Cisco ASA and Firebox BOVPN Virtual Interface Integration Guide

Deployment Overview

WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, see the documentation and support resources for that product.

This integration guide describes how to configure a Branch Office VPN (BOVPN) virtual interface connection between a WatchGuard Firebox and a Cisco Adaptive Security Appliance (ASA).

Integration Summary

The hardware and software used in this guide include:

  • WatchGuard Firebox
    • Fireware v12.7.1 or higher
  • Cisco ASA 5506-X
    • ASDM v7.15 (1) 150
    • ASA v9.15 (1) 16

Topology

This diagram shows the topology for a BOVPN virtual interface connection between a Firebox and a Cisco ASA.

Topology diagram

Configure the Firebox

On the Firebox, configure a BOVPN virtual interface connection:

  1. Log in to Fireware Web UI.
  2. Select VPN > BOVPN Virtual Interfaces.
    The BOVPN Virtual Interfaces configuration page opens.
  3. Click Add.
  4. In the Interface Name text box, type a name to identify this BOVPN virtual interface.
  5. From the Remote Endpoint Type drop-down list, select Cloud VPN or Third-Party Gateway.
  6. From the Gateway Address Family drop-down list, select IPv4 Addresses.
  7. In the Credential Method section, select Use Pre-Shared Key.
  8. In the adjacent text box, type the pre-shared key.

Screenshot of Firebox, new diagram1

  1. In the Gateway Endpoint section, click Add.
    The Gateway Endpoint Settings dialog box opens.
  2. From the Physical drop-down list, select External.
  3. From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
    The Primary Interface IP Address is the primary IP address you configured on the selected external interface.
  4. Select By IP Address.
  5. In the adjacent text box, type the primary IP address of the External Firebox interface.

Screenshot of Firebox, new diagram2

  1. Select the Remote Gateway tab.
  2. Select Static IP Address.
  3. In the adjacent text box, type the IP address of your Cisco ASA WAN connection.
  4. Select By IP Address.
  5. In the adjacent text box, type the IP address of your Cisco ASA WAN connection.

Screenshot of Firebox, new diagram3

  1. Click OK.
  2. In the Gateway Endpoint section, select Start Phase 1 tunnel when it is inactive.
  3. Select Add this tunnel to the BOVPN-Allow policies.

Screenshot of Firebox, new diagram4

  1. Select the VPN Routes tab.
  2. Click Add.
  3. From the Choose Type drop-down list, select Network IPv4.
  4. In the Route To text box, type the Network IP address of a route that will use this virtual interface.

Screenshot of Firebox, new diagram5

  1. Click OK.
  2. Select the Assign virtual interface IP addresses (required for dynamic routing) check box.
  3. In the Local IP address and Peer IP address or netmask text boxes, type the virtual interface IP addresses.

Screenshot of Firebox, new diagram6

  1. Select the Phase 1 Settings tab.
  2. From the Version drop-down list, select IKEv2.
  3. Keep all other Phase 1 settings as the default values.

Screenshot of Firebox, new diagram7

  1. Keep all other Phase 2 settings as the default values.

Screenshot of Firebox, new diagram8

  1. Click Save.

For more information about BOVPN virtual interface configuration on the Firebox, see BOVPN Virtual Interfaces

Configure the Cisco ASA

In our example, we configure a Cisco ASA 5506-X.

To configure the basic settings:

  1. Log in to the ASA 5506-X with Cisco Adaptive Security Device Manager (ASDM). The default IP address is 192.168.1.1.
  2. Configure the ASA 5506-X interfaces. For information about how to configure interfaces, see the Cisco ASA 5506-X documentation.
  3. Select the Enable traffic between two or more interfaces which are configured with same security levels check box.
  4. Click Apply.

Screenshot of Cisco, new diagram1

Next, configure the IPSec VPN settings:

  1. Click Configuration.
  2. Select Site-to-Site VPN > Advanced > IKE policies.
  3. In the IKEv2 Policies section, click Add.
  4. In the Priority text box, type 1.
  5. From the D-H Group drop-down list, select 14.
  6. From the Encryption drop-down list, select aes-256.
  7. From the Integrity Hash drop-down list, select sha256.
  8. From the Pseudo Random Function (PRF) Hash drop-down list, select sha256.
  9. Keep the default value for all other settings.

