The USG automatically loads the USG SecuExtender for Windows client program to your computer
after a successful login to an SSL VPN tunnel with network extension support enabled.
Note: For information on using the USG SecuExtender for Mac client program, please see
its User’s Guide at the download library on the ZyXEL website.
The USG SecuExtender (Windows) lets you:
• Access servers, remote desktops and manage files as if you were on the local network.
• Use applications like e-mail, file transfer, and remote desktop programs directly without using a
browser. For example, you can use Outlook for e-mail instead of the USG’s web-based e-mail.
• Use applications, even proprietary applications, for which the USG does not offer SSL application
objects.
The applications must be installed on your computer. For example, to use the VNC remote desktop
program, you must have the VNC client installed on your computer.
24.1 The USG SecuExtender Icon
The USG SecuExtender icon color indicates the SSL VPN tunnel’s connection status.
Figure 271 USG SecuExtender Icon
• Green: the SSL VPN tunnel is connected. You can connect to the SSL application and network
resources. You can also use another application to access resources behind the USG.
• Gray: the SSL VPN tunnel’s connection is suspended. This means the SSL VPN tunnel is
connected, but the USG SecuExtender will not send any traffic through it until you right-click the
icon and resume the connection.
• Red: the SSL VPN tunnel is not connected. You cannot connect to the SSL application and
network resources.
24.2 Status
Right-click the USG SecuExtender icon in the system tray and select Status to open the Status
screen. Use this screen to view the USG SecuExtender’s connection status and activity statistics.
USG20(W)-VPN Series User’s Guide
391
Chapter 24 USG SecuExtender (Windows)
Figure 272 USG SecuExtender Status
The following table describes the labels in this screen.
Table 149 USG SecuExtender Status
LABELDESCRIPTION
Connection Status
SecuExtender IP
Address
DNS Server 1/2These are the IP addresses of the DNS server and backup DNS server for the SSL VPN
WINS Server 1/2These are the IP addresses of the WINS (Windows Internet Naming Service) and backup
Network 1~8These are the networks (including netmask) that you can access through the SSL VPN
Activity
Connected TimeThis is how long the computer has been connected to the SSL VPN tunnel.
Tra n s mitted This is how many bytes and packets the computer has sent through the SSL VPN
Received This is how many bytes and packets the computer has received through the SSL VPN
This is the IP address the USG assigned to this remote user computer for an SSL VPN
connection.
connection.
DNS (Domain Name System) maps a domain name to its corresponding IP address and
vice versa. The DNS server is extremely important because without it, you must know
the IP address of a computer before you can access it. Your computer uses the DNS
server specified here to resolve domain names for resources you access through the SSL
VPN connection.
WINS servers for the SSL VPN connection. The WINS server keeps a mapping table of
the computer names on your network and the IP addresses that they are currently using.
connection.
connection.
connection.
24.3 View Log
If you have problems with the USG SecuExtender, customer support may request you to provide
information from the log. Right-click the USG SecuExtender icon in the system tray and select Log
to open a notepad file of the USG SecuExtender’s log.
USG20(W)-VPN Series User’s Guide
392
Chapter 24 USG SecuExtender (Windows)
Figure 273 USG SecuExtender Log Example
##################################################################################
##############
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Build Datetime: Feb 24 2009/
10:25:07
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DEBUG] rasphone.pbk: C:\Documents and
Settings\11746\rasphone.pbk
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DEBUG] SecuExtender.log:
C:\Documents and Settings\11746\SecuExtender.log
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Check Parameters
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Connect to 172.23.31.19:443/
10444
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Parameter is OK
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Checking System status...
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Checking service (first) ...
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] SecuExtender Helper is running
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] System is OK
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DEBUG] Connect to 2887196435/443
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] Handshake LoopCounter: 0
[ 2009/03/12 13:35:50 ][SecuExtender Agent][DETAIL] 611 bytes of handshake data
received
24.4 Suspend and Resume the Connection
When the USG SecuExtender icon in the system tray is green, you can right-click the icon and
select Suspend Connection to keep the SSL VPN tunnel connected but not send any traffic
through it until you right-click the icon and resume the connection.
24.5 Stop the Connection
Right-click the icon and select Stop Connection to disconnect the SSL VPN tunnel.
24.6 Uninstalling the USG SecuExtender
Do the following if you need to remove the USG SecuExtender.
Figure 274 Uninstalling the USG SecuExtender Confirmation
3Windows uninstalls the USG SecuExtender.
Figure 275 USG SecuExtender Uninstallation
USG20(W)-VPN Series User’s Guide
394
25.1 Overview
L2TP VPN uses the L2TP and IPSec client software included in remote users’ Android, iOS, Windows
or Mac OS X operating systems for secure connections to the network behind the USG. The remote
users do not need their own IPSec gateways or third-party VPN client software.
Figure 276 L2TP VPN Overview
CHAPTER 25
L2TP VPN
25.1.1 What You Can Do in this Chapter
•Use the L2TP VPN screen (see Section 25.2 on page 396) to configure the USG’s L2TP VPN
settings.
•Use the VPN Setup Wizard screen in Quick Setup (Chapter 4 on page 49) to configure the
USG’s L2TP VPN settings.
25.1.2 What You Need to Know
The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel network traffic
between two peers over another network (like the Internet). In L2TP VPN, an IPSec VPN tunnel is
established first and then an L2TP tunnel is built inside it. See Chapter 21 on page 332 for
information on IPSec VPN.
IPSec Configuration Required for L2TP VPN
You must configure an IPSec VPN connection prior to proper L2TP VPN usage (see Chapter 25 on
page 395 for details). The IPSec VPN connection must:
• Be enabled.
• Use transport mode.
•Use Pre-Shared Key authentication.
• Use a VPN gateway with the Secure Gateway set to 0.0.0.0 if you need to allow L2TP VPN
clients to connect from more than one IP address.
USG20(W)-VPN Series User’s Guide
395
Chapter 25 L2TP VPN
LAN_SUBNET
L2TP_POOL
Using the Quick Setup VPN Setup Wizard
The VPN Setup Wizard is an easy and convenient way to configure the L2TP VPN settings. Click
Configuration > Quick Setup > VPN Setup > VPN Settings for L2TP VPN Settings to get
started.
Policy Route
The Policy Route for return traffic (from LAN to L2TP clients) is automatically created when USG
adds a new L2TP connection, allowing users access the resources on a network without additional
configuration. However, if some of the traffic from the L2TP clients needs to go to the Internet, you
will need to create a policy route to send that traffic from the L2TP tunnels out through a WAN
trunk. This task can be easily performed by clicking the Allow L2TP traffic through WAN checkbox at
Quick Setup > VPN Setup > Allow L2TP traffic through WAN.
Figure 277 Policy Route for L2TP VPN
25.2 L2TP VPN Screen
Click Configuration > VPN > L2TP VPN to open the following screen. Use this screen to configure
the USG’s L2TP VPN settings.
Note: Disconnect any existing L2TP VPN sessions before modifying L2TP VPN settings.
The remote users must make any needed matching configuration changes and reestablish the sessions using the new settings.
Click on the icons to go to the OneSecurity.com website where there is guidance on configuration
walkthroughs, troubleshooting, and other information.
USG20(W)-VPN Series User’s Guide
396
Chapter 25 L2TP VPN
Figure 278 Configuration > VPN > L2TP VPN
The following table describes the fields in this screen.
Table 150 Configuration > VPN > L2TP VPN
LABELDESCRIPTION
Show Advanced
Settings / Hide
Advanced Settings
Create new Object Use to configure any new settings objects that you need to use in this screen.
Enable L2TP Over
IPSec
VPN ConnectionSelect the IPSec VPN connection the USG uses for L2TP VPN. All of the configured VPN
Click this button to display a greater or lesser number of configuration fields.
Use this field to turn the USG’s L2TP VPN function on or off.
connections display here, but the one you use must meet the requirements listed in IPSec
Configur
ation Required for L2TP VPN on page 395.
Note: Modifying this VPN connection (or the VPN gateway that it uses) disconnects any
existing L2TP VPN sessions.
IP Address PoolSelect the pool of IP addresses that the USG uses to assign to the L2TP VPN clients. Use
Authentication
Method
Authentication
Server Certificate
Create new Object if you need to configure a new pool of IP addresses.
This should not conflict with any WAN, LAN, DMZ or WLAN subnet even if they are not in
use.
Select how the USG authenticates a remote user before allowing access to the L2TP VPN
tunnel.
The authentication method has the USG check a user’s user name and password against
the USG’s local database, a remote LDAP, RADIUS, a Active Directory server, or more
than one of these.
Select the certificate to use to identify the USG for L2TP VPN connections. You must have
certificates already configured in the My Certificates screen. The certificate is used with
the EAP, PEAP, and MSCHAPv2 authentication protocols.
Allowed UserThe remote user must log into the USG to use the L2TP VPN tunnel.
Select a user or user group that can use the L2TP VPN tunnel. Use Create new Object if
you need to configure a new user account. Otherwise, select any to allow any user with a
valid account and password on the USG to log in.
Keep Alive TimerThe USG sends a Hello message after waiting this long without receiving any traffic from
First DNS Server,
Second DNS
Server
First WINS Server,
Second WINS
Server
ApplyClick Apply to save your changes in the USG.
ResetClick Reset to return the screen to its last-saved settings.
the remote user. The USG disconnects the VPN tunnel if the remote user does not
respond.
Specify the IP addresses of DNS servers to assign to the remote users. You can specify
these IP addresses two ways.
Custom Defined - enter a static IP address.
From ISP - use the IP address of a DNS server that another interface received from its
DHCP server.
The WINS (Windows Internet Naming Service) server keeps a mapping table of the
computer names on your network and the IP addresses that they are currently using.
