Dell SonicWall TZ670 and Firebox Route-Based BOVPN Integration Guide
This integration guide describes how to configure a route-based Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Dell SonicWall TZ670.
Contents
Integration Summary
The hardware and software used in this guide include:
- Firebox with Fireware v12.11 or higher
- SonicWall TZ670 with SonicOS v7.0.0 or higher
Topology
This diagram shows the topology for a route-based BOVPN connection between a Firebox and a SonicWall TZ670.
Before You Begin
Before you begin these procedures, make sure that:
- If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
- If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
- You have configured the external interfaces and zones on the SonicWall TZ670. In this guide, we use the X4 external interface with the 10.10.0.1/24 IP address. For more information about how to configure interfaces, go to the SonicWall User Guide.
Configure the Firebox
You can configure your Firebox for a route-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.
- Log in to WatchGuard Cloud.
If you log in with a Service Provider account, you must select a Subscriber account from the Account Manager. - From the navigation menu, select Configure > VPNs.
- Click Add BOVPN.
The Add BOVPN page opens. - In the Name text box, type a descriptive name for the BOVPN. In this example, we type route-based vpn.
- From the VPN Connection Type drop-down list, select Route-Based IPSec to Locally-Managed Firebox / Third-Party.
- From the Address Family drop-down list, select IPv4 Addresses.
- In the Endpoint A section, select your cloud-managed Firebox.
- In the Endpoint B section, in the Endpoint Name text box, type a name to identify the remote VPN endpoint. In this example, we type SonicWall.
- Click Next.
The VPN Gateways settings page opens. - For your cloud-managed Firebox:
- Select External.
- From the IP or Domain Name or User on Domain text box, select an IP address, domain name, or user on domain that resolves to the Firebox external network IP address.
- For the remote VPN endpoint, in the IP or Domain Name or User on Domain text box, type the IP address of your SonicWall WAN interface.
- To encrypt and decrypt the data that goes through the VPN tunnel, in the Pre-Shared Key text box, type a shared secret. This pre-shared key matches the pre-shared key you will configure for the IKE Gateway on the SonicWall firewall.
- Click Next.
The Traffic settings page opens. - From the cloud-managed Firebox section, select the internal networks that you want to be accessible through the VPN tunnel.
- For the SonicWall VPN endpoint, click Add Network Resource.
- In the Network Resource text box, type the IP address of the private network protected by the SonicWall firewall. In this example, we type 10.10.0.0/24.
- Click Add.
- Keep the default values for all other settings.
- Click Next.
The Security settings page opens. - In the Phase 1 Settings section:
- From the Authentication drop-down list, select SHA2-256.
- From the Encryption drop-down list, select AES-CBC (256-bit).
- In the SA Life text box, type 24.
- From the Diffie-Hellman Group drop-down list, select Diffie-Hellman Group14.
- In the Phase 2 Settings section:
- From the Authentication drop-down list, select SHA2-256.
- From the Encryption drop-down list, select AES-CBC (256-bit).
- Select the Use Perfect Forward Secrecy (PFS) check box.
- From the PFS Group drop-down list, select Diffie-Hellman Group14.
- Keep the default values for all other settings.
- Click Add.
- (Optional) To open the VPN Configuration Summary page for the cloud-managed Firebox, click View Guide.
- Click Finish.
WatchGuard Cloud creates and deploys a configuration update for the cloud-managed Firebox.
- Log in to Fireware Web UI at: https://<your Firebox IP address>:8080.
- Select VPN > BOVPN Virtual Interfaces.
The BOVPN Virtual Interfaces configuration page opens. - Click Add.
The Add page opens. - In the Interface Name text box, type a name for this BOVPN virtual interface. In this example, we type BovpnVif.1.
- From the Remote Endpoint Type drop-down list, select Cloud VPN or Third-Party Gateway.
- From the Gateway Address Family drop-down list, select IPv4 Addresses.
- In the Credential Method section, select Use Pre-Shared Key and in the adjacent text box, type the pre-shared key.
- In the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens. - For Interface, select Physical, and from the adjacent drop-down list, select the interface that has the external (public) IP address of the Firebox.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
The Primary Interface IP Address is the primary IP address you configured on the selected external interface. - For Specify the Gateway ID for Tunnel Authentication, select By IP Address.
- In the adjacent text box, type the primary IP address of the external Firebox interface. In this example, we type 203.0.113.2.
- Select the Remote Gateway tab.
The Remote Gateway page opens. - For Specify the Remote Gateway IP Address for a Tunnel, select Static IP Address.
- In the adjacent text box, type the IP address of your SonicWall WAN interface. In this example, we type 198.51.100.2.
- For Specify the Remote Gateway ID for Tunnel Authentication, select By IP Address.
- In the adjacent text box, type the IP address of your SonicWall WAN interface. In this example, we type 198.51.100.2.
- Click OK.
The gateway endpoint you added appears in the Gateway Endpoint section. - In the Gateway Endpoint section, select the Start Phase 1 Tunnel When It Is Inactive check box.
- Select the Add This Tunnel to the BOVPN-Allow Policies check box.
- Select the VPN Routes tab.
The VPN Routes page opens. - Click Add.
The VPN Route Settings dialog box opens. - From the Choose Type drop-down list, select Network IPv4.
