Google Cloud BOVPN Integration Guide
This integration guide describes how to configure a Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and Google Cloud Platform.
This integration guide includes instructions about how to configure a BOVPN tunnel for a Firebox from:
- Firebox Web UI
- Policy Manager
- WatchGuard Cloud
WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, go to the documentation and support resources for that product.
Contents
Integration Summary
The hardware and software used in this guide include:
- WatchGuard Firebox
- Fireware v12.11.3
- WatchGuard System Manager (WSM)
- 2025.1.0
- WatchGuard Cloud Platform
- Google Cloud Platform
Additional charges might apply for the use of Google Cloud Platform.
Topology
This diagram shows the topology for a BOVPN connection between a Firebox and Google Cloud Platform.
Use Fireware Web UI to Configure the Firebox
To configure a BOVPN connection on the Firebox:
- Log in to Fireware Web UI.
- Select VPN > Branch Office VPN.
- From the Gateways section, click Add.
The Branch Office VPN configuration page opens.
- In the Gateway Name text box, type a name to identify this BOVPN gateway.
- From the Address Family drop-down list, select IPv4 Addresses.
- From the Credential Method section, select Use Pre-Shared Key.
- In the adjacent text box, type the pre-shared key.
- In the adjacent drop-down list, keep the default String-Basedvalue.
- From the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens.
- From the External Interface drop-down list, select External.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
The Primary Interface IP Address is the primary IP address you configured on the selected external interface. - To specify the gateway ID for tunnel authentication, select By IP Address.
- In the adjacent text box, type the primary IP address of the External Firebox interface.
- Select the Remote Gateway tab.
- To specify the remote gateway IP address for a tunnel, select Static IP Address.
- In the adjacent text box, type the External IP address of your Google Cloud connection.
- To specify the remote gateway ID for tunnel authentication, select By IP Address.
- In the adjacent text box, type the External IP address of your Google Cloud connection.
- Keep the default values for all other options.
- Click OK.
- From the Gateway Endpoint section, select the Start Phase 1 Tunnel When Firebox Starts check box.
- Select the Phase 1 Settings tab.
- From the Version drop-down list, select IKEv2.
- Keep the default values for all other Phase 1 settings.
- Click Save.
The Branch Office VPN page opens.
- From the Tunnels section, click Add.
The Branch Office VPN tunnel configuration page opens.
- From the Gateway drop-down list, select the gateway that you configured.
- From the Addresses section, click Add.
The Tunnel Route Settings page opens.
- From the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the local IP segment. This is the local network protected by the Firebox.
- From the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the remote IP segment. This is the local network protected by Google Cloud.
- Click OK.
- Keep the default values for the Phase 2 Settings tab.
- Click Save.
Use Policy Manager to Configure the Firebox
To configure a BOVPN connection on the Firebox:
- From WatchGuard System Manager (WSM), select Tools > Policy Manager.
- Select VPN > Branch Office Gateways.
The Gateways dialog box opens. - To add a gateway, click Add.
The New Gateway dialog box opens.
- In the Gateway Name text box, type a name to identify this BOVPN gateway.
- From the Address Family drop-down list, select IPv4 Addresses.
- In the Credential Method section, select Use Pre-Shared Key.
- In the text box, type or paste the shared key.
- From the drop-down list, select String-Based.
- In the Gateway Endpoints section, click Add.
The New Gateway Endpoints Settings dialog box opens.
- In the Local Gateway area, from the External Interface drop-down list, select External.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
The Primary Interface IP Address is the primary IP address you configured on the selected external interface. - To specify the gateway ID for tunnel authentication, select By IP Address.
- In the text box, type the primary IP address of the external Firebox interface.
- In the Remote Gateway area, to specify the remote gateway IP address for a tunnel, select Static IP Address.
- In the text box, type the external IP address of your Google Cloud connection.
- In the Specify the Remote Gateway ID for Tunnel Authentication, select By IP Address.
- In the text box, type the external IP address of your Google Cloud connection.
- Keep the default values for all other options.
- Click OK.
- From the Gateway Endpoint section, select the Start Phase 1 Tunnel When Firebox Starts check box.
- Select the Phase 1 Settings tab.
- From the Version drop-down list, select IKEv2.
- Keep the default values for all other Phase 1 settings.
