Policy-Based VPN with Policy Routes – Advanced Control for Multi-Subnet Environments

Options
Zyxel_Claudia
Zyxel_Claudia Posts: 194 image  Zyxel Employee
Network Detective-New Adventure Badge Network Detective Badge First Comment Friend Collector

USG FLEX H Series Firewall continues to offer flexible VPN deployment options with support for Policy-Based VPN using Policy Routing. While route-based VPNs are commonly used in modern deployments, policy-based VPNs still hold value for scenarios involving specific subnet-to-subnet communication and USG FLEX/ATP firewall compatibility.

In this article, we’ll explain how policy-based VPN works, how to configure it using policy routes, and how to ensure proper traffic flow across multiple subnets.

1. Multi-Subnet Challenges with Policy-Based VPN

Older firewall models (e.g., USG FLEX /ATP series) support only one VPN phase 2 selector, meaning only one local/remote subnet pair can be defined. However, Zyxel's newer USG FLEX H series support multiple phase 2 selectors, allowing more flexible subnet-to-subnet communication—even with policy-based VPN.

Some customers may still use the older ZLD firewall, while others use the new H Series firewall. So, if we want multiple VPN subnets ️to communicate between the two firewalls, we need to use a Policy-Based VPN with Policy Routes.

2. New Naming Rule of VPN Phase 2 Policy

When you create a policy-based VPN:

  • The system automatically generates VPN interface names like test_SP1, test_SP2, etc.
  • These are used as next-hop interfaces in policy routes
    image.png

After the policy is applied, the VPN interface name becomes read-only, so define custom names before saving.

3. Configuring Policy Routes for VPN Tunnels

Steps (Local Firewall):

  1. Go to Network > Routing
  2. Add a Policy Route
  3. Set the next-hop type to IPSec VPN Tunnel
  4. Choose the corresponding VPN interface (e.g., test_SP1)
    image.png

Policy Control Requirement

In current firmware (v1.36), additional policy control rules are required to allow traffic through the VPN tunnel:

  • Go to Security Policy > Policy Control
  • Add rules to allow VPN source/destination subnets
    image.png

This is necessary because encrypted traffic cannot match zone in this firmware, otherwise be blocked by the default deny rule, we plan to implement this in the next release.

4. Monitoring and Troubleshooting

🔍 Use Packet Flow Explorer:

  • Navigate to Maintenance > Packet Flow Explorer
  • See how packets are routed (via policy route, VPN interface, etc.)
    image.png

5. Scenario: Multi-Hop VPN with Policy Routing

In a 3-site setup (Firewall A ⇄ B ⇄ C):

image.png
  • Step 1: Establish VPN tunnels A–B and B–C and verify VPN connection
  • Step 2: Use policy routes to allow subnet traffic from C to A via B
    image.png
  • Step 3: Ensure policy control rules are in place across all firewalls
    image.png

Policy-based VPN with policy routes is fully supported on Nebula as well. VPN interface naming and routing references follow the same behavior as on standalone firewalls

Tagged: