Sophos XG Firewall and Firebox Branch Office VPN Integration Guide
Deployment Overview
WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, go to the documentation and support resources for that product.
This integration guide describes how to configure a Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Sophos XG firewall.
Contents
Integration Summary
The hardware and software used in this guide include:
- WatchGuard Firebox T70
- Fireware v12.9.2
- Sophos XG Firewall SFVUNL
- SFOS 19.5.1 MR-1
Topology
This diagram shows the topology for a BOVPN connection between a Firebox and a Sophos XG Firewall.
Configure the Firebox
On the Firebox, configure a BOVPN connection:
- Log in to Fireware Web UI.
- Select VPN > Branch Office VPN.
The Branch Office VPN configuration page opens. - In the Gateways section, click Add.
- In the Gateway Name text box, type a name to identify this Branch Office VPN gateway.
- From the Address Family drop-down list, select IPv4 Addresses.
- In the Credential Method section, select Use Pre-Shared Key.
- In the adjacent text box, type the pre-shared key.
- In the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens. - From the External Interface drop-down list, select External.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
- Select By IP Address.
- In the adjacent text box, type the primary IP address of the External Firebox interface.
- Select the Remote Gateway tab.
- Select Static IP Address.
- In the adjacent text box, type the IP address of your Sophos XG firewall WAN connection.
- Select By IP Address.
- In the adjacent text box, type the IP address of your Sophos XG firewall WAN connection.
- Click OK.
- In the Gateway Endpoint section, select the Start Phase 1 tunnel when Firebox starts check box.
- Select the Phase 1 Settings tab.
- From the Version drop-down list, select IKEv2.
- Keep all other Phase 1 settings as the default values.
- Click Save.
- In the Tunnels section, click Add.
- From the Gateway drop-down list, select the gateway. In our example, the name of the gateway is gateway.1.
- In the Addresses section, click Add.
- In the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the local IP segment. This is the local network protected by the Firebox.
- In the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the remote IP segment. This is the local network protected by the Sophos XG Firewall.
- From the Direction drop-down list, select bi-directional.
- Click OK.
- Keep Phase 2 Settings as the default values.
- Click Save.
Configure the Sophos XG Firewall
From the Sophos XG Firewall Web UI, configure the Sophos XG firewall.
Basic Settings
- Log in to the Sophos XG Firewall Web UI at https://<IP address of the Sophos firewall>. The default URL is https://172.16.16.16:4444.
- Configure the interfaces. For information about how to configure interfaces, go to the Sophos XG Firewall documentation. Our example uses192.168.13.3 for the IPv4 address of PortA.
- Select Configure > Routing > Gateways.
- Verify the gateway status is on (green).
Add IPSec Profiles
From the Sophos XG Firewall Web UI, add IPSec profiles:
- Select System > Profiles > IPsec profiles.
- Click Add.
- In the Name text box, type the object name. In our example, the name is BOVPN_IKEv2.
- For Key exchange, select IKEv2.
- Select the Re-key connection check box.
- In the Phase 1 section, from the DH group (key group) drop-down list, select 14 (DH2048).
- Delete the other default DH groups.
- In the Phase 2 section, from the PFS group (DH group) drop-down list, select 14 (DH2048).
- Keep the default values for all other settings.
- Click Save.
IPSec VPN Connection Settings
From the Sophos XG Firewall Web UI, configure IPSec VPN connection settings:
- Select System > Hosts and services > IP host.
- Click Add.
- In the Name text box, type the object name. In our example, the name is Sophos_lan.
- For Type, select Network.
- In the IP address text box, type the IP segment.
- Keep the default values for all other settings.
- Click Save.
- Repeat steps 1–7 to create another IP segment.
- Select Configure > Site-to-site VPN > IPsec.
- In the IPsec connections section, click Add.
- In the General settings section, type an object name in the Name text box. In our example, the name is wg_connection.
- From the Gateway type drop-down list, select Initiate the connection.
- Select Activate on save.
- Keep the default values for all other General settings.
- In the Encryption section, from the Profile drop-down list, select BOVPN_IKEv2. You create this profile in the Add IPsec Profiles section.
- From the Authentication type drop-down list, select Preshared key.
- In the Preshared Key text box, type the pre-shared key.
- In the Repeat preshared Key text box, type the pre-shared key again.
- In the Gateway settings section, from the Listening interface drop-down list, select PortB - 198.51.100.2.
- From the Local subnet drop-down list, select Sophos_lan.
- In the Gateway address text box, type the WAN IP address of Firebox.
- From the Remote subnet drop-down list, select WG_lan.
- Keep the default value for all other settings.
- Click Save.
- Click OK.
Test the Integration
From Fireware Web UI, test the integration:
- Select System Status > VPN Statistics.
- Select the Branch Office VPN tab and verify the VPN is established.
- Verify that Host1 (behind the Firebox) and Host2 (behind the Sophos XG Firewall) can ping each other.