Type the IP addresses of up to two WINS servers to assign to the remote users. You can
specify these IP addresses two ways.
25.2.1 Example: L2TP and USG Behind a NAT Router
If the USG (Z) is behind a NAT router (N), then do the following for remote clients (C) to access the
network behind the USG (Z) using L2TP over IPv4.
1Create an address object in Configuration > Object > Address for the WAN IP address of the
NAT router.
2Go to Configuration > VPN > IPSec VPN > VPN Connection and click Add for IPv4
Configuration to create a new VPN connection.
3Select Remote Access (Server Role) as the VPN scenario for the remote client.
USG20(W)-VPN Series User’s Guide
398
Chapter 25 L2TP VPN
4Select the NAT router WAN IP address object as the Local Policy.
5Go to Configuration > VPN > L2TP VPN and select the VPN Connection just configured.
USG20(W)-VPN Series User’s Guide
399
CHAPTER 26
BWM (Bandwidth Management)
26.1 Overview
Bandwidth management provides a convenient way to manage the use of various services on the
network. It manages general protocols (for example, HTTP and FTP) and applies traffic prioritization
to enhance the performance of delay-sensitive applications like voice and video.
26.1.1 What You Can Do in this Chapter
Use the BWM screens (see Section 26.2 on page 404) to control bandwidth for services passing
through the USG, and to identify the conditions that define the bandwidth control.
26.1.2 What You Need to Know
When you allow a service, you can restrict the bandwidth it uses. It controls TCP and UDP traffic.
Use policy routes to manage other types of traffic (like ICMP).
Note: Bandwidth management in policy routes has priority over TCP and UDP traffic
policies.
If you want to use a service, make sure both the security policy allow the service’s packets to go
through the USG.
Note: The USG checks security policies before it checks bandwidth management rules for
traffic going through the USG.
Bandwidth management examines every TCP and UDP connection passing through the USG. Then,
you can specify, by port, whether or not the USG continues to route the connection.
BWM Type
The USG supports three types of bandwidth management: Shared, Per user and Per-Source-IP.
The Shared BWM type is selected by default in a bandwidth management rule. All matched taffic
shares the bandwidth configured in the rule.
If the BWM type is set to Per user in a rule, each user that matches the rule can use up to the
configured bandwidth by his/her own.
Select the Per-Source-IP type when you want to set the maximum bandwidth for traffic from an
individual source IP address.
In the following example, you configure a Per user bandwidth management rule for radius-users to
limit outgoing traffic to 300 kbs. Then all radius-users (A, B and C) can send 300 kbps of traffic.
USG20(W)-VPN Series User’s Guide
400
Chapter 26 BWM (Bandwidth Management)
DiffServ and DSCP Marking
QoS is used to prioritize source-to-destination traffic flows. All packets in the same flow are given
the same priority. CoS (class of service) is a way of managing traffic in a network by grouping
similar types of traffic together and treating each type as a class. You can use CoS to give different
priorities to different packet types.
DiffServ (Differentiated Services) is a class of service (CoS) model that marks packets so that they
receive specific per-hop treatment at DiffServ-compliant network devices along the route based on
the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs)
indicating the level of service desired. This allows the intermediary DiffServ-compliant network
devices to handle the packets differently depending on the code points without the need to
negotiate paths or remember state information for every flow. In addition, applications do not have
to request a particular service or give advanced notice of where the traffic is going.
Connection and Packet Directions
Bandwidth management looks at the connection direction, that is, from which interface the
connection was initiated and to which interface the connection is going.
A connection has outbound and inbound packet flows. The USG controls the bandwidth of traffic of
each flow as it is going out through an interface or VPN tunnel.
• The outbound traffic flows from the connection initiator to the connection responder.
• The inbound traffic flows from the connection responder to the connection initiator.
For example, a LAN1 to WAN connection is initiated from LAN1 and goes to the WAN.
• Outbound traffic goes from a LAN1 device to a WAN device. Bandwidth management is applied
before sending the packets out a WAN interface on the USG.
• Inbound traffic comes back from the WAN device to the LAN1 device. Bandwidth management is
applied before sending the traffic out a LAN1 interface.
USG20(W)-VPN Series User’s Guide
401
Chapter 26 BWM (Bandwidth Management)
Connection
BWM
BWM
Outbound
Inbound
LAN1
Figure 279 LAN1 to WAN Connection and Packet Directions
Outbound and Inbound Bandwidth Limits
You can limit an application’s outbound or inbound bandwidth. This limit keeps the traffic from using
up too much of the out-going interface’s bandwidth. This way you can make sure there is bandwidth
for other applications. When you apply a bandwidth limit to outbound or inbound traffic, each
member of the out-going zone can send up to the limit. Take a LAN1 to WAN policy for example.
• Outbound traffic is limited to 200 kbps. The connection initiator is on the LAN1 so outbound
means the traffic traveling from the LAN1 to the WAN. Each of the WAN zone’s two interfaces can
send the limit of 200 kbps of traffic.
