USG Flex 200H: Unknown and unwanted VPN connection tries






Using: USG Flex 200H / Firmware V1.32(ABWV.0)
I've configured IPSec VPN (IKEv2) to allow access behind the Firewall.
But no one was using a VPN connection in the past days.
But I'm seeing many VPN connection tries in the log.
All are from outside my home country (Germany).
I'm seeing tries from USA, China, Great Britain.
I've configured Geo-blocking to only allow VPN connections from a few countries (and the mentioned countries are not in this list) but I'm still seeing these VPN connection tries.
Here is a screenshot of the log:
Is there anything more I can do to avoid these connection tries?
Maybe my configuration for the Geo-blocking is faulty?
What's the best way to avoid these connection tries?
Thanks!
Accepted Solution
-
I have replied to you in PM.
It's incorrect security policy configuration.To limit VPN packet from other countries, you need to create a new by From WAN to ZyWall, Source: Geo-IP object, Service: AH, ESP, IKE, NATT, action: Allow.
And also removing AH, ESP, IKE, NATT from Default_Allow_WAN_To_ZyWALL.
0
All Replies
-
What can be done is use DDNS on the remote end so you know the IP and have firewall rule from WAN to Zywall source FQDN of the connecting DDNS
0 -
Is it possible to provide your configuration via private message? I would like to check your security policy with Geo-IP
0 -
Hi @Zyxel_James
I send you a PM.
0 -
I am seeing something very similar to this with my SIP traffic that has geo-filtering active on the WAN-to-Device rule and seeing loads of attacks reaching my SIP server
0 -
Geoblocking works like a charm, if set properly.
I also read somewhere a while ago (not even sure if it was here?), about how setting it properly. I needed some tuning in the end to harden the system- see below.
When it works, make sure that it updates the database once per week (that is the maximum polling what my device allows).
Some ranges from a country may not be reflected correctly. I block these subnets / ranges then manually. After a while, everything is set and you will have VPN connections only from the countries allowed. If you build up your groups granulary eg per country, or per continent if you will never travel there, you can manually enable respectively disable regions or countries when you travel there, afterwards blocking them again.
If it is set properly, there will be no such VPN-relevant entries in the log.
The procedure is two-fold. One setting is to be done in the GeoIP, then the second one using the references from the GeoIP in the security policy.
Hopefully, the Support here will post the correct procedures.
0 -
- define your WAN interface as an entry, eg OwnFixedIP= IP address, then define Country1=… (use one of these: continent, range, subnet,… - accordingly)
- go to security policy/policy control, then build the following rule: from any to ZyWall, source=Country1, destination=OwnFixedIP, service any, device any, user any, action deny, and log or not. I log them as alerts in red, therefore I can ignore them as having dealt with them and see only new entries in black.
- repeat 1 and 2 for country, range, specific IP, continent.
0 -
Its likely you have a default rule for VPN that allows any
0 -
I have replied to you in PM.
It's incorrect security policy configuration.To limit VPN packet from other countries, you need to create a new by From WAN to ZyWall, Source: Geo-IP object, Service: AH, ESP, IKE, NATT, action: Allow.
And also removing AH, ESP, IKE, NATT from Default_Allow_WAN_To_ZyWALL.
0 -
Hi @Zyxel_James
understood. But wouldn't it be enough to just set the source to the Geo-IP object within the default policy rule named "WAN_to_Device"? Because when I remove AH, ESP, IKE and NATT from the service object "Default_Allow_WAN_To_ZyWALL" nothing remains in this service object. And the new policy rule that I should create looks for me as an exact copy of the default "WAN_to_Device".
0 -
Defaults are they as a guide and for Default login access you don't have to use them if you know what your doing
0
Categories
- All Categories
- 431 Beta Program
- 2.6K Nebula
- 166 Nebula Ideas
- 112 Nebula Status and Incidents
- 6K Security
- 366 USG FLEX H Series
- 293 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.2K Wireless
- 42 Wireless Ideas
- 6.7K Consumer Product
- 264 Service & License
- 408 News and Release
- 87 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 83 Security Highlight