Screenshot of Cisco, new diagram2

  1. Click OK.
  2. Click Apply.

Screenshot of Cisco, new diagram3

  1. Select Site-to-Site VPN > Advanced > IPsec Proposals (Transform Sets).
  2. In the IKE v2 IPsec Proposals section, click Add.
  3. In the Name text box, type an object name. In our example, we specify the name AES256-SHA256.
  4. From the Encryption drop-down list, select aes-256.
  5. From the Integrity Hash drop-down list, select sha-256.

Screenshot of Cisco, new diagram4

  1. Click OK.
  2. In the IPsec Profile section, click Add.
  3. In the Name text box, type the IPSec profile name. In our example, we specify the name Profile.
  4. In the IKE v2 IPsec Proposal text box, type the proposal.
  5. Select PFS Settings and select group14.

Screenshot of Cisco, new diagram5

  1. Click OK.
  2. Click Apply.

Screenshot of Cisco, new diagram6

  1. Select Configuration > Firewall > Objects > Network Objects/Groups.
  2. Click Add > Network Object.
  3. In the Name text box, type the object name. In our example, we specify the name VTI-network.
  4. From the Type drop-down list, select Network.
  5. For IP Version, select IPv4.
  6. In the IP Address text box, type the IP address. In our example, we specify the IP address 10.0.11.0.
  7. In the Netmask text box, type the netmask. In our example, we specify the netmask 255.255.255.0.

Screenshot of Cisco, new diagram7

  1. Click OK.
  2. Repeat Steps 25–31 to create other network objects.
  3. Click Apply.

Screenshot of Cisco, new diagram8

  1. Select Configuration > Site-to-Site VPN > Connection Profiles.
  2. In the Connection Profiles section, click Add.
  3. In the Peer IP Address text box, type the peer IP address.
  4. From the Interface drop-down list, select outside.
  5. From the Local Network list, select internal-network/24.
  6. From the Remote Network list, select wg-network.
  7. In the IPsec Enabling section, click Manage.
  8. Click Add.
  9. In the Name text box, type the name. In our example, we specify the name GroupPolicy1.
  10. In the Tunneling Protocols section, clear the Inherit check box and select IPsec IKEv2.

Screenshot of Cisco, new diagram9

  1. Click OK > OK.
  2. Select Local Pre-shared Key.
  3. In the adjacent text box, type the pre-shared key.
  4. In the Remote Peer Pre-shared Key text box, type the pre-shared key.

Screenshot of Cisco, new diagram10

  1. For the IKE Policy setting, keep the default value.
  2. From the IPsec Proposal list, select AES256-SHA256.

Screenshot of Cisco, new diagram11

  1. For the Advanced settings, select Advanced > Crypto Map Entry.
  2. For Perfect Forward Secrecy, select Enable.
  3. From the Diffie-Hellman Group drop-down list, select group14.
  4. Keep all other settings as the default values.

Screenshot of Cisco, new diagram12

  1. Click OK.
  2. Click Apply.

Screenshot of Cisco, new diagram13

Next, configure the VTI interface settings:

  1. Click Configuration.
  2. Select Device Setup > Interface Settings > Interfaces.
  3. Click Add > VTI Interface.
  4. In the VTI ID text box, type the VTI ID.
  5. In the Interface Name text box, type the interface name.
  6. Select Enable Interface.
  7. In the IP Address text box, type the IP address.
  8. In the Subnet Mask drop-down list, select 255.255.255.0.

Screenshot of Cisco, new diagram14

  1. Select the Advanced tab.
  2. In the Destination IP text box, type the destination IP address.
  3. From the Source Interface drop-down list, select outside.
  4. From the Tunnel Protection with Ipsec Profile drop-down list, select Profile.
  5. Select the Enable Tunnel Mode IPv4 Ipsec check box.

Screenshot of Cisco, new diagram15

  1. Click OK.
  2. Click Apply.

Finally, configure the routing settings:

  1. Select Configuration > Device Setup > Routing > Static Routes.
  2. Click Add.
  3. Select IPv4.
  4. From the Interface drop-down list, select VTI.
  5. From the Network drop-down list, select wg-network.
  6. In the Gateway IP text box, type the gateway IP address.
  7. For all other settings, keep the default values.

Screenshot of Cisco, new diagram16

  1. Click OK.
  2. Click Apply.

Screenshot of Cisco, new diagram17

Test the Integration

To test the integration, from Fireware Web UI:

  1. Select System Status > VPN Statistics.
  2. Select the Branch Office VPN tab and verify the VPN is established.

Screenshot of Firebox, new diagram9

  1. Verify that Host1 (behind the Firebox) and Host2 (behind the Cisco ASA) can ping each other.