• Inbound traffic is limited to 500 kbs. The connection initiator is on the LAN1 so inbound means
the traffic traveling from the WAN to the LAN1.
• The USG gives bandwidth to higher-priority traffic first, until it reaches its configured bandwidth
rate.
• Then lower-priority traffic gets bandwidth.
• The USG uses a fairness-based (round-robin) scheduler to divide bandwidth among traffic flows
with the same priority.
• The USG automatically treats traffic with bandwidth management disabled as priority 7 (the
lowest priority).
USG20(W)-VPN Series User’s Guide
402
Chapter 26 BWM (Bandwidth Management)
1000 kbps
1000 kbps
BWM
1000 kbps
Maximize Bandwidth Usage
Maximize bandwidth usage allows applications with maximize bandwidth usage enabled to “borrow”
any unused bandwidth on the out-going interface.
After each application gets its configured bandwidth rate, the USG uses the fairness- based
scheduler to divide any unused bandwidth on the out-going interface amongst applications that
need more bandwidth and have maximize bandwidth usage enabled.
Unused bandwidth is divided equally. Higher priority traffic does not get a larger portion of the
unused bandwidth.
Bandwidth Management Behavior
The following sections show how bandwidth management behaves with various settings. For
example, you configure DMZ to WAN policies for FTP servers A and B. Each server tries to send
1000 kbps, but the WAN is set to a maximum outgoing speed of 1000 kbps. You configure policy A
for server A’s traffic and policy B for server B’s traffic.
Figure 281 Bandwidth Management Behavior
Configured Rate Effect
In the following table the configured rates total less than the available bandwidth and maximize
bandwidth usage is disabled, both servers get their configured rate.
Table 151 Configured Rate Effect
POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsNo1300 kbps
B200 kbpsNo1200 kbps
Priority Effect
Here the configured rates total more than the available bandwidth. Because server A has higher
priority, it gets up to it’s configured rate (800 kbps), leaving only 200 kbps for server B.
Table 152 Priority Effect
POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A800 kbpsYes1800 kbps
B1000 kbpsYes2200 kbps
USG20(W)-VPN Series User’s Guide
403
Chapter 26 BWM (Bandwidth Management)
Maximize Bandwidth Usage Effect
With maximize bandwidth usage enabled, after each server gets its configured rate, the rest of the
available bandwidth is divided equally between the two. So server A gets its configured rate of 300
kbps and server B gets its configured rate of 200 kbps. Then the USG divides the remaining
bandwidth (1000 - 500 = 500) equally between the two (500 / 2 = 250 kbps for each). The priority
has no effect on how much of the unused bandwidth each server gets.
So server A gets its configured rate of 300 kbps plus 250 kbps for a total of 550 kbps. Server B
gets its configured rate of 200 kbps plus 250 kbps for a total of 450 kbps.
Table 153 Maximize Bandwidth Usage Effect
POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsYes1550 kbps
B200 kbpsYes2450 kbps
Priority and Over Allotment of Bandwidth Effect
Server A has a configured rate that equals the total amount of available bandwidth and a higher
priority. You should regard extreme over allotment of traffic with different priorities (as shown here)
as a configuration error. Even though the USG still attempts to let all traffic get through and not be
lost, regardless of its priority, server B gets almost no bandwidth with this configuration.
Table 154 Priority and Over Allotment of Bandwidth Effect
POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A1000 kbpsYes1999 kbps
B1000 kbpsYes21 kbps
26.2 The Bandwidth Management Screen
The Bandwidth management screens control the bandwidth allocation for TCP and UDP traffic. You
can use source interface, destination interface, destination port, schedule, user, source, destination
information, DSCP code and service type as criteria to create a sequence of specific conditions,
similar to the sequence of rules used by firewalls, to specify how the USG handles the DSCP value
and allocate bandwidth for the matching packets.
Click Configuration > BWM to open the following screen. This screen allows you to enable/disable
bandwidth management and add, edit, and remove user-defined bandwidth management policies.
The default bandwidth management policy is the one with the priority of “default”. It is the last
policy the USG checks if traffic does not match any other bandwidth management policies you have
configured. You cannot remove, activate, deactivate or move the default bandwidth management
policy.
USG20(W)-VPN Series User’s Guide
404
Chapter 26 BWM (Bandwidth Management)
Figure 282 Configuration > Bandwidth Management
The following table describes the labels in this screen. See Section 26.2.1 on page 406 for
more
information as well.
Table 155 Configuration > Bandwidth Management
LABELDESCRIPTION
Enable BWMSelect this check box to activate management bandwidth.
AddClick this to create a new entry. Select an entry and click Add to create a new entry
EditSelect an entry and click this to be able to modify it.
RemoveSelect an entry and click this to delete it.
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
MoveTo change an entry’s position in the numbered list, select it and click Move to display
StatusThe activate (light bulb) icon is lit when the entry is active and dimmed when the
PriorityThis field displays a sequential value for each bandwidth management policy and it is
DescriptionThis field displays additional information about this policy.
