How can I configure IPSec site-to-site VPN by using VTI on the USG ?
SCENARIO DESCRIPTION:
This example shows how to configure an IPSec site-to-site VPN using VTI. The following instructs how to configure the VPN tunnel between each site. When the VPN tunnel is configured, each site can be accessed securely
Note: All network IP addresses and subnet masks are examples. Please replace them with your actual network IP addresses and subnet masks. This example was tested using the USG40 and the USG60 (Firmware version: ZLD 4.20).
SETUP/STEP BY STEP PROCEDURE:
Set Up the IPSec VPN Tunnel on the Headquarter's USG60 (HQ-USG60)
1. In the USG60's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.
CONFIGURATION > VPN > IPSec VPN >VPN Gateway
2. Configure the VPN connection as the following.
CONFIGURATION > VPN > IPSec VPN > VPN Connection
3. Configure a VTI interface which corresponds with the VPN rule.
Configuration > Network > Interface > VTI
Set Up the IPSec VPN Tunnel on the Branch Office's USG40 (BO-USG40)
1. In the USG40's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.
CONFIGURATION > VPN > IPSec VPN >VPN Gateway
2. Configure the VPN connection as the following.
CONFIGURATION > VPN > IPSec VPN > VPN Connection
3. Configure a VTI interface which corresponds with the VPN rule.
Configuration > Network > Interface > VTI
4. Go back to CONFIGURATION > VPN > IPSec VPN >VPN connection and click Connect.
CONFIGURATION > VPN > IPSec VPN >VPN Connection
5. Once the VPN connection is established, the VTI interfaces on both HQ-USG60 and BO-USG40 are activated.
- HQ-USG60
- BO-USG40
Set Up the Policy Route on HQ-USG60
1. Create an object for the BO_LAN1 subnet.
CONFIGURATION > Object > Address/Geo IP
2. Configure the policy route.
CONFIGURATION > Network > Routing > Policy Route
Set Up the Policy Route on BO-USG40
1. Create an object for the HQ_LAN1 subnet.
CONFIGURATION > Object > Address/Geo IP
2. Configure the policy route.
CONFIGURATION > Network > Routing > Policy Route
VERIFICATION:
Test the IPSec VPN Tunnel
1. Go to HQ-USG60's MONITOR > VPN Monitor > IPSec screen and check the tunnel's Up Time and Inbound(Bytes)/Outbound(Bytes) traffic.
MONITOR > VPN Monitor > IPSec
2. To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other. Ensure that both computers have Internet access (via the IPSec devices).
PC at HQ Office: Windows 7 > cmd > ping 192.168.20.34
PC at Branch Office: Windows 10 > cmd > ping 192.168.10.33
Categories
- All Categories
- 347 Beta Program
- 2.1K Nebula
- 114 Nebula Ideas
- 77 Nebula Status and Incidents
- 5K Security
- 44 USG FLEX H Series
- 246 Security Ideas
- 1.2K Switch
- 65 Switch Ideas
- 901 WirelessLAN
- 33 WLAN Ideas
- 5.8K Consumer Product
- 204 Service & License
- 326 News and Release
- 71 Security Advisories
- 21 Education Center
- 5 [Campaign] Zyxel Network Detective
- 1.8K FAQ
- 831 Nebula FAQ
- 401 Security FAQ
- 219 Switch FAQ
- 190 WirelessLAN FAQ
- 45 Consumer Product FAQ
- 136 Service & License FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 71 About Community
- 61 Security Highlight