SSL VPN between two DrayTek Routers

This document introduces how to establish an SSL VPN tunnel between two Vigor Routers. (For SSL VPN tunnel between Vigor Router and Vigor3900, please refer to the article here.)

LAN-to-LAN SSL VPN feature will be supported by Vigor2860 series starts from firmware version 3.8.1 and Vigor2925 series starts from firmware version 3.8.2. As for other models, please refer to their specifications.

a screenshot of DrayOS LAN-to-LAN profile list

VPN Server (Dial-in Site) Setup

1. Create a LAN-to-LAN VPN Profile: Go to VPN and Remote Access >> LAN to LAN, click on a profile Index to add/edit a profile.

2. Edit the profile as follows:

  1. Enter Profile Name.
  2. Enable this profile.
  3. Set Call Direction as “Dial-in”.
  4. Make sure Allow Dial-in Type has “SSL Tunnel” enabled.
  5. Enter Username and Password.
  6. For Remote Network IP/Mask, enter VPN client's LAN IP and subnet mask.
  7. Click OK to save the profile.

3. Go to VPN and Remote Access >> Remote Access Control to make sure the SSL VPN Service has enabled.

 

VPN Client (Dial-out Site) Setup

4. Create a LAN-to-LAN profile: Go to VPN and Remote Access >> LAN to LAN, click on an available index number.

Edit the VPN profile as follows.

  1. Enter Profile Name.
  2. Enable this profile.
  3. Set Call Direction to “Dial-out”.
  4. Set Type of Server I am calling to SSL Tunnel.
  5. Enter Username and Password as the same set in VPN Client in Step 2.
  6. Enter VPN Server's WAN IP in Server IP/Host Name.
  7. Enter Remote Network IP/Mask as VPN Server's LAN settings. (Note that this has to be the same as Local Network IP/Mask setting in Step 2.)
  8. Click OK to save.

Establishing the VPN Tunnel:

1. To dial the VPN, on VPN Client, go to VPN and Remote Access >> Connection Management, select the profile created previously and click on “Dial”.

2. If all the credentials are Network administrator may check the VPN that is established and its Up Time from VPN and Remote Access >> Connection Management page.

Since firmware version 1.1.0 or above, Vigor2960 and Vigor3900 supports LAN-to-LAN SSL VPN. This document introduces how to establish a LAN-to-LAN SSL VPN between two Vigor2960 or Vigor3900.

VPN Server (Dial-in Site) Setup

1. Create a user profile for SSL VPN login. Go to User Management >> User Profile, click Add to create a new profile.

2. Edit the user profile as follows:

  1. Enter Profile Name.
  2. Enable this profile.
  3. Enter Password.
  4. In PPTP/L2TP/SSL Server, enable SSL Tunnel.
  5. Click Apply to save.

3. Create a VPN profile: Go to VPN and Remote Access >> VPN Profiles >> SSL Dial-in, click Add to add a new profile.

4. Edit the VPN Profile as follows:

  1. Enter Profile name.
  2. Enable this profile.
  3. For SSL User Name, select the profile we created in Step 3 from the drop-down list.
  4. Enter Local IP /Subnet Mask as the LAN settings on VPN Server.
  5. For Remote IP /Subnet Mask, click Add and enter VPN client's LAN settings.
  6. Click Apply to save.

5. Go to VPN and Remote Access >> Remote Access Control to make sure SSL Tunnel Service is enabled.

6. And go to System Maintenance >> Access Control >> Internet Access Control to make sure HTTPS Allow is enabled.

VPN Client (Dial-Out) Setup

7. Create a VPN profile: Go to VPN and Remote Access >> VPN Profiles >> SSL Dial-out, clickAdd to create a new profile.

8. Edit the VPN Profile as follows:

  1. Enter Profile name.
  2. Enable this profile.
  3. For Server IP/Host Name, enter VPN Server's WAN IP address or host name.
  4. For SSL User Name and SSL Password, enter the same as in Step 2.
  5. Enter Local IP/Subnet Mask as the local LAN subnet you would like to connected to remote site.
  6. For Remote IP/Subnet Mask, click Add and enter VPN Server's LAN settings.
  7. Click Apply to save.

Establishing the VPN:

1. To dial the VPN, on VPN Client, go to VPN and Remote Access >> Connection Management, select SSL and choose the VPN profile created in Step 3 from the drop-down list. Click Connectto establish the VPN tunnel.

 

2. If all the credentials are correct, VPN will be established. And network administrator may check the connected VPN and its Up Time from VPN and Remote Access >> Connection Management page.

Published On: Jul 08, 2019

Was this helpful?