Palo Alto and Firebox Policy-Based BOVPN Integration Guide

This integration guide describes how to configure a policy-based Branch Office VPN (BOVPN) between a WatchGuard Firebox and a Palo Alto PA-220 firewall.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11.2
  • Palo Alto PA-220 v10.2.4

Integration Topology

This diagram shows the topology for a policy-based BOVPN connection between a Firebox and a Palo Alto PA-220 firewall.

Diagram of WatchGuard Firebox and Palo Alto topology

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal interface on the Firebox.
  • You have configured the Palo Alto PA-220 with Layer 3 interfaces, Trust and Untrust security zones, and a static route to the Internet. For more information go to the Palo Alto documentation.

Configure the Firebox

You can configure your Firebox for a policy-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure the Palo Alto Firewall

To configure the Palo Alto firewall, complete these steps:

  1. Configure a Tunnel Interface
  2. Configure a Static Route
  3. Configure the IKE Crypto Profile
  4. Configure the IPSec Crypto Profile
  5. Configure the IKE Gateway
  6. Configure the IPSec Tunnel
  7. Configure the Security Policy

Configure a Tunnel Interface

To configure a tunnel interface on the Palo Alto firewall:

  1. Log in to the Palo Alto Web UI at: https://<IP address of the Palo Alto device>.
    The default IP address is https://192.168.1.1.
  2. Select Network > Interfaces > Tunnel.
    The Tunnel page opens.
  3. Click Add.
    The Tunnel Interface dialog box opens.
  4. Screenshot of Palo Alto, Tunnel Interface dialog box

  5. In the Interface Name text box, type a numeric suffix. In our example, we type 1.
  6. Select the Config tab.
  7. From the Virtual Router drop-down list, select Default.
  8. From the Security Zone drop-down list, select New Zone.
    The Zone dialog box opens.
  9. Screenshot of Palo Alto, Zone dialog box

  10. In the Name text box, type a name for the zone. In this example, we type vpn-tun.
  11. To save the zone, click OK.
  12. To save the tunnel interface, click OK.
    The tunnel interface is added and appears on the Tunnel page.
  13. Screenshot of Palo Alto, Tunnel page with new tunnel interface list

Configure a Static Route

To configure a static route on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Network > Virtual Routers.
    The list of existing virtual routers opens.
  2. Screen shot of Palo Alto, Virtual Routers page with list of virtual routers

  3. In the list of virtual routers, click the Default virtual router.
  4. Click Static Routes.
  5. Click Add.
    The static route settings open.
  6. Screenshot of Palo Alto, Virtual Router dialog box

  7. In the Name text box, type a name for the route. In this example, we type route1.
  8. In the Destination text box, type the destination address. In this example, we type 192.168.35.0/24.
  9. From the Interface drop-down list, select tunnel.1.
  10. From the Next Hop drop-down list, select None.
  11. To save the static route settings, click OK.
  12. Screenshot of Palo Alto, Virtual Router dialog box with new static route

  13. To save the virtual router settings, click OK.
    The updates to the Default virtual router configuration are saved.

Configure the IKE Crypto Profile

To configure the IKE crypto profile on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Network > Network Profiles > IKE Crypto.
    The list of existing IKE crypto profiles opens.
  2. Click Add.
    The IKE Crypto Profile dialog box opens.
  3. Screenshot of Palo Alto, IKE Crypto Profile dialog box

  4. In the Name text box, type a name for the profile. In this example, we type IKE-phase1-profile.
  5. In the DH Group section, click Add, then select the group14 check box.
  6. In the Encryption section, click Add, then select the aes-256-cbc check box.
  7. In the Authentication section, click Add, then select the sha256 check box.
  8. Keep the default values for all other settings.
  9. Click OK.
    The profile is added to the list of IKE crypto profiles.

Configure the IPSec Crypto Profile

To configure the IPSec crypto profile on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Network > Network Profiles > IPSec Crypto.
    The list of existing IPSec crypto profiles opens.
  2. Click Add.
    The IPSec Crypto Profile dialog box opens.
  3. Screenshot of Palo Alto, IPSec Crypto Profile dialog box

  4. In the Name text box, type a name for the IPSec Crypto profile. In this example, we type IPSec-phase2-profile.
  5. From the IPSec Protocol drop-down list, select ESP.
  6. In the Encryption section, click Add, then select the aes-256-cbc check box.
  7. From the DH Group drop-down list, select group14.
  8. In the Authentication section, click Add, then select the sha256 check box.
  9. Keep the default values for all other settings.
  10. Click OK.
    The profile is added to the list of IPSec crypto profiles.

