2 telecommuters using unique vpn rules example – ZyXEL Communications 662HW Series User Manual

Page 243

Advertising
background image

Prestige 662H/HW Series User’s Guide

243

Chapter 19 VPN Screens

19.17.2 Telecommuters Using Unique VPN Rules Example

In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain
names that are mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).

With aggressive negotiation mode (see

the Negotiation Mode section

), the Prestige can use

the ID types and contents to distinguish between VPN rules. Telecommuters can each use a
separate VPN rule to simultaneously access a Prestige at headquarters. They can use different
IPSec parameters. The local IP addresses (or ranges of addresses) of the rules configured on
the Prestige at headquarters can overlap. The local IP addresses of the rules configured on the
telecommuters’ IPSec routers should not overlap.

See the following table and figure for an example where three telecommuters each use a
different VPN rule for a VPN connection with a Prestige located at headquarters. The Prestige
at headquarters (HQ in the figure) identifies each incoming SA by its ID type and content and
uses the appropriate VPN rule to establish the VPN connection.

The Prestige at headquarters can also initiate VPN connections to the telecommuters since it
can find the telecommuters by resolving their domain names.

Table 77 Telecommuters Sharing One VPN Rule Example

FIELDS

TELECOMMUTERS

HEADQUARTERS

My IP Address:

0.0.0.0 (dynamic IP address assigned

by the ISP)

Public static IP address

Secure Gateway IP

Address:

Public static IP address

0.0.0.0 With this IP address only the

telecommuter can initiate the IPSec

tunnel.

Local IP Address:

Telecommuter A: 192.168.2.12

Telecommuter B: 192.168.3.2

Telecommuter C: 192.168.4.15

192.168.1.10

Remote IP Address: 192.168.1.10

0.0.0.0 (N/A)

Advertising
This manual is related to the following products: