Related Topics
Set up a VPN from a Firebox to a Cyberoam Device
A branch office virtual private network (BOVPN) tunnel is a secure way for networks, or for a host and a network, to exchange data across the Internet. This topic tells you how to define a manual BOVPN tunnel between a Firebox and a Cyberoam Security Appliance (10.04.0 build 433). Before you create a BOVPN tunnel, you must collect the IP addresses from each endpoint and agree on the common tunnel settings to use.
This topic does not give detailed information on what the different BOVPN settings mean, or the effects those settings can have on the tunnel that is built. If you want to know more about a particular setting, use these resources:
WatchGuard provides interoperability instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about configuring a non-WatchGuard product, see the documentation and support resources for that product.
VPN Configuration Summary
For reference purposes, here is a summary of the VPN configuration defaults for the Cyberoam Security Appliance, with emphasis on any settings that do not match the default VPN configuration settings in Fireware v11.12.4.
In Fireware v12.0 and higher, the default BOVPN security settings are different. To determine whether those settings are compatible with your Cyberoam device, see the documentation for your Cyberoam device.
| VPN Settings | WatchGuard Device Default (v11.12.4) | Cyberoam Device Default (10.04.0 build 433) | Matched? |
|---|---|---|---|
| Phase 1 Settings | |||
| IKE Exchange Mode | Main | Main | Y |
| Authentication | SHA1 | SHA1 | Y |
| Encryption | 3DES | AES (128-bit) |
N |
| Diffie-Hellman Group | 2 | 2 | Y |
| Phase 2 Settings | |||
| Perfect Forward Secrecy | No | Yes | N |
| Protocol | ESP | ESP | Y |
| Authentication | SHA1 | SHA1 | Y |
| Encryption | AES (256-bit) | AES (128-bit) | N |
WatchGuard and Cyberoam devices have different default settings for Phase 1 and 2 encryption. For the VPN tunnel to build successfully, you must specify the same Phase 1 and 2 settings on your Firebox and Cyberoam devices. For the strongest security, WatchGuard recommends that you specify an AES variant (128-bit or 256-bit) for encryption.
Collect IP Address and Tunnel Settings
Before you can configure a branch office VPN, you must collect the public IP addresses of each device, and the IP addresses of the private networks you want to connect. You must also agree upon Phase 1 and Phase 2 settings to use for the VPN. This procedure describes how to configure a Firebox with the Phase 1 and Phase 2 settings that match the default settings on a Cyberoam device.
For example, the IP address settings you collect could look like this:
WatchGuard Firebox:
External interface IP address: 203.0.113.2
Trusted network IP address: 10.0.1.0/24
Cyberoam device:
External interface IP address: 198.51.100.2
Private network IP address: 10.50.1.0/24
Configure the WatchGuard Firebox
On the Firebox, you must add a VPN gateway, and add a VPN tunnel that uses that gateway. The Phase 1 settings on the Firebox must match the Phase 1 settings on the Cyberoam device.
Add the VPN Gateway
- Select VPN > Branch Office VPN.
- Below the Gateways list, click Add.
The Gateway settings page appears.
- In the Gateway Name text box, type a name to identify this gateway.
- Select Use Pre-Shared Key. Type the shared key.
The shared key must use only standard ASCII characters. It must match the key used on the Cyberoam device. - Below the Gateway Endpoint list, click Add.
The Gateway Endpoint Settings dialog box appears.
- From the External Interface drop-down list, select the external interface has the public IP address.
- Select By IP Address. Type the external (public) IP address for the Firebox.
- Select the Remote Gateway tab.
- In the Specify the remote gateway IP address for a tunnel section, select Static IP Address. Type the external (public) IP address of the Cyberoam device.
- In the Specify the remote gateway ID for tunnel authentication section, select By IP Address. Type the public IP address of the Cyberoam device.
- Click OK to close the Gateway Endpoint Settings dialog box.
The gateway pair you defined appears in the list of gateway endpoints. - Select the Phase 1 Settings tab.
- In the Transform Settings list, select the default Phase 1 Transform. Click Edit.
The Phase 1 Transform dialog box appears. - From the Encryption drop-down list, select AES (128-bit).
