Figure 14-13 Telecommuters Sharing One Vpn Rule Example; Table 14-12 Telecommuters Sharing One Vpn Rule Example - ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Internet security gateway
Hide thumbs Also See for Internet Security Gateway ZyWALL 2 Series:
Table of Contents

Advertisement

ZyWALL 2 Series User's Guide

Figure 14-13 Telecommuters Sharing One VPN Rule Example

Table 14-12 Telecommuters Sharing One VPN Rule Example

FIELDS
My IP Address:
Secure Gateway
IP Address:
Local IP Address:
Remote IP
Address:
14.18.2
Telecommuters Using Unique VPN Rules Example
In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain names that are
mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).
With aggressive negotiation mode (see section 14.12.1), the ZyWALL can use the ID types and contents to
distinguish between VPN rules. Telecommuters can each use a separate VPN rule to simultaneously access a
ZyWALL at headquarters. They can use different IPSec parameters. The local IP addresses (or ranges of
addresses) of the rules configured on the ZyWALL at headquarters can overlap. The local IP addresses of the
rules configured on the telecommuters' IPSec routers should not overlap.
14-36
TELECOMMUTERS
0.0.0.0 (dynamic IP address
assigned by the ISP)
Public static IP address
Telecommuter A: 192.168.2.12
Telecommuter B: 192.168.3.2
Telecommuter C: 192.168.4.15
192.168.1.10
HEADQUARTERS
Public static IP address
0.0.0.0
With this IP address only the
telecommuter can initiate the IPSec tunnel.
192.168.1.10
0.0.0.0 (N/A)
VPN Screens

Advertisement

Table of Contents
loading

Table of Contents