How do I allow SecuExtender clients to access servers in the remote site/company through VPN tunnel?
Topology
(lan: 192.168.1.0/24)USG60------IPSec VPN------USG210(lan: 192.168.11.0/24)----PC(192.168.11.33)
SSL VPN client is connected to USG60. SSL VPN pool is 192.168.99.0/24.
Site to site VPN tunnel is established between USG60 and USG210.
On USG60
Create a policy route.
Source: SSL VPN pool. In this example, SSL VPN pool is 192.168.99.0/24.
Destination: Remote Subnet. In this example, Remote Subnet is 192.168.11.0/24.
Next-Hop: site to site VPN tunnel.
Add 192.168.11.0/24 into Network List.
On USG210
Create a policy route.
Source: LAN subnet. In this example, SSL VPN pool is 192.168.11.0/24.
Destination: USG60's SSL VPN pool. In this example, USG60's SSL VPN pool is 192.168.99.0/24.
Next-Hop: site to site VPN tunnel.
Test result
SSL VPN client is connected to USG60 and gets IP 192.168.99.1.
Ping USG60's LAN successfully.
Ping 8.8.8.8 successfully.
Ping USG210's LAN PC 192.168.11.33 successfully.
Best regards,
Emily
Don't miss this great chance to upgrade your Nebula org. For free!
Categories
- All Categories
- 414 Beta Program
- 2.2K Nebula
- 131 Nebula Ideas
- 91 Nebula Status and Incidents
- 5.4K Security
- 179 USG FLEX H Series
- 258 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 36 Wireless Ideas
- 6.2K Consumer Product
- 236 Service & License
- 372 News and Release
- 79 Security Advisories
- 24 Education Center
- 5 [Campaign] Zyxel Network Detective
- 2.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 80 About Community
- 69 Security Highlight