Solved

Zyxel USG 50 and Shrewsoft VPN

Posted on 2014-01-02
3
1,103 Views
Last Modified: 2014-03-04
I have been searching for an answer to this, but so far no luck.

I have a Zyxel USG 50 and I am using Shrewsoft VPN.  I have the tunnel enabled and running, but I cannot get any resources behind the gateway to be available.  

It has to do with the Firewall rules and/or policy routing issue, does anyone have any experience with this?

I have found the info. for getting the tunnel established and it really is pretty straight forward.  I can't find anything about getting access to resources.  The pre-established firewall rules aren't of much help.  I have tried implementing some on my own with no success.

I was hoping the USG 50 would be a good low cost firewall, but now I have my doubts.
0
Comment
Question by:gmanry
  • 2
3 Comments
 
LVL 39

Accepted Solution

by:
noci earned 500 total points
ID: 39756731
you need a policy route from the network (interface) where the packets come from pointing to the right tunnel...
And the firewall needs to allow the traffic, fro the ultimate source to the ultimate address as the Zywall sees it.
0
 

Author Comment

by:gmanry
ID: 39757860
Yeah, I have tried what I thought were the right rules for that, but no luck yet.  I will post some screen shots, and maybe we can figure out where I am going wrong.  The Zyxel series is a bit different in how it lays things out, at least it seems that way to me.

It's affordable, so that is why this person bought it.
0
 
LVL 39

Expert Comment

by:noci
ID: 39770101
it is actualy quite usable, it uses a linux kernel and has management layer around it.
So the web & command interface actualy manage iptables.
please present more info...
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now