- Click OK.
- Click Close.
- Select VPN > Branch Office Tunnels.
- Click Add.
The New Tunnel dialog box opens.
- From the Gateway drop-down list, select the gateway that you configured previously.
- On the Addresses tab of the New Tunnel dialog box, click Add.
The Tunnel Route Settings dialog box opens.
- From the Local IP section, click ..., from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the local IP segment. This is the local network that the Firebox protects.
- From the Remote IP section, click ..., from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the remote IP segment. This is the local network that Google Cloud protects.
- Click OK.
- Click OK.
- Keep the default values for the Phase 2 Settings tab.
- Click OK.
- Click Close.
- Click Save to Firebox.
Use WatchGuard Cloud to Configure the Firebox
To enable access from your Firebox network to your VPC, you must configure a BOVPN tunnel in WatchGuard Cloud.
To configure a BOVPN tunnel for a cloud-managed Firebox, from WatchGuard Cloud:
- Log in to WatchGuard Cloud with your WatchGuard Cloud operator account credentials.
If you log in with a Service Provider account, you must select a Subscriber account from the Account Manager. - From the navigation menu, select Configure > Device Configuration > VPN.
- Click Branch Office VPN.
- Click Add BOVPN.
The Add BOVPN page opens.
- In the Name text box, type a name for this BOVPN. In our example, we type To GCloud.
- From the VPN Connection Type drop-down list, select Policy-Based IPSec to Locally-Managed Firebox / Third-Party.
- From the Address Family drop-down list, select IPv4 Addresses.
- In the Endpoint A section, select your cloud-managed Firebox.
- In the Endpoint B section, in the Endpoint Name text box, type a name to identify the remote VPN endpoint. In our example, we type GCloud.
- Click Next.
The VPN Gateways settings page opens.
- In the VPN Gateways (IPv4 Addresses) section:
- For your cloud-managed Firebox, select the External network.
- For your GCloud connection, in the IP or Domain Name text box, type the external IP address of your Google Cloud.
- In the Pre-Shared Key text box, type the value of the Pre-Shared Key
- Click Next.
The Traffic settings page opens.
- For your cloud-managed Firebox, select the Internal network that you want to be accessible through the VPN tunnel.
- For your GCloud connection, click Add Network Resource.
- In the Network Resource text box, type the CIDR of your GCloud. In our example, we type 192.168.1.0/24.
- Click Add.
- Click Next.
The Tunnel Routes settings page opens.
- In the Tunnel Routes section, keep all the default settings, and click Next.
The Security settings page opens.
- In the Phase 1 Settings section:
- From the Authentication drop-down list, select SHA2-256.
- From the Encryption drop-down list, select AES-CBC (256-bit).
- In the SA Life text box, type 8.
- From the Diffie-Hellman Group drop-down list, select Diffie-Hellman Group14.
- In the Phase 2 Settings section:
- From the Authentication drop-down list, select SHA2-256.
- From the Encryption drop-down list, select AES-CBC (256-bit).
- Select the Use Perfect Forward Secrecy (PFS) check box.
- From the PFS Group drop-down list, select Diffie-Hellman Group14.
- Keep the default value for all other settings.
- Click Add.
- Click Finish.
For more information about BOVPN configuration for a cloud-managed Firebox, go to Manage BOVPNs for Cloud-Managed Fireboxes.
Configure the Google Cloud VPN
To configure the Google Cloud VPN, perform these steps:
Create a VPC Network
Before you create your VPC Network, you should enable the Compute Engine API. Google charges you for the Compute Engine API in your projects. For more information, go to the Google Cloud documentation.
To create a VPC Network:
- Log in to the Google Cloud Platform.
- Select a project or create a new one. In this example, we use GoogleCloudVPN.
- From the navigation menu, select VPC Network > VPC Networks.
- Click Continue.
The Product Details page opens.
- Click Enable.
The VPC Networks page opens.
- Click Create VPC Network.
The Create a VPC Network page opens. - In the Name text box, type a name for the VPC network. In our example, we use cloud-vpc-network.
- From Subnet Creation Mode, select Custom.
- From Subnets, create a new subnet or edit the existing Subnet 1.
- From the New Subnet or Edit Subnet section, in the Name text box, type a name for the subnet. In our example, we use subnet-asia-east1-192-168-1.
