B15. How can I protect against IP spoofing attacks?...........................233
C. Security Service licenses FAQ ......................................................................234
C01. What is iCard? ................................................................................234
C02. Where can I buy the iCard and how much does it cost?.............234
C03. How many kinds of iCard does ZyXEL provide?........................234
C04. Is each type of iCard device specific?............................................234
C05. What are the available security service licenses which require
additional purchase and license activation in ZyNOS v4.00?..............234
C06. What kind of iCard should I buy?.................................................235
C07. If I violate the mappings described above, for example, using a
silver iCard for ZyWALL 35 or ZyWALL 70, what will happen?
.......235
C08. Can I try the Content Filtering service for free? How long is the
free trial period of Content Filtering service?
.......................................235
D. Security Service Activation and UpdateFAQ................................................235
D01. Why do I have to register?.............................................................235
All contents copyright (c) 2006 ZyXEL Communications Corporation.
4
ZyWALL 2WG Support Notes
D02. In addition to registration, what can I do with myZyXEL.com?235
D03. Is there anything changed on myZyXEL.com because of the
launch of ZyNOS v4.00? Which ZyWALL models can be registered
via myZyXEL.com?.................................................................................236
D04. What’s the difference between new registration flow and
previous registration? What’s the advantage of new registration flow
over the previous registration flow?.......................................................236
D05. If I were new to myZyXEL.com, what are the required fields
when I register my ZyWALL device on myZyXEL.com?....................237
D06. When using the new registration flow of myZyXEL.com for
ZyNOS v4.0, do I have to create a new account if I were already a
registered user on myZyXEL.com?........................................................237
D07. What is mySecurityZone? ..............................................................237
D08. What is Update Server?..................................................................237
D09. Who maintains mySecurityZone & Update Server? ...................238
D10. What’s the URL for these service portals? ...................................238
E. Content Filter FAQ........................................................................................238
E01. What's the operation between ZyXEL appliance and BlueCoat
data center?..............................................................................................238
E02. How many entries can the cache of Web Site Auto Categorization
keep at most?............................................................................................238
E03. Can I specify the time out value of the query response from
BlueCoat data center? .............................................................................238
E04. Can I decide whether to forward or drop the HTTP response if
the query to BlueCoat data center is timed out?...................................239
E05. How to register for BlueCoat service?...........................................239
E06. Why can't I make registration successfully?................................239
E07. What services can I get with Trial Registration? .........................239
E08. What types of content filter does ZyWALL provide?..................239
E09. What are the primary features of ZyXEL Content Filtering?....239
E10. Who needs ZyXEL Content Filtering? Is ZyXEL Content
Filtering for small companies or for large corporations? ....................240
E11. Can I have different policies in effect for different times of the
day or week?
All contents copyright (c) 2006 ZyXEL Communications Corporation.
8
ZyWALL 2WG Support Notes
Application Notes
Mobility Internet Access
You may have the experienced a need of Internet access in a location where wired connection is difficult
to deploy, e.g. in countryside or mountain. Or you are just in a public environment without Internet access,
like in a park, on a bus, in a train or metropolitan subway, etc… Or you may temporarily need Internet
access when you are in your exhibition booth and need Internet access for some demonstration. ZyWALL
2WG is especially designed for the mobility Internet access; it is light to carry everywhere and can utilize
a 3G card for dial up to get the Internet access. Besides, you could utilize the embedded wireless card to
provide wireless access for your LAN users.
Not only the mobility, you could also use ZyWALL 2WG as your WAN backup in the small office or
SOHO. You could further choose a certain load balancing mechanism to perform dual WAN access.
In summery, you could utilize the 3G wireless access for your primary WAN, or backup WAN, or work
with your primary WAN(Ethernet or PPP) together as a dual WAN application.
9
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
Utilize 3G and Wireless for the Internet Access
Following we will show you how to configure it step-by-step.
Utilize 3G card to get Internet access
1). Plug the 3G card to ZyWALL 2WG's card slot before powering on the ZyWALL 2WG device.
2). Login the GUI. After the system boots up, you can see the 3G card information on the home page. Make
sure there is no "Error" message in "3G Card IMEI" and "SIM Card IMSI" fields. Otherwise, you need to
re-install the 3G card and the SIM card and make sure they are properly installed. Please refer to the quick start
guide if you need to troubleshoot because of an error message.
3) Switch to GUI menu Network > WAN2 tab. Configure the APN, username, password, PIN code, phone
number, the authentication type and other settings you have got from your service provider. Click the Apply
button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
10
ZyWALL 2WG Support Notes
3). Then the 3G wireless card will be dialed up automatically when WAN1 is not available. If you check the
"Nailed-up" option as shown in the figure above, the system will automatically dial up the 3G Internet access
even if WAN1 is available. Then you will see the process in logs as following.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
11
ZyWALL 2WG Support Notes
4) If dialed up successfully, you can see the GUI home page as shown below. You will get the "WAN2
connection is up" and "3G card's signal strength" messages in the latest alerts.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
12
ZyWALL 2WG Support Notes
Utilize the embedded wireless card to provide LAN users access
1). Go to GUI menu Network > WIRELESS CARD, enable it and configure the other parameters like 802.11
ZyWALL 2WG allows you to configure up to 8 SSID profiles. Choose the SSID profile you want to use and
click Apply button.
Note: You can modify the SSID profile by clicking the modify () icon in the figure above: here you can
configure the SSID information and choose the security and the MAC filtering.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
13
ZyWALL 2WG Support Notes
To configure the security and the MAC filter, go to Wireless Card > Security or Wireless Card > MAC Filter to
further configure it.
For example, we would like to provide the wireless access clients with preset MAC address filtering list.
Furthermore, these clients will also have to pass the security control described below.
a. Wireless security level to "WPA-PSK"with key "12345678".
b. Only allow the PC's with MAC of "00:A0:C5:11:22:33", "00:A0:C5:11:22:44", and
"00:A0:C5:11:22:55" are allowed to associate the wireless network.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
14
ZyWALL 2WG Support Notes
All contents copyright (c) 2006 ZyXEL Communications Corporation.
15
ZyWALL 2WG Support Notes
All contents copyright (c) 2006 ZyXEL Communications Corporation.
16
ZyWALL 2WG Support Notes
After you have configured the Security and MAC filter profiles, you can choose them in the main page
of wireless card setting as shown
All contents copyright (c) 2006 ZyXEL Communications Corporation.
17
ZyWALL 2WG Support Notes
Seamless Incorporation into your network
Using Transparent (Bridge Mode) Firewall
If user wants to insert a firewall into current network, IP setting of hosts and servers may need to change.
Following example illustrates an example of current deployment: servers and other hosts sit in the same IP
segment.
