Chapter 11 Routing Protocols
ZyWALL USG 50-H User’s Guide
244
Figure 182
Network > Routing > OSPF > Edit
The following table describes the labels in this screen.
Table 90
Network > Routing > OSPF > Edit
LABEL
DESCRIPTION
Area ID
Type the unique, 32-bit identifier for the area in IP address format.
Type
Select the type of area.
Normal
- This area is a normal area. It has routing information about the OSPF AS
and about networks outside the OSPF AS.
Stub
- This area is an stub area. It has routing information about the OSPF AS but
not about networks outside the OSPF AS. It depends on a default route to send
information outside the OSPF AS.
NSSA
- This area is a Not So Stubby Area (NSSA), per RFC 1587. It has routing
information about the OSPF AS and networks that are outside the OSPF AS and
are directly connected to the NSSA. It does not have information about other
networks outside the OSPF AS.
Authentication
Select the default authentication method used in the area. This authentication
protects the integrity, but not the confidentiality, of routing updates.
None
uses no authentication.
Text
uses a plain text password that is sent over the network (not very secure).
MD5
uses an MD5 password and authentication ID (most secure).
Text
Authentication
Key
This field is available if the
Authentication
is
Text
. Type the password for text
authentication. The key can consist of alphanumeric characters and the
underscore, and it can be up to 8 characters long.
MD5
Authentication ID
This field is available if the
Authentication
is
MD5
. Type the default ID for MD5
authentication in the area. The ID can be between 1 and 255.
MD5
Authentication
Key
This field is available if the
Authentication
is
MD5
. Type the default password for
MD5 authentication in the area. The password can consist of alphanumeric
characters and the underscore, and it can be up to 16 characters long.
Virtual Link
This section is displayed if the
Type
is
Normal
. Create a virtual link if you want to
connect a different area (that does not have a direct connection to the backbone)
to the backbone. You should set up the virtual link on the ABR that is connected to
the other area and on the ABR that is connected to the backbone.
#
This field is a sequential value, and it is not associated with a specific area.
Peer Router ID
Type the 32-bit ID (in IP address format) of the other ABR in the virtual link.
Summary of Contents for ZyWall USG 50-H Series
Page 2: ......
Page 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Page 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Page 30: ...30...
Page 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Page 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Page 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Page 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Page 146: ...146...
Page 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Page 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Page 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Page 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Page 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Page 287: ...287 PART III Firewall Firewall 289...
Page 288: ...288...
Page 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Page 306: ...306...
Page 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Page 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Page 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Page 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Page 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Page 396: ...396...
Page 421: ...421 PART VI Anti X ADP 423...
Page 422: ...422...
Page 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Page 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Page 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Page 442: ...442...
Page 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Page 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Page 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Page 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Page 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Page 511: ...511 PART VIII System System 513...
Page 512: ...512...
Page 552: ...552...
Page 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Page 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Page 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Page 598: ...598...
Page 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Page 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Page 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...