Cisco Firepower and Firebox Policy-Based BOVPN Integration Guide

This integration guide describes how to configure a policy-based Branch Office VPN (BOVPN) between a WatchGuard Firebox and a Cisco Firepower 1010E Threat Defense.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11.2 or higher
  • Firepower 1010E Threat Defense v7.4.2.2-28 or higher

Topology

This diagram shows the topology for a BOVPN connection between a Firebox and a Firepower 1010E.

Topology diagram

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • You have configured the internal network objects for the Firebox and Firepower in the Firepower 1010E web UI. In this guide, we use the Network_under_Firebox and Network_Under_Firepower network objects.
  • You have configured an internal and external interface in the Firepower 1010E web UI. In this guide, we use the external ethernet1/1 and internal ethernet1/2 interfaces. For more information about how to configure interfaces, go to the Cisco Firepower official documentation.

Configure the Firebox

You can configure your Firebox for a policy-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure the Firepower 1010E

To configure the Firepower 1010E, complete these steps:

  1. Configure an IPSec VPN Tunnel for the Firepower 1010E
  2. Configure Policies for the Firepower 1010E
  3. Deploy the Configuration for the Firepower 1010E

Configure an IPSec VPN Tunnel for the Firepower 1010E

To configure an IPSec VPN tunnel for the Firepower 1010E:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>
  2. Select Device: [Firepower device name].
  3. In the Site-to-Site VPN section, click View Configuration.
    The Site-to-Site VPN page opens.
  4. Click Create Site-to-Site Connection.
    The Define Endpoints page opens.
  5. Screenshot of the Define Endpoints settings

  6. In the Connection Profile Name text box, type a descriptive name for the VPN. In our example, we type Policy-Based_IPSec.
  7. For Type, select Policy Based.
  8. From the Local VPN Access Interfaces drop-list, select the external interface you configured for the Firepower. In our example, we select external (Ethernet1/1).
  9. From the Local Network drop-list, select the internal network you configured for the Firepower. In our example, we select Network_Under_Firepower.
  10. In the Remote Site section, select Static.
  11. In the Remote IP Address text box, type the public IP address for your Firebox. In our example, we type 203.0.113.2.
  12. From the Remote Network drop-list, select the network object you configured for your Firebox. For our example, we select Network_Under_Firebox.
  13. Click Next.
    The Privacy Configuration page opens.
  14. Enable IKE Version 2.
  15. In the IKE Policy section, click Edit > Create New IKE Policy.
    The IKE v2 Policy configuration dialog box opens.
  16. Screenshot of the IKE v2 Policy configuration dialog box

  17. In the Priority text box, type the priority number for the IKE v2 policy. In our example, we type 1.
  18. In the Name text box, type a descriptive name for the IKE v2 policy. In our example, we type IKE_to_Firebox.
  19. Enable State.
  20. From the Encryption drop-down list, select AES 256.
  21. From the Diffie-Hellman Group drop-down list, select 14.
  22. From the Integrity Hash drop-down list, select SHA256.
  23. From the Pseudo Random Function (PRF) Hash drop-down list, select SHA256.
  24. In the Lifetime (Seconds) text box, type 86400.
  25. Click OK.
    The IKE v2 policy you created appears in the list of policies.
  26. Disable any other IKE v2 policies in the list.
  27. Screenshot of the list of IKE v2 policies

  28. Click OK.
    The Select IPSec Proposals dialog box opens.
  29. Screenshot of the Select IPSec Proposals dialog box

  30. To create a new IPSec proposal, select Edit > Add IPSec Proposals > Create New IPSec Proposal.
    The IKE v2 IPSec Proposal configuration dialog box opens.
  31. In the Name text box, type a descriptive name for the proposal. In our example, we type IKE_to_Firebox_Proposal.
  32. From the Encryption drop-down list, select AES 256.
  33. From the Integrity Hash drop-down list, select SHA256.
  34. Click OK.
  35. Select the IKE v2 proposal you created in the previous steps.
  36. Click OK.
  37. Screenshot of the list of IPSec Proposals

  38. Click OK.
    The Privacy Configuration page opens.
  39. Screenshot of the Privacy Configuration page

  40. For Authentication Type, select Pre-Shared Manual Key.
  41. In the Local Pre-Shared Key text box, type the same pre-shared key you configured for the Firebox.
  42. In the Remote Peer Pre-Shared Key text box, type the same pre-shared key you configured for the Firebox.
  43. In the Lifetime Duration text box, type 86400.
  44. In the Additional Options section, from the Diffie-Hellman Group for Perfect Forward Secrecy drop-down list, select 14.
  45. From the NAT Exempt drop-down list, select the interface to be protected by the VPN tunnel. In our example, we select internal (Ethernet 1/2).
  46. Click Next.
    The Summary page opens.
  47. Verify the configurations on this page, then click Finish.
    The VPN is created successfully.

Configure Policies for the Firepower 1010E

To configure policies for the Firepower 1010E:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>.
  2. Select Policies.
    The Policy Configuration page opens.
  3. Click Create Access Rule.
    The Add Access Rule dialog box opens.
  4. Screenshot of the Add Access Rule dialog box

  5. In the Title text box, type a descriptive name for this policy. In our example, we type IPSec_AllowIPSec_Allow.
  6. From the Action drop-down list, select Allow.
  7. In the Source section, from the Networks drop-down list, select the internal network you configured for the Firepower. In our example, we select Network_Under_Firepower.
  8. In the Destination section, from the Networks drop-down list, select the internal network you configured for the Firebox. In our example, we select Network_Under_Firebox.
  9. Click OK.

Deploy the Configuration for the Firepower 1010E

To deploy the Firepower 1010E configuration:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>.
  2. Select Deployment.
  3. Click Deploy Now.
  4. Click OK.
    It might take several minutes to complete the deployment.

Test the Integration