Object Type | Object screen | Description |
|---|---|---|
User Accounts | User Account/ User Group | Configure a user account or user group to which you want to apply this SSL access policy. |
Application | SSL Application | Configure an SSL application object to specify the type of application and the address of the local computer, server, or web site SSL users are to be able to access. |
IP Pool | Address | Configure an address object that defines a range of private IP addresses to assign to user computers so they can access the internal network through a VPN connection. |
Server Addresses | Address | Configure address objects for the IP addresses of the DNS and WINS servers that the Zyxel Device sends to the VPN connection users. |
VPN Network | Address | Configure an address object to specify which network segment users are allowed to access through a VPN connection. |
label | description |
|---|---|
Enable | Click the switch to enable the SSL access policy. |
Download | Click to download a VPN configuration script to send to clients using SecuExtender VPN client or OpenVPN Connect VPN client. The supported operating systems for SecuExtender are: • Windows 10 (64-bit) and later versions. • macOS 10.15 and later versions. |
VPN Server Address | |
Type | Select the method the Zyxel Device uses for incoming traffic from remote clients. If Nebula manages your Zyxel Device and assigns it a domain name, then you will see Nebula Assigned Domain Name in this field. • Interface: Use the public IP address of the interface. • Domain Name: Use a domain name. Select this if DDNS is assigning a dynamic IP address to the interface (for example, vpn.zyxel.com). • Nebula Assigned Domain Name: Use the domain name Nebula assigns to your network. |
Interface | Select an interface from the drop-down list box for incoming traffic to your Zyxel Device. |
DNS Name | Enter the domain name (for example, vpn.zyxel.com) if you’re using DDNS to assign the interface a dynamic IP address. |
Domain Name | If you chose Nebula Assigned Domain Name in the Type field, this field displays the assigned domain name. |
Binding Address | If you select Nebula Assigned Domain Name in the Type field, this field displays the settings from your Nebula. |
Server Port | Specify the server port of the Zyxel Device for full tunnel mode SSL VPN access. Leave this field to default settings unless it conflicts with another interface. |
Zone | Select the security zone into which to add this VPN connection policy. Any security rules or settings configured for the selected zone apply to this VPN connection, so do not select a zone that a security policy may block. |
Authentication | You must first create a server in User & Authentication > AAA Server for it to display in the following fields. • If you have one authentication server, it can be on the Zyxel Device (local) or an external AAA server. • If you have two authentication servers, one of them must be on the Zyxel Device (local). You cannot use two external AAA servers. |
Primary/Secondary Server | Select local or a specified AAA server from the drop-down list box for the Zyxel Device to use for authentication. These are listed in the following order and then sorted alphabetically: Local (1), Nebula Cloud Authentication (2), AD Server (3), LDAP Server (4), OIDC Server (5), RADIUS Server (6). |
Allowed Users | Select or create a user or user group that can connect to this SSL access policy. ![]() • This is a required field. • The User Type must be: User, External User, or External Group User. • It cannot be an admin or viewer account type. • SecuExtender VPN clients must log in with a User account in Menu > Configuration > Get from Server screen. See What You Need To Know for more information on user accounts. ncas-users are users authenticated by Nebula. oidc-users are users authenticated by OpenID Connect (OIDC). See Add an OIDC Server for more information on OIDC. |
Clients will use VPN to access | |
Internet and Local Networks (Full Tunnel) | Select this to encrypt all traffic through the VPN. Enable Auto SNAT to allow the Zyxel Device to rewrite the source address of packets being sent to the interface's IP address. |
Auto-SNAT | Auto-SNAT changes the (private) source IP addresses of VPN clients to the Zyxel Device WAN interface’s public IP address for traffic going to the Internet. The Internet cannot route privately-assigned IP addresses, so the Zyxel Device must perform Source NAT (SNAT) to convert them to the public IP address on its WAN interface. For example, if the SSL VPN client has a privately-assigned IP address such as 192.168.1.88, then that IP address is automatically translated to the Zyxel Device’s WAN interface IP address, such as 1.1.1.1 when going to the Internet. If you disable Auto-SNAT, then SSL VPN clients can reach internal LAN subnets, but not the Internet, unless you create an outbound NAT rule for the SSL VPN pool in Network > NAT. |
Local Networks Only (Split Tunnel) | Select this to only encrypt traffic going to networks behind the Zyxel Device. Enter an IPv4 address in CIDR notation. Traffic going to the Internet from this IP address is encrypted. Traffic going to the Internet from the remote client does not go through the Zyxel Device is not encrypted. • Define a range of IP address using a subnet mask. For example, enter 192.168.1.0/24. • Define a specific IP address. For example, enter 192.168.1.1/32. |
Client Network | |
IP Address Pool | Enter an IPv4 address in CIDR notation. The IP address pool is used to assign IP addresses to the VPN clients. The SSL VPN IP pool should not overlap with IP addresses on the Zyxel Device's local networks and the SSL user's network. • Define a range of IP address using a subnet mask. For example, enter 192.168.1.0/24. • Define a specific IP address. For example, enter 192.168.1.1/32. |
DNS Server | Specify up to two DNS servers for VPN clients to use. This allows them to access devices on the local network using domain names instead of IP addresses. • Disable: No DNS server is defined. • ZyWALL: The VPN clients use the IP address of the WAN interface you specified in the SSL VPN rule and the Zyxel Device works as a DNS relay. • Custom: Enter the static IP address of the DNS server. |
