Chapter 7 Tutorials
ZyWALL USG 300 User’s Guide
146
7.6.0.1 Hub-and-spoke VPN Requirements and Suggestions
Consider the following when implementing a hub-and-spoke VPN.
• This example uses a wide range for the ZyNOS-based ZyWALL’s remote
network, to use a narrower range, see
for an
example of configuring a VPN concentrator.
• The local IP addresses configured in the VPN rules should not overlap.
• The hub router must have at least one separate VPN rule for each spoke. In the
local policy, specify the IP addresses of the hub-and-spoke networks with which
the spoke is to be able to have a VPN tunnel. This may require you to use more
than one VPN rule.
• To have all Internet access from the spoke routers to go through the VPN
tunnel, set the VPN rules in the spoke routers to use 0.0.0.0 (any) as the
remote IP address.
• Your firewall rules can still block VPN packets.
• If the USG ZyWALLs or ZyWALL 1050s’ VPN tunnels are members of a single
zone, make sure it is not set to block intra-zone traffic.
• The ZyNOS based ZyWALLs don't have user-configured policy routes so the only
way to get traffic destined for another spoke router to go through the ZyNOS
ZyWALL's VPN tunnel is to make the remote policy cover both tunnels.
• Since the USG ZyWALLs or ZyWALL 1050s automatically handle the routing for
VPN tunnels, if a USG ZyWALL or ZyWALL 1050 is a hub router and the local
policy covers both tunnels, the automatic routing takes care of it without
needing a VPN concentrator.
• If a ZyNOS-based ZyWALL’s remote network setting overlaps with its local
network settings, set
ipsec swSkipOverlapIp
to
on
to send traffic destined to
A’s local network to A’s local network instead of through the VPN tunnel.
7.7 How to Configure User-aware Access Control
You can configure many policies and security settings for specific users or groups
of users. This is illustrated in the following example, where you will set up the
following policies. This is a simple example that does not include priorities for
different types of traffic. See
Bandwidth Management on page 561
for more on
bandwidth management.
Table 21
User-aware Access Control Example
GROUP (USER)
WEB
SURFING
WEB
BANDWIDTH
MSN
LAN-TO-DMZ
ACCESS
Finance (Leo)
Yes
200K
No
Yes
Engineer (Steven) Yes
100K
No
No
Sales (Debbie)
Yes
100K
Yes (M-F, 08:30~18:00)
Yes
Boss (Andy)
Yes
100K
Yes
Yes
Summary of Contents for USG-300 - V2.20 ED 2
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 221 ...
Page 222: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 222 ...
Page 223: ...223 PART II Technical Reference ...
Page 224: ...224 ...
Page 238: ...Chapter 9 Dashboard ZyWALL USG 300 User s Guide 238 ...
Page 282: ...Chapter 10 Monitor ZyWALL USG 300 User s Guide 282 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 433: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 433 ...
Page 434: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 434 ...
Page 456: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 456 ...
Page 474: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 474 ...
Page 515: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 515 ...
Page 516: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 516 ...
Page 529: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 529 ...
Page 530: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 530 ...
Page 540: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 540 ...
Page 542: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 542 ...
Page 550: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 550 ...
Page 635: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 635 ...
Page 636: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 636 ...
Page 646: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 646 Figure 448 Profiles Protocol Anomaly ...
Page 657: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 657 ...
Page 658: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 658 ...
Page 690: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 690 ...
Page 708: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 708 ...
Page 730: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 730 ...
Page 746: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 746 ...
Page 752: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 752 ...
Page 764: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 764 ...
Page 780: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 780 ...
Page 802: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 802 ...
Page 814: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 814 ...
Page 824: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 824 ...
Page 876: ...Chapter 50 System ZyWALL USG 300 User s Guide 876 ...
Page 916: ...Chapter 54 Reboot ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Shutdown ZyWALL USG 300 User s Guide 918 ...
Page 938: ...Chapter 56 Troubleshooting ZyWALL USG 300 User s Guide 938 ...
Page 946: ...Chapter 57 Product Specifications ZyWALL USG 300 User s Guide 946 ...
Page 1118: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1118 ...