zyman2008  Master Member

Comments

  • Usually a triangle route issue if multiple Stateful firewall as router in the same subnet. Enable “Allow Asymmetrical Route” option in policy control page. On both USG20 and USG FLEX firewall.
  • The most easy way is using a middleware Idp cloud to integrate.
  • I don't want to activate any service. Then just add the default profile is need. configure terminal anti-virus default_profile infected-action destroy log exit anti-spam profile 1 profile-name default_profile exit write exit
  • I think you need add these CLI to setup the default profile for AntiMalware and Email Security. configure terminal anti-virus default_profile infected-action destroy log exit anti-spam profile 1 profile-name default_profile exit security-service ips activate security-service anti-virus activate security-service…
  • Hi @StefanZ, If the USG 20 also behind NAT with dynamic public IP address. Then, On USG FLEX 200 create another IKEv1 aggressive mode rule (make it easy to different from to other rules to avoid conflict) On USG FLEX 200, Select Aggressive mode. After rules created. You need to Edit this VPN Gateway rule. In advanced…
  • Hi @StefanZ, Zyxel firewall doesn't support as a L2TP/IPSec VPN client. Using VPN wizard to create another Site-to-Site rule on USG FLEX 200 and FLEX 50. On FLEX 200: Select IKEv2 to make it different with the L2TP/IPSec server rule. On FLEX 50: Select Remote Access (client role)
  • Hi @DG_1, Sorry, I don't know much about it.
  • Hi @DG_1, As I know, Zyxel firewall doesn't support to identify different user's sessions from the same Terminal Server. user1 -> RDS IP address user2 -> RDS IP address It can support users in different workstation. (different IP addresses) user1 -> PC1 IP address user1 -> PC2 IP address user2 -> PC3 IP address The user's…
  • Hi @mMontana, If you have multiple Aggressive mode gateway (phase 1) rule. local-id is the attribute that used to identify the different gateway (phase 1) rule. By default, the local-id is IP address of interface of the gateway rule. In your case, you can setup local-id of gateway 9 rule. (ex. type: DNS, value=string1) In…
  • Hi @firerabbit, My USG110 4.73 works fine with the GeoIP settings. Maybe you can using filter in Policy control page to check if any other rule allow the UDP 500, 4500 traffic to your USG.
  • Hi firerabbit, 1. First, create a country address object. (1) Go to Object > Address/Geo IP > Address. (2) Click Add, in the pop-up window give a name for the object. Ex. US, DE, NL ... (3) Address type select GEOGRAPHY. And region select your country. 2. Edit the default WAN to ZyWALL Security policy, change the Source…
  • Hi @AntonKotikov, Form the log, the Linux sent IKEv1, 3DES, MD5, DH2 to USG. But you setup DES, MD5, DH2 in USG. So that it mismatch in Phase 1.
  • To trouble shoot the packets between VPN tunnel. 1. On USG, using CLI to monitor packet in/out the IPSec VTI tunnel. # packet-trace interface <VTI tunnel interface> ip-proto icmp 2. ping 10.1.0.101 from host in your office. 3. Check the packet monitor. If you get ping request to 10.1.0.101 -> USG do sent the ping to Azure…
  • Hi @asiawatcher, If you don't set the DNS server point to the DNS server in central site. Then each branch site will use its own local DNS server. And that guide didn't include the steps about this part. So don't worry if you follow the guide to setup.
  • Hi @Teooo43, First, you need to make sure the switch model you get support send syslog to your Wazuh SIEM server. Then, you can go to GUI of the switch to check log message that your want to monitor. Copy log message from switch GUI and paste it to the wazuh-logtest to go through the default decoder.…
Default Avatar