zyman2008  Master Member

Комментарии

  • Just add the Signature ID into the IPS allow list.
  • Vary depends on the behavior of FritzBox & clients setting. Clients on 192.168.1.0/24 request to 192.168.20.0/24 will forward packet to default gateway 192.168.1.1, the FritzBox. What's FritzBox will do ? Reply ICMP redirect to clients ? Tell client the Next-Hop to 192.168.20.0/24 is 192.168.1.2 Also forward the first…
    Раздел: Connect LAN2 to LAN1 to VPN to LAN3/4 Комментарий от zyman2008 5 июн
  • Once the interface join into a ridge interface. The original interface function will be turn off and acting like a layer 2 port. No matter the bridge interface is active or not.
  • Here the guideline to create VPN rule, Static Site to Site: One rule for one peer My IP - Peer IP will be the matching criteria Site to Site with dynamic Peer & Remote Access: One rule for all peers. Setup Local ID/Remote ID is any. On the peer setup remote ID/Local ID. Setup the proposal different with other Site to Site…
    Раздел: IpSec VPN with Remote Access Server - trouble Комментарий от zyman2008 24 мар
  • Just one VPN rule Gateway/Conenction rule on firewall. But on each client need to setup unique local-id. The point of view comes from IPSec IKE RFC standard. Remote/Local ID is one of the matching criteria for IKE negotiation. But the default value of local id is depends on the design of the VPN client. Here an example of…
    Раздел: IpSec VPN with Remote Access Server - trouble Комментарий от zyman2008 22 мар
  • Hi @KonradWo , Multiple clients under the same NAT router. The source IP address of VPN (IKE) request from clients is the same IP. VPN server cannot identify the different without unique "fingerprint". So that you need to setup different "local ID" on each client. How to do that ? It's vary depends what's client software…
    Раздел: IpSec VPN with Remote Access Server - trouble Комментарий от zyman2008 22 мар
  • Here what I think the root cuase of issue. Triangle route issue (without SNAT to 192.168.99.1) No triangle route (with SNAT) So either Zyxel Firewall to allow asymmetric route or doing SNAT can solve the issue.
    Раздел: SNAT Nebula Комментарий от zyman2008 9 мар
  • Usually a triangle route issue if multiple Stateful firewall as router in the same subnet. Enable “Allow Asymmetrical Route” option in policy control page. On both USG20 and USG FLEX firewall.
    Раздел: Little Network with Two USG Комментарий от zyman2008 3 мар
  • The most easy way is using a middleware Idp cloud to integrate.
    Раздел: VPN - Authentification with ADD Комментарий от zyman2008 2 мар
  • I don't want to activate any service. Then just add the default profile is need. configure terminal anti-virus default_profile infected-action destroy log exit anti-spam profile 1 profile-name default_profile exit write exit
    Раздел: USG60W to USG Flex 100W configuration conversion Комментарий от zyman2008 1 мар
  • I think you need add these CLI to setup the default profile for AntiMalware and Email Security. configure terminal anti-virus default_profile infected-action destroy log exit anti-spam profile 1 profile-name default_profile exit security-service ips activate security-service anti-virus activate security-service…
    Раздел: USG60W to USG Flex 100W configuration conversion Комментарий от zyman2008 28 фев
  • Hi @StefanZ, If the USG 20 also behind NAT with dynamic public IP address. Then, On USG FLEX 200 create another IKEv1 aggressive mode rule (make it easy to different from to other rules to avoid conflict) On USG FLEX 200, Select Aggressive mode. After rules created. You need to Edit this VPN Gateway rule. In advanced…
    Раздел: USG as VPN client behind a router Комментарий от zyman2008 17 фев
  • Hi @StefanZ, Zyxel firewall doesn't support as a L2TP/IPSec VPN client. Using VPN wizard to create another Site-to-Site rule on USG FLEX 200 and FLEX 50. On FLEX 200: Select IKEv2 to make it different with the L2TP/IPSec server rule. On FLEX 50: Select Remote Access (client role)
    Раздел: USG as VPN client behind a router Комментарий от zyman2008 16 фев
  • Hi @DG_1, Sorry, I don't know much about it.
  • Hi @DG_1, As I know, Zyxel firewall doesn't support to identify different user's sessions from the same Terminal Server. user1 -> RDS IP address user2 -> RDS IP address It can support users in different workstation. (different IP addresses) user1 -> PC1 IP address user1 -> PC2 IP address user2 -> PC3 IP address The user's…
Default Avatar