The problem that I am having is accessing shared folders from the network 192.168.2.x from a computer in the 192.168.1.x network. I added a static route on the USG 50 Destination:192.168.2.0 Subnet Mask: 255.255.255.0 Next-Hop 192.168.1.30 Metric:0. I can access the shared folders from 192.168.1.x from a laptop that is in the network 10.59.1.x. If I disable the firewall on the USG 50 everything works fine. I tried adding NETBIOS rules to the firewall and the log says it was forward but it does not work. Thank you for you help in advance.
P.S. I put inactive the LAN2 in USG 50 and I put inactive LAN1 on the USG 20W. Also, the DNS Server for each LAN1 or LAN2 is the Zywall.
Hard to tell where your exact issue is without seeing all routing and firewall rules. But if your USG20W is acting as wireless AP only (no internet connection directly to it) I'd recommend to create the 192.168.2.x network on USG50 and get rid of the NAT (I'm assuming your have on USG20W today since I see your connection to WAN port). The USG50 will automatically add the required static routes between 1.x and 2.x LANs and all you need to do is appropriate firewall rules. And take care of your WLAN (which seems to be working today based on your description). Suggested setup on picture below (can be further improved/simplified if you describe what your desired setup is and if the two switches are VLAN capable). Also 2.x network can be bridged with 10.59.x network to make things even simpler.
I agree with Brano. One more thing though, the WLAN will now be 192.168.2.x and not 10.59.1.1. You should manually assign an IP address to the wifi router and make sure you can administer it from the LAN side.
What Brano is recommending is what I am running. The 192.168.2.x network for me is like a Guest net in that none of my personal items are there.
P.S. your original problem is the firewall is going to block all the data between the two subnets unless you explicitly allow it. So whatever protocol you want to allow, you need to open the ports for. Or just open everything between those two as a test. you can also make the firewall log any packets blocked between those two subnets and that will let you know what is not being allowed.
Also, I don't think netbios will jump across subnets by default. So I don't know how the computers will discover each other in the first place.
"Then said I, Wisdom [is] better than strength: nevertheless the poor man's wisdom [is] despised, and his words are not heard. " Ecclesiastes 9:16
Thank you guys for your help. I resolved the issue by adding this policy route in the USG 50. Incoming: lan1 Source:any Destination: any Service: any Source port : any Next Hop: auto DSCP Marking:preserve SNAT : outgoing-interface