If a router mode firewall is inserted into existing network, user may need to reassign the IP of all servers
and hosts and related setting of applications. However, it may be a huge task to admi nistrators.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
18
ZyWALL 2WG Support Notes
Deploying a transparent mode firewall doesn’t require any changes of settings on the original network
topology. It works as bridge/switch; therefore, all the hosts can communicate with each other as without
firewall in between. At the same time, the transparent firewall can check the packets passing through it
and block attacks and limit unauthorized access through access control right.
In the following section, we will explain how to configure ZyWALL as bridge firewall. Therefore, all
hosts and servers can keep using the same IP as that of current network.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
19
ZyWALL 2WG Support Notes
User can configure ZyWALL to act as a router mode firewall or bridge (transparent) firewall. The default
is router mode firewall.
Step1. Before changing ZyWALL to bridge mode, if admin wants to make the ZyWALL’s LAN PC be
able to get DHCP IP address assignment from the DHCP server or the gateway upper than the ZyWALL,
there is one firewall rule needs to be activated.
Go to Firewall >> Rule Summary; choose ‘WAN to LAN’ from ‘Packet Direction’. You will see a rule
to permit the service type, ‘BOOTP_CLIENT(UDP:68)’, to pass firewall. It’s INACTIVE by default.
Admin can activate the rule by clicking the ‘N’ as following picture. Then the rule will be activated right
away.
Step2. To change the device mode, go to MAINTENANCE >> Device Mode. Select ‘Bridge’ and
All contents copyright (c) 2006 ZyXEL Communications Corporation.
20
ZyWALL 2WG Support Notes
assign a management IP for ZyWALL. The Gateway IP Address is used as next-hop of default route.
ZyWALL will restart after applying the change.
(Note: Here we suggest admin to dedicate an IP address to ZyWALL itself at the same subnet as
original one (like 210.242.82.X/24 in this example). In this way, admin doesn’t need to change his
PC’s IP address when he wants to access Internet and ZyWALL’s web GUI at the same time.)
21
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
Step3. After rebooting, login ZyWALL’s GUI by accessing ZyWALL’s management IP address.
(Accessing ZyWALL by the PC with a static IP address configured in the same subnet or with an IP from
DHCP server (refer to step1 for the pre-configured firewall rule).
Step4. In this example, since we want to apply a DMZ zone for servers. So for ZyWALL 2 Plus which
the ports of LAN & DMZ can be configured, user can decide the roles of each port.
Go to Network >> LAN (or DMZ or WLAN) >> Port Roles. By default, 4 ports are assigned to LAN.
In this example, we use port 1 & 2 assigned to LAN and Port 3 & 4 assigned to DMZ as following
picture.
Step5. Furthermore, to configure firewall rule to control the access of your network, go to SECURITY
>> FIREWALL as you do in router mode firewall. For example, user wants to block the access from a
FTP server (210.242.82.2) in DMZ zone to LAN hosts (210.242.82.31~34) (Note that they all sits in the
same IP segment 210.242.82.0/24). Edit the firewall rule via Firewall >> Rule Summary and with
packet direction: DMZ to LAN.
And enter 210.242.82.2 as the source address and 210.242.82.31~34 as destination address. And then
select the service and set the action for ‘Matched Packet’ to
‘BLOCK’.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
22
ZyWALL 2WG Support Notes
23
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
Internet Connection
A typical Internet access application of the ZyWALL is shown below. This section guides you how to
configure ZyWALL to gain the Internet access.
ZyWALL
Internet
LAN
WAN
Step1. First of all, Select Home menu and click Internet Access Wizard to configure your WAN
connection. Click “Internet Access” under Home >> Wizards for Internet Access Quick Setup
A pop-up window as below will indicate you to enter ISP Parameters for Internet Access .
There are three kinds of encapsulation which are supported by ZyWALL: Ethernet, PPPoE & PPTP.
Select the correct encapsulation type from the drop-down menu. The wizards will requests related
information needed. These fields vary depending on what you select in the Encapsulation field. Fill them
in with the information exactly as given by the ISP or network administrator.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
24
ZyWALL 2WG Support Notes
Following picture is an example while PPPoE is selected.
Once the required information is correctly configured, click on the “Finish” button to apply the setting
and then you have finished configuring Internet Access on WAN link.
DHCP server/client/relay
ZyWALL supports
(1) DHCP client on the WAN port
User can choose either a static IP or a dynamic IP address for WAN port. When choosing dynamic IP,
ZyWALL will get a DHCP IP address from ISP or upper layer DHCP server.
(2) DHCP server/relay/none on the LAN ports
ZyWALL supports DHCP server for LAN ports, but also
1. When choosing DHCP setting as ‘None’, the LAN will NOT assign IP address to the
associated hosts. Client PCs need to configure IP address manually.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
25
ZyWALL 2WG Support Notes
2. When choosing DHCP setting as a ‘Server’, the LAN will automatically assign IP, subnet,
gateway and DNS to the associated clients.
3. When choosing DHCP setting as a ‘Relay’, the LAN will forward the DHCP request to
another DHCP server.
Using NAT/Multi-NAT
• What is Multi-NAT?
• How NAT works
• NAT Mapping Types
• SUA versus Multi-NAT
• Example
Step 1. Applying NAT on WAN Interface
Step 2. Configuring NAT Address Mapping
Step 3. Using Multiple Global IP addresses for clients and servers (One-to-One, Many-to-One,
Server Set mapping types)
• Application -- Non NAT-Friendly Support
• What is Multi-NAT?
NAT (Network Address Translation-NAT RFC 1631) is the translation of an Internet Protocol address used
within one network to a different IP address known within another network. One network is designated the
inside
network and the other is the
outside
. Typically, a company maps its local inside network addresses to one
or more global outside IP addresses and "unmaps" the global IP addresses on incoming packets back into local
IP addresses. The IP addresses for the NAT can be either fixed or dynamically assigned by the ISP. In addition,
you can designate servers, e.g., a web server and a telnet server, on your local network and make them
accessible to the outside world. If you do not define any servers, NAT offers the additional benefit of firewall
protection. In such case, all incoming connections to your network will be filtered out by the ZyWALL, thus
preventing intruders from probing your network.
The SUA feature that the ZyWALL supports previously operates by mapping the private IP addresses to a
global IP address. It is only one subset of the NAT. The ZyWALL supports the most of the features of the NAT
based on RFC 1631, and we call this feature as 'Multi-NAT'. For more information on IP address translation,
please refer to RFC 1631,
The IP Network Address Translator (NAT)
.
26
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
• How NAT works
If we define the local IP addresses as the Internal Local Addresses (ILA) and the global IP addresses as the
Inside Global Address (IGA), see the following figure. The term 'inside' refers to the set of networks that are
subject to translation. NAT operates by mapping the ILA to the IGA required for communication with hosts on
other networks. It replaces the original IP source address (and TCP or UDP source port numbers) and then
forwards each packet to the Internet ISP, thus making them appear as if they had come from the NAT system
itself (e.g., the ZyWALL router). The ZyWALL keeps track of the original addresses and port numbers so
incoming reply packets can have their original values restored.
