USG40 - Set up Port Forwarding
RBattaglia
Posts: 4 Freshman Member
Hello All,
I am new to the Zywall universe so I have not set up any port forwarding before on one of their devices. I need to open 1723 to our server for VPN access. I know that the USG40 has its own VPN but I am going to be retiring this server and adding a new one in a week. I just found out that there is one person that needs to access the VPN the old way by porting into the server on 1723.
So how do it do this? It seems very confusing since on an Ubiquiti I just added the port foward in the NAT/Firewall rules. This seems like I need to add services and then use those services. Any help or suggestions would be greatly appreciated,
Regards,
Rob
I am new to the Zywall universe so I have not set up any port forwarding before on one of their devices. I need to open 1723 to our server for VPN access. I know that the USG40 has its own VPN but I am going to be retiring this server and adding a new one in a week. I just found out that there is one person that needs to access the VPN the old way by porting into the server on 1723.
So how do it do this? It seems very confusing since on an Ubiquiti I just added the port foward in the NAT/Firewall rules. This seems like I need to add services and then use those services. Any help or suggestions would be greatly appreciated,
Regards,
Rob
0
Accepted Solution
-
@RBattaglia
Regarding to this case,
on USG40, you need to create the NAT rule, and firewall rule to allow traffic through USG.
On NAT page
Go to Object>Service Group, and group the VPN service
Create rule on security policy, Destination: Internal Server, Service: Test(The group service you created)
Charlie5
All Replies
-
Go Network > NAT > add
Virtual server
Incoming Interface wan1
External IP any or make address rule with Interface IP wan1
Internal IP the VPN server IP
port mapping type Service-Group
External service VPN_PPTP
0 -
You can also switch to easy mode and use the wizard included.0
-
@RBattaglia
Regarding to this case,
on USG40, you need to create the NAT rule, and firewall rule to allow traffic through USG.
On NAT page
Go to Object>Service Group, and group the VPN service
Create rule on security policy, Destination: Internal Server, Service: Test(The group service you created)
Charlie5 -
All set. Thanks for your hlep.0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 149 Nebula Ideas
- 96 Nebula Status and Incidents
- 5.7K Security
- 264 USG FLEX H Series
- 271 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 41 Wireless Ideas
- 6.4K Consumer Product
- 249 Service & License
- 387 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.5K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 73 Security Highlight