1 telecommuters sharing one vpn rule example, 2 telecommuters using unique vpn rules example, For a telec – ZyXEL Communications ZyXEL ZyWALL P1 User Manual

Page 148

Advertising
background image

ZyWALL P1 User’s Guide

Chapter 9 VPN Screens

147

9.11.1 Telecommuters Sharing One VPN Rule Example

See the following figure and table for an example configuration that allows multiple
telecommuters (A, B and C in the figure) to use one VPN rule to simultaneously access a
ZyWALL at headquarters (HQ in the figure). The telecommuters do not have domain names
mapped to the WAN IP addresses of their IPSec routers. The telecommuters must all use the
same IPSec parameters but the local IP addresses (or ranges of addresses) should not overlap.

Figure 59 Telecommuters Sharing One VPN Rule Example

9.11.2 Telecommuters Using Unique VPN Rules Example

In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain
names that are mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).

With aggressive negotiation mode (see

Section 3.3.7.1 on page 63

), the ZyWALL can use the

ID types and contents to distinguish between VPN rules. Telecommuters can each use a
separate VPN rule to simultaneously access a ZyWALL at headquarters. They can use
different IPSec parameters. The local IP addresses (or ranges of addresses) of the rules
configured on the ZyWALL at headquarters can overlap. The local IP addresses of the rules
configured on the telecommuters’ IPSec routers should not overlap.

Table 48 Telecommuters Sharing One VPN Rule Example

FIELDS

HEADQUARTERS

TELECOMMUTERS

My IP Address:

Public static IP address

0.0.0.0 (dynamic IP address

assigned by the ISP)

Secure Gateway IP

Address:

0.0.0.0 With this IP address only

the telecommuter can initiate the

IPSec tunnel.

Public static IP address

Local IP Address:

192.168.1.10

Telecommuter A: 192.168.2.12

Telecommuter B: 192.168.3.2

Telecommuter C: 192.168.4.15

Remote IP Address:

0.0.0.0 (N/A)

192.168.1.10

Advertising