ZyXEL Communications 2WE Network Card User Manual


 
ZyWALL 2 and ZyWALL 2WE
xxii List of Figures
Figure 25-3 Applying Schedule Set(s) to a Remote Node (PPPoE)..............................................................25-4
Figure 25-4 Applying Schedule Set(s) to a Remote Node (PPTP) ...............................................................25-5
Figure 26-1 Encryption and Decryption .......................................................................................................26-2
Figure 26-2 VPN Application.......................................................................................................................26-3
Figure 26-3 IPSec Architecture.....................................................................................................................26-4
Figure 26-4 Transport and Tunnel Mode IPSec Encapsulation.....................................................................26-5
Figure 27-1 IPSec Summary Fields..............................................................................................................27-3
Figure 27-2 VPN Summary..........................................................................................................................27-3
Figure 27-3 NAT Router Between IPSec Routers.........................................................................................27-5
Figure 27-4 Basic IKE VPN Rule Setup.......................................................................................................27-8
Figure 27-5 Two Phases to Set Up the IPSec SA........................................................................................27-12
Figure 27-6 Advanced IKE VPN Rule Setup.................................................................................................27-15
Figure 27-7 Manual IKE VPN Rule Setup.....................................................................................................27-21
Figure 27-8 VPN SA Monitor.....................................................................................................................27-25
Figure 27-9 VPN Global Setting.................................................................................................................27-26
Figure 27-10 Telecommuters Sharing One VPN Rule Example.................................................................27-28
Figure 27-11 Telecommuters Using Unique VPN Rules Example .............................................................27-29