ZyXEL UAG4100 User Guide - Page 209
Table 89, Label, Description
View all ZyXEL UAG4100 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 209 highlights
Chapter 12 Policy and Static Routes Table 89 Configuration > Network > Routing > Policy Route > Add/Edit (continued) LABEL Configuration Enable Description Criteria User Incoming Please select one member Source Address Destination Address DSCP Code DESCRIPTION Select this to activate the policy. Enter a descriptive name of up to 31 printable ASCII characters for the policy. Select a user name or user group from which the packets are sent. Select where the packets are coming from; any, an interface, a VPN tunnel, or the UAG itself (Device). For an interface or a VPN tunnel, you also need to select the individual interface or VPN tunnel. This field displays only when you set Incoming to Interface or Tunnel. Select an interface or VPN tunnel from which the packets are sent. Select a source IP address object from which the packets are sent. Select a destination IP address object to which the traffic is being sent. Select a DSCP code point value of incoming packets to which this policy route applies or select User Define to specify another DSCP code point. The lower the number the higher the priority with the exception of 0 which is usually given only best-effort treatment. any means all DSCP value or no DSCP marker. default means traffic with a DSCP value of 0. This is usually best effort traffic User-Defined DSCP Code Schedule Service Source Port Next-Hop Type The "af" choices stand for Assured Forwarding. The number following the "af" identifies one of four classes and one of three drop preferences. See Assured Forwarding (AF) PHB for DiffServ on page 212 for more details. Use this field to specify a custom DSCP code point. Select a schedule to control when the policy route is active. none means the route is active at all times if enabled. Select a service or service group to identify the type of traffic to which this policy route applies. Select a service or service group to identify the source port of packets to which the policy route applies. Select Auto to have the UAG use the routing table to find a next-hop and forward the matched packets automatically. Select Gateway to route the matched packets to the next-hop router or switch you specified in the Gateway field. You have to set up the next-hop router or switch as a HOST address object first. Select VPN Tunnel to route the matched packets via the specified VPN tunnel to the remote IPSec router. Select Trunk to route the matched packets through the interfaces in the trunk group based on the load balancing algorithm. Gateway VPN Tunnel Select Interface to route the matched packets through the specified outgoing interface to a gateway (which is connected to the interface). This field displays when you select Gateway in the Type field. Select a HOST address object. The gateway is an immediate neighbor of your UAG that will forward the packet to the destination. The gateway must be a router or switch on the same segment as your UAG's interface(s). This field displays when you select VPN Tunnel in the Type field. Select a VPN tunnel through which the UAG sends the matched packets to the remote network. UAG Series User's Guide 209