BWM TypeThis field displays the below types of BWM:
UserThis is the type of user account to which the policy applies. If any displays, the policy
ScheduleThis is the schedule that defines when the policy applies. none means the policy
Incoming InterfaceThis is the source interface of the traffic to which this policy applies.
Outgoing InterfaceThis is the destination interface of the traffic to which this policy applies.
SourceThis is the source address or address group for whom this policy applies. If any
DestinationThis is the destination address or address group for whom this policy applies. If any
after the selected entry.
a field to type a number for where you want to put that entry and press [ENTER] to
move the entry to the number that you typed.
entry is inactive. The status icon is not available for the default bandwidth
management policy.
not associated with a specific setting.
This field displays default for the default bandwidth management policy.
• Shared, when the policy is set for all matched traffic
• Per User, when the policy is set for an individual user or a user group
• Per-Source-IP, when the policy is set for a source IP
applies to all user accounts.
always applies.
displays, the policy is effective for every source.
displays, the policy is effective for every destination.
USG20(W)-VPN Series User’s Guide
405
Chapter 26 BWM (Bandwidth Management)
Table 155 Configuration > Bandwidth Management
LABELDESCRIPTION
DSCP CodeThese are the DSCP code point values of incoming and outgoing packets to which this
Service TypeApp and the service name displays if you selected Application Object for the
BWM In/Pri/Out/PriThis field shows the amount of bandwidth the traffic can use.
DSCP MarkingThis is how the USG handles the DSCP value of the incoming and outgoing packets
ApplyClick Apply to save your changes back to the USG.
ResetClick Reset to return the screen to its last-saved settings.
policy applies. The lower the number the higher the priority with the exception of 0
which is usually given only best-effort treatment.
any means all DSCP value or no DSCP marker.
default means traffic with a DSCP value of 0. This is usually best effort traffic
The “af” options stand for Assured Forwarding. The number following the “af”
identifies one of four classes and one of three drop preferences.
service type. An Application Object is a pre-defined service.
Obj and the service name displays if you selected Service Object for the service
type. A Service Object is a customized pre-defined service or another service.
Mouse over the service object name to view the corresponding IP protocol number.
In - This is how much inbound bandwidth, in kilobits per second, this policy allows
the matching traffic to use. Inbound refers to the traffic the USG sends to a
connection’s initiator. If no displays here, this policy does not apply bandwidth
management for the inbound traffic.
Out - This is how much outgoing bandwidth, in kilobits per second, this policy allows
the matching traffic to use. Outbound refers to the traffic the USG sends out from a
connection’s initiator. If no displays here, this policy does not apply bandwidth
management for the outbound traffic.
Pri - This is the priority for the incoming (the first Pri value) or outgoing (the second
Pri value) traffic that matches this policy. The smaller the number, the higher the
priority. Traffic with a higher priority is given bandwidth before traffic with a lower
priority. The USG ignores this number if the incoming and outgoing limits are both
set to 0. In this case the traffic is automatically treated as being set to the lowest
priority (7) regardless of this field’s configuration.
that match this policy.
In - Inbound, the traffic the USG sends to a connection’s initiator.
Out - Outbound, the traffic the USG sends out from a connection’s initiator.
If this field displays a DSCP value, the USG applies that DSCP value to the route’s
outgoing packets.
preserve means the USG does not modify the DSCP value of the route’s outgoing
packets.
default means the USG sets the DSCP value of the route’s outgoing packets to 0.
The “af” choices stand for Assured Forwarding. The number following the “af”
identifies one of four classes and one of three drop preferences.
26.2.1 The Bandwidth Management Add/Edit Screen
The Configuration > Bandwidth Management Add/Edit screen allows you to create a new
condition or edit an existing one.
USG20(W)-VPN Series User’s Guide
406
Chapter 26 BWM (Bandwidth Management)
802.1P Marking
Use 802.1P to prioritize outgoing traffic from a VLAN interface. The Priority Code is a 3-bit field
within a 802.1Q VLAN tag that’s used to prioritize associated outgoing VLAN traffic. "0" is the lowest
priority level and "7" is the highest.
Table 156 Single Tagged 802.1Q Frame Format
DASATPID PriorityVID Len/EtypeDataFCSIEEE 802.1Q
Table 157 802.1Q Frame
DADestination AddressPriority802.1p Priority
SASource AddressLen/EtypeLength and type of Ethernet frame
TPIDTag Protocol IDentifierDataFrame data
VIDVLAN IDFCSFrame Check Sequence
The following table is a guide to types of traffic for the priority code.
Table 158 Priority Code and Types of Traffic
PRIORITYTRAFFIC TYPES
0 (lowest)Background
1Best Effort
2Excellent Effort
3Critical Applications
4Video, less than 100 ms latency and jitter
5Voice, less than 10 ms latency and jitter
6Internetwork Control
7 (highest)Network Control
customer
tagged frame
To access this screen, go to the Configuration > Bandwidth Management screen (see Section
26.2 on
page 404), and click either the Add icon or an Edit icon.
