.

If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or

regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the legal file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.

  1. Application of this License.

This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code.

  1. Versions of the License.

6.1. New Versions

Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number.

6.2. Effect of New Versions

Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License.

6.3. Derivative Works

If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrases "Mozilla", "MOZILLAPL", "MOZPL", "Netscape", "MPL", "NPL" or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.)

  1. Disclaimer of warranty

Covered code is provided under this license on an "as is" basis, without warranty of any kind, either expressed or implied, including, without limitation, warranties that the covered code is free of defects, merchantable, fit for a particular purpose or non-infringing. The entire risk as to the quality and performance of the covered code is with you. Should any covered code prove defective in any respect, you

(not the initial developer or any other contributor) assume the cost of any necessary servicing, repair or correction. This disclaimer of warranty constitutes an essential part of this license. No use of any covered code is authorized hereunder except under this disclaimer.

8. Termination

8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

8.2. If You initiate litigation by asserting a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You file such action is referred to as "Participant") alleging that:

such Participant's Contributor Version directly or indirectly infringes any patent, then any and all rights granted by such Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights granted by Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above.

any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant.

8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license.

8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly

granted by You or any distributor hereunder prior to termination shall survive termination.

9. Limitation of liability

Under no circumstances and under no legal theory, whether tort (including negligence), contract, or otherwise, shall you, the initial developer, any other contributor, or any distributor of covered code, or any supplier of any of such parties, be liable to any person for any indirect, special, incidental, or consequential damages of any character including, without limitation, damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses, even if such party shall have been informed of the possibility of such damages. This limitation of liability shall not apply to liability for death or personal injury resulting from such party's negligence to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so this exclusion and limitation may not apply to you.

10. U.S. government end users

The Covered Code is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Code with only those rights set forth herein.

11. Miscellaneous

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions. With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License.

12. Responsibility for claims

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

13. Multiple-licensed code

Initial Developer may designate portions of the Covered Code as "Multiple-Licensed". "Multiple-Licensed" means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the MPL or the alternative licenses, if any, specified by the Initial Developer in the file described in Exhibit A.

Exhibit A - Mozilla Public License.

"The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/

Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License.

The Original Code is ____.

The Initial Developer of the Original Code is ____.

Portions created by ____ are Copyright (C) ____

____. All Rights Reserved.

Contributor(s): ____.

Alternatively, the contents of this file may be used under the terms of the ____ license (the "[____] License"), in which case the provisions of [____] License are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of the [____] License and not to allow others to use your version of this file under the MPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the [____] License. If you do not delete the provisions above, a recipient may use your version of this file under either the MPL or the [____] License."

NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.

Note: This Product includes unzip-5.50 and zip-2.3 software under Info-ZIP license

Info-ZIP license

This is version 2007-Mar-4 of the Info-ZIP license. The definitive version of this document should be available at ftp://ftp.info-zip.org/pub/infozip/license.html indefinitely and a copy at http://www.info-zip.org/pub/infozip/license.html.

Copyright (c) 1990-2007 Info-ZIP. All rights reserved.

For the purposes of this copyright and license, "Info-ZIP" is defined as the following set of individuals:

Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-Ioup Gailly, Hunter Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta, Antoine Verheijen, Paul von Behren, Rich Wales, Mike White.

This software is provided "as is," without warranty of any kind, express or implied. In no event shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the above disclaimer and the following restrictions:

- Redistributions of source code (in whole or in part) must retain the above copyright notice, definition, disclaimer, and this list of conditions.

- Redistributions in binary form (compiled executables and libraries) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution. The sole exception to this condition is redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled.

- Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, versions with modified or added functionality, and dynamic, shared, or static library versions not from Info-ZIP--must be plainly marked as such and must not be misrepresented as being the original source or, if binaries, compiled from the original source. Such altered versions also must not be misrepresented as being Info-ZIP releases--including,

but not limited to, labeling of the altered versions with the names "Info-ZIP" (or any variation thereof, including, but not limited to, different capitalizations), "Pocket UnZip," "WiZ" or "MacZip" without the explicit permission of Info-ZIP. Such altered versions are further prohibited from misrepresentative use of the Zip-Bugs or Info-ZIP e-mail addresses or the Info-ZIP URL(s), such as to imply Info-ZIP will provide support for the altered versions.

- Info-ZIP retains the right to use the names "Info-ZIP," "Zip," "UnZip," "UnZipSFX," "WiZ," "Pocket UnZip," "Pocket Zip," and "MacZip" for its own source and binary releases.

Note: This Product includes libpcap-0.8.3, libnet-1.1.2.1, net-snmp-5.1.1, libpcap-0.9.4, and openssh-4.3p2 software under BSD license

BSD

Copyright (c) [dates as appropriate to package]

The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Note: This Product includes libxml2-2.6.8 and Prototype software under the MIT License

The MIT License

Copyright (c)

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Note: This Product includes openldap-2.1.10 software under the OpenLDAP License

The Public License

Version 2.8, 17 August 2003

Redistribution and use of this software and associated documentation("Software"), with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions in source form must retain copyright statements and notices,

tributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and

  1. Redistributions must contain a verbatim copy of this document.

The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license.

THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders.

OpenLDAP is a registered trademark of the OpenLDAP Foundation.

Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted.

Note: This Product includes gd-2.0.36RC1 software under the below License

Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health.

Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc.

Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner.

Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs.

Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellison (ellson@lucent.com).

Portions relating to gdft.c copyright 2001, 2002 John Ellison (ellson@lucent.com).

Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye (pierre@libgd.org).

Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,

2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information.

Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande.

Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation.

This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation.

This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation.

Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions.

Note: This Product includes Tablekit software under the below License

Copyright (c) 2007 Andrew Tetlaw & Millstream Web Softwarehttp://www.millstream.com.au/view/code/tablekit/ Version: 1.2.1 2007-03-11

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Note: This Product includes libmd5-rfc software under the below License

Copyright (C) 1999, 2000, 2002 Aladdin Enterprises. All rights reserved.

This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

  1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation

would be appreciated but is not required.

  1. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

  2. This notice may not be removed or altered from any source distribution.

L. Peter Deutschghost@aladdin.com

Note: This Product includes ftp-tls-1.0.0 software under the below License

Copyright (C) 1997 and 1998 WIDE Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Copyright (c) 1985, 1989, 1993, 1994 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

This product includes software developed by the University of California, Berkeley and its contributors.

  1. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Copyright (c) 1997 The NetBSD Foundation, Inc. All rights reserved.

This code is derived from software contributed to The NetBSD Foundation by Luke Mewburn.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the

following disclaimer.

  1. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  2. All advertising materials mentioning features or use of this software must display the following acknowledgement:

This product includes software developed by the NetBSD Foundation, Inc. and its contributors.

  1. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Note: NOTE: Some components of the ZyWALL USG2000 incorporate source code covered under the Apache License, GPL License, LGPL License, BSD License, Open SSL License, Internet Software Consortium and Nominum License, ISC License, OpenLDAP License, X11-style License, A 3 clause BSD License, NTP License, Expat License, PPP License, Netkit-telnet License, MIT License, Info-ZIP license, BSD like License and other licenses presented above. To obtain the source code covered under those Licenses, please contact ZyXEL Communications Corporation at: ZyXEL Technical Support.

End-User License Agreement for "ZyWALL USG 2000"

WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL, INC. IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED, AND YOUR MONEY WILL BE REFUNDED.

1. Grant of License for Personal Use

ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice. You have the right to make one backup copy of the Software and Documentation solely for archival, back-up or disaster recovery purposes. You shall not exceed the scope of the license granted

hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed.

2. Ownership

You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.

The Software and Documentation contain material that is protected by United States Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.

4. Restrictions

You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software. You may not copy, reverse engineer, decompile, reverse compile, translate, adapt, or disassemble the Software, or any part thereof, nor shall you attempt to create the source code from the object code for the Software. You may not market, co-brand, private label or otherwise permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or permit any third party to do any of the foregoing.

5. Confidentiality

You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information. You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software.

6. No Warranty

THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY LAW, ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE, OR THAT THE SOFTWARE WILL OPERATE ERROR FREE, OR IN AN UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM. SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU. IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION, THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD.

7. Limitation of Liability

IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ZyXEL'S AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE AMOUNT OF THE PRODUCT. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.

8. Export Restrictions

THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.

9.Audit Rights

ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.

10. Termination

This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed. All provisions relating to confidentiality, proprietary rights, and non-disclosure shall survive the termination of this Software License Agreement.

12. General

This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.

Copyright © 2009 by ZyXEL Communications Corporation.

The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.

Published by ZyXEL Communications Corporation. All rights reserved.

Disclaimer

ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.

Trademarks

ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.

Certifications (Class B)

Federal Communications Commission (FCC) Interference Statement

The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:

• This device may not cause harmful interference.

- This device must accept any interference received, including interference that may cause undesired operations.

This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

1 Reorient or relocate the receiving antenna.
2 Increase the separation between the equipment and the receiver.
3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4 Consult the dealer or an experienced radio/TV technician for help.

ZYXEL ZYWALL USG 2000 - Federal Communications Commission (FCC) Interference Statement - 1

FCC Radiation Exposure Statement

- This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.

注意!

依據 低功率電波輻射性電機管理辦法

Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.

This Class B digital apparatus complies with Canadian ICES-003.

Viewing Certifications

1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.

Note

Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http://www.zyxel.com/web/support_warranty_info.php.

Registration

Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com.

Index

Symbols

Numerics

3DES 368

3G see also cellular 205

A

AAA

Base DN 650

Bind DN 650, 651, 653

directory structure 649

Distinguished Name, see DN.

DN 650, 651, 653

host 651, 653

password 651, 653

port 651, 653

search time limit 651, 654

SSL 652, 654

AAA server 647

AD 649

and users 614

directory service 647

group members 654

LDAP 647, 649

LDAP default server settings 651

LDAP group 652

local user database 649

object, where used 115

RADIUS 648, 649

RADIUS default 654

RADIUS group 655

RADIUS group members 657

RADIUS, see also RADIUS.

access 47

access control attacks 502

Access Point Name, see APN

access users 614, 615

custom page 716

forcing login 615

forcing login, see also force user authentication policies.

idle timeout 622

logging in 615

multiple logins 622

see also users 614

web configurator 625

account

myZyXEL.com 167

user 613

accounting server 647

ACT LED 36

Active Directory, see AD.

active protocol 374

AH 374

and encapsulation 375

ESP 374

active sessions 151, 157, 778

ActiveX 562

AD 647, 650, 651, 653

CN identifier 651, 653

default server settings 651

directory structure 649

Distinguished Name, see DN.

group 652

group members 654

host 651, 653

password 651, 653

port 651, 653

search time limit 651, 654

SSL 652, 654

address groups 629

and content filtering 543, 544, 549

and firewall 334

and force user authentication policies 625

and FTP 736

and SNMP 740

and SSH 731

and Telnet 735

and WWW 716

where used 115

address objects 629

and content filtering 543, 544, 549

and firewall 334

and force user authentication policies 625

and FTP 736

and NAT 256

and policy routes 254, 255, 625

and SNMP 740

and SSH 731

and Telnet 735

and virtual servers 290, 291

and VPN connections 341

and WWW 716

HOST 629

RANGE 629

SUBNET 630

types of 629

where used 115

address record 706

admin users 613

multiple logins 622

see also users 613

ADP 523

base profiles 524, 528

configuration overview 112

false negatives 529

false positives 529

inline profile 529

monitor profile 529

port scanning 535

prerequisites 112

profiles 527

protocol anomaly 524

signatures 175

traffic anomaly 524, 529

updating signatures 175

Advanced Encryption Standard, see AES.

AES 368

AH 346, 374

and transport mode 375

alerts 764, 768, 771, 772, 773

anti-spam 580

anti-virus 480

IDP 500

ALG 305, 311

and firewall 305, 308

and NAT 306

and policy routes 307, 308, 311

and trunks 311

and virtual servers 308

configuration overview 115

FTP 306

H.323 306, 311

peer-to-peer calls 307

RTP 312

See also VoIP pass through 306

SIP 306

tutorial 138

announcements

software 887

Anomaly Detection and Prevention, see ADP.

answer rings 742

anti-spam 575, 581

action for spam mails 581

alerts 580

black list 576, 581

concurrent e-mail sessions 578, 788, 789

configuration overview 113

DNSBL 577, 581, 586

DNSBL domain 589

e-mail header buffer 577

e-mail headers 576

excess e-mail sessions 578

general settings 578

identifying legitimate e-mail 575

identifying spam 576

log options 580

mail sessions threshold 578

POP2 576

POP3 576

prerequisites 113

priority 579

regular expressions 584

SMTP 576

statistics 787

status 589

white list 575, 581, 583, 585

anti-virus 473, 474

alert message 875

alerts 480

black list 480, 482

boot sector virus 487

configuration overview 111

EICAR 477

e-mail virus 487

engines 474

file decompression 480

file infector virus 487

firmware package blocking 481

log options 480

macro virus 487

packet scan 474, 875, 877

packet types 474

polymorphic virus 487

prerequisites 111

priority 477

real-time alert message 877

registration status 478

scanner types 487

signatures 485

statistics 781

trial service activation 168

updating signatures 172

virus 474

virus types 487

white list 480, 484

Windows 98/Me requirements 877

worm 474

Apache server 539, 540

Apache-whitespace attack 539

APN 209

Application Layer Gateway, see ALG.

