Watchguard IPsec Configuration
Overview
This article will show you how to configure the Watchguard to connect to the Acreto Ecosystem. This configuration will be made by using IPsec VPN.
Prerequisites
- Watchguard installation
- Ecosystem set up with proper security policies
How-To
Step 1: Create Gateway for IPsec
Firstly, you will need to create a new Gateway device in the Acreto platform. Instructions on how to create a new Gateway are available here.
- Name: IPsec connection name must meet the same requirements as the Strongswan connection name (letters and numbers only).
- Category: IoT
- Type: IPsec
- Allow connection from: Empty (describes the source IP address where the IPsec connection will be permitted).
- Local Networks: any local network addresses that will be routed through this gateway.
To simplify testing, add the IP addresses of all interfaces connected to your gateway as Local Networks (you can use /32 prefix for public interface). This will allow you to test connectivity from the gateway, or similar tools.
Step 2: Read the Values from Acreto Gateway
To proceed with the Watchguard configuration, you will need a few values from an existing committed Acreto Gateway:
All of these may be found within the Gateway details panel - view the below animation for further instruction.
Step 3: Configure VPN settings on Watchguard
-
Create Phase 2 proposal - Navigate to VPN > Phase 2 Proposals and click ADD button
-
Create Phase 2 with the following values and SAVE
- Name: Acreto
- Description: Acreto phase2 selectors
- Type: ESP
- Authentication: SHA-512
- Encryption: AES(128-bit)
- Time: 1 hour
-
To set up IPsec VPN navigate to VPN > BOVPN Virtual Interfaces and click ADD from the right pane
-
Select Remote Endpoint Type as Cloud VPN or Third-Party Gateway
-
Provide the Preshared key copied from the Wedge dashboard in Step 1 and click ADD button to configure Gateway Endpoint
-
Configure Local gateway - Select Interface By Domain Name and provide the Peer ID copied from Wedge dashboard in Step 1.
-
Configure Remote gateway with values copied in Step 1 and click OK
- Select the Phase 1 Transform set in Transform Settings and click EDIT. Set the following values and click OK.
- Authentication: SHA2-512
- Encryption: AES(28-bit)
- SA Life: 3 hours
- Key Group: Diffie-Hellman Group 15
- Click Phase 2 Settings and configure Phase 2 with values as below
- Enable Perfect Forward Secrecy: Diffie-Hellman Group 15
Select Acreto from Phase 2 proposal and ADD and SAVE.
- Verify the tunnel status - Navigate to SYSTEM STATUS > VPN Statistics > Branch Office VPN and click IKEv2 Virtual Interface. If the VPN is successfully established, the statistics related to VPN will be displayed.
Summary
Once the VPN connection is successfully established, all the internet traffic will be routed through Acreto.