• NAT Mapping Types
NAT supports five types of IP/port mapping. They are:
1. One to One
In One-to-One mode, the ZyWALL maps one ILA to one IGA.
2. Many to One
In Many-to-One mode, the ZyWALL maps multiple ILA to one IGA. This is equivalent to SUA (i.e., PAT,
port address translation), ZyXEL's Single User Account feature that previous ZyNOS routers supported
(the SUA only option in today's routers).
3. Many to Many Overload
In Many-to-Many Overload mode, the ZyWALL maps the multiple ILA to shared IGA.
4. Many One to One
In Many One to One, the ZyWALL maps each ILA to unique IGA.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
27
ZyWALL 2WG Support Notes
5. Server
In Server mode, the ZyWALL maps multiple inside servers to one global IP address. This allows us to
specify multiple servers of different types behind the NAT for outside access. Note, if you want to map
each server to one unique IGA please use the One-to-One mode.
SUA (Single User Account), if you get only one public IP address from your ISP, then you should use SUA.
With SUA, PCs on ZyWALL's LAN side can access Internet without further configuration. If you have internal
servers to be accessed by remote users on Internet, you need to go to ADVANCED -> SUA/NAT -> SUA
Server to setup which service, or port numbers, you would like to forward to which Internal server.
Multi-NAT, if you get multiple public IP addresses from your ISP, then you may use Multi-NAT. With
Multi-NAT, you can choose different types of NAT mapping methods to utilize the public IP addresses. You
should define each NAT mapping rules clearly in ADVANCED -> SUA/NAT -> Address Mapping, so that
internal PCs can access Internet and internal servers can be accessed by remote uses on Internet.
28
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
Step 1. Applying NAT in WAN Interface
You can choose the NAT mapping types to either SUA Only or Full Feature in WAN setup.
NETWORK -> WAN
or ADVANCED -> NAT -> NAT Overview
All contents copyright (c) 2006 ZyXEL Communications Corporation.
29
ZyWALL 2WG Support Notes
Key Settings
Field Options Description
Full Feature
Set to 'Full Feature' if there are multiple IP addresses
given by ISP and can assigned to your clients.
Set to 'Routring' if you clients use Internet IP
Network Address Translation
Routing
addresses and thus do not need NAT function.
Set this field to 'SUA Only' if you want all clients
SUA Only
share one IP to Internet.
Step 2. Configuring NAT Address Mapping
To configure NAT, go to ADVANCED -> NAT -> Address Mapping
All contents copyright (c) 2006 ZyXEL Communications Corporation.
30
ZyWALL 2WG Support Notes
Step 3. Using Multiple Global IP addresses for clients and servers (One-to-One, Many-to-One, Server Set
mapping types)
In this case we have 3 IGAs (IGA1, IGA2 and IGA3) from the ISP. We have two very busy internal FTP
servers and also an internal general server for the web and mail. In this case, we want to assign the 3 IGAs by
the following way using 4 NAT rules.
Rule 1 (One-to-One type) to map the FTP Server 1 with ILA1 (192.168.1.10) to IGA1 (200.1.1.1).
Rule 2 (One-to-One type) to map the FTP Server 2 with ILA2 (192.168.1.11) to IGA2 (200.1.1.2).
Rule 3 (Many-to-One type) to map the other clients to IGA3 (200.1.1.3).
Rule 4 (Server type) to map a web server and mail server with ILA3 (192.168.1.20) to IGA3. Type
Server allows us to specify multiple servers, of different types, to other machines behind NAT on
the LAN.
Rule 1 Setup: Select One-to-One type to map the FTP Server 1 with ILA1 (192.168.1.10) to IGA1 (200.1.1.1).
All contents copyright (c) 2006 ZyXEL Communications Corporation.
31
ZyWALL 2WG Support Notes
Rule 2 Setup: Selecting One-to -One type to map the FTP Server 2 with ILA2 (192.168.1.11) to IGA2
(200.1.1.2).
Rule 3 Setup: Select Many-to-One type to map the other clients to IGA3.
Rule 4 Setup: Select Server type to map our web server and mail server with ILA3 (192.168.1.20) to IGA3.
When we have configured all four rules in the rule summary page.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
32
ZyWALL 2WG Support Notes
Now we configure all other incoming traffic to go to our web server and mail server in "Port Mapping" page,
Please note that if you turn on ZyWALL's firewall function, then you should add a firewall rule from WAN to
LAN to forward the incoming connections. If you would like to only allow traffic going to the internal server,
you should specify server's private IP address in the field of the destination IP address.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
33
ZyWALL 2WG Support Notes
Application for Non NAT Friendly Support
Some servers providing Internet applications such as some mIRC servers do not allow users to login using the
same IP address. In this case it is better to use Many One-to-One or One-to-One NAT mapping types, thus each
user login to the server is using a unique global IP address. The following figure illustrates this.
One rule configured for using Many One-to-One mapping type is shown below.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
34
ZyWALL 2WG Support Notes
Optimize network performance & availability
Using Bandwidth Management
Why Bandwidth Management (BWM)?
Nowadays, we have many different traffic types for Internet applications. Some traffic may consume high
bandwidth, such as FTP (File Transfer Protocol), if you are downloading or uploading files with large size.
Some other traffic may not require high bandwidth, but they require stable supply of bandwidth, such as
VoIP traffic. The VoIP quality would not be good, if all of the outgoing bandwidth is occupied via FTP.
Additionally, chances are that you would like to grant higher bandwidth for some body special that is
using specific IP address in your network. All of these are reasons why we need bandwidth management.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
35
ZyWALL 2WG Support Notes
How Bandwidth Management in ZyWALL?
ZyWALL achieves BWM by classifying packets, and control when to send out the classified packets.
Bandwidth Management of ZyXEL appliances operates on the IP layer. The major step to configure
BWM is defining filter rules by fields of IP header or TCP/UDP port number. Then specify the volume of
bandwidth you want to allocate to the filtered traffic. There are two types of BWM in ZyXEL
implementations, Full and Lite versions.
Full version: Users can define how they want to classify traffic on each interface. In this version,
child-class can borrow bandwidth from parent-class if necessary by Bandwidth Borrowing. For classes
that need more bandwidth even after bandwidth borrowing, users can also apply Maximize Bandwidth Usage from the interface.
Using BWM
All contents copyright (c) 2006 ZyXEL Communications Corporation.
36
ZyWALL 2WG Support Notes
Go to ADVANCED->BW MGMT->Summary, activate bandwidth management on the interface you
would like to manage. We enable the BWM function on WAN interface in this example.
Enter the total speed for this interface that you want to allocate using bandwidth management. This
appears as the bandwidth budget of the interface’s root class.
Select how you want the bandwidth to be allocated. Priority-Based means bandwidth is allocated via
priority, so the traffic with highest priority would be served first, then the second priority is served
secondly and so on. If Fairness-Based is chosen, then the bandwidth is allocated by ratio. Which means if
A class needs 300 kbps, B class needs 600 kbps, then the ratio of A and B's actual bandwidth is 1:2. So if
we get 450 kbps in total, then A would get 150 kbps, B would get 300 kbps.
