[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How i can access the remote network behind a VPN connection between 2 endpoints?

Posted on 2008-10-03
6
Medium Priority
?
1,189 Views
Last Modified: 2013-11-16
I have already setted up and running a VPN connection between my office and the remote location.

In my end i have a Watchguard Firebox x1250e and in the other end i have a Zyxel P653HWI-13 modem/router.

The Zyxel has 6 more VPN connections to other remote locations.

What i must do in order to gain access to the other 6 VPN connections? I mean, how i will be able to ping their IPs? Is this possible?

In my local trusted network i have the following:
192.168.2.0/24     255.255.255.0

The Zyxel has:
192.168.0.0/24   255.255.255.0

The other VPN endpoints tha are connected to the Zyxel are:
192.168.11.0/24    255.255.255.0
192.168.12.0/24    255.255.255.0
and so on....


Thanks in advance,
Stathis
0
Comment
Question by:PredatorGR
  • 3
  • 3
6 Comments
 
LVL 32

Expert Comment

by:dpk_wal
ID: 22635312
You need to add multiple routing policy and specify the local and remote subnet on WG as below:

Local                     Remote
192.168.2.0/24      192.168.11.0/24
192.168.2.0/24      192.168.12.0/24
and so on

You would use the same gateway; it is advisable to use different tunnel for each routing policy; however; not enforced strictly. You should also allow access for all the subnets in the ANY or the specific service you have already configured for the VPN.

On Sonicwall; you would need to add mutliple local and remote subnet in the same manner as above and also allow in the policy.

Please implement and update.

Thank you.
0
 

Author Comment

by:PredatorGR
ID: 22636244
dpk wal thanks for your comment, i user WSM 10.2.2 and Fireware 10.2.2, where exactly do i have to enter the routes in Policy Manager?

Please note that the other end uses a Zyxel router, not a Sonicwall.
0
 

Author Comment

by:PredatorGR
ID: 22636273
Also, which gateway i should prefer?
0
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

 
LVL 32

Expert Comment

by:dpk_wal
ID: 22636438
In Policy Manager; go to VPN->Branch Office Tunnels; click Add; from gateway drop-down select the gateway you have added for Zyxel; here you specify the local and remote subnets; as I said earlier in a single tunnel you can add multiple local/remote subnets or you can add one tunnel each for every local/remote subnets.

As you have ver 10.x the policies can be added using the wizard. For Zyxel also you need to add local/remote subnet pair.

Thank you.
0
 

Author Comment

by:PredatorGR
ID: 22636640
Thanks for the info, i've done all this but i get the following error when i try to ping an IP behind the router.

2008-10-03 21:29:05 Deny 192.168.2.2 192.168.11.112 icmp-Echo   1-Trusted Ktest/IPsec  SA deleted or negotiation failed, firewall drop    (Ping-00)  rc="201"       Traffic
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 2000 total points
ID: 22639703
Let me back track a bit; so the setup is as below:


Firebox------------VPN-------------Zyxel-------VPN----dev1
                                                    |         |
                                                    |         |
                                                  VPN     VPN
                                                    |         |
                                                    |         |
                                                 dev2    dev3
and so on...

if above is the setup; then what I adviced earlier would not work; I was thinking that Zyxel has multiple subnet; but reading the question again carefull I think above is the setup.

If so, then Zyxel acts as central hub and every other device communicates to each other through Zyxel. There are two ways in which you wish can be accomplished:
1. Create VPN between the individual devices, rather than through zyxel.
2. If you wish to have zyxel act as central device [called VPN crunchiing as well], have configuration as below:
Firebox -- all the settings currently are adequate
Zyxel, it would have entries like
VPN gateway firebox; local subnet 192.168.0.0/24;.11.0/24, .12.0/24, so on; remote 192.168.2.0/24
And also reverse; for each device as:
VPN gateway dev1; local 192.168.0.0/24, .2.0/24; remote 192.168.11.0/24
VPN gateway dev2; local 192.168.0.0/24, .2.0/24; remote 192.168.12.0/24
and so on
Finally on each device, you would have settings as:
VPN gateway Zyxel; local 192.168.11.0/24, remote 192.168.0.0/24, .2.0/24

I am not sure if Zyxel or other devices would support this configuration; you might want to consider implementing option 1 instead.

Thank you.
0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Like many others, when I created a Windows 2008 RRAS VPN server, I connected via PPTP, and still do, but there are problems that can arise from solely using PPTP.  One particular problem was that the CFO of the company used a Virgin Broadband Wirele…
OpenVPN is a great open source VPN server that is capable of providing quick and easy VPN access to your network on the cheap.  By default the software is configured to allow open access to your network.  But what if you want to restrict users to on…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month19 days, 9 hours left to enroll

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question