User manual

Chapter 6 Configuration Basics
ZyWALL USG 300 User’s Guide
107
Example: See Chapter 7 on page 115.
6.5.17 L2TP VPN
Use L2TP VPN to let remote users use the L2TP and IPSec client software included
with their computers’ operating systems to securely connect to the network
behind the ZyWALL.
Example: See Chapter 8 on page 183.
6.5.18 Application Patrol
Use application patrol to control which individuals can use which services through
the ZyWALL (and when they can do so). You can also specify allowed amounts of
bandwidth and priorities. You must subscribe to use application patrol. You can
subscribe using the Configuration > Licensing > Registration screens or one
of the wizards.
Example: Suppose you want to allow vice president Bob to use BitTorrent and
block everyone else from using it.
1 Create a user account for Bob (User/Group).
2 Click AppPatrol > Peer to Peer to go to the application patrol configuration
screen. Click the BitTorrent application patrol entry’s Edit icon.
Set the default policy’s access to Drop.
Add another policy.
Select the user account that you created for Bob.
You can leave the source, destination and log settings at the default.
WHERE USED
Policy routes, zones
MENU ITEM(S)
Configuration > VPN > L2TP VPN
PREREQUISITES
Interfaces, IPSec VPN connection, certificates (authentication),
authentication methods (extended authentication), addresses (local
network, remote network, NAT, IP pool for assigning to clients, DNS
and WINS server addresses), to-ZyWALL firewall, firewall
WHERE USED
The IPSec VPN connection used for L2TP VPN can be used in policy
routes and zones
MENU ITEM(S)
Configuration > AppPatrol
PREREQUISITES
Registration, zones, Schedules, users, user groups, addresses
(source, destination), address groups (source, destination). These are
only used as criteria in exceptions and conditions.