How to configure IPSec LAN to LAN VPN for multiple subnets using the new GUI

База знания
Ръководство за конфигуриране
06-27-2022
797

This article mainly introduces how to configure IPSec LAN to LAN VPN for multiple subnets, if you have any other problems about how to configure VPN connections, please refer to Configuration Guide for VPN.

Topology and requirements

  1. VPN Router_1 and VPN Router_2 connect together via IPSec VPN.
  2. PC_1 in remote subnet 192.168.10.0/24 could access PC_2 in local subnet 192.168.20.0/24
  3. PC_1 in remote subnet 192.168.10.0/24 could access PC_3 in local subnet 192.168.30.0/24
  4. PC_1 in remote subnet 192.168.10.0/24 could access PC_4 in local subnet 192.168.40.0/24

Configurations on VPN Router

Apart from configuring VPN connections on VPN Routers, we shall also configure Static Routing and Multi-Nets NAT on VPN Router which contains multiple subnets (In this example it is VPN Router_2).

1. Configure IPSec VPN connection on two VPN Router

We shall configure IPsec VPN Tunnel for each subnets so that packets in those subnets could go through the VPN connection. In this example, we configure three IPsec VPN Tunnel on VPN > IPSec > IPSec Polocy as follows:

When the IPSec VPN Tunnel connected, you could see entries on VPN > IPSec > IPSec SA as follows:

2. Configure Static Route on VPN Router_2

Static Route is required to make sure that packets sent from the remote subnet 192.168.10.0/24 could be forwarded to different subnets. Here we shall configure the IP address of switch as the Next Hop for packets send to each subnets different from LAN of VPN Router_2 on Transmission > Routing > Static Route as follows:

3. Configure Multi-Nets NAT on VPN Router_2 (Optional)

Multi-Nets NAT is configured to enable the Internet access of different subnets. If you don’t configure it, your VPN connection for different subnets would not be affected, thus you could configured it according to your actual requirement. In this example we could configure it on Transmission > NAT > Multi-Nets NAT as follows:

Configurations on L2+/L3 Switch

On L2+/L3 Switch, we shall configure Static Routing and Interface so that packets in different subnets could be transmitted between this L2+/L3 Switch and VPN Router_2.

1. Configure Interface for different subnets on L2+/L3 Switch

We need to configure Interface for each subnets so that packets could be forwarded between this subnet and L2+/L3 Switch. Go to L3 FEATURES > Interface > Interface Config > Edit IPv4 to configure it as follows

2. Configure Static Routing on L2+/L3 Switch

Here the Static Routing entry performs as default gateway. It would send all packets to VPN Router_2 to forward to the remote site of VPN Tunnel or access Internet. Go to L3 FEATURES > Static Routing > IPv4 Static Routing to configure it as follows:

Finally, after configuring Interface and Static Routing, we could the routing table on L3 FEATURES > Routing Tables > IPv4 Routing Table as follows:

Моля, оценете този документ

Свързани документи

How to connect to Omada Router using IKEv2 VPN of Android/iOS

Ръководство за конфигуриране
VPN
04-22-2024
7790

How to configure Multiple SSIDs with Multiple Subnets on EAP products

Ръководство за конфигуриране
08-03-2021
7654

How to configure WOL (Wake On LAN) on TP-Link SafeStream Router using the new GUI

Ръководство за конфигуриране
06-27-2022
7667

How to Configure LAN DNS on Omada Gateway

Ръководство за конфигуриране
06-24-2025
4810

How to set up Site-to-Site Manual IPsec VPN Tunnels on Omada Gateway via Omada Controller

Ръководство за конфигуриране
VPN
10-30-2024
10210