- In the Route To text box, type the Network IP address of a route that will use this virtual interface. In this example, we type 10.0.10.0.
- Click OK.
The VPN route settings are added. - Select the Phase 1 Settings tab.
The Phase 1 Settings page opens. - From the Version drop-down list, select IKEv2.
- Keep the default values for all other Phase 1 settings.
- Keep the default values for all Phase 2 Settings.
- Click Save.
For more information about how to configure BOVPN virtual interfaces on the Firebox, go to BOVPN Virtual Interfaces.
Configure the SonicWall TZ670
To configure the SonicWall, complete these steps:
Configure an IPSec VPN Tunnel
To configure an IPSec VPN tunnel, from the SonicWall Web UI:
- Log in to the SonicWall Web UI at: https://<IP address of TZ670>. The default IP address is 192.168.168.168.
- Select Object.
- From the navigation menu, select Match Objects > Addresses > Address Objects.
- To add a new subnet for the VPN tunnel, click Add.
The Address Object Settings dialog box opens. - In the Name text box, type a name for this subnet. In our example, we type WGINT.
- From the Zone Assignment drop-down list, select VPN.
- From the Type drop-down list, select Network.
- In the Network text box, type the IP address of the subnet. In this example, we type 192.168.35.0.
- In the Netmask/Prefix Length text box, type the netmask.
- Click Save.
- Click Close.
The VPN tunnel object is created. - Select Network.
- From the navigation menu, select IPSec VPN > Rules and Settings.
- In the Policies section, click Add.
The VPN Policy dialog box opens with General tab selected. - In the Security Policy section:
- From the Policy Type drop-down list, select Tunnel Interface.
- From the Authentication Method drop-down list, select IKE Using Preshared Secret.
- In the Name text box, type a name for this VPN. In our example, we type VPN with WG.
- In the IPsec Primary Gateway Name or Address text box, type the external IP address of your Firebox. In this example, we type 203.0.113.2.
- In the IKE Authentication section:
- Enable Mask Shared Secret.
- In the Shared Secret and Confirm Shared Secret text boxes, type the pre-shared secret key.
- From the Local IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the SonicWall outgoing public IP address. In this example, we type 198.51.100.2.
- From the Peer IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the external IP address of your Firebox. In this example, we type 203.0.113.2.
- Select the Proposals tab.
The Proposals page opens. - In the IKE (Phase 1) Proposal section:
- From the Exchange drop-down list, select IKEv2 Mode.
- From the DH Group drop-down list, select Group 14.
- From the Encryption drop-down list, select AES-256.
- From the Authentication drop-down list, select SHA256.
- In the Ipsec (Phase 2) Proposal section:
- From the Protocol drop-down list, select ESP.
- From the Encryption drop-down list, select AES-256.
- From the Authentication drop-down list, select SHA256.
- Enable Enable Perfect Forward Secrecy.
- From the DH Group drop-down list, select Group 14.
- Keep the default values for all other settings.
- Select the Advancedtab.
The Advanced page opens. - Turn on the Enable Keep Alive toggle.
- From the VPN Policy Bbound To drop-down list, select the WAN interface for the SonicWall. In our example, we select Interface X1.
- Click Save.
- Click Close.
The Advanced VPN Settings page opens. - Keep the default values for all Advanced VPN settings.
- Click Accept.
Configure a BOVPN Route
To configure a route, from the SonicWall Web UI:
- Log in to the SonicWall TZ670 Web UI at: https://<IP address of TZ670>. The default IP address is 192.168.168.168.
- Select Policy.
- From the navigation menu, select Rules and Policies > Routing Rules
- In the Routing Rules section, click Add.
The Adding Rule page opens. - In the Name text box, type a name for this routing rule. In this example, we type VPN Tunnel Routing Rule.
- From the Source drop-down list, select the interface for the SonicWall. In our example, we use the X4 Subnet interface with the IP address 10.10.0.0/24.
- From the Destination drop-down list, select the subnet you created for your Firebox in the Configure an IPSec VPN Tunnel section. In our example, we select WGINT.
- From the Service Object drop-down list, select Any.
- Select the Next Hop tab.
The Next Hop page opens. - From the Interface drop-down list, select the tunnel interface you created in the Configure an IPSec VPN Tunnel section. In our example, we select VPN with WG.
- In the Metric text box, type 1.
- Keep the default values for all other settings.
- Click Save.
Test the Integration
- Log in to the SonicWall Firewall Web UI at: https://<IP address of TZ670>.
- Select Network.
- From the navigation menu, select IPSec VPN > Rules and Settings.
- Verify that the VPN tunnels you configured are active.
- Log in to WatchGuard Cloud.
If you log in with Service Provider, you must select a Subscriber account from the Account Manager. - Select the cloud-managed Firebox.
- Select Monitor > Live Status > VPN.
The VPN page opens. - Click the BOVPN you configured.
- Verify that the VPN tunnels are active.
- Log in to Fireware Web UI at: https://<your Firebox IP address>:8080.
- Select System Status > VPN Statistics.
The VPN Statistics page opens. - Select the Branch Office VPN tab.
The Branch Office VPN page opens. - In the Tunnels section, verify that the VPN tunnels are active.