Cisco Firepower and Firebox Route-Based BOVPN Integration Guide

This integration guide describes how to configure a route-based Branch Office VPN (BOVPN) between a WatchGuard Firebox and a Cisco Firepower 1010E Threat Defense.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11.2 or higher
  • Firepower 1010E Threat Defense v7.4.2.2-28 or higher

Topology

This diagram shows the topology for a BOVPN connection between a Firebox and a Firepower 1010E.

Topology diagram

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • You have configured the internal network objects for the Firebox and Firepower in the Firepower 1010E web UI. In this guide, we use the Network_under_Firebox and Network_Under_Firepower network objects.
  • You have configured an internal and external interface in the Firepower 1010E web UI. In this guide, we use the external ethernet1/1 and internal ethernet1/2 interfaces. For more information about how to configure interfaces, go to the Cisco Firepower official documentation.

Configure the Firebox

You can configure your Firebox for a route-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure Firepower

To configure the Firepower 1010E, complete these steps:

  1. Configure an IPSec VPN Tunnel for the Firepower 1010E
  2. Configure a BOVPN Route for the Firepower 1010E
  3. Configure Policies for the Firepower 1010E
  4. Deploy the Configuration for the Firepower 1010E

Configure an IPSec VPN Tunnel for the Firepower 1010E

To configure an IPSec VPN tunnel for the Firepower 1010E:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>
  2. Select Device: [Firepower device name].
  3. In the Site-to-Site VPN section, click View Configuration.
    The Site-to-Site VPN page opens.
  4. Click Create Site-to-Site Connection.
    The Define Endpoints configuration page opens.
  5. Screenshot of the Define Endpoints configurations page

  6. In the Connection Profile Name text box, type a descriptive name for the VPN. In our example, we type Route_Based_IPSec.
  7. For Type, select Route Based (VTI).
  8. From the Local VPN Access Interfaces drop-down list, select Create New Virtual Tunnel Interface.
    The Virtual Tunnel Interface configuration page opens.
  9. Screenshot of the Virtual Tunnel Interface configuration page

  10. In the Name text box, type a descriptive name for the virtual tunnel interface. In our example, we type local_virtual_interface.
  11. To enable the virtual tunnel interface, enable Status.
  12. In the Tunnel ID text box, type a tunnel ID from 0 to 10413. In our example, we type 10.
  13. From the Tunnel Source drop-down list, select the external interface you configured for the Firepower. In our example, we select external (Ethernet1/1).
  14. In the IP Address and Subnet Mask text boxes, type the IP address and subnet mask of the virtual interface for the Firepower. In our example, we type 10.0.11.10/24.
  15. Click OK.
    The virtual tunnel interface you configured is added and appears in the Local VPN Access Interfaces drop-down list on the Define Endpoints configuration page.
  16. From the Local VPN Access Interface drop-down list, select the virtual tunnel interface you created.
  17. In the Remote IP Address text box, type the public IP of Firebox. In our example, we type 203.0.113.2.
  18. Click Next.
    The Privacy Configuration page opens.
  19. Enable IKE Version 2.
  20. In the IKE Policy section, click Edit > Create New IKE Policy.
    The IKE v2 Policy configuration dialog box opens.
  21. Screenshot of the IKE v2 Policy configuration dialog box

  22. In the Priority text box, type the priority number for the IKE v2 policy. In our example, we type 1.
  23. In the Name text box, type a descriptive name for the IKE v2 policy. In our example, we type IKE_to_Firebox.
  24. Enable State.
  25. From the Encryption drop-down list, select AES 256.
  26. From the Diffie-Hellman Group drop-down list, select 14.
  27. From the Integrity Hash drop-down list, select SHA256.
  28. From the Pseudo Random Function (PRF) Hash drop-down list, select SHA256.
  29. In the Lifetime (seconds) text box, type 86400.
  30. Click OK.
    The IKE v2 policy you created appears in the list of policies.
  31. Screenshot of IKE v2 policy in the list

  32. Disable any other IKE v2 policies in the list.
  33. Click OK.
    The Select IPSec Proposals dialog box opens.
  34. Screenshot of the Select IPSec Proposals dialog box

  35. To create a new IPSec proposal, select Edit > Add IPSec Proposals > Create New IPSec Proposal.
    The IKE v2 IPSec Proposal configuration dialog box opens.
  1. In the Name text box, type a descriptive name for the proposal. In our example, we type IKE_to_Firebox_Proposal.
  2. From the Encryption drop-down list, select AES 256.
  3. From the Integrity Hash drop-down list, select SHA256.
  4. Click OK.
  5. Select the IKE v2 proposal you created in the previous steps.
  6. Click OK.
  7. Screenshot of the IKE v2 proposal

  8. Click OK.
    The Privacy Configuration page opens.
  9. Screenshot of the Privacy Configuration page

  10. For Authentication Type, enable Pre-Shared Manual Key.
  11. In the Local Pre-Shared Key text box, type the same pre-shared key you configured for the Firebox.
  12. In the Remote Peer Pre-Shared Key text box, type the same pre-shared key you configured for the Firebox.
  13. In the Lifetime Duration text box, type 86400.
  14. In the Additional Options section, from the Diffie-Hellman Group for Perfect Forward Secrecy drop-down list, select 14.
  15. Click Next.
    The Summary page opens.
  16. Verify the configurations on this page, then click Finish.
    The VPN is created successfully.

Configure a BOVPN Route for the Firepower 1010E

To configure a BOVPN route for the Firepower 1010E:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>
  2. Select Device: [Firepower device name].
  3. In the Routing section, click View Configuration.
    The Static Route configuration page opens.
  4. Click Add Static Route.
    The Add Static Route dialog box opens.
  5. Screenshot of the Add Static Route page

  6. In the Name text box, type a descriptive name for the static route. For our example, we type to_Firebox.
  7. From the Interface drop-down list, select the virtual tunnel interface you created in the Configure an IPSec VPN Tunnel for the Firepower 1010E section. In our example, we select local_virtual_interface (Tunnel 10).
  8. For Protocol, select IPv4.
  9. In the Networks section, select the subnet you configured for the Firebox. In our example, we select Network_Under_Firebox.
  10. From the Gateway drop-down list, select the public IP network of the Firebox. For our example, we select firebox_IP.
  11. In the Metric text box, we type 1.
  12. Click OK.
    The BOVPN route you configured in added successfully.

Configure Policies for the Firepower 1010E

To configure policies for the Firepower 1010E:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>
  2. Select Policies.
    The policy configuration page opens.

    Make sure that no NAT rule is applied to the VPN-protected networks. Traffic between the local and remote subnets must use their original IP addresses. If NAT modifies these addresses, the VPN tunnel will fail.

  3. Click Create Access Rule.
    The Add Access Rule dialog box opens.
  4. Screenshot of the Add Access Rule dialog box

  5. In the Title text box, type a descriptive name for this policy. For our example, we type IPSec_Allow.
  6. From the Action drop-down list, select Allow.
  7. In the Source section, from the Networks drop-down list, select the internal network you configured for the Firepower. In our example, we select Network_Under_Firepower.
  8. In the Destination section, from the Networks drop-down list, select the internal network you configured for the Firebox. In our example, we select Network_Under_Firebox.
  9. Click OK.

Deploy the Configuration for the Firepower 1010E

To deploy the Firepower 1010E configuration:

  1. Log in to the Firepower Web UI at: https://<Management IP address of the Firepower>.
  2. Select Deployment.
  3. Click Deploy Now.
  4. Click OK.
    Itmight take several minutes to complete the deployment.

Test the Integration