This matches the default setting on the Cyberoam device.
- Click OK to confirm the change to the Phase 1 Transform.
Do not change any of the other Phase 1 settings from their default values. - Click Save.
The gateway is added to the Gateways list.
- In Policy Manager, select VPN > Branch Office Gateways. Click Add.
The New Gateway dialog box appears. - In the Gateway Name text box, type a name to identify this gateway in Policy Manager.
- Select Use Pre-Shared Key. Type the shared key.
The shared key must use only standard ASCII characters. It must match the key used on the Cyberoam device. - In the Gateway Endpoints section, click Add.
The New Gateway Endpoints settings dialog box appears.
- From the External Interface drop-down list, select the external interface that has the public IP address.
- In the Local Gateway section, select By IP Address.
- From the IP Address drop-down list, select the external (public) IP address for the device.
- In the Specify the remote gateway IP address for a tunnel section, select Static IP Address. Type the external (public) IP address of the Cyberoam device.
- In the Specify the gateway ID for tunnel authentication section, select By IP Address. Type the public IP address of the Cyberoam device.
- Click OK.
The gateway endpoint pair you defined appears in the list of gateway endpoints. - In the New Gateway dialog box, select the Phase 1 Settings tab.
- In the Transform Settings list, select the default Phase 1 Transform. Click Edit.
The Phase 1 Transform dialog box appears. - In the Authentication drop-down list, select SHA1.
- In the Encryption drop-down, select AES (128-bit).
This matches the default setting on the Cyberoam device.
- Click OK to confirm the change to the Phase 1 Transform.
Do not change any of the other Phase 1 settings from their default values. - Click OK to add the new gateway.
- Click OK to close the Gateways dialog box.
Add the VPN Tunnel
After you define the gateway, you can add a tunnel and configure the Phase 2 settings.
Create a Phase 2 proposal with settings that match the default Phase 2 settings on the Cyberoam device:
- Select VPN > Phase2 Proposals.
- Click Add.
- The Phase2 proposal settings appear.
- In the Name text box, type a meaningful name for this Phase2 proposal.
- From the Encryption drop-down list, select AES(128-bit).
- With this change, the proposal settings match the default configuration for the Cyberoam device.
- Click Save.
Create a VPN tunnel that uses the new Phase 2 proposal:
- Select VPN > Branch Office VPN.
- Below the Tunnels list, click Add.
- In the Name text box, type a meaningful name for this tunnel.
- From the Gateway drop-down list, select the gateway you configured to the Cyberoam device.
- Below the Addresses list, click Add.
The Tunnel Route Settings dialog box appears.
- In the Local IP settings, from the Choose Type drop-down list, select Network IPv4. Type the network IP address for the local network that you want to use the VPN tunnel.
- In the Remote IP settings, from the from the Choose Type drop-down list, select Network IPv4. Type the network IP address for the private network on the Cyberoam device that you want to use the VPN tunnel.
- Click OK to add the tunnel route.
The tunnel route is added to the Addresses tab of the tunnel configuration. - Select the Phase 2 Settings tab.
- Select the Enable Perfect Forward Secrecy check box.
This matches the default setting on the Cyberoam device. - In the IPSec Proposals list, select the default ESP-AES-SHA1 proposal. Click Remove.
- From the IPSec Proposals drop-down list, select the phase 2 proposal you added earlier. Click Add.
- Click Save.
The tunnel route configuration is added to the Tunnels list.
- In Policy Manager, select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Click Add.
The New Tunnel dialog box appears.
- In the Tunnel Name text box, type a meaningful name for this tunnel.
- From the Gateway drop-down list, select the gateway you configured to the Cyberoam device.
- Click Add to add a tunnel route.
The Tunnel Route Settings dialog box appears.
- In the Local text box, type the network IP address for the local network that you want to use the VPN tunnel.
- In the Remote text box, type the network IP address for the private network on the Cyberoam device that you want to use the VPN tunnel.
- Click OK to add the tunnel route.
The tunnel route is added to the Addresses tab of the New Tunnel dialog box. - Click the Phase 2 Settings tab.
- Select the PFS check box.
This matches the default setting on the Cyberoam device. - In the IPSec Proposals section, select the default ESP-AES-SHA1 entry.
