Cisco ASA and Firebox Branch Office VPN Integration Guide (2024)

WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, refer to the documentation and support resources for that product.

This integration guide describes how to configure a Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Cisco Adaptive Security Appliance (ASA).

Contents

  • Cisco ASA and Firebox Branch Office VPN Integration Guide
    • Contents
    • Integration Summary
    • Topology
    • Configure the Firebox
    • Configure the Cisco ASA
    • Test the Integration

Integration Summary

The hardware and software used in this guide include:

  • WatchGuard Firebox
    • Fireware v12.10 or higher
  • Cisco ASA 5506-X
    • ASDM 7.20(1)
    • ASA 9.16(4)19

Topology

This diagram shows the topology for a BOVPN connection between a Firebox and a Cisco ASA.

Cisco ASA and Firebox Branch Office VPN Integration Guide (1)

Configure the Firebox

To configure a BOVPNconnection on the Firebox, from Fireware Web UI:

  1. Select VPN > Branch Office VPN.
    The Branch Office VPN configuration page opens.
  2. In the Gateways section, click Add.
  3. In the Gateway Name text box, type a name to identify this Branch Office VPN gateway.
  4. From the Address Family drop-down list, select IPv4 Addresses.
  5. In the Credential Method section, select Use Pre-Shared Key.
  6. In the adjacent text box, type the pre-shared key.

Cisco ASA and Firebox Branch Office VPN Integration Guide (2)

  1. In the Gateway Endpoint section, click Add.
    The Gateway Endpoint Settings dialog box opens.
  2. From the External Interface drop-down list, select External.
  3. From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
    The Primary Interface IP Address is the primary IPaddress you configured on the selected external interface.
  4. Select By IP Address.
  5. In the adjacent text box, type the primary IP address of the External Firebox interface.

Cisco ASA and Firebox Branch Office VPN Integration Guide (3)

  1. Select the Remote Gateway tab.
  2. Select Static IP Address.
  3. In the adjacent text box, type the IP address of your Cisco ASA WANconnection.
  4. Select By IP Address.
  5. In the adjacent text box, type the IP address of your Cisco ASA WAN connection.

Cisco ASA and Firebox Branch Office VPN Integration Guide (4)

  1. Click OK.
  2. In the Gateway Endpoint section, select the Start Phase 1 tunnel when Firebox starts check box.

Cisco ASA and Firebox Branch Office VPN Integration Guide (5)

  1. Select the Phase 1 Settings tab.
  2. From the Version drop-down list, select IKEv2.
  3. Keep all other Phase 1 settings as the default values.

Cisco ASA and Firebox Branch Office VPN Integration Guide (6)

  1. Click Save.
  2. In the Tunnels section, click Add.

Cisco ASA and Firebox Branch Office VPN Integration Guide (7)

  1. From the Gateway drop-down list, select the gateway that you configured.
  2. In the Addresses section, click Add.

Cisco ASA and Firebox Branch Office VPN Integration Guide (8)

  1. In the Local IP section, from the Choose Type drop-down list, select Network IPv4.
  2. In the Network IP text box, type the local IP segment. This is the local network protected by the Firebox.
  3. In the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
  4. In the Network IP text box, type the remote IP segment. This is the local network protected by the Cisco ASA.

Cisco ASA and Firebox Branch Office VPN Integration Guide (9)

  1. Click OK.
  2. Keep Phase 2 Settings as the default values.

Cisco ASA and Firebox Branch Office VPN Integration Guide (10)

  1. Click Save.

Configure the Cisco ASA

In our example, we configure a Cisco ASA 5506-X.

To configure the ASA 5506-X basic settings:

  1. Log in to the ASA 5506-X with ASDM. The default IP address is 192.168.1.1.
  2. Configure the ASA 5506-X interfaces. For information about how to configure interfaces, refer to the Cisco ASA 5506-X documentation.
  3. Select the Enable traffic between two or more interfaces which are configured with same security levels check box.
  4. Click Apply.

