How can I configure IPSec site-to-site VPN by using VTI on the USG ?

Zyxel_Charlie
Zyxel_Charlie Posts: 1,034
50 Answers 500 Comments Friend Collector Fourth Anniversary
 Guru Member
edited June 2022 in VPN

SCENARIO DESCRIPTION:

This example shows how to configure an IPSec site-to-site VPN using VTI. The following instructs how to configure the VPN tunnel between each site. When the VPN tunnel is configured, each site can be accessed securely

Note: All network IP addresses and subnet masks are examples. Please replace them with your actual network IP addresses and subnet masks. This example was tested using the USG40 and the USG60 (Firmware version: ZLD 4.20).


SETUP/STEP BY STEP PROCEDURE:

Set Up the IPSec VPN Tunnel on the Headquarter's USG60 (HQ-USG60)

1.     In the USG60's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.

CONFIGURATION > VPN > IPSec VPN >VPN Gateway

2.     Configure the VPN connection as the following.

CONFIGURATION > VPN > IPSec VPN > VPN Connection

 

3.     Configure a VTI interface which corresponds with the VPN rule.

Configuration > Network > Interface > VTI

Set Up the IPSec VPN Tunnel on the Branch Office's USG40  (BO-USG40)

1.     In the USG40's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.

CONFIGURATION > VPN > IPSec VPN >VPN Gateway

2.     Configure the VPN connection as the following.

CONFIGURATION > VPN > IPSec VPN > VPN Connection

 

3.     Configure a VTI interface which corresponds with the VPN rule.

Configuration > Network > Interface > VTI

4.     Go back to CONFIGURATION > VPN > IPSec VPN >VPN connection and click Connect.

CONFIGURATION > VPN > IPSec VPN >VPN Connection

5.     Once the VPN connection is established, the VTI interfaces on both HQ-USG60 and BO-USG40 are activated. 

  • HQ-USG60

  • BO-USG40 

Set Up the Policy Route on HQ-USG60

1.       Create an object for the BO_LAN1 subnet.

CONFIGURATION > Object > Address/Geo IP

2.       Configure the policy route.

CONFIGURATION > Network > Routing > Policy Route

Set Up the Policy Route on BO-USG40

1.       Create an object for the HQ_LAN1 subnet.

CONFIGURATION > Object > Address/Geo IP

2.       Configure the policy route.

CONFIGURATION > Network > Routing > Policy Route

 


VERIFICATION:

Test the IPSec VPN Tunnel 

1.     Go to HQ-USG60's  MONITOR > VPN Monitor > IPSec screen and check the tunnel's Up Time and Inbound(Bytes)/Outbound(Bytes) traffic.

MONITOR > VPN Monitor > IPSec

2.     To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other. Ensure that both computers have Internet access (via the IPSec devices).

PC at HQ Office: Windows 7 > cmd > ping 192.168.20.34

PC at Branch Office: Windows 10 > cmd > ping 192.168.10.33