345
Configuring a Virtual Private Network

VPN Client-to-Network

The following example shows how to configure a VPN client-to-network IPsec tunnel. In this
example, the IOLAN will accept VPN connections from multiple VPN clients on private networks
that want to access the public 199.24.0.0 subnetwork through the VPN gateway. NAT Traversal
(NAT_T) is disabled in this example (on both sides) because the VPN tunnel is going private network
to public network.
Broadband
Router
VPN Client
199.24.10.10
Internet
172.16.45.45
199.24.45.12
199.24.45.87
Initiate Communication
Right
IPsec Tunnel--Encrypted Data Unencrypted
Data
172.16.45.99
Router
199.24.10.1
Configure the IPsec tunnel in the IOLAN:
The Remote IP Address field is %any to allow any VPN client to communicate in the IPsec tunnel
that can validate the Secret. Also, the Remote Host/Network field is configured for 0.0.0.0 to
allow any remote peer private IP address (RFC 1918—10.0.0.0/8, 172.16.0.0./ 12, 192.168.0.0/16)
access to the IPsec tunnel. Lastly, the Boot Action is set to Add to list en for an IPsec tunnel
connection.
Enable the IPsec service found in Security, Services.