ZyXEL Communications 2 Plus Network Card User Manual


 
Chapter 14 IPSec VPN
ZyWALL 2 Plus User’s Guide
269
14.15 Telecommuter VPN/IPSec Examples
The following examples show how multiple telecommuters can make VPN connections to a
single ZyWALL at headquarters. The telecommuters use IPSec routers with dynamic WAN IP
addresses. The ZyWALL at headquarters has a static public IP address.
14.15.1 Telecommuters Sharing One VPN Rule Example
See the following figure and table for an example configuration that allows multiple
telecommuters (A, B and C in the figure) to use one VPN rule to simultaneously access a
ZyWALL at headquarters (HQ in the figure). The telecommuters do not have domain names
mapped to the WAN IP addresses of their IPSec routers. The telecommuters must all use the
same IPSec parameters but the local IP addresses (or ranges of addresses) should not overlap.
Figure 175 Telecommuters Sharing One VPN Rule Example
14.15.2 Telecommuters Using Unique VPN Rules Example
In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain
names that are mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).
Table 73 Telecommuters Sharing One VPN Rule Example
FIELDS TELECOMMUTERS HEADQUARTERS
My ZyWALL: 0.0.0.0 (dynamic IP address
assigned by the ISP)
Public static IP address
Remote Gateway
Address:
Public static IP address 0.0.0.0 With this IP address only
the telecommuter can initiate the
IPSec tunnel.
Local Network - Single
IP Address:
Telecommuter A: 192.168.2.12
Telecommuter B: 192.168.3.2
Telecommuter C: 192.168.4.15
192.168.1.10
Remote Network -
Single IP Address:
192.168.1.10 Not Applicable