[ATP/FLEX] How to establish Site-to-Site IPsec VPN between Nebula and non-Nebula devices






The following is an example of setup site-to-site VPN between Nebula device(USG FLEX 100) and non-Nebula device(USG40).

Non-Nebula device USG40(on-premises) has a public IP, but Nebula device USG FLEX 100 is behind NAT.
Configure Steps
Nebula Device Configuration (USG FLEX 100)
Navigate to Configure > Firewall > Site-to-Site VPN > Non-Nebula VPN peers, click +Add and configure the VPN profile.
Input USG40 Public IP, Remote Private subnet, and Pre-Shared Secret
Click IPsec Policy Default, configure Phase1 and Phase 2 parameters

Non-Nebula Device Configuration (USG40)
Navigate to Configuration > VPN > IPsec VPN > VPN Gateway, click +Add to create a Gateway profile “NebulaFLEX100”
- Select IKEv1 as IKE version
- Select WAN1_ppp as My gateway address
- Input Pre-Shared Secret. It must be the same as Nebula device configuration

Scroll down to configure Phase1 parameters
Encryption: AES128, Authentication: SHA1, Key Group: DH2
Navigate to Configuration > VPN > IPsec VPN > VPN Connection, click +Add to create a Connection profile
- Select Remote Access(Server Role)
- Select the VPN Gateway profile “NebulaFLEX100”
- Select LAN1 subnet as Local Policy

Scroll down to configure Phase 2 parameters
Proposal 1: AES128, SHA1
Proposal 2: AES192, SHA256
PFS: DH2
Test Result
On Nebula Control Center, go to Monitor > Firewall > VPN connections to check VPN connection status

On Non-Nebula device(on-premises), go to Monitor > VPN Monitor > IPsec to check VPN connection status

Ping from USG FLEX 100 LAN1 device to USG40 LAN1 device

Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 154 Nebula Ideas
- 103 Nebula Status and Incidents
- 5.9K Security
- 307 USG FLEX H Series
- 284 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 256 Service & License
- 397 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.7K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 77 Security Highlight