VPN routing
Accepted Solution
-
If it's your scenario
USG60_A:
LAN1: 192.168.11.0/24
Local Policy 192.168.11.0/24
Remote Policy 192.168.12.0/24USG_B
LAN1 192.168.12.0/24
LAN2 192.168.16.0/24 (server is 192.168.16.2)
Local Policy 192.168.12.0/24
Remote Policy 192.168.11.0/24Please add policy route for routing the traffic to the server
For USG60_A:
Add a policy route
source address: 192.168.11.0/24
destination address: 192.168.16.2
next-hop: VPN tunnelFor USG60_B
Add a policy route
source address: 192.168.16.2
destination address: 192.168.1.11/24
next-hop: VPN tunnel0
All Replies
-
Hello @Ajay,
Could you provide your topology of the network?
Is 192.168.16.2 in the local policy of your VPN tunnel?
You can enable the log option for the policy rules and check if there is any blocked log when the users connect to the server.James
0 -
Good Morning James,
Thanks for the advice, l have not adjusted the policy control, if l have am not sure how l did it. how do l enable the log to capture this
0 -
If it's your scenario
USG60_A:
LAN1: 192.168.11.0/24
Local Policy 192.168.11.0/24
Remote Policy 192.168.12.0/24USG_B
LAN1 192.168.12.0/24
LAN2 192.168.16.0/24 (server is 192.168.16.2)
Local Policy 192.168.12.0/24
Remote Policy 192.168.11.0/24Please add policy route for routing the traffic to the server
For USG60_A:
Add a policy route
source address: 192.168.11.0/24
destination address: 192.168.16.2
next-hop: VPN tunnelFor USG60_B
Add a policy route
source address: 192.168.16.2
destination address: 192.168.1.11/24
next-hop: VPN tunnel0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 148 Nebula Ideas
- 96 Nebula Status and Incidents
- 5.7K Security
- 262 USG FLEX H Series
- 271 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.4K Consumer Product
- 249 Service & License
- 387 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.5K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 73 Security Highlight