- From the Region drop-down list, select a specific geographical location where you can host your resources. In our example, we select Asia-East1.
- From IP stack type section, select IPv4 (single-stack).
- In the IPv4 Range text box, specify the IP address range for this subnet. In our example, we use 192.168.1.0/24.
- (Optional) For Flow Logs, select On.
- Click Done.
- Keep the default values for all other settings.
- Click Create.
Reserve a Static Address
To reserve a static address:
- From the navigation menu, select VPC Network > IP Addresses.
The IP Addresses page opens.
- Click Reserve External.
The Reserve external static IP address page opens.
- In the Name text box, type a name for the External IP address. In our example, we use google-cloud-vpn-ip.
- From the Region drop-down list, select a region where you want to create the static address. In our example, we select asia-east1 (Taiwan).
- Keep the default values for all other settings.
- Click Reserve.
Create a VPN Connection
To create a VPN connection:
- Search for and select VPN.
- Click Create VPN Connection.
- From the VPN Options section, select Classic VPN.
- Click Continue.
The Create a VPN Connection page opens.
- From the Google Compute Engine VPN Gateway section, in the Name text box, specify a name for the VPN gateway.
- From the Network drop-down list, select the network you created. In our example, we select cloud-vpc-network.
- From the Region drop-down list, select a region. In our example, we select asia-east1 (Taiwan).
- From the IP Address drop-down list, select the IP address you created. In our example, we select google-cloud-vpn-ip.
- From the Tunnels section, in the Name text box, type a name for the tunnel.
- In the Remote Peer IP Address text box, type the External IP address of the remote peer.
- From the IKE Version drop-down list, select IKEv2.
- In the IKE Pre-shared Key text box, type the IKE pre-shared key for this tunnel.
- For Routing Options, select Policy-based.
- In the Remote Network IP Ranges text box, type the IP address ranges of the remote networks.
- From the Local Subnetworks drop-down list, select subnet-asia-east1-192-168-1.
- Click Done.
- Click Create.
Create the Firewall Rules
To create the firewall rules:
- From the navigation menu, select VPC Network > Firewall.
- Click Create Firewall Rule.
The Create a Firewall Rule page opens.
- In the Name text box, type a name for this rule.
- For Logs, select On.
- From the Network drop-down list, select the network you created. In our example, we select cloud-vpc-network.
- For Direction of Traffic, select Ingress.
- For Action on Match, select Allow.
- From the Targets drop-down list, select All Instances In the Network.
- From the Source Filter drop-down list, select IPv4 Ranges.
- In the Source IPv4 Ranges text box, type the IP address ranges of remote internal networks.
- For Protocols and Ports, select Allow All or Specified Protocols and Ports. In our example, we select Allow All.
- Keep the default values for all other settings.
- Click Create.
- To create an egress rule, repeat steps 2-13.
- Click Create.
Google Cloud VPN auto-negotiates authentication and encryption settings and the key group with the Firebox. You cannot edit these settings in the Google Cloud VPN configuration.
For more information about Google Cloud VPN configuration and supported IKE ciphers, go to Google Cloud VPN Documentation.
Test the Integration
To test the integration, you can use these methods.
Verify VPN status in Google Cloud
To verify the integration, from Google Cloud:
- From the Google Cloud Platform navigation menu, select Networking > Network Connectivity > VPN.
- Select the Cloud VPN Tunnels tab.
The data shows the VPN is established.
Verify VPN Status in Fireware WebUI
To verify the integration, from Web UI:
- Select System Status > VPN Statistics.
The VPN Statistics page opens. - Select the Branch Office VPN tab.
The traffic statistics for Branch Office VPN tunnels open. The data shows the VPN is established.
Verify VPN Status in WatchGuard System Manager (WSM)
To verify the integration, from WSM:
- Connect to a Firebox with WSM.
- Select the Device Status tab.
The data shows the VPN is established.
Verify VPN Status in WatchGuard Cloud
To verify the integration, from WatchGuard Cloud:
- Select Monitor > Devices.
If you log in with a Service Provider account, you must select a Subscriber account from the Account Manager. - Select your cloud-managed Firebox.
- Select Live Status > VPN > Branch Office VPN.
- Click the BOVPN name, and verify that the VPN is established.