ZyXEL Communications USG 300 Webcam User Manual


  Open as PDF
of 1121
 
Chapter 7 Tutorials
ZyWALL USG 300 User’s Guide
144
7.6.0.1 Hub-and-spoke VPN Requirements and Suggestions
Consider the following when implementing a hub-and-spoke VPN.
This example uses a wide range for the ZyNOS-based ZyWALL’s remote
network, to use a narrower range, see Section 25.4.1 on page 491 for an
example of configuring a VPN concentrator.
The local IP addresses configured in the VPN rules should not overlap.
The hub router must have at least one separate VPN rule for each spoke. In the
local policy, specify the IP addresses of the hub-and-spoke networks with which
the spoke is to be able to have a VPN tunnel. This may require you to use more
than one VPN rule.
To have all Internet access from the spoke routers to go through the VPN
tunnel, set the VPN rules in the spoke routers to use 0.0.0.0 (any) as the
remote IP address.
Your firewall rules can still block VPN packets.
If the USG ZyWALLs’ VPN tunnels are members of a single zone, make sure it is
not set to block intra-zone traffic.
The ZyNOS based ZyWALLs don't have user-configured policy routes so the only
way to get traffic destined for another spoke router to go through the ZyNOS
ZyWALL's VPN tunnel is to make the remote policy cover both tunnels.
Since the USG ZyWALLs automatically handle the routing for VPN tunnels, if a
USG ZyWALL is a hub router and the local policy covers both tunnels, the
automatic routing takes care of it without needing a VPN concentrator.
If a ZyNOS-based ZyWALL’s remote network setting overlaps with its local
network settings, set ipsec swSkipOverlapIp to on to send traffic destined to
A’s local network to A’s local network instead of through the VPN tunnel.
7.7 How to Configure User-aware Access Control
You can configure many policies and security settings for specific users or groups
of users. This is illustrated in the following example, where you will set up the
following policies. This is a simple example that does not include priorities for
different types of traffic. See Bandwidth Management on page 549 for more on
bandwidth management.
Table 20 User-aware Access Control Example
GROUP (USER)
WEB
SURFING
WEB
BANDWIDTH
MSN
LAN-TO-DMZ
ACCESS
Finance (Leo) Yes 200K No Yes
Engineer (Steven) Yes 100K No No
Sales (Debbie) Yes 100K Yes (M-F, 08:30~18:00) Yes
Boss (Andy) Yes 100K Yes Yes