Table of Contents
ZyWALL Series CLI Reference Guide
14
35.2 IPSec Configuration .................................................................................................................... 299
35.2.1 Using the Default L2TP VPN Connection ........................................................................ 300
35.3 LAN Policy Route ........................................................................................................................ 300
35.4 WAN Policy Route ....................................................................................................................... 300
35.5 L2TP VPN Commands ................................................................................................................. 301
35.5.1 L2TP VPN Commands .......................................................................................................302
35.5.2 L2TP Account Commands ............................................................................................... 303
35.6 L2TP VPN Examples ..................................................................................................................... 304
35.6.1 Configuring the Default L2TP VPN Gateway Example ................................................. 304
35.6.2 Configuring the Default L2TP VPN Connection Example ............................................. 304
35.6.3 Configuring the L2TP VPN Settings Example .................................................................. 305
35.6.4 Configuring the LAN Policy Route for L2TP Example ..................................................... 305
35.6.5 Configuring the WAN Policy Route for L2TP Example ................................................... 306
Chapter 36
Bandwidth Management................................................................................................................307
36.1 Bandwidth Management Overview ........................................................................................ 307
36.1.1 BWM Type .......................................................................................................................... 307
36.2 Bandwidth Management Commands .................................................................................... 307
36.2.1 Bandwidth Sub-Commands ............................................................................................ 308
36.3 Bandwidth Management Commands Examples ................................................................... 311
Chapter 37
Application Patrol............................................................................................................................313
37.1 Application Patrol Overview ..................................................................................................... 313
37.2 Application Patrol Commands Summary ................................................................................ 313
37.2.1 Application Patrol Commands ........................................................................................ 314
Chapter 38
Anti-Virus...........................................................................................................................................317
38.1 Anti-Virus Overview .................................................................................................................... 317
38.2 Anti-Virus Commands ................................................................................................................ 317
38.2.1 General Anti-Virus Commands ........................................................................................ 318
38.2.2 Anti-Virus Profile ................................................................................................................. 319
38.2.3 White and Black Lists ......................................................................................................... 320
38.2.4 Signature Search Anti-Virus Command .......................................................................... 322
38.3 Update Anti-Virus Signatures ..................................................................................................... 323
38.3.1 Update Signature Examples ............................................................................................ 323
38.4 Anti-Virus Statistics ....................................................................................................................... 324
38.4.1 Anti-Virus Statistics Example ............................................................................................. 324
Chapter 39
RTLS....................................................................................................................................................325