Figure 16-11 Telecommuters Sharing One Vpn Rule Example; Table 16-12 Telecommuters Sharing One Vpn Rule Example; Telecommuters Using Unique Vpn Rules Example - ZyXEL Communications Prestige 662HW Series User Manual

802.11g wireless adsl 2+ 4 port security gateway
Hide thumbs Also See for Prestige 662HW Series:
Table of Contents

Advertisement

16.17.1
Telecommuters Sharing One VPN Rule Example
See the following figure and table for an example configuration that allows multiple telecommuters
(A, B and C in the figure) to use one VPN rule to simultaneously access a Prestige at headquarters
(HQ in the figure). The telecommuters do not have domain names mapped to the WAN IP addresses
of their IPSec routers. The telecommuters must all use the same IPSec parameters but the local IP
addresses (or ranges of addresses) should not overlap.

Figure 16-11 Telecommuters Sharing One VPN Rule Example

Table 16-12 Telecommuters Sharing One VPN Rule Example

FIELDS
My IP Address:
Secure Gateway
IP Address:
Local IP Address:
Remote IP
Address:
16.17.2

Telecommuters Using Unique VPN Rules Example

In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain names
that are mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).
With aggressive negotiation mode (see section 16.11.1), the Prestige can use the ID types and contents
to distinguish between VPN rules. Telecommuters can each use a separate VPN rule to simultaneously
access a Prestige at headquarters. They can use different IPSec parameters. The local IP addresses (or
ranges of addresses) of the rules configured on the Prestige at headquarters can overlap. The local IP
addresses of the rules configured on the telecommuters' IPSec routers should not overlap.
See the following table and figure for an example where three telecommuters each use a different VPN
rule for a VPN connection with a Prestige located at headquarters. The Prestige at headquarters (HQ in
the figure) identifies each incoming SA by its ID type and content and uses the appropriate VPN rule
to establish the VPN connection.
The Prestige at headquarters can also initiate VPN connections to the telecommuters since it can find
the telecommuters by resolving their domain names.
VPN Screens
TELECOMMUTERS
0.0.0.0 (dynamic IP address
assigned by the ISP)
Public static IP address
Telecommuter A: 192.168.2.12
Telecommuter B: 192.168.3.2
Telecommuter C: 192.168.4.15
192.168.1.10
Prestige 662HW Series User's Guide
HEADQUARTERS
Public static IP address
0.0.0.0
With this IP address only the
telecommuter can initiate the IPSec tunnel.
192.168.1.10
0.0.0.0 (N/A)
16-23

Advertisement

Table of Contents
loading

Table of Contents