USG40 - routing traffic between two networks

LenBH
LenBH Posts: 15  Freshman Member
First Comment Friend Collector Seventh Anniversary

I have two networks in our office: one for general office traffic (192.168.2.x - P1/lan1), and one for a control system (machine automation, PLCs, etc) (192.168.15.x - P4/DMZ). I need to keep the control network isolated so it doesn't get bogged down by heavy office traffic. However, I want to be able to access specific nodes on the .15.x control network from the office network. Can anyone point me to the right way to do that? Thanks!

Accepted Solution

  • PeterUK
    PeterUK Posts: 3,389  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary
    Answer ✓

    So you can do a rule

    from LAN1

    to DMZ

    source any

    destination group of control devices

    service if you know it

    The office PC's will make the connection into DMZ for a reply back and DMZ can not make connections to LAN1 unless you make a rule to do so.

All Replies

  • PeterUK
    PeterUK Posts: 3,389  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary
    edited September 23

    Depending on the Zones you used it be from LAN1 to DMZ policy rule you can add source/destination IP and service what you can't do is allow broadcast traffic between subnets

  • LenBH
    LenBH Posts: 15  Freshman Member
    First Comment Friend Collector Seventh Anniversary
    edited September 23

    Thanks for the reply! Since many office PCs will want to access three control network devices, is there an easy way to open access from all office PCs to three individual control devices, without allowing broadcast traffic? What if I had three rules allowing "from any" on LAN1 to a specific IP on DMZ? Is that safe to do? And in doing this, I'd be exposing specific 192.168.15.x devices to the office network, and they would be accessed from the office network via that same IP (.15.x), right? (Sorry if my novice-ness is showing!)

  • PeterUK
    PeterUK Posts: 3,389  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary
    Answer ✓

    So you can do a rule

    from LAN1

    to DMZ

    source any

    destination group of control devices

    service if you know it

    The office PC's will make the connection into DMZ for a reply back and DMZ can not make connections to LAN1 unless you make a rule to do so.

  • LenBH
    LenBH Posts: 15  Freshman Member
    First Comment Friend Collector Seventh Anniversary

    Many thanks, Peter. Worked like a charm. Created the group of control devices, added the policy rule, and added a route on my desktop PC, and voila! Connected!

  • LenBH
    LenBH Posts: 15  Freshman Member
    First Comment Friend Collector Seventh Anniversary

    @PeterUK Hi, Peter. So this seemed to work at the time, but having made some changes in various places, seems to not work now! I've even restored the config to a previous version and still no luck. Very frustrated!

    Just to clarify the current objective:

    Using a USG40. (I have moved from DMZ to OPT port for the control network since my previous post.) LAN1 network IP is 192.168.2.x. OPT network IP is 192.168.15.x. I want traffic on LAN1 addressed to 192.168.15.x to simply be routed to the OPT network.

    I have created security policies that allow traffic from LAN1 to OPT and vice-versa, unconditionally.

    1

    LAN1_to_ControlNetwork

    LAN1

    OPT

    any

    any

    any

    any

    none

    allow

    no

    2

    ControlNetwork_to_LAN1

    OPT

    LAN1

    any

    any

    any

    any

    none

    allow

    no

    I created a route between the two networks:

    1

    any

    none

    LAN1

    any

    ControlDevices

    any

    any

    any

    auto

    preserve

    none

    That's incoming: LAN1, source: any, destination: ControlDevices (a group of IP addresses), Next-Hop: auto (I've tried different options), SNAT: none.

    If I test this with the built-in ZyXel Network Tools, I can ping the devices when directing it to the Control network (OPT), but can't ping them when directing to LAN1.

    I must have something very basic wrong, I hope!

    Thanks so much in advance.

  • PeterUK
    PeterUK Posts: 3,389  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary

    You do not need a route rule you can delete it
    is “Use IPv4 Policy Route to Overwrite Direct Route” unchecked?
    Is OPT set with internal and with what zone?

  • LenBH
    LenBH Posts: 15  Freshman Member
    First Comment Friend Collector Seventh Anniversary

    Thanks for the quick reply.

    OPT is set to internal and zone OPT.
    LAN1 is set to internal and zone LAN1 (that's fixed, I guess)
    "Use IPv4 Policy Route to Overwrite Direct Route" is NOT checked.

  • LenBH
    LenBH Posts: 15  Freshman Member
    First Comment Friend Collector Seventh Anniversary

    Also, if I ping one of the devices on the control network, I get this. Not a timeout, but "unreachable".

  • PeterUK
    PeterUK Posts: 3,389  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary

    the problem with ping is if the device allows to be pinged.

    I don't understand why its not working for OPT from DMZ is the IP of DMZ changed to something else now?

    you can do a packet capture on OPT for ICMP as you ping from LAN1 to see if it makes it

Security Highlight