Page 371 / 944 Scroll up to view Page 366 - 370
Chapter 22 Firewall
ZyWALL USG 50 User’s Guide
371
individual limits for specific users, addresses, or both. The individual limit takes
priority if you apply both.
Figure 225
Configuration > Firewall > Session Limit
The following table describes the labels in this screen.
Table 109
Configuration > Firewall > Session Limit
LABEL
DESCRIPTION
General
Settings
Enable Session
limit
Select this check box to control the number of concurrent sessions hosts
can have.
Default Session
per Host
Use this field to set a common limit to the number of concurrent NAT/
firewall sessions each client computer can have.
If only a few clients use peer to peer applications, you can raise this
number to improve their performance. With heavy peer to peer
application use, lower this number to ensure no single client uses too
many of the available NAT sessions.
Create rules below to apply other limits for specific users or addresses.
Rule Summary
This table lists the rules for limiting the number of concurrent sessions
hosts can have.
Add
Click this to create a new entry. Select an entry and click
Add
to create
a new entry after the selected entry.
Edit
Double-click an entry or select it and click
Edit
to open a screen where
you can modify the entry’s settings.
Remove
To remove an entry, select it and click
Remove
. The ZyWALL confirms
you want to remove it before doing so.
Activate
To turn on an entry, select it and click
Activate
.
Inactivate
To turn off an entry, select it and click
Inactivate
.
Move
To change a rule’s position in the numbered list, select the rule and click
Move
to display a field to type a number for where you want to put that
rule and press [ENTER] to move the rule to the number that you typed.
The ordering of your rules is important as they are applied in order of
their numbering.
Status
This icon is lit when the entry is active and dimmed when the entry is
inactive.
Page 372 / 944
Chapter 22 Firewall
ZyWALL USG 50 User’s Guide
372
22.3.1
The Session Limit Add/Edit Screen
Click
Configuration > Firewall > Session Limit
and the
Add
or
Edit
icon to
display the
Firewall Session Limit Edit
screen. Use this screen to configure
rules that define a session limit for specific users or addresses.
Figure 226
Configuration > Firewall > Session Limit > Edit
The following table describes the labels in this screen.
#
This is the index number of a session limit rule. It is not associated with
a specific rule.
User
This is the user name or user group name to which this session limit rule
applies.
Address
This is the address object to which this session limit rule applies.
Limit
This is how many concurrent sessions this user or address is allowed to
have.
Apply
Click
Apply
to save your changes back to the ZyWALL.
Reset
Click
Reset
to return the screen to its last-saved settings.
Table 109
Configuration > Firewall > Session Limit (continued)
LABEL
DESCRIPTION
Table 110
Configuration > Firewall > Session Limit > Edit
LABEL
DESCRIPTION
Create new
Object
Use to configure any new settings objects that you need to use in this
screen.
Enable Rule
Select this check box to turn on this session limit rule.
Description
Enter information to help you identify this rule. Use up to 64 printable
ASCII characters. Spaces are allowed.
Page 373 / 944
Chapter 22 Firewall
ZyWALL USG 50 User’s Guide
373
User
Select a user name or user group to which to apply the rule. The rule is
activated only when the specified user logs into the system and the rule
will be disabled when the user logs out.
Otherwise, select
any
and there is no need for user logging.
Note: If you specified an IP address (or address group) instead of
any
in the field below, the user’s IP address should be within
the IP address range.
Address
Select a source address or address group for whom this rule applies.
Select
any
if the policy is effective for every source address.
Session Limit
per Host
Use this field to set a limit to the number of concurrent NAT/firewall
sessions this rule’s users or addresses can have.
For this rule’s users and addresses, this setting overrides the
Default
Session per Host
setting in the general
Firewall Session Limit
screen.
OK
Click
OK
to save your customized settings and exit this screen.
Cancel
Click
Cancel
to exit this screen without saving.
Table 110
Configuration > Firewall > Session Limit > Edit (continued)
LABEL
DESCRIPTION
Page 374 / 944
Chapter 22 Firewall
ZyWALL USG 50 User’s Guide
374
Page 375 / 944
ZyWALL USG 50 User’s Guide
375
C
HAPTER
23
IPSec VPN
23.1
IPSec VPN Overview
A virtual private network (VPN) provides secure communications between sites
without the expense of leased site-to-site lines. A secure VPN is a combination of
tunneling, encryption, authentication, access control and auditing. It is used to
transport traffic over the Internet or any insecure network that uses TCP/IP for
communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible
solutions for secure data communications across a public network like the
Internet. IPSec is built around a number of standardized cryptographic techniques
to provide confidentiality, data integrity and authentication at the IP layer. The
following figure is an example of an IPSec VPN tunnel.
Figure 227
IPSec VPN Example
The VPN tunnel connects the ZyWALL (
X
) and the remote (peer) IPSec router (
Y
).
These routers then connect the local network (
A
) and remote network (
B
).
23.1.1
What You Can Do in this Chapter
Use the
VPN Connection
screens (see
Section 23.2 on page 378
) to specify
which VPN gateway a VPN connection policy uses and which devices (behind the
IPSec routers) can use the VPN tunnel and the IPSec SA settings (phase 2
settings). You can also activate / deactivate and connect / disconnect each VPN
connection (each IPSec SA).

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top