Cisco ASA and Firebox Branch Office VPN Integration Guide (11)

To configure the IPSec VPN settings:

  1. Click Configuration.
  2. Select Site-to-Site VPN > Advanced > IKE policies.
  3. In the IKEv2 Policies section, click Add.
  4. In the Priority text box, type 1.
  5. From the D-H Group drop-down list, select 14.
  6. From the Encryption drop-down list, select aes-256.
  7. From the Integrity Hash drop-down list, select sha256.
  8. From the Pseudo Random Function (PRF) Hash drop-down list, select sha256.
  9. Leave the default value for all other settings.

Cisco ASA and Firebox Branch Office VPN Integration Guide (12)

  1. Click OK.
  2. Click Apply.

Cisco ASA and Firebox Branch Office VPN Integration Guide (13)

  1. Select Configuration > Site-to-Site VPN > Advanced > IPsec Proposals (Transform Sets).
  2. In the IKEv2 IPsec Proposals section, click Add.
  3. In the Name text box, type an object name. In our example, we specify the name AES256-SHA256.
  4. From the Encryption drop-down list, select aes-256.
  5. From the Integrity Hash drop-down list, select sha-256.

Cisco ASA and Firebox Branch Office VPN Integration Guide (14)

  1. Click OK.
  2. Click Apply.

Cisco ASA and Firebox Branch Office VPN Integration Guide (15)

  1. From the navigation menu, select Configuration > Firewall > Objects > Network Objects/Groups.
  2. Click Add > Network Object.
  3. In the Name text box, type the object name. In our example, we specify the name WG_INT. Which is used for the network protected by the WatchGuard Firebox.
  4. From the Type drop-down list, select Network.
  5. From the IP Version check box, check IPv4.
  6. In the IP Address text box, type the IP address. For this example, we use IPaddress 192.168.10.0.
  7. In the Netmask text box, type the netmask. For this example, we use netmask 255.255.255.0.

Cisco ASA and Firebox Branch Office VPN Integration Guide (16)

  1. Click OK.
  2. Repeat Steps 20–26 to create another network object. For this example, we name the network object CISCO_INT. This is used for the network protected by the Cisco ASA.

Cisco ASA and Firebox Branch Office VPN Integration Guide (17)

  1. Select Configuration > Site-to-Site VPN > Connection Profiles.
  2. In the Connection Profiles section, click Add.

Cisco ASA and Firebox Branch Office VPN Integration Guide (18)

  1. In the Peer IP Address text box, type the peer IP address.
  2. From the Source Interface drop-down list, select inside.
  3. From the Destination Interface drop-down list, select outside.
  4. From the Local Network list, select CISCO_INT.
  5. From the Remote Network list, select WG_INT.
  6. In the IPsec Enabling section, click Manage.
  7. Click Add.
  8. In the Name text box, type the name. For this example, we use GroupPolicy To WG.
  9. In the Tunneling Protocols section, clear the Inherit check box and select IPsec IKEv2.

Cisco ASA and Firebox Branch Office VPN Integration Guide (19)

  1. Click OK > OK.
  2. Select Local Pre-shared Key.
  3. In the adjacent text box, type the pre-shared key.
  4. In the Remote Peer Pre-shared Key text box, type the pre-shared key.

Cisco ASA and Firebox Branch Office VPN Integration Guide (20)

  1. For the IKE Policy setting, keep the default value.
  2. From the IPsec Proposal list, select AES256-SHA256.

Cisco ASA and Firebox Branch Office VPN Integration Guide (21)

  1. For the Advanced settings, select Advanced > Crypto Map Entry.
  2. In the Perfect Forward Secrecy section, select Enable.
  3. From the Diffie-Hellman Group drop-down list, select group14.
  4. Leave the default value for all other settings.

Cisco ASA and Firebox Branch Office VPN Integration Guide (22)

  1. Click OK.
  2. In the Enable interfaces for IPsec access section, select the outside interface and select Allow IKE v2 Access.
  3. Click Apply.

Cisco ASA and Firebox Branch Office VPN Integration Guide (23)

  1. From the navigation menu, select Configuration > Firewall > NAT Rules.
  2. Click Add.
  3. In the Match Criteria: Original Packet section, from the Source Interface drop-down list, select inside.
  4. From the Source Address drop-down list, select CISCO_INT.
  5. From the Destination Interface drop-down list, select outside.
  6. From the Destination Address drop-down list, select WG_INT.
  7. Under Options, Select the Disable Proxy ARP on egress interface check box.
  8. Select the Lookup route table to locate egress interface check box.
  9. Leave the default value for all other settings.

Cisco ASA and Firebox Branch Office VPN Integration Guide (24)

  1. Click OK.
  2. Click Apply.

Test the Integration

To test the integration, from Fireware Web UI:

  1. Select System Status > VPN Statistics.
  2. Select the Branch Office VPN tab and verify the VPN is established.

Cisco ASA and Firebox Branch Office VPN Integration Guide (25)

  1. Verify that the Host behind the Firebox and the Host behind the Cisco ASA can ping each other.

Give Us FeedbackGet SupportAll Product DocumentationTechnical Search

© 2024 WatchGuard Technologies, Inc. All rights reserved. WatchGuard and the WatchGuard logo are registered trademarks or trademarks of WatchGuard Technologies in the United States and other countries. Various other trademarks are held by their respective owners.

Cisco ASA and Firebox Branch Office VPN Integration Guide (2024)

References

Top Articles
How to Defeat the Ultimate Mob in Minecraft: The Warden | Geekflare
The End of the Circus: From Shards to Gifts Crossover - Novella - Fantasy
Melson Funeral Services Obituaries
Enrique Espinosa Melendez Obituary
Craigslist Cars Augusta Ga
Windcrest Little League Baseball
Robot or human?
Mr Tire Prince Frederick Md 20678
Chelsea player who left on a free is now worth more than Palmer & Caicedo
Chalupp's Pizza Taos Menu
Heska Ulite
Joe Gorga Zodiac Sign
Horned Stone Skull Cozy Grove
Pollen Count Los Altos
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Obituary | Shawn Alexander | Russell Funeral Home, Inc.
Magicseaweed Capitola
Classic Lotto Payout Calculator
Illinois Gun Shows 2022
Hellraiser III [1996] [R] - 5.8.6 | Parents' Guide & Review | Kids-In-Mind.com
Jalapeno Grill Ponca City Menu
Hdmovie 2
Puss In Boots: The Last Wish Showtimes Near Cinépolis Vista
Plaza Bonita Sycuan Bus Schedule
Gina Wilson Angle Addition Postulate
3Movierulz
Il Speedtest Rcn Net
Craigslist Panama City Beach Fl Pets
Craiglist.nj
Shelby Star Jail Log
2004 Honda Odyssey Firing Order
How to Use Craigslist (with Pictures) - wikiHow
Shauna's Art Studio Laurel Mississippi
Mrstryst
Goodwill Houston Select Stores Photos
The Bold And The Beautiful Recaps Soap Central
3496 W Little League Dr San Bernardino Ca 92407
Busch Gardens Wait Times
Noaa Marine Weather Forecast By Zone
Discover Wisconsin Season 16
Tgirls Philly
Parent Portal Pat Med
Dr Mayy Deadrick Paradise Valley
22 Golden Rules for Fitness Beginners – Barnes Corner Fitness
9:00 A.m. Cdt
Rescare Training Online
Wood River, IL Homes for Sale & Real Estate
The Missile Is Eepy Origin
Skybird_06
Unbiased Thrive Cat Food Review In 2024 - Cats.com
Https://Eaxcis.allstate.com
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 6097

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.