
Chapter 14 IPSec VPN
ZyWALL 2WG User’s Guide
326
14.8 Network Policy Port Forwarding
Click
SECURITY > VPN
and the add network policy (
) icon in the
VPN Rules (IKE)
screen to display the
VPN-Network Policy -Edit
screen. Then, under
Virtual Address
Mapping Rule
, select
Many-to-One
as the
Type
and click the
Port Forwarding Rules
button to open the following screen. Use this screen to configure port forwarding for your
VPN tunnels to let the ZyWALL forward traffic coming in through the VPN tunnel to the
appropriate IP address on the LAN.
SA Life Time
(Seconds)
Define the length of time before an IPSec SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward
Secret (PFS)
Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if
you do, which Diffie-Hellman key group to use for encryption. Choices are:
NONE
- disable PFS
DH1
- enable PFS and use a 768-bit random number
DH2
- enable PFS and use a 1024-bit random number
PFS changes the root key that is used to generate encryption keys for each
IPSec SA. It is more secure but takes more time.
Enable Replay
Detection
As a VPN setup is processing intensive, the system is vulnerable to Denial of
Service (DOS) attacks. The IPSec receiver can detect and reject old or
duplicate packets to protect against replay attacks. Enable replay detection by
selecting this check box.
Enable Multiple
Proposals
Select this to allow the ZyWALL to use any of its phase 2 encryption and
authentication algorithms when negotiating an IPSec SA.
When you enable multiple proposals, the ZyWALL allows the remote IPSec
router to select which phase 2 encryption and authentication algorithms to use
for the IPSec SA, even if they are less secure than the ones you configure for
the VPN rule.
Clear this to have the ZyWALL use only the configured phase 2 encryption and
authentication algorithms when negotiating an IPSec SA.
Apply
Click
Apply
to save the changes.
Cancel Click
Cancel
to discard all changes and return to the main VPN screen.
Table 88
SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy (continued)
LABEL
DESCRIPTION
Summary of Contents for ZYWALL 2 WG
Page 2: ......
Page 8: ...Safety Warnings ZyWALL 2WG User s Guide 8 ...
Page 42: ...List of Figures ZyWALL 2WG User s Guide 42 ...
Page 50: ...List of Tables ZyWALL 2WG User s Guide 50 ...
Page 52: ...52 ...
Page 80: ...Chapter 2 Introducing the Web Configurator ZyWALL 2WG User s Guide 80 ...
Page 100: ...Chapter 3 Wizard Setup ZyWALL 2WG User s Guide 100 ...
Page 140: ...Chapter 4 Tutorial ZyWALL 2WG User s Guide 140 ...
Page 146: ...146 ...
Page 158: ...Chapter 6 LAN Screens ZyWALL 2WG User s Guide 158 ...
Page 171: ...Chapter 8 WAN Screens ZyWALL 2WG User s Guide 171 Figure 108 NETWORK WAN General ...
Page 200: ...Chapter 8 WAN Screens ZyWALL 2WG User s Guide 200 ...
Page 238: ...238 ...
Page 300: ...Chapter 13 Content Filtering Reports ZyWALL 2WG User s Guide 300 ...
Page 348: ...Chapter 14 IPSec VPN ZyWALL 2WG User s Guide 348 ...
Page 378: ...Chapter 15 Certificates ZyWALL 2WG User s Guide 378 ...
Page 384: ...384 ...
Page 426: ...Chapter 20 Bandwidth Management ZyWALL 2WG User s Guide 426 ...
Page 479: ...479 PART V Logs and Maintenance Logs Screens 481 Maintenance 511 ...
Page 480: ...480 ...
Page 485: ...Chapter 26 Logs Screens ZyWALL 2WG User s Guide 485 Figure 304 LOGS Log Settings ...
Page 510: ...Chapter 26 Logs Screens ZyWALL 2WG User s Guide 510 ...
Page 530: ...530 ...
Page 558: ...Chapter 30 WAN and Dial Backup Setup ZyWALL 2WG User s Guide 558 ...
Page 564: ...Chapter 31 LAN Setup ZyWALL 2WG User s Guide 564 ...
Page 570: ...Chapter 32 Internet Access ZyWALL 2WG User s Guide 570 ...
Page 574: ...Chapter 33 DMZ Setup ZyWALL 2WG User s Guide 574 ...
Page 578: ...Chapter 34 Route Setup ZyWALL 2WG User s Guide 578 ...
Page 582: ...Chapter 35 Wireless Setup ZyWALL 2WG User s Guide 582 ...
Page 594: ...Chapter 37 IP Static Route Setup ZyWALL 2WG User s Guide 594 ...
Page 614: ...Chapter 38 Network Address Translation NAT ZyWALL 2WG User s Guide 614 ...
Page 632: ...Chapter 40 Filter Configuration ZyWALL 2WG User s Guide 632 ...
Page 668: ...Chapter 44 System Maintenance Menus 8 to 10 ZyWALL 2WG User s Guide 668 ...
Page 672: ...Chapter 45 Remote Management ZyWALL 2WG User s Guide 672 ...
Page 680: ...Chapter 46 IP Policy Routing ZyWALL 2WG User s Guide 680 ...
Page 686: ...686 ...
Page 692: ...Chapter 48 Troubleshooting ZyWALL 2WG User s Guide 692 ...
Page 702: ...Chapter 49 Product Specifications ZyWALL 2WG User s Guide 702 ...
Page 704: ...704 ...
Page 712: ...Appendix A Pop up Windows JavaScripts and Java Permissions ZyWALL 2WG User s Guide 712 ...
Page 740: ...Appendix D Common Services ZyWALL 2WG User s Guide 740 ...
Page 768: ...Appendix G Legal Information ZyWALL 2WG User s Guide 768 ...
Page 774: ...Appendix H Customer Support ZyWALL 2WG User s Guide 774 ...