First DNS Server | Specify the IP address of the DNS server for the VPN clients to use. |
Second DNS Server | Specify a secondary DNS server IP address that is checked if the first one is unavailable. |
DNS Domain Suffix | Set the DNS suffix that is appended to hostnames typed by VPN clients to form a complete domain name. For example, if a user types only a hostname (fileserver), the DNS suffix (example.com.) is automatically appended, resulting in fileserver.example.com. |
Advanced Settings | |
Client Profile | You can create one or more profiles to apply the configured settings to specific user(s). |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
Move to | To change a policy’s position in the numbered list, select the policy and click Move to. Enter the position number and press [ENTER] to move the policy to that position. |
# | This is the entry’s index number in the list. If a user belongs to two or more profiles, the profile with the lower index number is applied first. |
IP Address Pool | This displays the IP address pool used to assign IP addresses to VPN clients in this profile. |
DNS Server | This displays the DNS server used by VPN clients in this profile. |
Tunnel Type | This displays whether VPN clients in this profile use a full tunnel or split tunnel to access the network. |
User | This displays the VPN clients in this profile. |
Minimum TLS Version | Select the minimum TLS version required for this SSL access policy. TLS connections using a version lower than the selected one will be blocked. The Zyxel Device requires a TLS 1.2 minimum to block insecure protocols (like TLS 1.0/1.1) that have known vulnerabilities. TLS 1.3 provides stronger cipher suites and more secure key exchange methods than earlier versions. |
Generate Certificate | Click this to have the Zyxel Device generate a self-signed certificate for the Zyxel Device to identify itself when setting up the SSL VPN tunnel. Note the expiry date in Certificate Expires on. Click Generate Certificate to generate a new certificate when the certificate expires and notify all SSL VPN and OpenVPN clients to import the SSL VPN file again as all SSL VPN and OpenVPN clients have to update their SSL VPN settings to match the Zyxel Device SSL VPN settings. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving. |
label | description |
|---|---|
Clients will use VPN to access | |
Internet and Local Networks (Full Tunnel) | Select this to encrypt all traffic through the VPN. Enable Auto SNAT to allow the Zyxel Device to rewrite the source address of packets being sent to the interface's IP address. |
Auto-SNAT | Auto-SNAT changes the (private) source IP addresses of VPN clients to the Zyxel Device WAN interface’s public IP address for traffic going to the Internet. The Internet cannot route privately-assigned IP addresses, so the Zyxel Device must perform Source NAT (SNAT) to convert them to the public IP address on its WAN interface. For example, if the SSL VPN client has a privately-assigned IP address such as 192.168.1.88, then that IP address is automatically translated to the Zyxel Device’s WAN interface IP address, such as 1.1.1.1 when going to the Internet. If you disable Auto-SNAT, then SSL VPN clients can reach internal LAN subnets, but not the Internet, unless you create an outbound NAT rule for the SSL VPN pool in Network > NAT. |
Local Networks Only (Split Tunnel) | Select this to only encrypt traffic going to networks behind the Zyxel Device. Enter an IPv4 address in CIDR notation. Traffic going to the Internet from this IP address is encrypted. Traffic going to the Internet from the remote client does not go through the Zyxel Device is not encrypted. • Define a range of IP address using a subnet mask. For example, enter 192.168.1.0/24. • Define a specific IP address. For example, enter 192.168.1.1/32. |
Client Network | |
IP Address Pool | Enter an IPv4 address in CIDR notation. The IP address pool is used to assign IP addresses to the VPN clients. The SSL VPN IP pool should not overlap with IP addresses on the Zyxel Device's local networks and the SSL user's network. • Define a range of IP address using a subnet mask. For example, enter 192.168.1.0/24. • Define a specific IP address. For example, enter 192.168.1.1/32. |
DNS Server | Specify up to two DNS servers for VPN clients to use. This allows them to access devices on the local network using domain names instead of IP addresses. • Inherit from Global Settings: Use the DNS server(s) configured in the VPN > SSL VPN screen. • ZyWALL: The VPN clients use the IP address of the interface you specified in the SSL VPN rule and the Zyxel Device works as a DNS relay. • Custom: Enter the static IP address of the DNS server. |
First DNS Server | Specify the IP address of the DNS server for the VPN clients to use. |
Second DNS Server | Specify a secondary DNS server IP address that is checked if the first one is unavailable. |
DNS Domain Suffix | A DNS suffix is the domain name of where the DNS server is located. Set the DNS suffix that is appended to hostnames typed by VPN clients to complete the domain name. For example, if a user types only a hostname (fileserver), the DNS suffix (company.com.) is automatically appended, resulting in fileserver.company.com. You can use a subdomain of your real domain, such as corp.company.com, resulting in fileserver.corp.company.com. |
Members | |
User | Select or create a user or user group that can connect to this SSL access policy. ![]() • This is a required field. • The User Type must be: User, External User, or External Group User. • It cannot be an admin or viewer account type. • SecuExtender VPN clients must log in with a User account in Menu > Configuration > Get from Server screen. See What You Need To Know for more information on user accounts. ncas-users are users authenticated by Nebula. oidc-users are users authenticated by OpenID Connect (OIDC). See Add an OIDC Server for more information on OIDC. |
OK | Click OK to save your changes. |
Cancel | Click Cancel to exit this screen without saving. |