pfSense and Firebox Route-Based BOVPN Integration Guide

This guide describes how to configure a route-based Branch Office VPN (BOVPN) with static routing between a WatchGuard Firebox and a pfSense firewall.

Contents

Integration Summary

The hardware and software used in this guide include:

  • WatchGuard Firebox with Fireware v12.11.2 (Build 713726)
  • pfSense firewall with v2.8.0-BETA (amd64)

Integration Topology

This diagram outlines the topology used in this integration:

Topology diagram

Configure the Firebox

You can configure your Firebox for a route-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure pfSense

This section describes how to configure the pfSense settings.

Configure Basic Settings

  1. Log in to the pfSense Web UI at: https://<IP address of the pfSense device>
    The default IP address of the interface is: https://192.168.1.1.
  2. Configure the pfSense interfaces. For information about how to configure interfaces, go to the pfSense documentation.

    Screenshot of pfSense, picture new1

    Screenshot of pfSense, picture new14

Configure pfSense IPSec VPN Phase 1 and 2 Settings

  1. Log in to the pfSense Web UI at: https://<IP address of the pfSense device>
  2. Select VPN > IPsec > Tunnels.
  3. Click + Add P1.
  4. In the IKE Endpoint Configuration section, from the Key Exchange Version drop-down list, select IKEv2.
  5. From the Internet Protocol drop-down list, select IPv4.
  6. From the Interface drop-down list, select WAN.
  7. In the Remote Gateway text box, type the IP address of the Firebox.
  8. In the Phase 1 Proposal (Authentication) section, from the Authentication Method drop-down list, select Mutual PSK.
  9. From the My Identifier drop-down list, select My IP Address.
  10. From the Peer Identifier drop-down list, select Peer IP Address.
  11. In the Pre-Shared Key text box, type the pre-shared key.
  12. In the Phase 1 Proposal (Encryption Algorithm) section, from the Algorithm drop-down list, select AES.
  13. From the Key Length drop-down list, select 256 bits.
  14. From the Hash drop-down list, select SHA256.
  15. From the DH Group drop-down list, select 14 (2048 bit).
  16. In the Life Time text box, type 28800.

    Screenshot of pfSense, picture pfsense-IPsec-Phase-1_One

    Screenshot of pfSense, picture pfsense-IPsec-Phase-1_Two

  17. Keep the default values for all other settings.

    Screenshot of pfSense, picture pfsense-IPsec-Phase_1-Three

  18. Click Save.

    Screenshot of pfSense, picture new6

  1. Click Show Phase 2 Entries.
  2. Click + Add P2.
  3. In the General Information section, from the Mode drop-down list, select Routed (VTI).
  4. For Local Network, from the Type drop-down list, select Address.
  5. In the Address text box, type the local VTI address. In this example, we type 10.0.11.10.
  6. From the Remote Network drop-down list, select Address.
  7. In the Address text box, type the remote VTI address. In this example, we type 10.0.11.11.
  8. In the Phase 2 Proposal (SA/Key Exchange) section, from the Protocol drop-down list, select ESP.
  9. For Encryption Algorithms, select the AES check box. In the adjacent drop-down list, select 256 bits. Do not select the AES128-GCM check box.
  10. For Hash Algorithms, select the SHA256 check box.
  11. From the PFS Key Group drop-down list, select 14 (2048 bit).
  12. In the Life Time text box, type 3600.

    Screenshot of pfSense, picture IPsec Phase 2 One

  13. Click Save.

    Screenshot of pfSense, picture new8

  14. Click Apply Changes.

Add the VTI Interface

  1. Log in to the pfSense Web UI at: https://<IP address of the pfSense device>

  2. Select VPN > IPsec.
  3. Select Interfaces > Assignments.
  4. From the Available Network Ports drop-down list, select ipsec1 (IPsec VTI:).

Screenshot of pfSense, picture of Interface-VTI-Add

  1. Click + Add.
  2. Select the interface you created. In this example, we select OPT1.

Screenshot of pfSense, picture of IPsecVPN interface assignments

  1. Select the Enable Interface check box.
  2. In the Description text box, type the interface name. In this example, we type IPsecVTI.

    Screenshot of pfSense, picture of IPsecVPN interface

  3. Click Save.
  4. Click Apply Changes.

Add the pfSense Static Route

  1. Select System > Routing > Gateways.
    A gateway for the VTI interface is created automatically.

    Screenshot of pfSense, routing gateway

  2. Click Static Routes.
  1. Click + Add.
  2. In the Destination Network text box, type the network you want to route to.
  3. From the Gateway drop-down list, select the gateway for the VTI interface. In this example, we select IPSECVTI_VTIV4 - 10.0.11.11.

Screenshot of pfSense, static routes

  1. Click Save.
  2. Click Apply Changes.

Configure Rule Settings

  1. Log in to the pfSense Web UI at: https://<IP address of the pfSense device>

  2. Select Firewall > Rules > IPsec.
  3. Click Add.
  4. From the Action drop-down list, select Pass.
  5. From the Protocol drop-down list, select Any.
  6. From the Source drop-down list, select Network.
  7. In the Source Address text box, type the remote network IP address.
  8. From the Destination drop-down list, select Network.
  9. In the Destination Address text box, type the local network IP address.
  10. Keep the default values for all other settings.

    Screenshot of pfSense, picture new17

  11. Click Save.
  12. Click Apply Changes.

Test the Integration