
658 Chapter 68 Virtual Private Networks (VPN)
N0060606N0060606
Table 166 Rule 2
Table 167 Rule 3
Table 168 Rule 4
Firewall rules for Remote User Tunnels
In the Remote User Tunnel case, four rules must be created. One is for the key exchange protocol
(IKE), the other two are for the type of protocol used (ESP and/or AH). The fourth rule is for the
inbound rules. Table 169, Table 170, Table 171 and Table 172 show the rules required.
Protocol IPSEC_ESP
Source IP 192.168.2.2
Source Mask 255.255.255.255
Destination IP 192.168.2.1
Destination Mask 255.255.255.255
Protocol IPSEC_AH
Source IP 192.168.2.2
Source Mask 255.255.255.255
Destination IP 192.168.2.1
Destination Mask 255.255.255.255
Protocol IGNORE
Source IP 12.12.12.0
Source Mask 255.255.255.0
Destination IP 11.11.11.0
Destination Mask 255.255.255.0
Table 169 Rule 1
Protocol UDP
Source IP IP Address of client PC (or 0.0.0.0 if not known)
Source Mask 255.255.255.255 (or 0.0.0.0 if not known)
Source Port 500
Destination IP IP Address of Interface that will receive VPN Client Connection request for client PC
Destination Mask 255.255.255.255
Destination Port 500
Commentaires sur ces manuels