ZyXEL Communications ZyWALL 1000 User Manual

Page of 780
 Chapter 5 Configuration Basics
ZyWALL USG 1000 User’s Guide
117
Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most one zone. 
Virtual interfaces are automatically assigned to the same zone as the interface on which they 
run. 
When you create a zone, the ZyWALL does not create any firewall rules, assign an IDP 
profile, or configure remote management for the new zone. 
Example: For example, to create the DMZ-2 zone and add ge5 as in the network topology 
example, click Network > Zone and then the Add icon. 
5.4.8  Device HA
Use device HA to create redundant backup gateways. The ZyWALL runs VRRP v2. You can 
only set up device HA with other ZyWALLs of the same model running the same firmware 
version. 
Example: See 
.
5.4.9  DDNS
Dynamic DNS maps a domain name to a dynamic IP address. The ZyWALL helps maintain 
this mapping. 
5.4.10  Policy Routes
Use policy routes to control the routing of packets through the ZyWALL’s interfaces, trunks, 
and VPN connections. You also use policy routes for bandwidth management (out of the 
ZyWALL), port triggering, and general NAT on the source address. You have to set up the 
criteria, next-hops, and NAT settings in other screens first.
Example: You have an FTP server connected to ge 4 (in the DMZ zone). You want to limit 
the amount of FTP traffic that goes out from the FTP server through your WAN connection. 
Create an address object for the FTP server (Object > Address). 
MENU ITEM(S)
Network > Zone
PREREQUISITES
Interfaces, IPSec VPN, SSL VPN
WHERE USED
Firewall, IDP, remote management, anti-virus, ADP, application patrol
MENU ITEM(S)
Device HA
PREREQUISITES
Interfaces (with a static IP address), to-ZyWALL firewall
MENU ITEM(S)
Network > DDNS
PREREQUISITES
Interfaces
MENU ITEM(S)
Network > Routing > Policy Route
PREREQUISITES
Criteria: users, user groups, interfaces (incoming), IPSec VPN (incoming), 
addresses (source, destination), address groups (source, destination), 
schedules, services, service groups
Next-hop: addresses (HOST gateway), IPSec VPN, SSL VPN, trunks, interfaces
NAT: addresses (translated address), services and service groups (port 
triggering)