Zywall USG 20 VPN from site to site with Orange provider

strappazon
Posts: 4
in Security
Hello,
Actually i have one site which uses an ADSL connection and mount two differents VPN to two other sites.
We're about to migrate the connexion from ADSL to Fiber with the French provider Orange so i'm supposed to use the Fiber connection to connect instead of the ADSL.
I have absolutely no idea how to do it. I guess nothing will change about the VPN but i'm trying to understand what i should change on the Zywall and my provider's device (Livebox Pro 5).
The Livebox should be in front of the zywall. The zywall is also the DHCP server for the LAN.
Does someone knows what i'm supposed to do or can provide a documentation ?
Regards,
David
We're about to migrate the connexion from ADSL to Fiber with the French provider Orange so i'm supposed to use the Fiber connection to connect instead of the ADSL.
I have absolutely no idea how to do it. I guess nothing will change about the VPN but i'm trying to understand what i should change on the Zywall and my provider's device (Livebox Pro 5).
The Livebox should be in front of the zywall. The zywall is also the DHCP server for the LAN.
Does someone knows what i'm supposed to do or can provide a documentation ?
Regards,
David
0
All Replies
-
Did you asked you provider if you're using PPPoE or something else?
0 -
I didn't ask the question but it seems that fiber connexions don't use PPPoE.
0 -
It depends on how it's implemented. And it's... ISP game, you have to deal to what they say.Anyway.Assuming ...
- 192.168.249.0/24 is the subnet of your next Livebox Pro 5, you have to triple check that is not used in any of the networks of the sites, LAN or IPSEC side....
The subnet is already used? Ever before connecting the cable to the WAN port of your USG20-VPN, connect a computer directly to the LiveBox Pro 5, then change the IP and the subnet of your "new" router.- 192.168.249.1 is the IP address of the LiveBox Pro 5
Take a note on what is your public (I hope static) IP address of your new connection.After the change... assuming:- 192.168.235.0/24 is the subnet not used in any network segment of your USG20-VPN and of the endpoints
- 192.168.235.1 is the IP of your Livebox Pro 5
- Optional: wlan of LiveBox Pro 5 is disabled
- a.b.c.d is the public ip address of your connection
- you already have saved settings and rebooted LiveBox Pro 5 as check (nice occasion to take time on how long takes the device from power on to Internet working)
Go like that- connect your computer to USG20-VPN LAN1 side
- login to the device
- create an object "Address" for your new public ip addres (optional but useful)
- change the WAN interface ip address to 192.168.235.2, subnet mask 255.255.255.0 gateway 192.168.235.1
- connect ethernet wire between LiveBox Pro 5 LAN side and USG20-VPN WAN side
- verify that you're connected to Internet, verify that your public IP address is still a.b.c.d
- connect to your Livebox Pro 5
- create 3 PortForwarding rules for ports 500, 1701, 4500 UDP with 192.168.235.2 as destination. No change of port number (public ports equal to private ports)
- I don't know LiveBox Pro 5 as device, so I don't know if there's any kind of setting about firewall and/or DMZ/Public host. You may have to operate also with that.
- Optional: disable UPNP on LiveBox Pro 5 if present. It's a comfortable feature, but IMVHO is... unsafe
- contact one of the endpoint of your VPNs, change the public ip address they are using to connect you to a.b.c.d
- after they changed the ip address, disable the IpSec Gateway, wait 10 seconds, then enable it
- wait for VPN to go live (or do something to make go live)
- if the issue is solved, change the public ip address of the other endpoint
Why the object? It's useful for L2TP connections (cfr the Zyxel documentation)1 -
Hi,Thank a lot for your reply. I appreciate. I'm gonna try to do this and let you know how it is going. as you said, i'm afraid it's going to take a lot of time and will drive me mad ;-)
Regards,
David.0 -
Hello,Sorry for the late reply but i've been very busy at work.
I've tried the VPN Ipsec site-to-site connexion with a Fortigate 90D connected to my provider router and it worked well (we have a Fortigate 101F on the other side / headquarter).
Anyway, when i want to reproduce the same thing with the Zywall USG 20w, it doesn't work.
here's my config with the fortinet:- on both side we created a custom tunnel.
On the Branch side, the router IP is: 192.168.55.1 I've put the WAN interface of the fortigate in the DMZ of the router. IP is 192.168.55.2.
the LAN interface of the Fortigate on has the IP 10.10.1.254 and is also a DHCP relay (DHCP server is on our LAN).Like i said, the tunnel work and everything is ok on the client.
Actually, on the Zywall, the configuration is the following:WAN: 0.0.0.0LAN1: 192.168.10.253Bridge: 192.168.10.254 (lAN1 is a member of the bridge).I've tried to modify the WAN IP with an address who is i nthe router DMZ, i changed the route, and all the adresses of the interfaces (we(re also moving from 192.168.10.0/24 to 10.10.1.0/24), etc...I can't even get an internet access...
i must say i don't know what's wrong.
If you have any idea...Regards.0
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 152 Nebula Ideas
- 102 Nebula Status and Incidents
- 5.8K Security
- 296 USG FLEX H Series
- 281 Security Ideas
- 1.5K Switch
- 77 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 254 Service & License
- 396 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 76 Security Highlight