Rooting of USG60W

G_L
G_L Posts: 3
edited April 14 in Security

Guys trying to paste a rooting I had in one of my CISCO routers and i find it EXTREMELEY difficult to do this in Zyxel. I am not at all expert so your step-by-step help will greatly appreciated.


Please also note that the CISCO router was the router to the outside world(intenet -e.g external IP 164.212.25.225) and my internal network. Now I have put between CISCO (192.168.2.1) and my internal network the ZYXEL USG60W (192.168.1.1).

I have on purpose provided 3 IPS (public ip, router Ip and Zyxel ip) to be inlcluded in your step by step answer.


Appreciated very much


Answers

  • PeterUK
    PeterUK Posts: 1,116  Guru Member

    Put the USG60W in expert mode

    Network > NAT

    add

    classification = virtual server

    Incoming interface = wan1

    Original IP = wan1

    (create new object > address

    Name =wan1

    address type = INTERFACE IP

    interface = wan1)

    mapped IP = User Defined

    User-Defined mapped IP = 192.168.2.200

    port mapping type = ports

    original start port =5390

    original end port =5399

    mapped start port =5390

    mapped end port = 5399

    do the same to the rest in your list

  • GLou
    GLou Posts: 10

    Thanks.

    You havent define port type, tcp/udp most propably will be any but i am confused with port numbers.


    I need to use the 50000 -50011 as these come from my Divar and also use the 443 porr external whichb is secure.

    Why do you also use a range i.e 5390-5399


    Do I also need to go to ,security, to setup something?

  • PeterUK
    PeterUK Posts: 1,116  Guru Member

    I'm not sure I get what you want? You want the setup on Cisco to be on USG60W from your screenshot?

  • CHS
    CHS Posts: 113  Ally Member

    Hi @G_L

    I guess you are looking for setup port forwarding configuration on USG.

    You can reference to FAQ first.

    And of course policy control rule is required.

  • GLou
    GLou Posts: 10

    Have tried and is a bit not that straight fwd to me as was the CISCO setup

Security Highlight