Key Settings:
Active
Speed
Scheduler
Maximize
Bandwidth
Usage
Go to ADVANCED->BW MGMT->Class Setup, select the interface on which you would like to setup
Check the box to enable BWM on the interface. Note that if you would like to manage
traffic from WAN to LAN, you should apply BWM on LAN interface.
Enter the total speed to manage on this interface. This value is the budget of the class
tree's root.
Choose the principle to allocate bandwidth on this interface. Priority-Based allocates
bandwidth via priority. Fairness-Based allocates bandwidth by ratio.
Check this box if you would like to give residuary bandwidth from Interface to the
classes who need more bandwidth than configured amount. Do not select this if you
want to reserve bandwidth for traffic that does not match a bandwidth class or you want
to limit the bandwidth of each class at the configured value. (Please note that to meat the
second condition, you should also disable bandwidth borrowing on the class.)
the Class tree.
Click the radio button besides the Root Class, then press 'Add Sub-Class'
All contents copyright (c) 2006 ZyXEL Communications Corporation.
37
ZyWALL 2WG Support Notes
Key Settings:
Class Name
Bandwidth
Budget
Priority
Bandwidth
Borrowing
Enable
Bandwidth
Filter
Destination IP
Address
Give this class a name, for example, 'App'
Configure the speed you would like to allocate to this class
Enter a number between 0 and 7 to set the priority of this class. The higher the number,
the higher the priority. The default setting is 3.
Check this box if you would like to let this class to borrow bandwidth from it's parents
when the required bandwidth is higher than the configured amount. Do not check this if
you want to limit the bandwidth of this class at the configured value.(Please note that
you should also disable Maximize Bandwidth Usage on the interface to meat the
condition.)
Check this to specify the traffic types via IP addresses/Port numbers.
Enter the IP address of destination that meats this class.
Destination
Subnet Mask
Destination
Port
Enter the destination subnet mask.
Enter the destination port number of the traffic.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
38
ZyWALL 2WG Support Notes
Source IP
Enter the IP address of source that meats this class. Note that for traffic from 'LAN to
WAN', since BWM is before NAT, you should use the IP address before NAT
Address
processing.
Source Subnet
Enter the destination subnet mask.
Mask
Source Port
Protocol ID
Enter the source port number of the traffic.
Enter the protocol number for the traffic. 1 for ICMP, 6 for TCP or 17 for UDP
After configuration BWM, you can check current bandwidth of the configured traffic in
ADVANCED->BWM MGMT->Monitor. The values in the column of Current usage (kbps) would
display the actually number.
Scenario - Limit bandwidth usage, but when there is residual bandwidth, we hope it can be shared fairly
among several active traffic.
Description
FTP Client A can get 400kbps FTP traffic and FTP Client B can get 800 kbps FTP traffic and IPTV user
can retrieve 800 kbps UDP streaming.
LAN Interface: Fairness-based, Speed = 2048kbps
Class 1: Budget = 400kbps, Dest. IP = FTP Client A’s IP, Service = FTP, Priority = 3, enable Borrow
Class 2: Budget = 800kbps, Dest. IP = FTP Client B’s IP, Service = FTP, Priority = 3, enable Borrow
Class 3: Budget = 800kbps, Dest IP = IPTV Client’s IP, Protocol = UDP.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
39
ZyWALL 2WG Support Notes
Step1.
Activate Bandwidth Management on the interface on which you want to control. In this example, it is
LAN. Assign 2048Kbps to LAN interface.
Step2. Go to “Class Setup” and select LAN from the drop-down list of Interface. Click on Root Class and
then click on “Add Sub-Class” to create and add a new class under root.
We add a service and allocate 400kbps for FTP and destined to FTP Client A. Select the Service as FTP
from drop-down list. Input Client A’s IP address as Destination IP Address.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
40
ZyWALL 2WG Support Notes
Step3. Add another service and allocate 800kbps for FTP and destined to FTP Client B. Select the Service
as FTP from drop-down list. Input Client B’s IP address as Destination IP Address.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
41
ZyWALL 2WG Support Notes
Step4. Add another service and allocate 800kbps for IPTV user and destined to Media traffic to IPTV user.
Select the Service as Custom from drop-down list and set Protocol IP as 17 (UDP). Input IPTV user’s IP
address as Destination IP Address.
Step 5. Three classes are created for FTP Client A, B & IPTV user as below:
All contents copyright (c) 2006 ZyXEL Communications Corporation.
42
ZyWALL 2WG Support Notes
Secure Connections across the Internet
Site-to-Site VPN (Intranet) Scenario
A site-to-site VPN protects the network resources on your protected networks from unauthorized use by
users on an unprotected network, such as the public Internet. Site-to-site VPN connects offices in different
locations with encryption technology.
Configure ZyWALLs with Static WAN IP Address
This section describes an example configuration ZyWALL with static WAN IP address.
If ZyWALL is used as Internet gateway and public IP address is assigned on ZyWALL’s WAN interface.
ZyWALL uses this public WAN IP address for terminating the VPN tunnels from remote VPN gateways.
In following example, local VPN gateway (ZyWALL) uses a static public IP address.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
43
ZyWALL 2WG Support Notes
1) Configure the static Public IP address to WAN interface through Network-> WAN-> WAN IP Address
Assignment
2) Enter the WAN IP address as My Address in Gateway Policy
3) On peer VPN gateway, use the same IP address as Remote Gateway Address in Gateway Policy
On Local VPN gateway, select IP as the Local IP Type and enter the public WAN IP address as the content of identify. One remote VPN peer, select IP as the Peer ID Type and enter the same IP address as
the content of identify.
Configure ZyWALL with Dynamic WAN IP Address
This section describes an example configuration ZyWALL with dynamic WAN IP address.
If ZyWALL uses PPPoE or Ethernet/DHCP for its Internet connection, WAN IP address is dynamically
assigned by ISP. Since ZyWALL has no idea about its WAN IP address before it is assigned, it is
difficult/impossible to use WAN IP Address for My Address in Gateway Policy.
To overcome this problem, Dynamic DNS can be used to resolving the VPN gateway. When new IP
All contents copyright (c) 2006 ZyXEL Communications Corporation.
44
ZyWALL 2WG Support Notes
address is assigned to ZyWALL’s WAN interface, ZyWALL will updates the related record in DDNS
server. Therefore the peer VPN gateway can resolve ZyWALL’s IP address to make a VPN tunnel.
In following example, local VPN gateway (ZyWALL) uses a dynamic WAN IP address (PPPoE with
dynamic IP assignment).
All contents copyright (c) 2006 ZyXEL Communications Corporation.
45
ZyWALL 2WG Support Notes
4) Configure the DDNS entry under DNS-> DDNS and bind it to a WAN interface.
5) Under Gateway Policy menu, select the DDNS entry from drop-down list and use it as My Domain
Name.
