Table of Contents
ZyWALL Series CLI Reference Guide
13
32.5.2 Printer-manager Command Example ............................................................................ 269
32.6 Free Time Overview .................................................................................................................... 270
32.7 Free-Time Commands ................................................................................................................ 270
32.8 Free-Time Commands Example ................................................................................................271
32.9 IPnP Overview ............................................................................................................................. 271
32.10 IPnP Commands ....................................................................................................................... 271
32.11 IPnP Commands Example ....................................................................................................... 272
32.12 Walled Garden Overview ....................................................................................................... 272
32.13 Walled Garden Commands ...................................................................................................272
32.13.1 walled-garden rule Sub-commands ............................................................................. 273
32.13.2 walled-garden domain-ip rule Sub-commands .......................................................... 274
32.13.3 Walled Garden Command Example ........................................................................... 274
32.14 Advertisement Overview ......................................................................................................... 275
32.15 Advertisement Commands ..................................................................................................... 275
32.15.1 Advertisement Command Example ............................................................................. 275
Chapter 33
IPSec VPN .........................................................................................................................................276
33.1 IPSec VPN Overview ................................................................................................................... 276
33.2 IPSec VPN Commands Summary ............................................................................................. 277
33.2.1 IPv4 IKEv1 SA Commands ................................................................................................. 278
33.2.2 IPv4 IPSec SA Commands (except Manual Keys) ......................................................... 280
33.2.3 IPv4 IPSec SA Commands (for Manual Keys) ................................................................. 285
33.2.4 VPN Concentrator Commands ....................................................................................... 286
33.2.5 VPN Configuration Provisioning Commands ................................................................. 286
33.2.6 SA Monitor Commands .................................................................................................... 288
33.2.7 IPv4 IKEv2 SA Commands ................................................................................................. 289
33.2.8 IPv6 IKEv2 SA Commands ................................................................................................. 290
33.2.9 IPv6 IPSec SA Commands ................................................................................................ 292
33.2.10 IPv6 VPN Concentrator Commands ............................................................................. 294
Chapter 34
SSL VPN..............................................................................................................................................295
34.1 SSL Access Policy ........................................................................................................................ 295
34.1.1 SSL Application Objects ................................................................................................... 295
34.1.2 SSL Access Policy Limitations ...........................................................................................295
34.2 SSL VPN Commands ................................................................................................................... 295
34.2.1 SSL VPN Commands ......................................................................................................... 296
34.2.2 Setting an SSL VPN Rule Tutorial ...................................................................................... 297
Chapter 35
L2TP VPN............................................................................................................................................299
35.1 L2TP VPN Overview ..................................................................................................................... 299