ZyWALL Series Internet Security Gateway
15.18 Telecommuter VPN/IPSec Examples
The following examples show how multiple telecommuters can make VPN connections to a single ZyWALL
at headquarters. The telecommuters use IPSec routers with dynamic WAN IP addresses. The ZyWALL at
headquarters has a static public IP address.
15.18.1
Telecommuters Sharing One VPN Rule Example
See the following figure and table for an example configuration that allows multiple telecommuters (A, B
and C in the figure) to use one VPN rule to simultaneously access a ZyWALL at headquarters (HQ in the
figure). The telecommuters do not have domain names mapped to the WAN IP addresses of their IPSec
routers. The telecommuters must all use the same IPSec parameters but the local IP addresses (or ranges of
addresses) should not overlap.
Figure 15-11 Telecommuters Sharing One VPN Rule Example
Table 15-12 Telecommuters Sharing One VPN Rule Example
FIELDS
My IP Address:
Secure Gateway
IP Address:
Local IP Address:
15-32
HEADQUARTERS
Public static IP address
0.0.0.0
With this IP address
only the telecommuter can initiate
the IPSec tunnel.
192.168.1.10
TELECOMMUTERS
0.0.0.0 (dynamic IP address assigned by
the ISP)
Public static IP address
Telecommuter A: 192.168.2.12
Telecommuter B: 192.168.3.2
Telecommuter C: 192.168.4.15
VPN Screens