Dell SonicWall TZ670 and Firebox Policy-Based BOVPN Integration Guide

This integration guide describes how to configure a policy-based Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Dell SonicWall TZ670.

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11 or higher
  • Dell SonicWall TZ670 with SonicOS v7.0.0 or higher

Topology

This diagram shows the topology for a BOVPN connection between a Firebox and a SonicWall TZ670.

Screen shot of the topology diagram

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • You have configured the external interfaces and zones on the Dell SonicWall TZ670. In this guide, we use the X4 external interface with the 10.10.0.1/24 IP address. For more information about how to configure interfaces, go to the SonicWall User Guide.

Configure the Firebox

You can configure your Firebox for a policy-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure an IPSec VPN Tunnel for the SonicWall TZ670

To configure an IPSec VPN tunnel for the SonicWall TZ670:

  1. Log in to the SonicWall TZ670 Web UI at https://<IP address of TZ670>. The default IP address is 192.168.168.168.
  2. Select Object.
  3. From the navigation menu, select Match Objects > Addresses > Address Objects.
  4. To add a new subnet for the VPN tunnel, click Add.
    The Address Object Settings dialog box opens.
  5. Screenshot of Dell SonicWall Address Object settings

  6. In the Name text box, type a name for this subnet. In our example, we type WGINT.
  7. From the Zone Assignment drop-down list, select VPN.
  8. From the Type drop-down list, select Network.
  9. In the Network text box, type the IP address of the subnet. In this example, we type 192.168.35.0.
  10. In the Netmask/Prefix Length text box, type the netmask.
  11. Click Save.
  12. Click Close.
    The VPN tunnel object is created and appears in the list of objects.
  13. Screenshot of Dell sonicwall address objects page

  14. Select Network.
  15. From the navigation menu, select IPSec VPN > Rules and Settings.
  16. In the Policies section, click Add.
    The VPN Policy page opens with General tab selected.
  17. Screenshot of sonicwall VPN policy settings on the General tab

  18. In the Security Policy section:
    1. From the Policy Type drop-down list, select Site to Site.
    2. From the Authentication Method drop-down list, select IKE Using Preshared Secret.
    3. In the Name text box, type a name for this VPN. In our example, we type VPN with WG.
    4. In the IPsec Primary Gateway Name or Address text box, type the external IP address of your Firebox. In this example, we type 203.0.113.2.
  19. In the IKE Authentication section:
    1. Enable Mask Shared Secret.
    1. In the Shared Secret and Confirm Shared Secret text boxes, type the pre-shared secret key.
    2. From the Local IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the SonicWall outgoing public IP address. In this example, we type 198.51.100.2.
    3. From the Peer IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the external IP address of your Firebox. In this example, we type 203.0.113.2.
  20. Keep the default values for all other settings.
  21. Select the Network tab.
    The Network page opens.
  22. Screenshot of sonicwall VPN policy settings on the network tab

  23. In the Local Networks section, select Choose Local Network From List, then from the adjacent drop-down list, select the subnet you have already configured for the SonicWall. In our example, we select X4 Subnet.
  24. In the Remote Networks section, select Choose Destination Network From List, then from the adjacent drop-down list, select the subnet object you added in Step 5. In our example, we select WGINT.
  25. Select the Proposals tab.
    The Proposals page opens.
  26. Screenshot of sonicwall VPN policy settings on the Proposal tab

  27. In the IKE (Phase 1) Proposal section:
    1. From the Exchange drop-down list, select IKEv2 Mode.
    2. From the DH Group drop-down list, select Group 14.
    3. From the Encryption drop-down list, select AES-256.
    4. From the Authentication drop-down list, select SHA256.
  28. In the Ipsec (Phase 2) Proposal section:
    1. From the Protocol drop-down list, select ESP.
    2. From the Encryption drop-down list, select AES-256.
    3. From the Authentication drop-down list, select SHA256.
    4. Enable Enable Perfect Forward Secrecy.
    5. From the DH Group drop-down list, select Group 14.
  29. Keep the default values for all other settings.
  30. Select the Advanced tab.
    The Advanced page opens.
  31. Screenshot of sonicwall VPN policy settings on the Advanced tab

  32. Turn on the Enable Keep Alive toggle.
  33. From the VPN Policy Bound To drop-down list, select the WAN interface for the SonicWall. In this example, we select Interface X1.
  34. Keep the default values for all other settings.
  35. Click Save.
  36. Click Close.
    The Advanced VPN Settings page opens.
  37. Screenshot of Sonicwall Advanced VPN Settings.

  38. Keep all default values for all Advanced VPN Settings.
  39. Click Accept.

Test the Integration