6) Configure the DDNS entry in Remote Gateway Address on peer VPN gateway.
7) Both DNS and E-mail can be used as the Local ID & Peer ID for authentication.
Note: If Hi-Available (HA) for incoming VPN HA is necessary, enable the HA option while configure the
DDNS entry under DNS-> DDNS ZyWALL will update its DDNS entry with another WAN interface
when the specified WAN interface is not available. Therefore, the next coming VPN connection will go
through second WAN interface.
Configure ZyWALL behind NAT Router
This section describes an example configuration ZyWALL behind NAT Router (Internet Gateway).
NAT routers sit on the border between private and public (Internet) networks, converting private
addresses in each IP packet into legally registered public ones. NAT is commonly supported by Internet
access routers that sit at the network edge. However, IPSec is NAT-sensitive protocol which means
modification on IPSec traffic may cause failure of VPN connection.
By far the easiest way to combine IPSec and NAT is to completely avoid these problems by locating
IPSec endpoints in public address space. This can be accomplished in two ways:
1) Perform NAT on a device located behind IPSec gateway
2) Use an IPSec gateway for both IPSec (VPN) and NAT (Internet Access).
However, in some situation, it is inevitable to locate IPSec gateway in public IP address and it must be
All contents copyright (c) 2006 ZyXEL Communications Corporation.
46
ZyWALL 2WG Support Notes
placed behind the NAT router. For example, the NAT router has a different interface (e.g. leased line,
ISDN) which are not supported by IPSec gateway. This example gives some guideline for configuring
ZyWALL behind NAT router.
1) UDP 500 (IKE) must be forwarded to ZyWALL to accept incoming VPN connection from peer VPN
gateway or client.
2) If Firewall is running on the same NAT router, make sure a firewall rule is configured to allow
IKE/IPSec (AH/ESP) traffic to pass-through.
Configuration on Peer VPN gatewayConfiguration on Loca l ZyWALL
WAN->WAN1 or WAN2
VPN->VPN Rule (IKE) on ZyWALL
4
3
VPN->VPN Rule (IKE) on ZyWALL
VPN->VPN Rule (IKE) on ZyWALL
5
6
3) On ZyWALL, enable “NAT T raversal” no matter if the front NAT router supports NAT Traversal
(IPSec pass-through) or not. With this option enabled, ZyWALL can detect if it is placed behind NAT
All contents copyright (c) 2006 ZyXEL Communications Corporation.
47
ZyWALL 2WG Support Notes
when peer VPN entity also support NAT Traversal function. If yes, the IPSec traffic will be
encapsulated in UDP packet to avoid traversal problem on NAT routers.
4) Under VPN->Gateway Policy-> Gateway Policy Information configure the private IP address as
“My Address” on local ZyWALL gateway (behind NAT router).
5) On peer VPN gateway, use the public WAN IP address of NAT Router as the “Remote Gateway
Address” of Gateway Policy rule.
The ID must be consistent no matter if IP/DNS/EMAIL is used. So long as if the ID Type and content are
consistent on both VP entities.
Mapping multiple Network policy to same gateway policy
This section describes an example configuration to map multiple (different) network policies to same
gateway policy which is built between two VPN gateways. Different network policies allow user in one
network to access multiple destination networks which are not in the continuous range. The other feature
of this application is to limit some users to access some specific destination and prevent others from
accessing the same network.
In following example, the owner of PC1 belongs to financial department and needs to connect to the
financial department (Dept.1) for business sensitive application. PC2 belongs to other group (Dept.2) and
need to access Dept.2 .
Traffic (PC1 <– > Dept1)
Dept. 1
Dept. 2
GW1
IPSec
IPSec Tunnel 1
Tunnel
IPSec
IPSec Tunnel 2
Tunnel
IKE Tunnel
Traffic (PC2 <–> Dept2)
IPSec
IPSec Tunnel 1IPSecTunnel
Tunnel
IPSec
IPSec Tunnel 2
Tunnel
PC 1
GW2
PC 2
Dept. 1
Dept. 2
Internet
PC1
PC 1
PC2
PC 2
GW1
VPN tunnel 1
VPN tunnel 2
GW2
All contents copyright (c) 2006 ZyXEL Communications Corporation.
48
ZyWALL 2WG Support Notes
The configuration goal is to achieve following two:
1) Setup VPN rule to allow PC1 to access Dept.1 through the tunnel between GW1 & GW2
2) Setup VPN rule to allow PC2 to access Dept.2 through the tunnel between GW1 & GW2
PC1PC2GW2GW1Dept.1 Dept.2
192.168.35.101 192.168.35.102
WAN
210.242.82.35
WAN
192.168.71.0/24 192.168.72.0/24
210.242.82.70
The following will illustrate how to configure on the GW1:
1) Login ZyWALL and click at “VPN”
3) Click on the icon to add a new “gateway policy” of the VPN tunnel
4) Enable “NAT Traversal” and configure the WAN IP as the “My Address” of My ZyWALL and
5) Under Authentication Key, “Pre-Shared Key” or “Certificate” can be used as authentication method.
For detailed usage of “Pre-Shared Key” and “Certificate”, please refer to XXX. In this example,
“Pre-Shared Key” is used and the string “12345678” is used as example.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
49
ZyWALL 2WG Support Notes
6) Extended Authentication (xAuth) can be enabled or not depending on your application. For detailed
info, you can refer to XXX.
7) Under “IKE Proposal”, select the Encryption and Authentication Algorithm. Note the configuration
must be consist on both ZyWALLs (GW1 & GW2)
8) Click on “Apply” to save profile
9) The IKE rule will be configured as below:
All contents copyright (c) 2006 ZyXEL Communications Corporation.
50
ZyWALL 2WG Support Notes
10) Click on the icon to add a new “Network Policy” over the configured Gateway Policy.
11) Activate the profile and name this policy as “PC1-to-Dept1” in this example. Enable “Nailed-Up”
option if you need the functionality that will automatically re-initiate a tunnel to a configured peer in
the event of SA Lifetime expires, failure on the link.
12) This network policy “PC1-to-Dept1” will be mapped to Gateway Policy, “Static Public IP Address”
by default. If you need to change to other pre-defined Gateway Policy, you can select from the
drop-down list.
13) Under “Local Network”, choose “Subnet” and input “192.168.71.0” and “255.255.255.0” for Dept1 in
this example.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
51
ZyWALL 2WG Support Notes
14) Under “Remote Network”, choose “Single” and input “192.168.1.101” for PC1 in this example.
15) Under “IPSec Proposal”, select the Encryption and Authentication Algorithm. Note the configuration
must be consist on both ZyWALLs (GW1 & GW2)
16) Click on “Apply” to save profile
17) The new Network Policy, PC1-to-Dept1 is added to the Gateway Policy.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
52
ZyWALL 2WG Support Notes
18) Follow the same procedures as step 10~16 to add 2nd Network Policy, PC2-to-Dept2.
Finish
Using Certificate for Device Authentication
IKE must authenticate the identities of the systems using the Diffie-Hellman algorithm. This process is
known as primary authentication. IKE can use two primary authentication methods:
1) Digital Signatures
2) Pre-shared keys
Digital signature and public-key encryption are both based on asymmetric key encryption and require a
mechanism for distributing public keys. This is usually done using security certificates and a Public Key
Infrastructure (PKI).
If certificate (Digital Signatures) is used for authentication, there are five available types of identity: IP,
All contents copyright (c) 2006 ZyXEL Communications Corporation.
53
ZyWALL 2WG Support Notes
DNS, E-mail, Subject Name and Any.
Depending how certificates are generated, it can be classified into three methods:
1) Using Self-signed Certificates (both entities must be ZyXEL IPSec gateway)
2) Online Enroll Certificates
3) Offline Enroll Certificates
This example displays how to use PKI feature in VPN function of ZyXEL appliance. Through PKI
function, users can achieve party identification when doing VPN/IPSec negotiation.
Using Self-signed Certificates
For customers who don't have CA service support in their environment but would like to use PKI feature,
ZyWALL provides self-signed certificates to achieve this. As the name indicates, a self-signed certificate
is a certificate signed by the device (ZyWALL) itself.
ZyWALL has the feature to sign itself a so-called self-signed certificate which can be imported to other
ZyWALL for authentication. This feature allows users to use certificate without CA. The certificate must
be exchanged and imported into Trusted Remote Hosts before making a VPN connection.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
54
ZyWALL 2WG Support Notes
The factory default self-signed certificates are the same on all ZyWALL models. It is not secure to use the
default self-signed certificate. To make the self-signed certificate unique for this device, you should
replace the factory default certificate by pressing the Apply button in the following page at the first time
you login to ZyWALL.
If you reset ZyWALL to default configuration file, the original self-signed certificate is also erased, and a
new self-signed certificate should be created at the first boot up time.
To use self-signed certificate, go to ZyWALL CERTIFICATES->My Certificates and export ZyWALL’s
certificate.
1) Press “Export” to save the ZyWALL self-signed certificate to local computer in Binary X.509 format.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
55
ZyWALL 2WG Support Notes
2) Or mark the certificate in PEM (Base-64) Encoded Format and then copy to a test editor (e.g.
Notepad) and then save to you local computer in PEM (Base-64) Encoded Format.
Then import the certificate to the other ZyWALL VPN gateway. Go to the other ZyWALL and click
“Import” button under CERTIFICATES->Trusted Remote Hosts
Select the certificate from local computer.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
56
ZyWALL 2WG Support Notes
When you configure VPN rule with certificate, select Certificate under VPN-> Gateway Policy. Select My
Certificate from the drop-down list. When (My) certificate is selected, ZyWALL will show what is the Local ID
Type and Content in my certificate. You must configure the same setting on peer ZyWALL and vise versal.
For example, on Local ZyWALL, the Local ID Type is E-mail and content is
00A0C5012345@auto.gen.cert.
Therefore, configure Peer ID Type and content on peer ZyWALL.
Online Enroll Certificates
This example displays how to use PKI feature in VPN function of ZyXEL appliance. Through PKI function,
users can achieve party identification when doing VPN/IPSec negotiation. With online enrollment, ZyWALL
firstly create certification request locally, then send certification request to trusted CA (Certificate Authority)
All contents copyright (c) 2006 ZyXEL Communications Corporation.
57
ZyWALL 2WG Support Notes
servers, and finally get a certificate for further usage. ZyWALL supports both SCEP and CMP protocols as
methods of online enrollment. Both SCEP and CMP online enrollment protocols provide secure mechanisms to
transmit ZyWALL's certification request securely over Internet. In this example, we adopt SCEP protocol to
enroll certificates.
Step 1. Download CA server's Certificate
Step 2. Create certificate request and enroll certificate request on ZyWALL A
Step 3. Create certificate request and enroll certificate request on ZyWALL B
Step 4. Using Certificate in VPN on ZyWALL A
Step 5. Using Certificate in VPN on ZyWALL B
LAN 1ZyW ALL AZyWALL BLAN 2
10.1.133.0/24
LAN: 10.1.133.1
WAN: 192.168.1.35
Step 1. Download CA server's Certificate
LAN: 192.168.2.1
192.168.2.0/24
WAN: 192.168.1.36
The most critical part for online certification request would be we need to send the certification request over
Internet, which is an insecure environment. To prevent certification request from being modified or
eavesdropped, we need to download CA server's certificate in the first step. When ZyWALL delivers the
certification requests, the public key in CA server's certificate will be used to protect the data.
You may need to access CA server's WEB interface or contact the administrator to get CA's certificate. Then
you can go to SECURITY->CERTIFICATES->Trusted CAs to import the downloaded certificate.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
58
ZyWALL 2WG Support Notes
Step 2. Create certificate request and enroll certificate request on ZyWALL A
Input a name, for this Certificate so you can identify this Certificate later.
1.
2.
In Subject Information, give this certificate a Common Name by either Host IP Address, Host Domain
Name or E-Mail address. Organizational Unit, Organization, Country are optional fields, you are free to
either enter them or not.
3.
Finally, specify the key length.
4. Select Create a certification request and enroll for a certificate immediately online.
5. Specify the Enrollment Protocol to Simple Certificate Enrollment Protocol (SCEP).
6.
In the "CA Server's Address" field, input the URL to access CA server, for example,
http://1.1.1.1:8080/scep/
7. Choose the previously downloaded CA server's certificate from the drop down list.
8.
Input user name and password if necessary.
9.
Then click Apply.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
59
ZyWALL 2WG Support Notes
After pressing the Apply button, ZyWALL would create the certification request and send it to the CA server
for enrollment. It may take one minutes to complete the whole process. After CA server agrees to issue the
corresponding certificate, you will find a newly enrolled certificate in My Certificates.
Step 3. Create certificate request and enroll certificate request on ZyWALL B
All contents copyright (c) 2006 ZyXEL Communications Corporation.
60
ZyWALL 2WG Support Notes
1. Input a name, for this Certificate so you can identify this Certificate later.
2.
In Subject Information, give this certificate a Common Name by either Host IP Address, Host Domain
Name or E-Mail address. Organizational Unit, Organization, Country are optional fields, you are free to
either enter them or not.
3.
Finally, specify the key length.
Select Create a certification request and enroll for a certificate immediately online.
4.
5.
Specify the Enrollment Protocol to Simple Certificate Enrollment Protocol (SCEP).
6.
In the "CA Server's Address" field, input the URL to access CA server, for example,
http://1.1.1.1:8080/scep/
7.
Choose the previously downloaded CA server's certificate from the drop down list.
8.
Input user name and password if necessary.
9. Then click Apply.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
61
ZyWALL 2WG Support Notes
After pressing the Apply button, ZyWALL would create the certification request and send it to the CA server
for enrollment. After CA server agrees to issue the corresponding certificate, ZyWALL will receive it
automatically, and you will find a newly enrolled certificate in My Certificates.
Step 4. Using Certifica e in VPN on ZyWALL A
t
1. Activate the rule
2. Give this VPN rule a name "toZyWALL_B"
3. Select Key Management to "IKE"
4. Select Negotiation Mode to "Main"
5. Edit Local: Address Type="Subnet Address", Starting IP Address="10.1.33.0", End IP Address/Subnet
Mask="255.255.255.0"
6. Edit Remote: Address Type="Subnet Address", Starting IP Address="192.168.2.0", End IP Address/Subnet
Mask="255.255.255.0"
7. Authentication Key, Select Certificate, and choose certificate you enrolled for this device from drop down list.
8. Fill in My IP address= "192.168.1.35"
9. Peer ID type= "ANY"
10. Secure Gateway Address= "192.168.1.36"
11. Encapsulation Mode="Tunnel"
12. Leave other options as default.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
62
ZyWALL 2WG Support Notes
13. You can check detailed settings by clicking Advanced button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
63
ZyWALL 2WG Support Notes
Step 5. Using Certifica e in VPN on ZyWALL B
t
1. Activate the rule
2. Give this VPN rule a name "toZyWALL_A"
3. Select Key Management to "IKE"
4. Select Negotiation Mode to "Main"
5. Edit Local: Address Type="Subnet Address", Starting IP Address="192.168.2.0", End IP Address/Subnet
Mask="255.255.255.0"
6. Edit Remote: Address Type="Subnet Address", Starting IP Address="10.1.33.0", End IP Address/Subnet
Mask="255.255.255.0"
7. Authentication Key, Select Certificate, and choose certificate you enrolled for this device from drop down list.
8. Fill in My IP address= "192.168.1.36"
9. Peer ID type= "ANY".
10. Secure Gateway Address= "192.168.1.35"
11. Encapsulation Mode="Tunnel"
12. Leave other options as default.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
64
ZyWALL 2WG Support Notes
13. You can check detailed settings by clicking Advanced button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
65
ZyWALL 2WG Support Notes
Offline Enroll Certificates
In this guide, we describe how ZyWALL devices, both ZyWALL A and ZyWALL B as IPSec/VPN tunnel
end points, authenticate each other through PKI. We use CA (Certificate Authority) service provided by
Windows 2000 server in this example. The whole procedure includes
Step 1. Create certificate request on ZyWALL A.
Step 2. Enroll the certificate request to Windows 2000.
Step 3. Create certificate request on ZyWALL B.
Step 4. Enroll the certificate request to Windows 2000.
Step 5. Setup VPN rule on ZyWALL A
Step 6. Setup VPN rule on ZyWALL B.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
66
ZyWALL 2WG Support Notes
LAN 1ZyW ALL AZyWALL BLAN 2
LAN: 10.1.133.1
LAN: 192.168.2.1
10.1.133.0/24
WAN: 192.168.1.35
WAN: 192.168.1.36
tStep 1. Create Certificate Reques on ZyWALL A
1. Go to VPN->My Certificates -> Click Create button.
192.168.2.0/24
All contents copyright (c) 2006 ZyXEL Communications Corporation.
67
ZyWALL 2WG Support Notes
2. Input a name, for this Certificate so you can identify this Certificate later. In Subject Information, give this
certificate a Common Name by either Host IP Address, Host Domain Name or E-Mail address. Organizational
Unit, Organization, Country are optional fields, you are free to either enter them or not. Finally, specify the key
length and select Create a certification request and save it locally for later manual enrollment.
3. Wait for 1-2 minutes until "Request Generation Successful" displays. During this period, ZyWALL is
working on creation of private, public key pair, and certificate request.
4. After creating certificate request, ZyWALL would return Successful Message.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
68
ZyWALL 2WG Support Notes
5. In My Certificates tab, you can get a new entry in grey color. This is the Certificate Request you just created.
Click Details to export the request.
Step 2. Enroll Certificate Request
1. Copy the content of Certificate in PEM Encoded Format, by selecting all of the content, then right click your
mouse, and select Copy. Keep your copy in clipboard for later paste.
69
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
In this support note, we utilize certificate enrollment service from Microsoft Windows 2000 CA server. The
enrollment procedure of your CA server may be different, you may need to check your CA service provider for
details. For how to setup Windows 2000 CA server, users may refer to http://www.microsoft.com.
2. Issue the URL to access the CA server, type in User Name/Password/Domain fields.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
70
ZyWALL 2WG Support Notes
3, Select Request a Certificate, then press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
71
ZyWALL 2WG Support Notes
4. Choose Advanced request, the press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
72
ZyWALL 2WG Support Notes
5. Choose "Submit a certificate request using a base64...", then press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
73
ZyWALL 2WG Support Notes
6. Right click your mouse, then paste the certificate request you get in
step 2.1.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
74
ZyWALL 2WG Support Notes
7. Click "Download CA certification path"
8. A file download would pop out, press Save button, and choose the local folder you would like to store the
certification path.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
75
ZyWALL 2WG Support Notes
9. Double click the saved file, Select Certificates, right click the Certificate, choose All Tasks-> Export...
10. Certificate Export Wizard would be popped up, then press Next>.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
76
ZyWALL 2WG Support Notes
11. Choose DER encoded binary X.509(.CER), then press Nxet>,
12. Specify the path to store your exported Certificate.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
77
ZyWALL 2WG Support Notes
13. Click Finish.
14. Go to ZyWALL WEB GUI -> VPN -> My Certificates -> click Import button.
15. Click Browse... button to find the location you stored ZyWALL's certificate then press Apply button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
78
ZyWALL 2WG Support Notes
16. After a while, if you see the gray entry turns to a black one, then it means the import of ZyWALL's
certificate is successful.
17. Repeat the same procedure from 9 to 13, to export CA's certificate. Note that you may get more than one
CA server's certificate, it's not necessary to export all of the CA server's certificates, you can double click
ZyWALL's certificate, such as zywall_a.cert.cert in this example, and select Certification Path to view the
nearest CA server's name, and then - export that CA server's certificate.
Import the saved CA server's certificate. Click Browse... button, and then select the location.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
79
ZyWALL 2WG Support Notes
After import CA's certificate, you will get this display.
tStep 3. Create Certificate Reques on ZyWALL_B
1. Go to VPN->My Certificates -> Click Create button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
80
ZyWALL 2WG Support Notes
2. Input a name, for this Certificate so you can identify this Certificate later. In Subject Information, give this
certificate a Common Name by either Host IP Address, Host Domain Name or E-Mail address. Organizational
Unit, Organization, Country are optional fields, you are free to either enter them or not. Finally, specify the key
length and select Create a certification request and save it locally for later manual enrollment.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
81
ZyWALL 2WG Support Notes
3. Wait for 1-2 minutes until "Request Generation Successful" displays. During this period, ZyWALL is
working on creation of private, public key pair, and certificate request.
4. After creating certificate request, ZyWALL would return Successful Message.
5. In My Certificates tab, you can get a new entry in grey color. This is the Certificate Request you just created.
Click Details to export the request.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
82
ZyWALL 2WG Support Notes
Step 4. Enroll Certificate Request on ZyWALLB
1. Copy the content of Certificate in PEM Encoded Format, by selecting all of the content, then right click your
mouse, and select Copy. Keep your copy in clipboard for later paste.
In this support note, we utilize certificate enrollment service from Microsoft Windows 2000 CA server. The
enrollment procedure of your CA server may be different, you may need to check your CA service provider for
details. For how to setup Windows 2000 CA server, users may refer to http://www.microsoft.com.
2. Issue the URL to access the CA server, type in User Name/Password/Domain fields.
83
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
3, Select Request a Certificate, then press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
84
ZyWALL 2WG Support Notes
4. Choose Advanced request, the press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
85
ZyWALL 2WG Support Notes
5. Choose "Submit a certificate request using a base64...", then press Next> button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
86
ZyWALL 2WG Support Notes
6. Right click your mouse, then paste the certificate request you get in step 4.1.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
87
ZyWALL 2WG Support Notes
7. Click "Download CA certification path"
8. A file download would pop out, press Save button, and choose the local folder you would like to store the
certification path.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
88
ZyWALL 2WG Support Notes
9. Double click the saved file, Select Certificates, right click the Certificate, choose All Tasks-> Export...
10. Certificate Export Wizard would be popped up, then press Next>.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
89
ZyWALL 2WG Support Notes
11. Choose DER encoded binary X.509(.CER), then press Nxet>,
All contents copyright (c) 2006 ZyXEL Communications Corporation.
90
ZyWALL 2WG Support Notes
12. Specify the path to store your exported Certificate.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
91
ZyWALL 2WG Support Notes
13. Click Finish.
14. Go to ZyWALL WEB GUI -> VPN -> My Certificates -> click Import button.
15. Click Browse... button to find the location you stored ZyWALL's certificate then press Apply button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
92
ZyWALL 2WG Support Notes
16. After a while, if you see the gray entry turns to a black one, then it means the import of ZyWALL's
certificate is successful.
17. Repeat the same procedure from 9 to 13, to export CA's certificate. Note that you may get more than one
CA server's certificate, it's not necessary to export all of the CA server's certificates, you can double click
ZyWALL's certificate, such as zywall_a.cert.cert in this example, and select Certification Path to view the
nearest CA server's name, and then - export that CA server's certificate.
Import the saved CA server's certificate. Click Browse... button, and then select the location.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
93
ZyWALL 2WG Support Notes
18. After import CA's certificate, you will get this display.
Step 5. Using Certifica e in VPN on ZyWALL A
t
1. Activate the rule
2. Give this VPN rule a name "toZyWALL_B"
3. Select Key Management to "IKE"
4. Select Negotiation Mode to "Main"
5. Edit Local: Address Type="Subnet Address", Starting IP Address="10.1.33.0", End IP Address/Subnet
Mask="255.255.255.0"
6. Edit Remote: Address Type="Subnet Address", Starting IP Address="192.168.2.0", End IP Address/Subnet
Mask="255.255.255.0"
7. Authentication Key, Select Certificate, and choose certificate you enrolled for this device from drop down list.
8. Fill in My IP address= "192.168.1.35"
94
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 2WG Support Notes
9. Peer ID type= "ANY".
10. Secure Gateway Address= "192.168.1.36"
11. Encapsulation Mode="Tunnel"
12. Leave other options as default.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
95
ZyWALL 2WG Support Notes
13. You can check detailed settings by clicking Advanced button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
96
ZyWALL 2WG Support Notes
Step 6. Using Certificate in VPN on ZyWALL B
1. Activate the rule
2. Give this VPN rule a name "toZyWALL_A"
3. Select Key Management to "IKE"
4. Select Negotiation Mode to "Main"
5. Edit Local: Address Type="Subnet Address", Starting IP Address="192.168.2.0", End IP Address/Subnet
Mask="255.255.255.0"
6. Edit Remote: Address Type="Subnet Address", Starting IP Address="10.1.33.0", End IP Address/Subnet
Mask="255.255.255.0"
7. Authentication Key, Select Certificate, and choose certificate you enrolled for this device from drop down list.
8. Fill in My IP address= "192.168.1.36"
9. Peer ID type= "ANY".
10. Secure Gateway Address= "192.168.1.35"
11. Encapsulation Mode="Tunnel"
12. Leave other options as default.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
97
ZyWALL 2WG Support Notes
13. You can check detailed settings by clicking Advanced button.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
98
ZyWALL 2WG Support Notes
Using Pre-Shared Key for Device Authentication
The IKE protocol also provides primary authentication - verifying the identity of the remote system
before negotiating the encryption algorithm and keys. Two kinds of authentication methods are supported
on ZyWALL: pre-shared key & certificate.
If pre-shared key is used, a shared, symmetric key must be manually exchanged and configured on the
two entities. Three types of identity are available: IP, DNS and E-mail.
Here are some rules to follow in Authentication Key:
3) Pre-shared key must be configured identically on both entities
4) The Local ID Type & Content of Local ZyWALL must be the same as that of Peer ID Type &
Content of peer VPN gateway.
5) When IP is selected as ID Type, the Content must be in the format of X.X.X.X (e.g. 210.242.82.70)
6) When DNS/E-mail are selected as ID Type, the same string must be configured on both entities.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
99
ZyWALL 2WG Support Notes
Configuration on Peer VPN gatewayConfiguration on Local ZyWALL
Pre-Shared Key must be identical on both entities
Local ID Type & Content on Local ZyWALL must be identical as
Peer ID Type & Content on Peer VPN gateway
Peer ID Type & Content on Local ZyWALL on Local ZyWALL must be identical as
Local ID Type & Content on Peer VPN gateway
Note:
1) If “ID T ype” is mis-configured on Local/Remote IPSec Gateway, the ZyWALL will show
[NOTFY:ERR_ID_INFO] error message in related IKE log.
2) If “Pre-shared Key” or ID “Content” are mis-configured on Local/Remote IPSec Gateway,
ZyWALL will show [NOTFY:ERR_ID_INFO] error message in related IKE log.
Using VPN routing between branches
Setup VPN in Branch Office A
1.
2. Setup VPN in Branch Office B
3.
Setup VPN in Headquarter
This page guides us how to setup VPN routing between branch offices through headquarter. So that whenever
branch office A wants to talk to branch office B, headquarter plays as a VPN relay. Users can gain benefit
from such application when the scale of branch offices is very large, because no additional VPN tunnels
between branch offices are needed. In this support note, we skip the detailed configuration steps for Internet
access and presume that you are familiar with basic ZyNOS VPN configuration.
All contents copyright (c) 2006 ZyXEL Communications Corporation.
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.