How can I configure IPSec site-to-site VPN by using VTI on the USG ?
SCENARIO DESCRIPTION:
This example shows how to configure an IPSec site-to-site VPN using VTI. The following instructs how to configure the VPN tunnel between each site. When the VPN tunnel is configured, each site can be accessed securely
Note: All network IP addresses and subnet masks are examples. Please replace them with your actual network IP addresses and subnet masks. This example was tested using the USG40 and the USG60 (Firmware version: ZLD 4.20).
SETUP/STEP BY STEP PROCEDURE:
Set Up the IPSec VPN Tunnel on the Headquarter's USG60 (HQ-USG60)
1. In the USG60's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.
CONFIGURATION > VPN > IPSec VPN >VPN Gateway
2. Configure the VPN connection as the following.
CONFIGURATION > VPN > IPSec VPN > VPN Connection
3. Configure a VTI interface which corresponds with the VPN rule.
Configuration > Network > Interface > VTI
Set Up the IPSec VPN Tunnel on the Branch Office's USG40 (BO-USG40)
1. In the USG40's web configurator, go to CONFIGURATION > VPN > IPSec VPN >VPN Gateway and create a VPN rule that can be used with the remote USG.
CONFIGURATION > VPN > IPSec VPN >VPN Gateway
2. Configure the VPN connection as the following.
CONFIGURATION > VPN > IPSec VPN > VPN Connection
3. Configure a VTI interface which corresponds with the VPN rule.
Configuration > Network > Interface > VTI
4. Go back to CONFIGURATION > VPN > IPSec VPN >VPN connection and click Connect.
CONFIGURATION > VPN > IPSec VPN >VPN Connection
5. Once the VPN connection is established, the VTI interfaces on both HQ-USG60 and BO-USG40 are activated.
- HQ-USG60
- BO-USG40
Set Up the Policy Route on HQ-USG60
1. Create an object for the BO_LAN1 subnet.
CONFIGURATION > Object > Address/Geo IP
2. Configure the policy route.
CONFIGURATION > Network > Routing > Policy Route
Set Up the Policy Route on BO-USG40
1. Create an object for the HQ_LAN1 subnet.
CONFIGURATION > Object > Address/Geo IP
2. Configure the policy route.
CONFIGURATION > Network > Routing > Policy Route
VERIFICATION:
Test the IPSec VPN Tunnel
1. Go to HQ-USG60's MONITOR > VPN Monitor > IPSec screen and check the tunnel's Up Time and Inbound(Bytes)/Outbound(Bytes) traffic.
MONITOR > VPN Monitor > IPSec
2. To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other. Ensure that both computers have Internet access (via the IPSec devices).
PC at HQ Office: Windows 7 > cmd > ping 192.168.20.34
PC at Branch Office: Windows 10 > cmd > ping 192.168.10.33
Categories
- All Categories
- 415 Beta Program
- 2.3K Nebula
- 141 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 218 USG FLEX H Series
- 262 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 39 Wireless Ideas
- 6.3K Consumer Product
- 245 Service & License
- 382 News and Release
- 81 Security Advisories
- 27 Education Center
- 8 [Campaign] Zyxel Network Detective
- 3.1K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight