Zyxel Device | Remote IPSec router |
|---|---|
Local ID type: tom@youroffice.com | Local ID type: 1.1.1.2 |
Peer ID type: 1.1.1.2 | Peer ID type: tom@youroffice.com |
Zyxel Device | Remote IPSec router |
|---|---|
Local ID type: tom@youroffice.com | Local ID type: 1.1.1.2 |
Peer ID type: 1.1.1.20 | Peer ID type: tom@youroffice.com |
Site-to-site | Site-to-site with dynamic peer |
|---|---|
Choose this if the remote IPSec router has a static IP address or a domain name. This Zyxel Device can initiate the VPN tunnel. The remote IPSec router can also initiate the VPN tunnel if this Zyxel Device has a static IP address or a domain name. | Choose this if the remote IPSec router has a dynamic IP address. You don’t specify the remote IPSec router’s address, but you specify the remote policy (the addresses of the devices behind the remote IPSec router). This Zyxel Device must have a static IP address or a domain name. Only the remote IPSec router can initiate the VPN tunnel. |
Label | Description |
|---|---|
Monitor | The graph shows the number of connected and disconnected VPNs. |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
Active | To turn on an entry, select it and click Activate. |
Inactive | To turn off an entry, select it and click Inactivate. |
Connect | To connect an IPSec SA, select it and click Connect. |
Disconnect | To disconnect an IPSec SA, select it and click Disconnect. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. The connect icon is lit when the interface is connected and dimmed when it is disconnected. |
Name | This field displays the name of the VPN rule. |
Outgoing Interface | This field displays the interface IP address or DNS name the VPN connection uses to transmit packets. |
Remote Gateway | This field displays the remote IPSec device IP address or DNS name in use for this VPN connection. |
Type | This field displays the type (route based or policy based) the VPN rule is using. |
Type | This field displays if the VPN rule is configured through wizard or a customized rule. |
Local | This field displays the IP address of the computer on your network. |
Remote | This field displays the IP address of the computer behind the remote IPSec device. |
Label | Description |
|---|---|
Name | Type the name used to identify this rule. You may use 1-31 single-byte characters, including 0-9a-zA-Z, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
IKE Version | Select IKEv1 or IKEv2. IKEv1 applies to IPv4 traffic only. IKEv2 applies to both IPv4 and IPv6 traffic. IKE (Internet Key Exchange) is a protocol used in setting up security associations that allows two parties to send data securely. See Virtual Private Networks (VPN) Overview for more information on IKEv1 and IKEv2. |
Type | Select Wizard to configure the VPN rule using the wizard. Select Custom to configure the VPN rule with customized settings. |
Behind NAT | None/ Local Site: The remote IPSec device has a static IP address or a domain name. This Zyxel Device can initiate the VPN tunnel. Remote Site: The remote IPSec device has a dynamic IP address. Only the remote IPSec device can initiate the VPN tunnel. |
Label | Description |
|---|---|
My Address | Select an interface or enter the IPv4 address or domain name of the interface the VPN connection uses to transmit packets out of the Zyxel Device. |
Peer Gateway Address | Enter the WAN IPv4 address or domain name of the remote IPSec device to identify the remote IPSec router by its IP address or domain name. |
Zone | Select a zone for the IPSec policy. Go to Security Policy > Policy Control to make sure that a security policy will not block traffic going to the zone you select. |
Label | Description |
|---|---|
Pre-Shared Key | Select this to have the Zyxel Device and remote IPSec router use a pre-shared key (password) of up to 128 characters to identify each other when they negotiate the IKE SA. Type the pre-shared key in the field to the right. The pre-shared key can be: • 8 to 128 single-byte characters, including [0-9][a-z][A-Z]['(){}<>^`+/:!*_#@&=$\.~%,|;-"] The Zyxel Device and remote IPSec router must use the same pre-shared key. Click the eye icon to see the pre-shared key in readable plain text. |
Certificate | Alternatively, select Certificate to use one of the Zyxel Device certificates for authentication. |
Label | Description |
|---|---|
Type | Select Route-Based to create a VPN rule that encrypts traffic based on the static route settings. Select Policy-Based to create a VPN rule that encrypts traffic based on the IPv4 addresses you set in Local Subnet and Remote Subnet. |
Local Subnet | This field displays when you select Policy-Based in the Type field. Type the IP address of a computer on your network that can use the tunnel. You can also specify a subnet. This must match the remote IP address configured on the remote IPSec device. |