- Click Remove, and click OK to confirm that you want to remove the proposal.
- Click Add to add an IPSec Proposal.
- Select Create a new Phase2 proposal.
- In the Name text box, type a meaningful name for this proposal.
- From the Encryption drop-down list, select AES (128-bit).
Leave all other settings at their default values. - Click OK to add the New Phase2 Proposal.
- Click OK to add the new tunnel to the configuration.
- Click Close to close the Branch Office IPSec Tunnels dialog box.
Configure the Cyberoam Device
This procedure describes how to manually configure the VPN settings for the Cyberoam device. The Cyberoam web-based interface also includes a setup wizard for the VPN configuration, but you can use this procedure as a guide for how to look at the settings in any existing VPN configuration.
In the Cyberoam web-based management interface:
- Select VPN > IPSec.
- Click Add.
- Locate the General Settings section of the page.
- In the Name text box, type a meaningful name for this connection.
- From the Connection Type drop-down list, select Site to Site.
- From the Policy drop-down list, select the DefaultHeadOffice policy.
In older versions of Cyberoam software, this Connection Type is called Net to Net.
- Locate the Authentication Details section of the page.
- From the Authentication Type drop-down list, select Preshared Key.
- In the two Preshared Key text boxes, type and confirm the shared key that you configured in the gateway settings on the WatchGuard device.
- Locate the Endpoint Details section of the page.
- From the Local drop-down list, select the interface on the Cyberoam device to use as the VPN endpoint.
The IP address of the interface you select must match the IP address you configured as the Remote Gateway ID on the WatchGuard device. - In the Remote text box, type the public IP address of the Firebox.
This IP address must match what you configured as the Local Gateway ID on the WatchGuard device. - Locate the Network Details section of the page.
- Click Add.
The Add Network Address dialog box appears.
- From the Local LAN Address drop-down list, select Local LAN Address.
- Click Add IP Host.
- In the Name text box, type a meaningful name for the local network.
- Adjacent to Type, select Network.
- In the IP Address text box, type the network IP address of the local network that connects to the Cyberoam device.
- In the Subnet drop-down, select the subnet mask for the local network.
- Click OK to add the IP Host.
- Click OK to close the Add Network Address dialog box.
- From the Local ID drop-down list, select IP Address. Type the public IP address of the Cyberoam device in the adjacent text box.
- Locate the Remote Network Details section of the page.
- From the Remote LAN Network drop-down list, select Remote Network.
- Click Add IP Host.
- In the Name text box, type a meaningful name for the remote network.
- Adjacent to Type, select Network.
- In the IP Address text box, type the subnet ID for the remote network.
- From the Subnet drop-down list, select the subnet mask for the remote network.
- Click OK to add the IP Host.
- Click OK to close the Add Network Address dialog box.
- From the Remote ID drop-down list, select IP Address. Type the public IP address of the Firebox in the adjacent text box.
- Click OK at the bottom of the page to add the VPN configuration.
Activate the Connection
After you complete the VPN configuration on the Cyberoam device, you must activate the connection. To activate the connection, click the red indicator in the Active column, and click OK.
Confirm the Cyberoam Device Allows Connections
By default the Cyberoam device does not add a policy to allow traffic to and from the remote VPN hosts. Once you have configured the VPN, select Firewall > Rules and look for rules to allow VPN-LAN, and LAN-VPN. If you do not see these rules, follow these steps to add the necessary rules in the Cyberoam web-based management interface.
Add a rule to allow traffic from the LAN to the VPN:
- Select Firewall > Rule.
- Click Add.
- In the Name text box, type a meaningful name for the new rule. For example, LAN-VPN.
- Set the Source Zone to LAN.
- Set the Destination Zone to VPN.
- Set the Action to Accept.
- Click OK to save the new rule.
Add another rule to allow traffic from the VPN to the LAN:
- Click Add.
- In the Name text box, type a meaningful name for the new rule. For example, VPN-LAN.
- Set the Source Zone to VPN.
- Set the Destination Zone to LAN.
- Set the Action to Accept.
- Click OK to save the new rule.
After you have configured the VPN on both devices, you can try to send traffic through the tunnel as a test of the VPN.