[Campaign] Zyxel Network Detective - Case #3 is OPEN! (Answer Revealed)

Zyxel_Jonas
Zyxel_Jonas Posts: 313  Zyxel Employee
25 Answers First Comment Friend Collector Fifth Anniversary
edited April 25 in Security

Solve a Firewall Enigma

Greetings, fellow tech enthusiasts!

Following the resounding success of our Case #2: Crack the Case for WiFi Network challenge, we are thrilled to introduce our final quest, Case #3: Crack the Case for Firewall. If you relished resolving network errors in our previous challenges, prepare for an exhilarating journey deep into the security firewalls and win fantastic prizes now.

You’re not on your own in this mission! Become part of conversations alongside other tech enthusiasts, share your observations, and exchange your findings HERE!

In Pursuit of Glory, Zyxel Detective!

Jonas,

All Replies

  • Zyxel-Watson
    Zyxel-Watson Posts: 16  Zyxel Employee
    Network Detective Badge First Comment Friend Collector

    Hello detectives!

    Do you know how to configure site-to-site VPN in Nebula between two devices under one organization?

    Steps:

    1. Select WAN interface to establish the VPN tunnel
    2. Select LAN Subnet that can be accessed through the VPN tunnel
    3. Select “Site-to-Site” in Nebula VPN topology
    4. Repeat step1 to step3 on the other firewall

    What’s even better, settings in step 1-3 can be configured in a single page!

    Once the VPN connection is established, you can monitor the VPN connection state under each site.

    Keep up the investigation,

    Watson🕵️

    When you have eliminated the impossible, whatever remains, however improbable, must be the truth.

  • Zyxel-Watson
    Zyxel-Watson Posts: 16  Zyxel Employee
    Network Detective Badge First Comment Friend Collector

    I'm certain you've pieced all the puzzles together, Zyxel Detective!

    Check out the revealed answer here!

    We'll be reuniting with you very soon and thank you for joining the hunt!

    Watson🕵️

    When you have eliminated the impossible, whatever remains, however improbable, must be the truth.

Security Highlight