application order 41

application patrol 445

actions 446

and firewall 446

and HTTP redirect 302

bandwidth management 446

bandwidth management behavior 449

bandwidth management examples 450

bandwidth statistics 468

classification 446

configuration overview 111

configured rate effect 449

exceptions 446

interface's bandwidth 451

maximize bandwidth usage 448, 449, 461, 466

over allotment of bandwidth 450

port-less 446

ports 446

prerequisites 111

priority 450

priority effect 449

protocol statistics 469

registration status 455

service ports 446

statistics 467

trial service activation 168

unidentified applications 462

updating signatures 173

vs firewall 321, 323

applications 43

AppPatrol, See application patrol. 173

ASAS (Authenex Strong Authentication System) 648

ASCII-encoding 539

ASCII-encoding attacks 539

asymmetrical routes 329

allowing through the firewall 330

vs virtual interfaces 329

AT command strings 741

attack

Microsoft Windows Plug-and-Play Service

Remote Overflow (MS-05-39) 516

attack type 499

attacks

access control 502

Apache-whitespace 539

ASCII-encoding 539

backdoor 502

bare byte encoding 539

base36-encoding 539

buffer overflow 502

Denial of Service (DoS) 345

directory traversal 539

DoS/DDoS 501

double-encoding 539

false negatives 496

false positives 496

IIS-backslash-evasion 539

IIS-unicode-codepoint-encoding 539

IM 501

known 494

multi-slash-encoding 539

network-based 40

non-RFC-defined-char 539

non-RFC-HTTP-delimiter 540

obsolete-options 540

oversize-chunk-encoding 540

oversize-len 541

oversize-offset 540

oversize-request-uri-directory 540

P2P 501

pattern-based 40

scan 501

self-directory-traversal attack 540

severity of 499

spam 501

trapdoor 502

trojan 502

truncated-address-header 541

truncated-header 541

truncated-options 540

truncated-timestamp-header 541

TTCP-detected 541

types of 501

u-encoding 540

undersize-len 541

undersize-offset 541

UTF-8-encoding 540

virus 474, 502

worm 502

Authenex Strong Authentication System (ASAS) 648

authentication

in IPSec 347

LDAP/AD 649

server 647

authentication algorithms 273, 368, 369

and active protocol 368

and routing protocols 274

MD5 274, 369

SHA1 369

text 274

Authentication Header, see AH.

authentication method objects 659

and users 614

and WWW 715

create 661

example 659

where used 115

authentication type 232, 687

Authentication, Authorization, Accounting servers, see AAA server.

authorization server 647

AUX LED 35

AUX port 741

See also auxiliary interface. 741

auxiliary interface 182, 230, 231, 741 when used 231

B

backdoor attacks 502

backing up configuration files 752

backslashes 539

bad-length-options attack 540

bandwidth

egress 210

ingress 210

usage statistics 468

bandwidth management 445

and policy routes 257

behavior 449

configured rate effect 449

examples 450

in application patrol 446

interface, outbound, see interfaces.

interface's bandwidth 451

maximize bandwidth usage 257, 260, 448, 449, 450, 461, 466

OSI level-7, see application patrol.

over allotment of bandwidth 450

priority 450

priority effect 449

See also application patrol. 445

See also policy routes.

bare byte encoding 539

bare byte encoding attack 539

Base DN 650

base profiles

in ADP 524, 528

in IDP 490, 494

base36-encoding 539

base36-encoding attack 539

Bind DN 650, 651, 653

BitTorrent 501

black list 581

anti-spam 576

Blaster 520

bookmarks 396

boot module 757

boot sector virus 487

bridge interfaces 182, 223

and virtual interfaces of members 224

basic characteristics 183

effect on routing table 223

member interfaces 223

virtual 233

bridges 222

buffer overflow 502

buffer overflow attacks 502

C

CA

and certificates 664

CA (Certificate Authority), see certificates.

CARD LED 35

card SIM 210

CEF (Common Event Format) 765, 771

cellular 205

APN 209

band selection 212

signal quality 214

SIM card 210

system 214

Centralized Network Management

see Vantage CNM. 698, 743

Certificate Authority (CA)

see certificates.

Certificate Management Protocol (CMP) 671

Certificate Revocation List (CRL) 664

vs OCSP 683

certificates 663

advantages of 664

and CA 664

and FTP 736

and HTTPS 711

and IKE SA 373

and SSH 731

and synchronization (device HA) 609

and VPN gateways 341

and WWW 714

certification path 664, 674, 680

expired 664

factory-default 665

file formats 665

fingerprints 675, 681

importing 668

in IPSec 358

in the VPN wizard 94

not used for encryption 664

revoked 664

self-signed 664, 670

serial number 674, 681

storage space 667, 677

thumbprint algorithms 666

thumbprints 666

used for authentication 664

verifying fingerprints 665

where used 115

certification requests 670, 671

certifications

notices 934

viewing 935

Challenge Handshake Authentication Protocol

(CHAP) 232, 687

CHAP (Challenge Handshake Authentication

Protocol) 232, 687

CHAP/PAP 232, 687

checking order 41

CLI 36, 57

button 57

display style 57

index numbers 57

messages 57

popup window 57

Reference Guide 3

cluster ID 596

CN identifier 651, 653

CNM 743

cold start 37

collecting data 775

command string (AT) 741

commands 36

sent by web configurator 57

Common Event Format (CEF) 765, 771

common services 871

compression (stac) 688

computer names 195, 221, 229, 238, 412

computer virus 474

infection and prevention 487

see also virus.

concurrent e-mail sessions 578, 788, 789

configuration

object-based 101

overview 105

web-based SSL application example 690

configuration files 749

at restart 752

backing up 752

downloading 754

downloading with FTP 735

editing 749

how applied 750

lastgood.conf 752, 754

managing 752

not stopping or starting the ZyWALL 37

startup-config.conf 754

startup-config-bad.conf 752

syntax 750

system-default.conf 754

uploading 755

uploading with FTP 735

use without restart 749

configuration information 793

connection monitor (in SSL) 385

connectivity check 194, 204, 211, 220, 230, 347

console port 37

speed 703

content (pattern) 515

content filtering 543, 544

and address groups 543, 544, 549

and address objects 543, 544, 549

and registration 548, 550, 552

and schedules 543, 544, 549

and user groups 543

and users 543

by category 544, 554

by keyword (in URL) 544, 563

by URL 544, 562, 563

by web feature 544, 562

cache 563, 566

categories 554

category service 552

configuration overview 112

default policy 544, 546

external web filtering service 552, 566

filter list 544

license status 154

managed web pages 553

message for blocked access 547

policies 543, 544

prerequisites 112

registration status 170, 548, 552

reports, see content filtering reports.

statistics 785

testing 560

trial service activation 168

uncategorized pages 553

unsafe web pages 553

URL for blocked access 548

content filtering reports 567

and registration 567

during trial service 567

how to view 551, 567

See also content filtering.

cookies 47, 562

copyright 933

CPU usage 151, 155

current date/time 152, 698

and schedules 641

daylight savings 700

setting manually 702

time server 702

current user list 385

custom

access user page 716

login page 716

custom signatures 506, 510

applying 519

example 516

verifying 519

custom.rules file 510

D

data collection 775

Data Encryption Standard, see DES.

Data Terminal Ready, see DTR

date 698

daylight savings 700

DDNS 279

backup mail exchanger 284

configuration overview 108

mail exchanger 284

prerequisites 108

service providers 279

DDoS attacks 501

decompression of files (in anti-virus) 480

default

firewall behavior 322

interfaces and zones 103

LAN IP address 31

login settings 803

port mapping 31

Default_L2TP_VPN_Connection 410

Default_L2TP_VPN_GW 410

Denial of Service (DoS) attacks 501

Denial of Service (Dos) attacks 345

DES 368

device HA 593

active-passive mode 593, 596

cluster ID 596

configuration overview 108

copying configuration 594

device role 599

HA status 596

legacy mode 593, 602

link monitoring 603

management access 594

management IP address 594

modes 593

monitored interfaces 597, 601

password 601

prerequisites 108

role 604

synchronization 594, 609

synchronization password 601, 605

synchronization port number 600, 604

tutorial 141

virtual router 596

virtual router and management IP addresses 597

VRID 604

device High Availability see device HA. 593

device introduction 31

DHCP 236, 698

and DNS servers 238

and domain name 698

and interfaces 237

client list 159

pool 237

static 198

static DHCP 237

diagnostics 793

dial backup 182

dial backup port and dial-in management 741

DIAL BACKUP port 230

See also auxiliary interface.

dial-in management

answer rings 742

AT command strings 741

Dial string 741

DTR 741

initial string 742

mute 742

port speed 742

response strings 741

dial-in server 742

Differentiated Services Code Point (DSCP) 507

Diffie-Hellman key group 369

Digital Signature Algorithm public-key algorithm, See also DSA.

directory 647

directory service 647

file structure 649

directory traversal attack 539

directory traversals 539

disclaimer 4, 933

Distinguished Name (DN) 650, 651, 653

Distributed Denial of Service (DDoS) attacks 501

distributed port scans 535

DN 650, 651, 653

DNS 703

address records 706

domain name forwarders 707

domain name to IP address 706

IP address to domain name 707

L2TP VPN 412

Mail eXchange (MX) records 709

pointer (PTR) records 707

DNS Blacklist see DNSBL 577

DNS servers 703, 707

and interfaces 238

DNSBL 577, 581, 586

domain 589

See also anti-spam. 577

documentation

related 3

domain name 698

Domain Name System, see DNS.

DoS (Denial of Service) attacks 501

double-encoding attack 539

DSA 670

DTR 741

Dynamic Domain Name System, see DDNS.

Dynamic Host Configuration Protocol, see DHCP.

dynamic IPSec VPN rules 341

dynamic peers in IPSec 345

DynDNS 279

DynDNS see also DDNS. 279

Dynu see DDNS. 280

E

e-Donkey 501

EGP (Exterior Gateway Protocol) 535

egress bandwidth 210

EICAR 477

e-mail 575

daily statistics report 790

header buffer 577

headers 576

virus 487

e-Mule 501

Encapsulating Security Payload, see ESP.

encapsulation

and active protocol 375

IPSec 346

transport mode 374

tunnel mode 374

VPN 374

encryption

and anti-virus 481

in L2TP VPN 424, 439

IPSec 347

RSA 674

encryption algorithms 368

3DES 368

AES 368

and active protocol 368

DES 368

encryption method 687

end of IP list 508

enforcing policies in IPSec 346

error messages 55

ESP 346, 374

and transport mode 375

Ethereal 516

Ethernet interfaces 119, 182

basic characteristics 183

virtual 233

with no physical ports 189

Ethernet ports 31, 32

default settings 32

examples (tutorials) 119

experimental-options attack 540

extended authentication

and VPN gateways 341

IKE SA 373

external modems 230

F

false negatives 496, 529

false positives 496, 529, 531

FCC interference statement 933

feature specifications 804

features overview 39

file decompression (in anti-virus) 480

file extensions

configuration files 749

shell scripts 749

fileinfector487

file manager 749

configuration overview 117

file sharing SSL application 689

create 693

filtered port scan 536

Firefox 47

firewall 321, 322

actions 334

and address groups 334

and address objects 334

and ALG 305, 308

and application patrol 446

and H.323 (ALG) 306

and HTTP redirect 302

and IPSec SA 323

and IPSec VPN 798

and logs 334

and port triggering 256

and schedules 333, 460, 462, 464

and service groups 334

and services 334, 636

and SIP (ALG) 307

and user groups 333, 336

and users 333, 336

and virtual servers 330

and VoIP pass through 308

and zones 322, 331

asymmetrical routes 329, 330

configuration overview 110

global rules 323

prerequisites 110

priority 331

rule criteria 323

see also to-ZyWALL firewall. 322

session limits 334

to-ZyWALL, see to-ZyWALL firewall.

triangle routes 329, 330

vs application patrol 321, 323

firmware

and restart 756

boot module, see boot module.

current version 151, 757

getting updated 756

uploading 756, 757

uploading with FTP 735

flags 507

flash usage 151

flood detection 536

force log out 386

force user authentication policies 623

and address groups 625

and address objects 625

and schedules 625

prerequisites 116

fragmentation flag 513

fragmentation offset 513

fragmenting IPSec packets 342

front panel ports 31

FTP 735

additional signaling port 310

ALG 305

and address groups 736

and address objects 736

and certificates 736

and zones 736

signaling port 310

with Transport Layer Security (TLS) 736

full tunnel mode 44, 380, 384

Fully-Qualified Domain Name (FQDN) 706

G

gateway policy, see VPN gateways.

ge 31

ge1 31

ge2 31

ge3 31

Generic Routing Encapsulation, see GRE.

Gigabit Ethernet 31

ports 31

global SSL setting 386

user portal logo 387

GRE 199, 238

GSM 210

Guide

CLI Reference 3

Quick Start 3

H

H.323 138, 311

additional signaling port 310

ALG 305, 311

and firewall 306

and RTP 312

signaling port 310

HA status see device HA 596

HDD LED 35

header checksum 508

host-based intrusions 520

HSDPA 210

HTTP

inspection 532, 539

over SSL, see HTTPS.

redirect to HTTPS 714

vs HTTPS 712

HTTP redirect 301

and application patrol 302

and firewall 302

and interfaces 304

and policy routes 302

configuration overview 114

packet flow 302

prerequisites 114

HTTPS 135, 711

and certificates 711

authenticating clients 712

avoiding warning messages 722

example 720

vs HTTP 712

with Internet Explorer 720

with Netscape Navigator 721

hub-and-spoke VPN, see VPN concentrator.

HyperText Transfer Protocol over Secure Socket Layer, see HTTPS.

|

ICMP 636

code 514

datagram length 541

decoder 532, 539

echo 537

flood attack 536

portsweep 536

sequence number 514

Time Stamp header length 541

type 514

unreachables 536

identification (IP) 512

identifying

legitimate e-mail 575

spam 576

IDP 489

action 500

alerts 500

and services 636

applying custom signatures 519

base profiles 490, 494

configuration overview 112

custom signature example 516

custom signatures 506

false negatives 496

false positives 496

inline profile 496

license status 153

log options 500

monitor profile 496

packet inspection profiles 498

packet inspection signatures 498

policies 493

policy types 501

prerequisites 112

profiles 489, 491, 492, 494

query view 499, 504

registration status 170, 492

reject sender 500

reject-both 500

reject-receiver 500

service group 502

severity 499

signature categories 501

signature ID 499

signatures 489

signatures and synchronization (device HA) 609

Snort signatures 521

statistics 783

traffic directions 489

trial service activation 168

updating signatures 173

verifying custom signatures 519

IEEE 802.1q VLAN

IGP (Interior Gateway Protocol) 535

IHL (IP Header Length) 507

IIS

backslash-evasion attack 539

emulation 539

encoding 539

server 539

unicode 539

unicode-codepoint-encoding attack 539

IKE SA

aggressive mode 367, 371, 372

and certificates 373

and RADIUS 373

and to-ZyWALL firewall 797

authentication algorithms 368, 369

content 370

dead peer detection (DPD) 362

Diffie-Hellman key group 369

encryption algorithms 368

extended authentication 373

ID type 370

IP address, remote IPSec router 367

IP address, ZyXEL device 367

local identity 370

main mode 367, 371

NAT traversal 372

negotiation mode 367

password 373

peer identity 370

pre-shared key 370

proposal 368

See also VPN.

