[SOLVED] - USG20-VPN BEHIND A FRITZBOX! 7590
Hello!
I've a FritzBox 7590 as a modem router with direct access to internet. The network is 192.168.188.0.
I've created a static route to 192.168.99.0 with gateway 192.168.188.200.
I've a Zyxel USG20-VPN connected to a LAN port of a Frizbox mesh repeater 2100, with static IP 192.168.188.200.
The network configured on the USG is 192.168.99.0, and there are 3 PC that actually can navigate to the internet network.
Now, the problems are:
Thanks
TM
I've a FritzBox 7590 as a modem router with direct access to internet. The network is 192.168.188.0.
I've created a static route to 192.168.99.0 with gateway 192.168.188.200.
I've a Zyxel USG20-VPN connected to a LAN port of a Frizbox mesh repeater 2100, with static IP 192.168.188.200.
The network configured on the USG is 192.168.99.0, and there are 3 PC that actually can navigate to the internet network.
Now, the problems are:
- 192.168.188.200 (USG20 WAN) is not found (no ping, and no HTTPS page)
- 192.168.99.x (for example 171) are not reachable by remote desktop (PCs in the 192.168.99.x are reachable by RDP)
Thanks
TM
0
All Replies
-
Can you disable the firewall on the USG and see if its reachable.
go to network > interface > trunk tab show advanced settings uncheck default SNAT
make a routing rule network > routing
incoming = interface
member = lan1
next hop
type = interface
interface = WAN1
source network address translation = none
In advance for routing check “Use IPv4 Policy Route to Overwrite Direct Route”
edit are you on firmware V4.62 ?
edit2 after testing here there seems to be a problem with static route for my setup with Zywall 110 and USG60 which I will post my own problem after some testing.
you might need another rule
incoming = interface
member = wan1
next hop
type = interface
interface = lan1
source network address translation = none
0 -
Hi @Max_Tor
You can enter Web-GUI Object > Service > Service Group
And at "Default_Allow_WAN_To_ZyWALL" tab to add PING service.
Go to Configuration > System > WWW > Service Control > Enable HTTPS
You can refer to this link to setup port forwarding for internal RDP service.
How to setup port forwarding to my internal RDP PC?
See how you've made an impact in Zyxel Community this year!
0 -
Ok, thank you!!
Today I'll try!
0 -
Hello!
I've tried everything you suggested... but anything works!
No ping answer and is no possibile to reach admin configuration page at all...
I've also upgrade to the last firmware available
0 -
Hi @Max_Tor
I think a call to our support team is the best.
Please let me know if I allow to use your E-Mail address, I´ll convert this then into a ticket and let someone locally (let me know your country) contact you to check it out by a Remote Session i.e. Teamviewer.
Thanks.
Kind Regards,
Tobias0 -
Yes you can use my email address. I'm in Italy, but I can be contacted from anywhere... speking in english.
Thanks0 -
Hi @Max_Tor
Thank you very much. We will follow up with you.
Please also check your PM.
Kind Regards,
Tobias0 -
By default you SNAT from your WAN IP on the USG you need to make a rule to not SNAT your LAN traffic for static routes to work that on your FRITZBOX then you can make firewall rules from WAN to LAN.
0 -
Hello to everybody!
Today, thanks to Lukas, Zyxel Support technician, we have solved my issue.
There was a rule that forwarded all traffic of every service to a internal LAN of the USG.
Deleted that rule and configured some NAT rule to forward traffic and some policy rules to control connection on specified service/port everything work!
NAT rule:
Policy rule:
We've also configured a standard SSL connection.
2
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 151 Nebula Ideas
- 98 Nebula Status and Incidents
- 5.7K Security
- 277 USG FLEX H Series
- 277 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.4K Consumer Product
- 250 Service & License
- 395 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 75 Security Highlight