Remote Subnet | Type the IP address of a computer behind the remote IPSec device. You can also specify a subnet. This must match the local IP address configured on the remote IPSec device. |
Metric | This field displays when you select Route-Based in the Type field. Type the number for the priority of the route. A lower value indicates higher priority. Metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link. The number need not be precise, but it must be 0 – 127. In practice, 2 or 3 is usually a good number. |
VTI Interface | This field displays when you select Route-Based in the Type field. Type the IP address and subnet mask of the virtual interface to use for the tunnel. |
Label | Description |
|---|---|
General Settings | |
Enable | Slide the switch to the right to activate this VPN connection |
Name | Type the name used to identify this rule. You may use 1-31 single-byte characters, including 0-9a-zA-Z, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
IKE Version | Select IKEv1 or IKEv2. IKEv1 applies to IPv4 traffic only. IKEv2 applies to both IPv4 and IPv6 traffic. IKE (Internet Key Exchange) is a protocol used in setting up security associations that allows two parties to send data securely. See Virtual Private Networks (VPN) Overview for more information on IKEv1 and IKEv2. |
Type | Select Route-Based to create a VPN rule that encrypts traffic based on the static route settings. Select Policy-Based to create a VPN rule that encrypts traffic based on the Local and Remote IPv4 addresses you set in Policy in Phase 2 Settings. |
Network | |
My Address | Select Interface to choose the interface on the Zyxel Device that will use the tunnel. Select Domain Name/IP to enter the IP address or FQDN of a computer on your network that will use the tunnel. This must match the remote IP address configured on the remote IPSec device. |
Peer Gateway Address | Select Domain Name/IP to enter the domain name or the IP address of the remote IPSec router. Select Dynamic Address if the remote IPSec router has a dynamic IP address (and does not use DDNS). |
Primary | Enter the domain name or the IP address of the remote IPSec router. |
Secondary | Use this field to configure a backup peer IPSec router. • Enter the domain name or IP address of the backup remote IPSec router. When the primary peer IPSec router becomes unavailable, the Zyxel Device reconnects the tunnel to this secondary peer IPSec router. • Leave this field blank if you do not set up a secondary peer IPSec router for failover. |
Fallback | Select this option to have the Zyxel Device automatically reconnect to the primary peer IPSec router when it becomes available again. Once reconnected to the primary IPSec router, the Zyxel Device stops the connection with the secondary peer IPSec router. |
Check Interval | Enter the number of seconds (30–300) to define how often the Zyxel Device checks if the primary peer IPSec router is available. |
Zone | Select a zone for the IPSec policy. ![]() Go to Security Policy > Policy Control to make sure that a security policy will not block traffic going to the zone you select. |
Authentication | |
Pre-Shared Key | Select this to have the Zyxel Device and remote IPSec router use a pre-shared key (password) of up to 128 characters to identify each other when they negotiate the IKE SA. Type the pre-shared key in the field to the right. The pre-shared key can be: • 8 to 128 single-byte characters, including [0-9][a-z][A-Z]['(){}<>^`+/:!*_#@&=$\.~%,|;-"] The Zyxel Device and remote IPSec router must use the same pre-shared key. Click the eye to see the pre-shared key in readable plain text. |
Certificate | Alternatively, select Certificate to use one of the Zyxel Device certificates for authentication. |
Advanced Settings | |
Local ID | Enter one of the followings to identify the Zyxel Device during authentication. IPv4 - the Zyxel Device is identified by an IP address DNS - the Zyxel Device is identified by a domain name E-mail - the Zyxel Device is identified by the string specified in this field |
Remote ID | Enter one of the followings to identify the remote IPSec router during authentication. IPv4 - the remote IPSec router is identified by an IP address DNS - the remote IPSec router is identified by a domain name E-mail - the remote IPSec router is identified by the string specified in this field If the Zyxel Device and remote IPSec router use certificates, there is one more choice. Subject Name - the remote IPSec router is identified by the subject name in the certificate |
Phase 1 Settings | This establishes a secure tunnel between the Zyxel Device and the peer site. |
SA Life Time | Set how often the Zyxel Device renegotiates the IKE SA. A short SA life time increases security, but renegotiation temporarily disconnects the VPN tunnel. The value you set for the SA life time in Phase 1 Settings should be greater than or equal to the value you set for the SA life time in Phase 2 Settings. |
Add | Click this to add an entry. |
Edit | Select an entry and click this to edit the entry. |
Remove | Select an entry and click this to remove the entry. |
Proposal | |
Encryption | Select which key size and encryption algorithm to use in the IPSec SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm The Zyxel Device and the remote IPSec router must both have at least one proposal that uses the same encryption and the same key. Longer keys are more secure, but require more processing power, resulting in increased latency and decreased throughput. |
Authentication | Select which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are MD5, SHA1, SHA256, SHA384 and SHA512. SHA is generally considered stronger than MD5, but it is also slower. The Zyxel Device and the remote IPSec router must both have a proposal that uses the same authentication algorithm. |
Diffie-Hellman Groups | Select which Diffie-Hellman key group (DHx) you want to use to create encryption keys. Choices are DH2, DH5, DH14, DH15, DH16, DH19, DH20, DH21, DH28, DH29, and DH30. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. The Zyxel Device and the remote IPSec router must use the same DH key group. See IPSec VPN Background Information for more information on DH key group. Different operating systems may support different DH key groups. Check your operating system documentation. • For Windows VPN clients, Zyxel SecuExtender perpetual VPN clients versions 3.8.203.61.32 and earlier support DH1 to DH14. • For macOS VPN clients, Zyxel SecuExtender subscription VPN clients versions 1.2.0.7 and later support DH14 to DH21. For Windows VPN clients, Zyxel SecuExtender subscription VPN clients versions 5.6.80.007 and later support DH14 to DH21. • Windows versions 7, 10, 11 built-in IKEv2 VPN clients support DH2 by default. • macOS versions 14.2 and later built-in IKEv2 VPN clients support DH14 by default. • iOS versions 10.15 and later built-in IKEv2 VPN clients support DH14 by default. |
Advanced Settings | |
DPD Delay | Configure this field if you want the Zyxel Device to make sure the remote IPSec router is there before it transmits data through the IKE SA. The remote IPSec router must support Dead Peer Detection (DPD). Set how many seconds the Zyxel Device will wait before sending a message to the remote IPSec router it there has been no traffic. If the remote IPSec router responds, the Zyxel Device transmits the data. If the remote IPSec router does not respond, the Zyxel Device shuts down the IKE SA. This field applies for IKEv1 only. DPD is always performed when you use IKEv2. |
UDP Encapsulation | Enable to encrypt a UDP connection. |
Phase 2 Settings | This secures the actual data transmission between the Zyxel Device and the peer site, based on the secure key settings established in Phase 1. |
Initiation | Select how Phase 2 of the IPSec connection is established on the Zyxel Device. Auto: Select this to have the Zyxel Device listen for incoming traffic and automatically establish the Phase 2 of the IPSec connection when traffic is detected. Nailed-Up: Select this to have the Zyxel Device initiate Phase 2 of the IPSec connection. The Zyxel Device automatically renegotiates the IPSec SA when the SA lifetime expires, ensuring the continuity of the connection. Responder Only: Select this to have the Zyxel Device wait for the peer site to initiate the Phase 2 of the IPSec connection. |
Policy | |
Add | Click this to add an entry. |
Remove | Select an entry and click this to remove the entry. This is grayed out if a rule is currently using the selected entry. |
Reference | Select an entry and click this to see which rules are currently using it. This is grayed out if no rule is currently using the selected entry. |
Name | This field displays the name of the entry. When you add a new entry, a name is automatically generated based on this VPN connection policy name, followed by _sp1. Adding another entry will use _sp2, and so on. For example, if the VPN connection policy is named VPN1, adding a new entry will display the name as VPN1_sp1. You can also manually change the name. |
Local | Enter the address corresponding to the local network. |
Remote | Enter the address corresponding to the remote network. |
Protocol | Select the protocol required to use this translation. Choices are: TCP, UDP, ICMP, GRE or Any. |
Reference | This displays the number of rules that currently use this entry. |
SA Life Time | Set how often the Zyxel Device renegotiates the IPSec SA. A short SA life time increases security, but renegotiation temporarily disconnects the VPN tunnel. The value you set for the SA life time in Phase 2 Settings should be lesser than or equal to the value you set for the SA life time in Phase 1 Settings. |
Proposal | |
Add | Click this to add an entry. |
Remove | Select an entry and click this to remove the entry. This will not display if a rule is currently using the entry. |
Encryption | Select which key size and encryption algorithm to use in the IPSec SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES265 - a 256-bit key with the AES encryption algorithm The Zyxel Device and the remote IPSec router must both have at least one proposal that uses use the same encryption and the same key. Longer keys are more secure, but require more processing power, resulting in increased latency and decreased throughput. |
Authentication | Select which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are MD5, SHA1, SHA256, SHA384 and SHA512. SHA is generally considered stronger than MD5, but it is also slower. The Zyxel Device and the remote IPSec router must both have a proposal that uses the same authentication algorithm. |
Perfect Forward Secrecy (PFS) | Select which Perfect Forward Secrecy (PFS) you want to use to create encryption keys. Choices are DH2, DH5, DH14, DH15, DH16, DH19, DH20, DH21, DH28, DH29, and DH30. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. The Zyxel Device and the remote IPSec router must use the same DH key group. See IPSec VPN Background Information for more information on DH key group. |
Advanced Settings | |
NAT Rule | This is available if the VPN type is Policy-based. |
Add | Click this to add an entry. |
Remove | Select an entry and click this to remove the entry. |
Pri. | Select the priority for the entry. The smaller the number, the higher the priority. |
Origin IP | Select the address object that represents the originating source IP address for outgoing traffic, or the destination IP address from the sender that is mapped to the local IP address of the receiver (DNAT). |
Type | SNAT: Select this when there are no overlapping local and remote VPN IP addresses. 1:1 NAT: Select this to avoid overlapping local and remote VPN IP addresses. The peer IPSec router must create identical mirror configurations. |
Mapped IP | Use this field to map the sender’s source IP address or subnet for the VPN rule. • Select an address object. • Create a new object by clicking Add Object. Enter an IP address or subnet in the local IP address range. The local IP address range must not conflict with the peer’s local IP address range. In the peer IPSec router, the destination IP from the sender is mapped to the local IP address of the receiver (DNAT). • Enter an IP address by clicking User Defined. The IP address should be within the local IP address range. |
VTI Setting (Selecting Policy-based in Type will not support the VTI setting.) | |
Local IP | Enter an IPv4 address for this connection. IPSec VPN Tunnel Interface (VTI) encrypts or decrypts IPv4 traffic from or to the interface according to the IP routing table. |
Subnet Mask | Enter the subnet mask of the local networks behind the custom peer gateway. |
Route Setting (Selecting Policy-based in Type will not support the Route setting.) Remote Subnet | |
Add | Click this to add an entry. |
Remove | Select an entry and click this to remove the entry. |
Remote | Specify the destination IP addresses of the remote site that are routed through this VTI interface in a single CIDR format, for example, 192.168.10.0/24. |
Metric | Metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks. Enter a number that approximates the cost for this link. The number need not be precise, but it must be 0–127. In practice, 2 or 3 is usually a good number. |
Description | Enter a description to help identify this policy. You can use alphanumeric and ()+/:=?!*#@$_%– characters, and it can be up to 512 characters long. The default description is ‘IPSec VPN: xxx’ where ‘xxx’ is VPN rule name. |
Apply | Click Apply to save your settings to the Zyxel Device. |
Cancel | Click Cancel to return to the profile summary page without saving any changes. |
local policy | remote policy |
|---|---|
192.168.168.0/24 | 192.168.100.0/24 |
site | TYPE | ORIGIN IP | MAPPED IP |
|---|---|---|---|
Site A | SNAT | 192.168.10.0/24 | 192.168.168.11/32 |
Site B | SNAT | 192.168.20.0/24 | 192.168.168.12/32 |
site | local policy | remote policy |
|---|---|---|
Site A | 192.168.20.0/24 | 192.168.30.0/24 |
Site B | 192.168.30.0/24 | 192.168.20.0/24 |
site | TYPE | ORIGIN IP | MAPPED IP |
|---|---|---|---|
Site A | 1:1 NAT | 192.168.169.0/24 | 192.168.20.0/24 |
Site B | 1:1 NAT | 192.168.169.0/24 | 192.168.30.0/24 |
label | description |
|---|---|
Enable | Click the switch to enable the remote access VPN rule. |
Get SecuExtender VPN Client Software | Click to download SecuExtender to your computer. The supported operating systems for SecuExtender are: • Windows 10 (64-bit) and later versions. • macOS 10.15 and later versions. |
VPN configuration script Download | Click to download a VPN configuration script to send to clients using IPSec VPN clients built into the operating systems. To use the download script, the built-in IPSec VPN clients need to use the following operating systems: • Clients using Windows 7 and later, iOS and macOS built-in IPSec VPN clients can import the VPN configuration script to configure a remote access VPN rule automatically. Click the link to download the script and send it to them. • Clients using Android should download the latest version strongSwan VPN client, then import the script to configure a remote access VPN rule automatically. Click the link to download the script and send it to them. • Clients using built-in IPSec VPN clients earlier than Windows 7 cannot use the script. They must configure a remote access VPN rule manually. Send the Pre-Shared Key and the Zyxel Device interface IP or domain name to them. |
VPN Server Address | |
Type | Select the method the Zyxel Device uses for incoming traffic from remote clients. If Nebula manages your Zyxel Device and assigns it a domain name, then you will see Nebula Assigned Domain Name in this field. • Interface: Use the public IP address of the interface. • IP Address: Use the static IP address. Select this if the interface uses a static public IP address. • Domain Name: Use a domain name. Select this if DDNS is assigning a dynamic IP address to the interface (for example, vpn.zyxel.com). • Nebula Assigned Domain Name: Use the domain name Nebula assigns to your network. |
Interface | If you chose Interface in the Type field, select the interface from the drop-down list that the Zyxel Device will use for the remote VPN connection. |
IP Address | If you chose IP Address in the Type field, enter the static IPv4 that the Zyxel Device will use for the remote VPN connection. |
Domain Name | If you chose Domain Name in the Type field, enter the domain name that the Zyxel Device will use for the remote VPN connection. If you chose Nebula Assigned Domain Name in the Type field, this field displays the assigned domain name. |
NAT Traversal | If the Zyxel Device is behind a NAT router, you can select Custom IP or Domain Name and enter the public IP address or the domain name that is configured and mapped to the Zyxel Device on the NAT router. |
Binding Address | If you select Nebula Assigned Domain Name in the Type field, this field displays the settings from your Nebula. |
Zone | Select the security zone into which to add this VPN connection policy. Any security rules or settings configured for the selected zone apply to this VPN connection policy. |
Certificate for VPN Validation | |
Auto | Select Auto to have the Zyxel Device generate a certificate from the current remote access VPN settings. This is the certificate the Zyxel Device uses to identify itself when setting up the VPN tunnel. |
Manual | Select Manual to use an existing certificate from the drop-down list box. |
Clients will use VPN to Access | |
Internet and Local Networks (Full Tunnel) | Select this to encrypt all traffic through the VPN. Enable Auto SNAT to allow the Zyxel Device to rewrite the source address of packets being sent to the interface's IP address. |
Local Networks Only (Split Tunnel) | Select this to only encrypt traffic going to networks behind the Zyxel Device. Enter an IPv4 address in CIDR notation, for example, type 192.168.1.1/24. Traffic going to the Internet from this IP address is encrypted. Traffic going to the Internet from the remote client does not go through the Zyxel Device is not encrypted. |
Client Network | |
IP Address Pool | Enter an IPv4 address in CIDR notation, for example, type 192.168.1.1/24. The IP address pool is used to assign IP addresses to the VPN clients. The SSL VPN IP pool should not overlap with IP addresses on the Zyxel Device's local networks and the SSL user's network. |
First DNS Server | Specify the IP address of the DNS server whose information the Zyxel Device sends to the remote users. This allows them to access devices on the local network using domain names instead of IP addresses. ZyWALL- the VPN clients use the IP address of the interface you specified in the SSL VPN rule and the Zyxel Device works as a DNS relay. Custom Defined- enter a static IPv4 address |
Second DNS Server | Enter a secondary DNS server IP address that is checked if the first one is unavailable. |
Authentication | You must first create a server in User & Authentication > AAA Server for it to display in the following fields. • If you have one authentication server, it can be on the Zyxel Device (local) or an external AAA server. • If you have two authentication servers, one of them must be on the Zyxel Device (local). You cannot use two external AAA servers. |
Primary/Secondary Server | Select local or a specified AAA server from the drop-down list box for the Zyxel Device to use for authentication. |
User | Select or create a user or user group that can use this remote access VPN access policy. The User Type must be: User, External User, or External Group User. See Types of User Accounts for more information on user accounts. |
Advanced Settings Phase 1 /2 Settings | |
SA Life Time | Set how often the Zyxel Device renegotiates the IKE SA in Phase 1 Settings and the IPSec SA in Phase 2 Settings. A short SA life time increases security, but renegotiation temporarily disconnects the VPN tunnel. The value you set for the SA life time in Phase 2 Settings should be lesser than or equal to the value you set for the SA life time in Phase 1 Settings. |
Add | Click this to add an entry. |
Edit | Select an entry and click this to edit the entry. |
Remove | Select an entry and click this to remove the entry. |
Encryption | Select which key size and encryption algorithm to use in the IPSec SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm The Zyxel Device and the remote IPSec router must both have at least one proposal that uses use the same encryption and the same key. Longer keys are more secure, but require more processing power, resulting in increased latency and decreased throughput. |
Authentication | Select which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are MD5, SHA1, SHA256, SHA384 and SHA512. SHA is generally considered stronger than MD5, but it is also slower. The Zyxel Device and the remote IPSec router must both have a proposal that uses the same authentication algorithm. |
Diffie-Hellman Groups | Select which Diffie-Hellman key group (DHx) you want to use to create encryption keys. Choices are DH2, DH5, DH14, DH15, DH16, DH19, DH20, DH21, DH28, DH29, and DH30. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. The Zyxel Device and the remote IPSec router must use the same DH key group. See IPSec VPN Background Information for more information on DH key group. Different operating systems may support different DH key groups. Check your operating system documentation. • For Windows VPN clients, Zyxel SecuExtender perpetual VPN clients versions 3.8.203.61.32 and earlier support DH1 to DH14. • For macOS VPN clients, Zyxel SecuExtender subscription VPN clients versions 1.2.0.7 and later support DH14 to DH21. For Windows VPN clients, Zyxel SecuExtender subscription VPN clients versions 5.6.80.007 and later support DH14 to DH21. • Windows versions 7, 10, 11 built-in IKEv2 VPN clients support DH2 by default. • macOS versions 14.2 and later built-in IKEv2 VPN clients support DH14 by default. • iOS versions 10.15 and later built-in IKEv2 VPN clients support DH14 by default. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
VPN Type | FEATURE | HOME USER software | Supported operating systems | Authentication Requirements |
|---|---|---|---|---|
Provides high security. May have lower connection speed and stability. | Windows, macOS, Linux, iOS, Android | • VPN account username and password • OVPN configuration file | ||
Windows, macOS | • VPN account username and password | |||
Provides high security, connection speed and stability. | Windows, macOS, iOS, and Android (strongSwan) | • VPN account username and password • Configuration file | ||
Windows, macOS | • VPN account username and password |
Label | Description |
|---|---|
Enable | Click this to the right to enable SSL VPN. |
Interface | Select an interface for incoming traffic to your Zyxel Device. |
Clients will use VPN to access | Full Tunnel - Select this to encrypt all traffic through the VPN. Split Tunnel - Select this to only encrypt traffic going to networks behind the Zyxel Device. Enter an IPv4 address in CIDR notation, for example, type IP address 192.168.51.0/24. Traffic going to the Internet from this IP address is encrypted, and not encrypt traffic going to the Internet through the Zyxel Device. |
User | Select the user account you created in step 2 to allow SSL VPN access |
Label | Description |
|---|---|
Enable | Click this to the right to enable SSL VPN. |
Interface | Select an interface for incoming traffic to your Zyxel Device. |
Clients will use VPN to access | Internet and Local Networks (Full Tunnel) - Select this to encrypt all traffic through the VPN. Local Networks Only (Split Tunnel) - Select this to only encrypt traffic going to networks behind the Zyxel Device. Enter an IPv4 address in CIDR notation, for example, type IP address 192.168.51.0/24. Traffic going to the Internet from this IP address is encrypted, and not encrypt traffic going to the Internet through the Zyxel Device. |
User | Select the user account you created in step 2 to allow IKEv2 VPN access |
Label | Description |
|---|---|
Gateway Address | Enter the WAN IP address of the Zyxel Device. |
Authentication | Set as Login + Password. |
Login/Password | Enter the username and password the Zyxel Device administrator gave. |