Create new ObjectUse to configure any new settings objects that you need to use in this screen.
Configuration
EnableSelect this check box to turn on this policy.
DescriptionEnter a description of this policy. It is not used elsewhere. You can use alphanumeric
CriteriaUse this section to configure the conditions of traffic to which this policy applies.
and ()+/:=?!*#@$_%- characters, and it can be up to 60 characters long.
BWM TypeThis field displays the below types of BWM rule:
• Shared, when the policy is set for all users
• Per User, when the policy is set for an individual user or a user group
• Per Source IP, when the policy is set for a source IP
UserSelect a user name or user group to which to apply the policy. Use Create new
ScheduleSelect a schedule that defines when the policy applies or select Create Object to
Incoming InterfaceSelect the source interface of the traffic to which this policy applies.
Outgoing InterfaceSelect the destination interface of the traffic to which this policy applies.
SourceSelect a source address or address group for whom this policy applies. Use Create
DestinationSelect a destination address or address group for whom this policy applies. Use
DSCP CodeSelect a DSCP code point value of incoming packets to which this policy
User-Defined
DSCP Code
Service TypeSelect Service Object if you want a specific service (defined in a service object) to
Service ObjectThis field is available if you selected Service Object as the service type.
DSCP MarkingSet how the USG handles the DSCP value of the incoming and outgoing packets that
Bandwidth ShapingConfigure these fields to set the amount of bandwidth the matching traffic can use.
Object if you need to configure a new user account. Select any to apply the policy for
every user.
configure a new one. Otherwise, select none to make the policy always effective.
new Object if you need to configure a new one. Select any if the policy is effective for
every source.
Create new Object if you need to configure a new one. Select any if the policy is
effective for every destination.
route applies or select User Defined to specify another DSCP code point. The lower
the number the higher the priority with the exception of 0 which is usually given only
best-effort treatment.
any means all DSCP value or no DSCP marker.
default means traffic with a DSCP value of 0. This is usually best effort traffic
The “af” choices stand for Assured Forwarding. The number following the “af”
identifies one of four classes and one of three drop preferences.
Use this field to specify a custom DSCP code point.
which the policy applies.
Select a service or service group to identify the type of traffic to which this policy
applies. any means all services.
match this policy. Inbound refers to the traffic the USG sends to a connection’s
initiator. Outbound refers to the traffic the USG sends out from a connection’s initiator.
Select one of the pre-defined DSCP values to apply or select User Defined to specify
another DSCP value. The “af” choices stand for Assured Forwarding. The number
following the “af” identifies one of four classes and one of three drop preferences.
Select preserve to have the USG keep the packets’ original DSCP value.
Select default to have the USG set the DSCP value of the packets to 0.
Inbound kbpsType how much inbound bandwidth, in kilobits per second, this policy allows the traffic
Outbound kbpsType how much outbound bandwidth, in kilobits per second, this policy allows the
PriorityThis field displays when the inbound or outbound bandwidth management is not set to
Maximize
Bandwidth Usage
MaximumIf you did not enable Maximize Bandwidth Usage, then type the maximium unused
802.1P MarkingUse 802.1P to prioritize outgoing traffic from a VLAN interface.
Priority CodeThis is a 3-bit field within a 802.1Q VLAN tag that’s used to prioritize associated
InterfaceChoose a VLAN interface to which to apply the priority level for matching frames.
Related Setting
LogSelect whether to have the USG generate a log (log), log and alert (log alert) or
OKClick OK to save your changes back to the USG.
CancelClick Cancel to exit this screen without saving your changes.
to use. Inbound refers to the traffic the USG sends to a connection’s initiator.
If you enter 0 here, this policy does not apply bandwidth management for the
matching traffic that the USG sends to the initiator. Traffic with bandwidth
management disabled (inbound and outbound are both set to 0) is automatically
treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is higher than the
actual transmission speed, lower priority traffic may not be sent if higher priority
traffic uses all of the actual bandwidth.
traffic to use. Outbound refers to the traffic the USG sends out from a connection’s
initiator.
If you enter 0 here, this policy does not apply bandwidth management for the
matching traffic that the USG sends out from the initiator. Traffic with bandwidth
management disabled (inbound and outbound are both set to 0) is automatically
treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is higher than the
actual transmission speed, lower priority traffic may not be sent if higher priority
traffic uses all of the actual bandwidth.
0. Enter a number between 1 and 7 to set the priority for traffic that matches this
policy. The smaller the number, the higher the priority.
Traffic with a higher priority is given bandwidth before traffic with a lower priority.
The USG uses a fairness-based (round-robin) scheduler to divide bandwidth between
traffic flows with the same priority.
The number in this field is ignored if the incoming and outgoing limits are both set to
0. In this case the traffic is automatically treated as being set to the lowest priority (7)
regardless of this field’s configuration.