user name 373

IM (Instant Messenger) 501

IMAP 576

iMesh 501

incoming bandwidth 210

ingress bandwidth 210

initial string 742

inline profile 496, 529

inspection signatures 494

Instant Messenger (IM) 445, 501

managing 445

interface

bandwidth 451

mapping 31

status 151, 185

types 102

interfaces 31, 102, 119, 181

and DNS servers 238

and HTTP redirect 304

and layer-3 virtualization 182

and physical ports 102, 182

and policy routes 254, 255

and static routes 259

and virtual servers 290

and VPN gateways 341

and VRRP groups 602

and zones 102, 182

as DHCP relays 237

as DHCP servers 237, 698

auxiliary, see also auxiliary interface.

backup, see trunks.

bandwidth management 236, 246

bridge, see also bridge interfaces.

configuration overview 106

default configuration 103

DHCP clients 235

Ethernet, see also Ethernet interfaces.

gateway 236

general characteristics 182

IP address 235

metric 236

MTU 236

overlapping IP address and subnet mask 235

port groups, see also port groups.

PPPoE/PPTP, see also PPPoE/PPTP interfaces.

prerequisites 106, 183

relationships between 183

static DHCP 198, 237

subnet mask 235

trunks, see also trunks.

types 182

virtual, see also virtual interfaces.

VLAN, see also VLAN interfaces.

where used 106

Internet Control Message Protocol, see ICMP.

Internet Explorer 47

Internet Message Access Protocol, see IMAP. 576

Internet Protocol (IP) 507

Internet Protocol Security, see IPSec.

Intrusion, Detection and Prevention see IDP. 489

intrusions

host 520

network 520

IP (Internet Protocol) 507

IP address 31

IP alias, see virtual interfaces.

IP decoy portscan 535

IP distributed portscan 535

IP options 508, 513

IP policy routing, see policy routes.

IP pool 384

IP portscan 535

IP portsweep 536

IP protocols 635

ICMP, see ICMP.

TCP, see TCP.

UDP, see UDP.

IP security option 508

IP static routes, see static routes.

IP stream identifier 508

IP v4 packet headers 507

IP/MAC binding 313

exempt list 317

monitor 317

static DHCP 316

IPSec 339

active protocol 346

AH 346

and certificates 341

authentication 347

basic troubleshooting 797

certificates 358

connections 341

connectivity check 347

Default_L2TP_VPN_Connection 410

Default_L2TP_VPN_Connection example 417

Default_L2TP_VPN_GW 410

Default_L2TP_VPN_GW example 416

dynamic rules 341

encapsulation 346

encryption 347

ESP 346

established in two phases 340

fragmentation 342

L2TP VPN 409

local network 339

local policy 345

manual key 345

NetBIOS 345

peer 339

Perfect Forward Secrecy 347

PFS 347

phase 2 settings 346

policy enforcement 346

policy routes 341

proposals 347

remote access 345

remote IPSec router 339

remote network 339

remote policy 346

replay detection 345

SA life time 346

SA monitor 366

SA See also IPSec SA 374

See also VPN.

site-to-site with dynamic peer 345

static site-to-site 345

transport encapsulation 346

tunnel encapsulation 346

VPN gateway 341

IPSec SA

active protocol 374

and firewall 323, 798

and to-ZyWALL firewall 797

authentication algorithms 368, 369

authentication key (manual keys) 376

destination NAT for inbound traffic 378

encapsulation 374

encryption algorithms 368

encryption key (manual keys) 376

local policy 374

manual keys 376

NAT for inbound traffic 376

NAT for outbound traffic 376

Perfect Forward Secrecy (PFS) 375

proposal 375

remote policy 374

search by name 366

search by policy 366

Security Parameter Index (SPI) (manual keys) 376

See also IPSec.

See also VPN.

source NAT for inbound traffic 377

source NAT for outbound traffic 377

status 366

transport mode 374

tunnel mode 374

when IKE SA is disconnected 374

IPSec VPN

configuration overview 107

prerequisites 107

See also IPSec.

tutorial 124

where used 107

ISP account

CHAP 687

CHAP/PAP 687

MPPE 687

MSCHAP 687

MSCHAP-V2 687

PAP 687

ISP accounts 685

and PPPoE/PPTP interfaces 200, 685

authentication type 687

encryption method 687

stac compression 688

J

Java 562

permissions 47

JavaScript 47

K

key pairs 663

kick out user 386

kill SSL user session 386

L

L2TP VPN 409

configuration overview 107

configuring in Windows 2000 426

configuring in Windows XP 420

Default_L2TP_VPN_Connection 410

Default_L2TP_VPN_Connection example 417

Default_L2TP_VPN_GW 410

Default_L2TP_VPN_GW example 416

DNS 412

example 415, 418

IPSec configuration 409

policy routes 410

policy routes example 419

prerequisites 107

remote user configuration 420

session monitor 412

where used 107

WINS 412

LAN

interface 31

IP address 31

LAND attack 538

lastgood.conf 752, 754

Layer 2 Tunneling Protocol Virtual Private

Network, See L2TP VPN. 409

LDAP 647

and users 614

Base DN 650

Bind DN 650, 651, 653

CN identifier 651, 653

default server settings 651

directory 647

directory structure 649

Distinguished Name, see DN.

DN 650, 651, 653

group 652

group members 654

host 651, 653

password 651, 653

port 651, 653

search time limit 651, 654

SSL 652, 654

user attributes 627

least load first load balancing 241

LEDs 35

legitimate e-mail 575

level-4 inspection 446

level-7 inspection 446

license

key 170

upgrading 170

licensing 165

lights 35

Lightweight Directory Access Protocol, see LDAP.

LNK LED 36

load balancing 239

algorithms 241, 245

least load first 241

round robin 246

See also trunks. 239

session-oriented 241

spillover 242

tutorial 122

weighted round robin 242

local user database 649

log messages

categories 768, 771, 772, 773

debugging 761

regular 761

types of 761

log options 480, 580

(IDP) 500

logged in users 162

login

custom page 716

default settings 803

SSL user 392

logo in SSL 387

logout

SSL user 396

web configurator 50

logs 761

and firewall 334

configuration overview 118

descriptions 811

e-mail profiles 764

e-mailing log messages 762, 768

formats 765

log consolidation 769

settings 764

syslog servers 764

system 764

types of 764

loose source routing 508

M

MAC address

and VLAN 215

Ethernet interface 193

range 151

macro virus 487

mail sessions threshold 578

malware 555

managed web pages 553

management access and device HA 594

Management Information Base (MIB) 738, 739

managing bandwidth 446

manual key IPSec 345

mapping ports 31

MD5 369

memory usage 151, 156

message bar 55, 56

Message Digest 5, see MD5.

messages 55

CLI 57

warning 56

metrics, see reports.

Microsoft

Challenge-Handshake Authentication Protocol (MSCHAP) 232, 687

Challenge-Handshake Authentication Protocol Version 2 (MSCHAP-V2) 232, 687

Point-to-Point Encryption (MPPE) 687

Windows Plug-and-Play Service Remote Overflow (MS-05-39) attack 516

mini GBIC ports 32

connection speed 33

connector type 33

transceiver installation 33

transceiver removal 34

model name 151

monitor 385

SA 366

monitor profile

ADP 529

IDP 496

monitored interfaces 597

device HA 601

MPPE (Microsoft Point-to-Point Encryption) 687

MS-05-39 (Microsoft Windows Plug-and-Play Service Remote Overflow) 516

MSA (MultiSource Agreement) 33

MSCHAP (Microsoft Challenge-Handshake Authentication Protocol) 232, 687

MSCHAP-V2 (Microsoft Challenge-Handshake Authentication Protocol Version 2) 232, 687

MTU 211

multiple slash encoding 539

multi-slash-encoding attack 539

mutation virus 487

mute 742

My Certificates, see also certificates. 667

MyDoom 520

myZyXEL.com 165, 173

accounts, creating 165

and IDP 492

N

NAT 259, 287

1 to 1 example 292

address mapping, see policy routes.

ALG, see ALG.

and address objects 256

and ALG 306

and policy routes 250, 255

and VPN 372

and VPN, see also VPN.

port forwarding, see virtual servers.

port translation, see virtual servers.

port triggering, see also policy routes.

port triggering, see also port triggering. traversal 372

trigger port, see also policy routes.

NBNS 195, 221, 229, 238, 384

NetBIOS 516

Broadcast over IPSec 345

Name Server, see NBNS.

NetBIOS Name Server, see NBNS

NetMeeting 311

See also H.323.

Netscape Navigator 47

network access mode 43

full tunnel 44, 380

reverse proxy 43, 379

Network Address Translation, see NAT.

network list, see SSL 384

network policy, see VPN connections.

Network Time Protocol (NTP) 701

network-based intrusions 520

Nimda 520

Nmap 535

no IP options 508

No-IP see DDNS. 280

non-RFC

characters 539

defined-char attack 539

HTTP-delimiter attack 540

NSSA 266

O

object-based configuration 101

objects 101, 115, 380

AAA server 647

addresses and address groups 629

authentication method 659

certificates 663

for configuration 101

introduction to 101

schedules 641

services and service groups 635

SSL application 689

users, user groups 613

obsolete-options attack 540

offset (patterns) 515

One-Time Password (OTP) 648

Online Certificate Status Protocol (OCSP) 683

vs CRL 683

Open Shortest Path First, see OSPF.

open software announcements 887

order of feature application 41

original setting (IDP) 500

OSI (Open System Interconnection) 489, 494

OSI level-4 446

OSI level-7 446

OSPF 265

and RIP 268

and static routes 268

and to-ZyWALL firewall 266

area 0 267

areas, see OSPF areas.

autonomous system (AS) 265

backbone 267

configuration steps 269

redistribute 268

redistribute type (cost) 270

routers, see OSPF routers.

virtual links 268

vs RIP 263, 265

OSPF areas 266

backbone 266

Not So Stubby Area (NSSA) 266

stub areas 266

types of 266

OSPF routers 267

area border (ABR) 267

autonomous system boundary (ASBR) 268

backbone (BR) 268

backup designated (BDR) 268

designated (DR) 268

internal (IR) 267

link state advertisements

priority 268

types of 267

other documentation 3

OTP (One-Time Password) 648

outgoing bandwidth 210

oversize

chunk-encoding attack 540

len attack 541

offset attack 540

request-uri-directory attack 540

P

P1 31

P1\~P8 LEDs 36

P2P (Peer-to-peer) 501

attacks 501

See also Peer-to-peer.

packet

flow 41

inspection signatures 494, 498

scan 474, 877

statistics 160, 161

padding 508

PAP (Password Authentication Protocol) 232, 687

password 31

Password Authentication Protocol (PAP) 232, 687

payload

option 514

size 515

Peanut Hull see DDNS. 280

Peer-to-peer (P2P) 501

calls 138, 307

managing 445

Perfect Forward Secrecy (PFS) 347

Diffie-Hellman key group 375

Personal Identification Number code, see PIN code

PFS (Perfect Forward Secrecy) 347, 375

phishing 554

physical ports 31

and interfaces 102

packet statistics 160, 161

PIN code 210

PIN generator 648

pointer record 707

Point-to-Point Protocol over Ethernet, see PPPoE.

Point-to-Point Tunneling Protocol, see PPTP

policy enforcement in IPSec 346

policy routes 250

actions 251

and address objects 254, 255, 625

and ALG 307, 308, 311

and HTTP redirect 302

and interfaces 254, 255

and IPSec 341

and NAT 250

and schedules 255, 458, 460, 462, 464

and service groups 255

and services 255, 636

and trunks 240, 255

and user groups 254, 458, 460, 462, 464

and users 254, 458, 460, 462, 464

and VoIP pass through 307, 308

and VPN connections 254, 255, 797

bandwidth management 257

benefits 250

configuration overview 108

criteria 251

L2TP VPN 410

L2TP VPN example 419

prerequisites 109

polymorphic virus 487

POP

POP2 576

POP3 576

pop-up windows 47

port forwarding, see virtual servers.

port groups 119, 182, 188

and Ethernet interfaces 188

and physical ports 188

representative interfaces 188

port mapping 31

port scan, filtered 536

port scanning 535

port speed 742

port sweep 536

port translation, see virtual servers.

port triggering 259

and firewall 256

and policy routes 256

and service groups 256

and services 256

ports 31

Post Office Protocol, see POP. 576

power module 804

changing 800

connecting 802

disconnecting 800

power off 37

power on 37

PPP 238

PPP interfaces

subnet mask 235

PPPoE 199, 238

and RADIUS 199, 238

TCP port 1723 199, 238

PPPoE/PPTP interfaces 182, 199

and ISP accounts 200, 685

basic characteristics 183

gateway 200

subnet mask 200

PPTP 199, 238

and GRE 199, 238

as VPN 199, 238

privacy concerns 555

product

overview 31

registration 935

profiles

ADP 527

packet inspection 498

proposals in IPSec 347

protocol anomaly 524, 539

detection 532

protocol usage statistics 469

proxy servers 302

web, see web proxy servers.

