
ZyWALL 100 Internet Security Gateway
xii Table of Contents
25.1 Introduction...........................................................................................................................25-1
25.2 Benefits .................................................................................................................................25-1
25.3 Routing Policy ......................................................................................................................25-1
25.4 IP Routing Policy Setup........................................................................................................25-2
25.5 Applying an IP Policy...........................................................................................................25-6
25.6 IP Policy Routing Example...................................................................................................25-6
Chapter 26 Call Scheduling...................................................................................................................26-1
26.1 Introduction...........................................................................................................................26-1
Chapter 27 Introduction to IPSec .........................................................................................................27-1
27.1 Introduction...........................................................................................................................27-1
27.2 IPSec Architecture ................................................................................................................27-3
27.3 Encapsulation........................................................................................................................27-5
27.4 IPSec and NAT .....................................................................................................................27-5
Chapter 28 VPN/IPSec Setup ................................................................................................................28-1
28.1 VPN/IPSec Setup..................................................................................................................28-1
28.2 IPSec Algorithms ..................................................................................................................28-2
28.3 IPSec Summary.....................................................................................................................28-3
28.4 IPSec Setup...........................................................................................................................28-9
28.5 IKE Setup............................................................................................................................28-12
28.6 Manual Setup ......................................................................................................................28-17
Chapter 29 SA Monitor..........................................................................................................................29-1
29.1 Introduction...........................................................................................................................29-1
29.2 Using SA Monitor.................................................................................................................29-1
Chapter 30 IPSec Log ............................................................................................................................30-1
30.1 VPN Initiator IPSec Log.......................................................................................................30-1
30.2 VPN Responder IPSec Log...................................................................................................30-2
Troubleshooting, Appendices and Index ...................................................................................................31-1
Commentaires sur ces manuels