EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Figure 56 SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example

ZyXEL Communications ZYWALL 35
872 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 4 Tutorials
ZyWALL 5/35/70 Series User’s Guide
125
Figure 56 SECURITY > VPN > VPN Rules (IKE): With Gateway Policy Example
4 Use this screen to specify which computers behind the routers can use the VPN tunnel.
Configure the fields that are circled as follows and click Apply. You may notice that the
example does not specify the port numbers. This is due to the following reasons.
While FTP uses a control session on port 20, the port for the data session is not fixed.
So this example uses the firewall’s FTP application layer gateway (ALG) to handle
this instead of specifying port numbers in this VPN network policy.
The firewall provides better security because it operates at layer 4 and checks traffic
sessions. The VPN network policy only operates at layer 3 and just checks IP
addresses and port numbers.

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals