IPsec ZyXEL USG40: Difference between revisions
Appearance
Content deleted Content added
clean up |
|||
| (6 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
<indicator name="Tunnels">[[File:Menu-IPsec.svg|link=:Category:FireBrick IPsec|30px|Back up to the FireBrick IPsec Tunnels Category Page]]</indicator> |
|||
= FireBrick IPsec = |
= FireBrick IPsec = |
||
| Line 4: | Line 5: | ||
https://support.aa.net.uk/FireBrick_to_FireBrick_IPsec_(Howto) |
https://support.aa.net.uk/FireBrick_to_FireBrick_IPsec_(Howto) |
||
Note: Version 4 of ZyXELs firmware is required, version 3 does not support IKEv2 |
Note: Version 4 of ZyXELs firmware is required, version 3 does not support IKEv2. A copy of the Firmware is available here: ftp://ftp2.zyxel.com/USG40/firmware/USG40_4.11(AALA.2)C0.zip |
||
= ZyWALL USG40 IPsec instructions = |
= ZyWALL USG40 IPsec instructions = |
||
<br> |
|||
* Log into the ZyWALL Dashboard. |
* Log into the ZyWALL Dashboard. |
||
<gallery> |
|||
Zywall1.png| |
|||
</gallery> |
|||
* Enter the configuration tab on the left & select "VPN" and then select "IPsec VPN" (sic). |
* Enter the configuration tab on the left & select "VPN" and then select "IPsec VPN" (sic). |
||
* Select the "VPN Gateway" tab. |
* Select the "VPN Gateway" tab. |
||
* Click on "Add". |
* Click on "Add". |
||
* Select "Show Advanced Settings". |
* Select "Show Advanced Settings". |
||
* Make sure that you have ticked the "Enable" box for the connection. |
* Make sure that you have ticked the "Enable" box for the connection. |
||
< |
<gallery> |
||
Zywall2.png| |
|||
</gallery> |
|||
* Enter a VPN Gateway name, for example my FireBrick is called "Internal2", so that's the name I will use for this configuration. |
* Enter a VPN Gateway name, for example my FireBrick is called "Internal2", so that's the name I will use for this configuration. |
||
* Select IKEv2 protocol. |
* Select IKEv2 protocol. |
||
* Keep "My Address" as "Wan1" or select one that suits your specific configuration. |
* Keep "My Address" as "Wan1" or select one that suits your specific configuration. |
||
<br> |
|||
* Under "Peer Gateway Address" select "Static Address" and enter the public IP Address of your FireBrick. - Note, keep "Secondary" as "0.0.0.0". |
* Under "Peer Gateway Address" select "Static Address" and enter the public IP Address of your FireBrick. - Note, keep "Secondary" as "0.0.0.0". |
||
* The "Authentication" section needs to be set to "Pre-shared Key" - This is the pass phrase that you have set on the FireBrick. |
* The "Authentication" section needs to be set to "Pre-shared Key" - This is the pass phrase that you have set on the FireBrick. |
||
<gallery> |
|||
Zywall4.png| |
|||
</gallery> |
|||
* "Local ID type" needs to be set to "DNS". In the "Content" box, you should enter the domain name for your FireBrick. e.g. "internal2.**.co.uk". |
* "Local ID type" needs to be set to "DNS". In the "Content" box, you should enter the domain name for your FireBrick. e.g. "internal2.**.co.uk". |
||
| Line 35: | Line 46: | ||
Now, click "OK" and activate the config by clicking on the entry that you have just created and pressing the "Activate" button. |
Now, click "OK" and activate the config by clicking on the entry that you have just created and pressing the "Activate" button. |
||
<gallery> |
|||
Zywall5.png| |
|||
</gallery> |
|||
<br> |
<br> |
||
Next, we're going to select the "VPN Connection" Tab and click "Add". |
Next, we're going to select the "VPN Connection" Tab and click "Add". |
||
<gallery> |
|||
Zywall6.png| |
|||
</gallery> |
|||
* Click show "Advanced settings" |
* Click show "Advanced settings" |
||
* Select "Nailed-Up" and "Enable Replay Detection". |
* Select "Nailed-Up" and "Enable Replay Detection". |
||
<gallery> |
|||
Zywall6.png| |
|||
</gallery> |
|||
* Under "VPN Gateway" select "Remote Access (Client Role) and select the VPN Gateway you just created in the drop down box. |
* Under "VPN Gateway" select "Remote Access (Client Role) and select the VPN Gateway you just created in the drop down box. |
||
* in "Local Policy" select "DMZ_SUBNET" and in "Remote Policy" select "LAN1_SUBNET". |
* in "Local Policy" select "DMZ_SUBNET" and in "Remote Policy" select "LAN1_SUBNET". |
||
<gallery> |
|||
Zywall8.png| |
|||
</gallery> |
|||
* Under "Phase 2 Setting", change the "SA Life Time" to "3000000". |
* Under "Phase 2 Setting", change the "SA Life Time" to "3000000". |
||
| Line 52: | Line 73: | ||
* In the "Proposal" section, change "Encryption" to "3DES" and the "Authentication" to "SHA1". |
* In the "Proposal" section, change "Encryption" to "3DES" and the "Authentication" to "SHA1". |
||
* We then need to change the "Perfect Forward Secrecy (PFS)" to "DH2". |
* We then need to change the "Perfect Forward Secrecy (PFS)" to "DH2". |
||
<gallery> |
|||
Zywall9.png| |
|||
</gallery> |
|||
* Now all we need to do is click "OK" and "Activate". |
* Now all we need to do is click "OK" and "Activate". |
||
<gallery> |
|||
Zywall10.png| |
|||
</gallery> |
|||
<br> |
<br> |
||
Once all of this has been done, press "Connect" and you should see that you now have an active IPsec connection from your ZyWALL USG40 to your FireBrick. |
Once all of this has been done, press "Connect" and you should see that you now have an active IPsec connection from your ZyWALL USG40 to your FireBrick. |
||
<gallery> |
|||
Zywall11.png| |
|||
</gallery> |
|||
| ⚫ | |||
| ⚫ | |||