Creating IPSec tunnels

Adding the CA to the list of trusted CAs

In the menu Configuration > VPN > IPSec VPN > Identification tab:

  1. Under Approved certificate authorities, click on Add.
  2. Select your CA.
  3. Save.

Creating IPSec peers

In the menu Configuration > VPN > IPSec VPN, select the Peers tab.

  1. Click on Add.
  2. Click on New IKEv1 remote site or New IKEv2 remote site depending on the IKE protocol version you use.
  3. The wizard will then ask you to select the remote gateway. In this case, this gateway will be the public address of the first remote Firewall (object Pub_FW_Site_A).
    By default, the name of the peer will be created by adding a prefix “Site_” to this object name; this name can be customized.
  4. Press Enter.
  5. Check the Certificate checkbox.
  6. Click on the magnifying glass next to the Certificate field.
  7. Select the one corresponding to the main Firewall.
    The Trusted CA field is automatically entered by the certificate.
  8. The wizard will display a summary of the peer you have just created.
  9. Click on Finish to close this window.
  10. Click again on Finish to close the wizard.
  11. Repeat all the steps to create the IPSec peer for remote site B.

Selecting the encryption policy and adding the VPN tunnel

In the menu Configuration > VPN > IPSec VPN > Encryption policy – Tunnels tab.

  1. Select the encryption policy you wish to configure.
  2. You can rename it later by clicking on Edit.
  3. Next, click on Add to define the IPSec tunnels.
  4. Select the Star configuration model.
    A wizard will automatically launch.
  5. In the Local network field, select your object Private_Net_Main_Site.
  6. In the Remote sites table, click on Add to select the first peer by associating its network (Site_Pub_FW_Site_A and Private_Net_Site_A). Peers can be created directly in this wizard by clicking on  >> then Create a peer.
  7. Repeat the operation for the second peer (Site_Pub_FW_Site_B and Private_Net_Site_B).
  8. IMPORTANT

    Ensure that you do not select the Treat IPSec interfaces as internal interfaces checkbox (applies to all tunnels). This option would prevent the setup of tunnels between remote sites and the main site (it can only be used in a Hub & Spoke configuration). If you have selected it by mistake, go to the Advanced properties window in the Inspection profiles module (Application protection menu) and unselect Treat IPSec interfaces as internal interfaces (applies to all tunnels - remote networks will need to be explicitly legitimized).

  9. Validate by clicking on Finish.
    The IPSec tunnels are now defined on the main site and the tunnels will be automatically enabled (Status “on”):
  10. You can now click on Enable this policy.