This field displays when the inbound or outbound bandwidth management is not set to
0 and the BWM Type is set to Shared. Enable maximize bandwidth usage to let the
traffic matching this policy “borrow” all unused bandwidth on the out-going interface.
After each application or type of traffic gets its configured bandwidth rate, the USG
uses the fairness-based scheduler to divide any unused bandwidth on the out-going
interface among applications and traffic types that need more bandwidth and have
maximize bandwidth usage enabled.
bandwidth that traffic matching this policy is allowed to “borrow” on the out-going
interface (in Kbps), here.
outgoing VLAN traffic. "0" is the lowest priority level and "7" is the highest. See Tab le
58 on page 407. The setting configured here overwrites existing priority settings.
1
neither (no) when any traffic matches this policy.
USG20(W)-VPN Series User’s Guide
410
Chapter 26 BWM (Bandwidth Management)
26.2.1.1 Adding Objects for the BWM Policy
Objects are parameters to which the Policy rules are built upon. There are three kinds of objects
you can add/edit for the BWM policy, they are User, Schedule and Address objects. Click Configuration > BWM > Add > Create New Object > Add User to see the following screen.
Figure 285 Configuration >BWM > Create New Object > Add User
The following table describes the fields in the above screen.
Table 160 Configuration > BWM > Create New Object > Add User
LABELDESCRIPTION
User NameType a user or user group object name of the rule.
User TypeSelect a user type from the drop down menu. The user types are Admin, Limited
admin, User, Guest, Ext-user, Ext-group-user.
USG20(W)-VPN Series User’s Guide
411
Chapter 26 BWM (Bandwidth Management)
Table 160 Configuration > BWM > Create New Object > Add User
LABELDESCRIPTION
PasswordType a password for the user object. The password can consist of alphanumeric
RetypeRetype the password to confirm.
DescriptionEnter a description for this user object. It is not used elsewhere. You can use
Authentication Timeout
Settings
Lease TimeThis shows the Lease Time setting for the user, by default it is 1,440 minutes.
Reauthentication TimeThis shows the Reauthentication Time for the user, by default it is 1,440
OKClick OK to save the setting.
CancelClick Cancel to abandon this screen.
characters, the underscore, and some punctuation marks (+-/*= :; .! @$&%#~
‘ \ () ), and it can be up to eight characters long.
alphanumeric and ()+/:=?!*#@$_%- characters, and it can be up to 60
characters long.
Choose either Use Default setting option, which shows the default Lease Time
of 1,440 minutes and Reauthentication Time of 1,440 minutes or you can enter
them manually by choosing Use Manual Settings option.
NameEnter a name for the schedule object of the rule.
TypeSelect an option from the drop down menu for the schedule object. It will show
Start DateClick the icon menu on the right to choose a Start Date for the schedule object.
Start TimeClick the icon menu on the right to choose a Start Time for the schedule object.
Stop DateClick the icon menu on the right to choose a Stop Date for schedule object.
Stop TimeClick the icon menu on the right to choose a Stop Time for the schedule object.
NameEnter a name for the Address object of the rule.
Address TypeSelect an Address Type from the drop down menu on the right. The Address
IP AddressEnter an IP address for the Address object.
OKClick OK to save the setting.
CancelClick Cancel to abandon the setting.
Types are Host, Range, Subnet, Interface IP, Interface Subnet, and Interface
Gateway.
USG20(W)-VPN Series User’s Guide
414
CHAPTER 27
27.1 Overview
Use the content filtering feature to control access to specific web sites or web content.
27.1.1 What You Can Do in this Chapter
•Use the Filter Profile screens (Section Figure 289 on page 420) to set up content filtering
profiles.
•Use the Trusted Web Sites screens (Section 27.4 on page 430) to create a common list of good
(allowed) web site addresses.
•Use the Forbidden Web Sites screens (Section 27.5 on page 431) to create a common list of
bad (blocked) web site addresses.
Content Filtering
27.1.2 What You Need to Know
Content Filtering
Content filtering allows you to block certain web features, such as cookies, and/or block access to
specific web sites. It can also block access to specific categories of web site content. You can create
different content filter policies for different addresses, schedules, users or groups and content filter
profiles. For example, you can configure one policy that blocks John Doe’s access to arts and
entertainment web pages during the workday and another policy that lets him access them after
work.
Content Filtering Policies
A content filtering policy allows you to do the following.
• Use schedule objects to define when to apply a content filter profile.
• Use address and/or user/group objects to define to whose web access to apply the content filter
profile.
• Apply a content filter profile that you have custom-tailored.
Content Filtering Profiles
A content filtering profile conveniently stores your custom settings for the following features.
• Category-based Blocking
The USG can block access to particular categories of web site content, such as pornography or
racial intolerance.
USG20(W)-VPN Series User’s Guide
415
Chapter 27 Content Filtering
• Restrict Web Features
The USG can disable web proxies and block web features such as ActiveX controls, Java applets
and cookies.
