How To Bypass IPSec VPN Traffic Applicable Version: 10.00 onwards Scenario Cyberoam should bypass the IPSec VPN traffic between Site A and Site B, in other words, between Router A and Firewall B. The network schema is as given below. Configuration Cyberoam can bypass IPSec VPN traffic if it has its UDP ports 500 and 4500 open both from WAN and LAN sides. To open the ports, follow the steps given below. You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s). Step 1: Create Virtual Host for UDP port 500 Go to Firewall > Virtual Host > Virtual Host and click Add to create a new virtual host according to parameters given below. Parameter Value Description Basic Settings Name UDP_Port_500 Name to identify the Virtual Host. IP Family IPv4 Select the IP Family. External IP PortC 10.10.1.1 The IP address through which Internet users access internal server/host. Mapped IP 172.16.16.20 The IP address of the internal server/host. Physical Zone LAN LAN, WAN, DMZ, VPN or custom zone of the mapped IP address(s). For example, if mapped IP address represents any internal server then it is the zone in which server
resides physically. Port Forwarding Enable Port Forwarding Protocol Enabled UDP External Port Type Port External Port 500 Mapped Port Type Port Mapped Port 500 Click to enable service port forwarding. If Port Forwarding is enabled, following options are available. Select the protocol TCP or UDP that you want the forwarded packets to use. Select the type of external port from the available options: Specify public port number for which you want to configure port forwarding. Select the type of mapped port from the available options: Specify mapped port number on the destination network to which the public port number is mapped. On clicking OK, you are asked to create Firewall Rules to allow access to the virtual host created. Step 2: Add Firewall Rule On clicking OK, the following screen is displayed prompting you to create Firewall Rules.
Enable Add Firewall Rule(s) For Virtual Host and specify parameters shown in the screen as required. Click Add Rule(s) to add the firewall rule. The above firewall rule forwards all traffic from port 500 on WAN side to port 500 on the LAN side. Step 3: Create Virtual Host for UDP port 4500 Go to Firewall > Virtual Host > Virtual Host and click Add to create a new virtual host according to parameters given below. Parameter Value Description Basic Settings Name UDP_Port_4500 Name to identify the Virtual Host. IP Family IPv4 Select the IP Family. External IP PortC 10.10.1.1 The IP address through which Internet users access internal server/host. Mapped IP 172.16.16.20 The IP address of the internal server/host. Physical Zone Port Forwarding Enable Port Forwarding Protocol LAN Enabled UDP External Port Type Port External Port 4500 Mapped Port Type Port Mapped Port 4500 LAN, WAN, DMZ, VPN or custom zone of the mapped IP address(s). For example, if mapped IP address represents any internal server then it is the zone in which server resides physically. Click to enable service port forwarding. If Port Forwarding is enabled, following options are available. Select the protocol TCP or UDP that you want the forwarded packets to use. Select the type of external port from the available options: Specify public port number for which you want to configure port forwarding. Select the type of mapped port from the available options: Specify mapped port number on the destination network to which the public port number is mapped.
On clicking OK, you are asked to create Firewall Rules to allow access to the virtual host created. Step 4: Add Firewall Rule On clicking OK, the following screen is displayed prompting you to create Firewall Rules. Enable Add Firewall Rule(s) For Virtual Host and specify parameters shown in the screen as required. Click Add Rule(s) to add the firewall rule. The above firewall rule forwards all traffic from port 4500 on WAN side to port 4500 on the LAN side.
Note: Ensure that there exists a similar Firewall Rules which forward all traffic from port 500 and 4500 on LAN side to port 500 and 4500 respectively on the WAN side. Document Version: 2.0 18 February, 2015