USG40 - Set up Port Forwarding
RBattaglia
Posts: 4
Hello All,
I am new to the Zywall universe so I have not set up any port forwarding before on one of their devices. I need to open 1723 to our server for VPN access. I know that the USG40 has its own VPN but I am going to be retiring this server and adding a new one in a week. I just found out that there is one person that needs to access the VPN the old way by porting into the server on 1723.
So how do it do this? It seems very confusing since on an Ubiquiti I just added the port foward in the NAT/Firewall rules. This seems like I need to add services and then use those services. Any help or suggestions would be greatly appreciated,
Regards,
Rob
I am new to the Zywall universe so I have not set up any port forwarding before on one of their devices. I need to open 1723 to our server for VPN access. I know that the USG40 has its own VPN but I am going to be retiring this server and adding a new one in a week. I just found out that there is one person that needs to access the VPN the old way by porting into the server on 1723.
So how do it do this? It seems very confusing since on an Ubiquiti I just added the port foward in the NAT/Firewall rules. This seems like I need to add services and then use those services. Any help or suggestions would be greatly appreciated,
Regards,
Rob
0
Accepted Solution
-
@RBattaglia
Regarding to this case,
on USG40, you need to create the NAT rule, and firewall rule to allow traffic through USG.
On NAT page
Go to Object>Service Group, and group the VPN service
Create rule on security policy, Destination: Internal Server, Service: Test(The group service you created)
Charlie5
All Replies
-
Go Network > NAT > add
Virtual server
Incoming Interface wan1
External IP any or make address rule with Interface IP wan1
Internal IP the VPN server IP
port mapping type Service-Group
External service VPN_PPTP
0 -
You can also switch to easy mode and use the wizard included.0
-
@RBattaglia
Regarding to this case,
on USG40, you need to create the NAT rule, and firewall rule to allow traffic through USG.
On NAT page
Go to Object>Service Group, and group the VPN service
Create rule on security policy, Destination: Internal Server, Service: Test(The group service you created)
Charlie5 -
All set. Thanks for your hlep.0
Categories
- All Categories
- 347 Beta Program
- 2.1K Nebula
- 114 Nebula Ideas
- 77 Nebula Status and Incidents
- 5K Security
- 44 USG FLEX H Series
- 246 Security Ideas
- 1.2K Switch
- 65 Switch Ideas
- 901 WirelessLAN
- 33 WLAN Ideas
- 5.8K Consumer Product
- 204 Service & License
- 326 News and Release
- 71 Security Advisories
- 21 Education Center
- 5 [Campaign] Zyxel Network Detective
- 1.8K FAQ
- 831 Nebula FAQ
- 401 Security FAQ
- 219 Switch FAQ
- 190 WirelessLAN FAQ
- 45 Consumer Product FAQ
- 136 Service & License FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 71 About Community
- 61 Security Highlight