• Customize Web Site Access
You can specify URLs to which the USG blocks access. You can alternatively block access to all
URLs except ones that you specify. You can also have the USG block access to URLs that contain
particular keywords.
Content Filtering Configuration Guidelines
When the USG receives an HTTP request, the content filter searches for a policy that matches the
source address and time (schedule). The content filter checks the policies in order (based on the
policy numbers). When a matching policy is found, the content filter allows or blocks the request
depending on the settings of the filtering profile specified by the policy. Some requests may not
match any policy. The USG allows the request if the default policy is not set to block. The USG
blocks the request if the default policy is set to block.
External Web Filtering Service
When you register for and enable the external web filtering service, your USG accesses an external
database that has millions of web sites categorized based on content. You can have the USG block,
block and/or log access to web sites based on these categories.
Keyword Blocking URL Checking
The USG checks the URL’s domain name (or IP address) and file path separately when performing
keyword blocking.
The URL’s domain name or IP address is the characters that come before the first slash in the URL.
For example, with the URL www.zyxel.com.tw/news/pressroom.php
www.zyxel.com.tw
The file path is the characters that come after the first slash in the URL. For example, with the URL
www.zyxel.com.tw/news/pressroom.php
Since the USG checks the URL’s domain name (or IP address) and file path separately, it will not
find items that go across the two. For example, with the URL www.zyxel.com.tw/news/
pressroom.php, the USG would find “tw” in the domain name (www.zyxel.com.tw). It would also
find “news” in the file path (news/pressroom.php
.
Finding Out More
•See Section 27.6 on page 432 for content filtering background/technical information.
27.1.3 Before You Begin
• You must configure an address object, a schedule object and a filtering profile before you can set
up a content security policy.
• You must have Content Filtering license in order to use the function.subscribe to use the external
database content filtering (see the Licensing > Registration screens).
, the domain name is
, the file path is news/pressroom.php.
) but it would not find “tw/news”.
USG20(W)-VPN Series User’s Guide
416
Chapter 27 Content Filtering
27.2 Content Filter Profile Screen
Click Configuration > UTM Profile> Content Filter > Profile to open the Content Filter
Profile screen. Use this screen to enable content filtering, view and order your list of content filter
policies, create a denial of access message or specify a redirect URL and check your external web
filtering service registration status.
Click on the icons to go to the OneSecurity.com website where there is guidance on configuration
walkthroughs, troubleshooting and other information.
Denied Access MessageEnter a message to be displayed when content filter blocks access to a web page.
Redirect URLEnter the URL of the web page to which you want to send users when their web
Profile Management
AddClick Add to create a new content filter rule.
EditClick Edit to make changes to a content filter rule.
RemoveClick Remove the delete a content filter rule.
Object ReferenceSelect an entry and click Object References to open a screen that shows which
#This column lists the index numbers of the content filter profile.
NameThis column lists the names of the content filter profile rule.
DescriptionThis column lists the description of the content filter profile rule.
ReferenceThis displays the number of times an Object Reference is used in a rule.
License StatusThis read-only field displays the status of your content-filtering database service
License TypeThis read-only field displays what kind of service registration you have for the
Expiration DateThis field displays the date your service license expires.
Register NowThis link appears if you have not registered for the service or the service has
ApplyClick Apply tosave your changes back to the USG.
ResetClick Reset to return the screen to its last-saved settings.
Use up to 127 characters (0-9a-zA-Z;/?:@&=+$\.-_!~*'()%,”). For example,
“Access to this web page is not allowed. Please contact the network
administrator”.
It is also possible to leave this field blank if you have a URL specified in the
Redirect URL field. In this case if the content filter blocks access to a web page,
the USG just opens the web page you specified without showing a denied access
message.
access is blocked by content filter. The web page you specify here opens in a new
frame below the denied access message.
Use “http://” or “https://” followed by up to 262 characters (0-9a-zA-Z;/
?:@&=+$\.-_!~*'()%). For example, http://192.168.1.17/blocked access.
settings use the entry. Click Refresh to update information on this screen.
registration.
Not Licensed displays if you have not successfully registered and activated the
service.
Expired displays if your subscription to the service has expired.
Licensed displays if you have successfully registered the USG and activated the
service.
You can view content filter reports after you register the USG and activate the
subscription service in the Registration screen.
content-filtering database.
None displays if you have not successfully registered and activated the service.
Standard displays if you have successfully registered the USG and activated the
service.
Trial displays if you have successfully registered the USG and activated the trial
service subscription.
expired. Click this link to go to the screen where you can register for the service.
USG20(W)-VPN Series User’s Guide
418
Chapter 27 Content Filtering
27.3 Content Filter Profile Add or Edit Screen
Click Configuration > UTM > Content Filter > Profile > Add or Edit to open the Add Filter
Profile screen. Configure Category Service and Custom Service tabs.
USG20(W)-VPN Series User’s Guide
419
Chapter 27 Content Filtering
27.3.1 Content Filter Add Profile Category Service