Configure the IKE Gateway

To configure the IKE gateway on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Network > Network Profiles > IKE Gateways.
    The list of existing IKE gateways opens.
  2. Click Add.
    The IKE Gateway dialog box opens with the General tab selected by default.
  3. Screenshot of Palo Alto, IKE Gateway dialog box

  4. In the Name text box, type a name for the IKE gateway. In this example, we type IKE-GW.
  5. From the Version drop-down list, select IKEv2 Only Mode.
  6. For Address Type, select IPv4.
  7. From the Interface drop-down list, select Ethernet1/1.
  8. From the Local IP Address drop-down list, select the IP address for the Palo Alto WAN connection. In this example, we select 198.51.100.2/24.
  9. For Peer IP Address Type, select IP.
  10. In the Peer Address text box, type the primary IP address of the external Firebox interface. In this example, we type 203.0.113.2.
  11. For Authentication, select Pre-Shared Key.
  12. In the Pre-Shared Key text box, type the same pre-shared key you configured on the Firebox.
  13. In the Confirm Pre-Shared Key text box, type the pre-shared key again.
  14. From the Local Identification drop-down list, select None.
  15. From the Peer Identification drop-down list, select None.
  16. Select the Advanced Options tab.
    The Advanced Options page opens.
  17. Screenshot of Palo Alto, IKE Gateway dialog box with Advanced Options

  18. In the IKEv2 section, from the IKE Crypto Profile drop-down list, select the IKE crypto profile you created in the Configure the IKE Crypto Profile section. In this example, we select IKE-phase1-profile.
  19. Click OK.
    The gateway is added to the list of IKE gateways.

Configure the IPSec Tunnel

To configure the IPSec tunnel on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Network > IPSec Tunnels.
    The list of existing IPSec tunnels opens.
  2. Click Add.
    The IPSec Tunnel dialog box opens with the General tab selected by default.
  3. Screenshot of Palo Alto, IPSec Tunnel dialog box with general settings

  4. In the Name text box, type a name for the tunnel. In this example, we type IPSec-tunnel.
  5. From the Tunnel Interface drop-down list, select the tunnel interface you created in the Configure a Tunnel Interface section. In this example, we type tunnel.1.
  6. For Type, select Auto Key.
  7. For Address Type, select IPv4.
  8. From the IKE Gateway drop-down list, select the gateway you created in the Configure the IKE Gateway section. In this example, we select IKE-GW.
  9. From the IPSec Crypto Profile drop-down list, select the IPSec crypto profile you created in the Configure the IPSec Crypto Profile section. In this example, we select IPSec-phase2-profile.
  10. Select the Show Advanced Options check box.
  11. Select the Enable Replay Protection check box.
  12. Select the Proxy IDs tab.
  13. Click IPv4.
  14. Click Add.
    The Proxy ID dialog box opens.
  15. Screen shot of Palo Alto, Proxy ID dialog box

  16. In the Proxy ID text box, type a Proxy ID name. In this example, we type Proxy.
  17. In the Local text box, type the IP address or subnet for the local VPN gateway. In this example, we type 192.168.13.0/24.
  18. In the Remote text box, type the IP address or subnet for the remote VPN gateway. In this example, we type 192.168.35.0/24.
  19. From the Protocol drop-down list, select Any.
  20. Click OK.
  21. Screenshot of Palo Alto, IPSec Tunnel dialog box with new proxy ID

  22. Click OK.
    The tunnel is added to the list of IPSec tunnels.

Configure the Security Policy

To configure a security policy on the Palo Alto firewall, from the Palo Alto Web UI:

  1. Select Policies > Security.
    The list of existing security policies opens.
  2. Click Add.
    The Security Policy Rule dialog box opens with the General tab selected by default.
  3. Screenshot of Palo Alto, Security Policy Rule dialog box

  4. In the Name text box, type a name for the policy. In this example, we type trust-vpn-tun.
  5. Select the Source tab.
    The Source page opens.
  6. Screenshot of Palo Alto, Security Policy Rule dialog box with Source settings

  7. In the Source Zone section, click Add, then select Trust.
  8. Select the Destination tab.
    The Destination page opens.
  9. Screenshot of Palo Alto, Security Policy Rule dialog box with Destination settings

  10. In the Destination Zone section, click Add, then select the security zone you created in the Configure a Tunnel Interface section. In this example, we select vpn-tun.
  11. Keep the default values for all other settings.
  12. Click OK.
  13. To create another security policy, repeat Steps 1-9.
  14. Screenshot of Palo Alto, Security page with list of security policies

  15. Click Commit.
    The firewall can take several minutes to save your change.
  16. Click Close.

Test the Integration