PTR record 707

public server tutorial 146

Public-Key Infrastructure (PKI) 664

public-private key pairs 663

PWR LEDs 35

Q

query view (IDP) 499, 504

Quick Start Guide 3

R

RADIUS 648, 649

advantages 648

and IKE SA 373

and PPPoE 199, 238

and users 614

user attributes 627

real-time alert message 877

Real-time Transport Protocol, see RTP.

reboot 37, 795

vs reset 795

record route 508

Reference Guide, CLI 3

registration 165

and content filtering 548, 550, 552

configuration overview 117

prerequisites 117

product 935

subscription services, see subscription services.

registration status

anti-virus 478

application patrol 455

IDP 492

reject (IDP)

both 500

receiver 500

sender 500

related documentation 3

Relative Distinguished Name (RDN) 650, 651, 653

remote access IPSec 345

Remote Authentication Dial-In User Service, see RADIUS.

remote management

CNM 743

configuration overview 116

connection 741

FTP, see FTP.

prerequisites 117

see also service control 710

Telnet 734

to-ZyWALL firewall 323

WWW, see WWW.

remote network 339

remote user screen links 690

replay detection 345

reports 775

anti-spam 787

anti-virus 781

collecting data 776

configuration overview 118

content filtering 785

daily 790

daily e-mail 790

IDP 783

specifications 778

traffic statistics 775

reset 799

vs reboot 795

RESET button 37, 799

response strings 741

reverse proxy mode 43, 379

RFC

1058 (RIP) 264

1389 (RIP) 264

1587 (OSPF areas) 266

1631 (NAT) 259

1889 (RTP) 312

2131 (DHCP) 236

2132 (DHCP) 236

2328 (OSPF) 265

2338 (VRRP) 602

2402 (AH) 346, 374

2406 (ESP) 346, 374

2510 (Certificate Management Protocol or CMP) 671

2516 (PPPoE) 199, 238

2637 (PPTP) 199, 238

2890 (GRE) 199, 238

3261 (SIP) 311

RIP 264

and OSPF 264

and static routes 264

and to-ZyWALL firewall 264

authentication 264

redistribute 264

vs OSPF 263

Rivest, Shamir and Adleman public-key algorithm (RSA) 670

round robin 246

Routing Information Protocol, see RIP

routing protocols 263

and authentication algorithms 274

RSA 670, 674, 681

RTP 312

See also ALG. 312

S

safety warnings 7

same IP 513

scan attacks 501

scanner types 487

SCEP (Simple Certificate Enrollment Protocol) 671

schedules 641

and content filtering 543, 544, 549

and current date/time 641

and firewall 333, 460, 462, 464

and force user authentication policies 625

and policy routes 255, 458, 460, 462, 464

one-time 641

recurring 641

types of 641

where used 115

screen resolution 47

Secure Hash Algorithm, see SHA1.

Secure Socket Layer, see SSL.

security associations, see IPSec.VPN

See also IPSec SA.

Security Focus 516

self-directory-traversal attack 540

self-referential directories 540

sensitivity level 531

serial number 151

service control 135, 710

and to-ZyWALL firewall 710

and users 711

dial-in management

dial-in management 741

limitations 711

timeouts 711

service groups 636

and firewall 334

and policy routes 255

and port triggering 256

in IDP 502

where used 115

service objects 635

service subscription status 170

service trials 168

services 635, 636, 871

and device HA 594

and firewall 334, 636

and IDP 636

and policy routes 255, 636

and port triggering 256

subscription 166

where used 115

Session Initiation Protocol, see SIP.

session limits 334

session monitor (L2TP VPN) 412

sessions 778

sessions usage 151, 157

severity (IDP) 495, 499

SHA1 369

shell scripts 749

and users 627

downloading 759

editing 758

how applied 750

managing 758

not stopping or starting the ZyWALL 37

syntax 750

uploading 760

shutdown 37

signal quality 214

signature categories

access control 502

backdoor/Trojan 502

buffer overflow 502

DoS/DDoS 501

IM 501

P2P 501

scan 501

spam 501

virus/worm 502

Web attack 502

signature ID 499, 509, 512

signatures 494

anti-virus 485

IDP 489

packet inspection 498

updating 171

SIM card 210

Simple Certificate Enrollment Protocol (SCEP) 671

Simple Mail Transfer Protocol. See SMTP. 576

Simple Network Management Protocol, see SNMP.

Simple Traversal of UDP through NAT, see STUN.

SIP 311

ALG 305

and firewall 307

and RTP 312

media inactivity timeout 309

signaling inactivity timeout 309

signaling port 310

SMTP 576

smurf attack 536

SNAT 259

SNMP 737, 738

agents 738

and address groups 740

and address objects 740

and zones 740

Get 738

GetNext 739

Manager 738

managers 738

MIB 738, 739

network components 738

Set 739

Trap 739

traps 739

versions 737

Snort

equivalent terms 521

rule header 521

rule options 521

signatures 521

software announcements 887

Source Network Address Translation, see SNAT.

spam 501, 575

specifications 803

device 803

feature 804

hardware 803

spillover (for load balancing) 242

spyware 555

SQL slammer 520

SSH 728

and address groups 731

and address objects 731

and certificates 731

and zones 731

client requirements 730

encryption methods 730

for secure Telnet 732

how connection is established 729

versions 730

with Linux 733

with Microsoft Windows 732

SSL 379, 384, 711

access policy 380

and AAA 652, 654

and AD 652, 654

and LDAP 652, 654

certificates 392

client virtual desktop logo 387

computer names 384

connection monitor 385

full tunnel mode 384

global setting 386

IP pool 384

network list 384

remote user login 392

remote user logout 396

See also SSL VPN 379

user screen bookmarks 396

user screens 391, 395

user screens access methods 391

user screens certificates 392

user screens login 392

user screens logout 396

user screens required information 392

user screens system requirements 392

WINS 384

SSL application object 689

file sharing 689

file sharing application 693

remote user screen links 690

summary 691

types 689

web-based 689, 691

web-based example 690

where used 115

SSL policy

add 383

edit 383

objects used 380

SSL VPN 379

access policy 380

configuration overview 107

full tunnel mode 44, 380

network access mode 43

prerequisites 107

reverse proxy mode 43, 379

See also SSL 379

where used 107

stac compression 688

starting the ZyWALL 37

startup-config.conf 754

and synchronization (device HA) 609

if errors 752

missing at restart 752

present at restart 752

startup-config-bad.conf 752

static DHCP 198, 316

static routes 251

and interfaces 259

and OSPF 268

and RIP 264

configuration overview 110

metric 259

prerequisites 110

statistics

anti-spam 787

anti-virus 781

application patrol 467

bandwidth 468

content filtering 785

daily e-mail report 790

IDP 783

protocol 469

traffic 775

status 150

status bar 56

also called message bar 55

warning message popup 56

stopping an SSL user session 386

stopping the ZyWALL 37

streaming protocols management 445

strict source routing 508

stub area 266

STUN 307

and ALG 307

subscription services 166

and synchronization (device HA) 594

AppPatrol 168

content filtering 168

IDP 168

IDP, see also IDP.

new IDP/AppPatrol signatures 168

SSL VPN 166

SSL VPN, see also SSL VPN.

status 170, 455, 478

trial service activation 168

upgrading 170

supported browsers 47

supporting disc 4

SYN flood 538

synchronization 594

and subscription services 594

information synchronized 609

password 601, 605

port number 600, 604

restrictions 609

syntax conventions 5

SYS LED 35

syslog 765, 771

syslog servers, see also logs.

system log, see logs.

system name 150, 698

system protect

updating signatures 175

system reports, see reports.

system uptime 152

system-default.conf 754

T

T/TCP 541

target market 31

task bar properties 878

TCP 635

ACK (acknowledgment) 537

ACK number 514

attack packet 500

connections 635

decoder 532, 539

decoy portscan 535

distributed portscan 535

flag bits 514

port numbers 636

portscan 535

portsweep 536

RST 536

SYN (synchronize) 537

SYN flood 537

window size 514

TCPdump 516

Telnet 734

and address groups 735

and address objects 735

and zones 735

with SSH 732

terminating an SSL user connection 386

terminology differences

bandwidth management 105

NAT 105

with other products 104

with ZyNOS 104

three-way handshake 537

time 698

time servers (default) 701

time to live 507

timestamp 508

token 648

to-ZyWALL firewall 322

and NAT traversal (VPN) 798

and OSPF 266

and remote management 323

and RIP 264

and service control 710

and virtual servers 292

and VPN 797

and VRRP 602

and VRRP groups 603

global rules 322

See also firewall. 322

trademarks 933

traffic anomaly 524, 529

traffic statistics 775

transceiver

installation 33

removal 34

Transmission Control Protocol, see TCP.

transport encapsulation 346

Transport Layer Security (TLS) 736

trapdoor attacks 502

trial subscription services 168

triangle routes 329

allowing through the firewall 330

vs virtual interfaces 329

Triple Data Encryption Standard, see 3DES.

trojan attacks 502

troubleshooting 793, 797

packet flow 41

truncated-address-header attack 541

truncated-header attack 541

truncated-options attack 540

truncated-timestamp-header attack 541

trunk 31

trunks 182, 239

and ALG 311

and policy routes 240, 255

configuration overview 106

member interface mode 246

member interfaces 245

prerequisites 106

See also load balancing. 239

tutorial 122

where used 106

Trusted Certificates, see also certificates. 677

TTCP-detected attack 541

tunnel encapsulation 346

tutorials 119

U

UDP 635

attack packet 500

decoder 532, 539

decoy portscan 535

distributed portscan 535

flood attack 538

messages 635

port numbers 636

portscan 535

portsweep 536

u-encoding attack 540

undersize-len attack 541

undersize-offset attack 541

unreachables (ICMP) 536

unsafe web pages 553

unsolicited commercial e-mail 575

update

configuration overview 118

prerequisites 118

updating

anti-virus signatures 172

IDP and application patrol signatures 173

signatures 171

system protect signatures 175

upgrading

firmware 756

licenses 170

uploading

configuration files 755

firmware 756

shell scripts 758

URI (Uniform Resource Identifier) 515

usage

CPU 151, 155

flash 151

memory 151, 156

onboard flash 151

sessions 151, 157

user authentication 613

external 614

local user database 649

user awareness 615

User Datagram Protocol. See UDP.

user group objects 613

user groups 613, 615

and content filtering 543

and firewall 333, 336

and policy routes 254, 458, 460, 462, 464

configuration overview 116

user name 31

rules 616

user objects 613

user portal

links 690

logo 387

See SSL user screens. 391, 395

user sessions, see sessions.

user SSL screens 391, 395

access methods 391

bookmarks 396

certificates 392

login 392

logout 396

required information 392

system requirements 392

user-aware 128

users 613

access, see also access users.

Admin (type) 613

admin, see also admin users.

and AAA servers 614

and authentication method objects 614

and content filtering 543

and firewall 333, 336

and LDAP 614

and policy routes 254, 458, 460, 462, 464

and RADIUS 614

and service control 711

and shell scripts 627

attributes for Ext-User 614

attributes for LDAP 627

attributes for RADIUS 627

attributes in AAA servers 626

configuration overview 116

currently logged in 152, 162

default lease time 621

default reauthentication time 621

default type for Ext-User 614

Ext-User (type) 614

groups, see user groups.

Guest (type) 614

lease time 618

Limited-Admin (type) 614

lockout 622

prerequisites for force user authentication policies 116

reauthentication time 618

types of 613

User (type) 614

user names 616

UTF-8 decode 540

UTF-8-encoding attack 540

V

Vantage CNM 743

Vantage Report (VRPT) 765, 771

virtual interfaces 182, 233

basic characteristics 183

not DHCP clients 235

types of 233

vs asymmetrical routes 329

vs triangle routes 329

Virtual Local Area Network, see VLAN.

Virtual Private Network, see VPN.

virtual router 596

Virtual Router ID number (VRID). 604

Virtual Router Redundancy Protocol, see VRRP.

virtual servers 287

and address objects (HOST) 290, 291

and ALG 308

and firewall 330

and interfaces 290

and to-ZyWALL firewall 292

and VoIP pass through 308

configuration overview 113

limitations 259

prerequisites 113

tutorial 146

virus 502

attack 474, 502

boot sector 487

e-mail 487

fileinfector487

life cycle 487

macro 487

mutation 487

polymorphic 487

scan 474

VLAN 214

advantages 215

and MAC address 215

ID 215

VLAN interfaces 182, 216

and Ethernet interfaces 216

basic characteristics 183

virtual 233

VoIP pass through 311

and firewall 308

and policy routes 307, 308

and virtual servers 308

See also ALG. 306

VPN 339

active protocol 374

and NAT 372

and the firewall 323

basic troubleshooting 797

hub-and-spoke, see VPN concentrator.

IKE SA, see IKE SA.

IPSec 339

IPSec SA

proposal 368

security associations (SA) 340

See also IKE SA.

See also IPSec 339

See also L2TP VPN 339

status 158

VPN concentrator 363

advantages 363

and IPSec SA policy enforcement 365

disadvantages 363

VPN connections

and address objects 341

and policy routes 254, 255, 797

VPN gateways

and certificates 341

and extended authentication 341

and interfaces 341

and to-ZyWALL firewall 798

VRID 604

VRPT (Vantage Report) 765, 771

VRRP 602

advertisement interval 608

and to-ZyWALL firewall 602

backup router 608

management IP 608

master router 608

router priority 609

virtual router ID (VR ID) 608

VRRP groups 602

and interfaces 602

and to-ZyWALL firewall 603

authentication 603

role (desired) 607

See also VRRP.

cookies 562

Java 562

web proxy servers 562

web proxy servers 302, 562

see also HTTP redirect.

web site

ZyXEL 4

web-based SSL application 689

configuration example 690

create 691

webroot-directory-traversal attack 540

weighted round robin (for load balancing) 242

white list (anti-spam) 575, 581, 583, 585

Windows Internet Naming Service, see WINS

Windows Internet Naming Service, see WINS.

WinPopup window 877

WINS 195, 221, 229, 238, 384

in L2TP VPN 412

WINS server 195, 412

Wizard Setup 59

worm 474, 502

attacks 502

WWW 712

and address groups 716

and address objects 716

and authentication method objects 715

and certificates 714

and zones 716

See also HTTP, HTTPS. 135, 712

www.zyxel.com 4

W

WAN_TRUNK 31

warm start 37

warning message popup 56

warranty 935

note 935

Web attack 502

web configurator 36, 47

access 47

access users 625

requirements 47

supported browsers 47

web features

ActiveX 562

Z

zones 102, 275

and firewall 322, 331

and FTP 736

and interfaces 102, 275

and SNMP 740

and SSH 731

and Telnet 735

and VPN 102, 275

and WWW 716

block intra-zone traffic 278, 329

configuration overview 108

default 103

extra-zone traffic 276

inter-zone traffic 276 intra-zone traffic 276 prerequisites 108 types of traffic 276 where used 108 ZyWALL terminology differences 104 ZyXEL web site 4

Table of contents Click a title to access it
Manual assistant
Powered by Anthropic
Waiting for your message
Product information

Brand : ZYXEL

Model : ZYWALL USG 2000

Category : UTM Firewall