Google Cloud BOVPN Integration Guide
This integration guide describes how to configure a Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and Google Cloud Platform.
WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, see the documentation and support resources for that product.
Contents
Integration Summary
The hardware and software used in this guide include:
- WatchGuard Firebox
- Fireware v12.10
- Google Cloud Platform
Additional charges might apply for the use of Google Cloud Platform.
Topology
This diagram shows the topology for a BOVPN connection between a Firebox and Google Cloud Platform.
Configure the Firebox
To configure a BOVPN connection on the Firebox:
- Log in to Fireware Web UI.
- Select VPN > Branch Office VPN.
- From the Gateways section, click Add.
The Branch Office VPN configuration page opens.
- In the Gateway Name text box, type a name to identify this BOVPN gateway.
- From the Address Family drop-down list, select IPv4 Addresses.
- From the Credential Method section, select Use Pre-Shared Key.
- In the adjacent text box, type the pre-shared key.
- In the adjacent drop-down list, keep the default String-Basedvalue.
- From the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens.
- From the External Interface drop-down list, select External.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
The Primary Interface IP Address is the primary IP address you configured on the selected external interface. - To specify the gateway ID for tunnel authentication, select By IP Address.
- In the adjacent text box, type the primary IP address of the External Firebox interface.
- Select the Remote Gateway tab.
- To specify the remote gateway IP address for a tunnel, select Static IP Address.
- In the adjacent text box, type the External IP address of your Google Cloud connection.
- To specify the remote gateway ID for tunnel authentication, select By IP Address.
- In the adjacent text box, type the External IP address of your Google Cloud connection.
- Keep the default values for all other options.
- Click OK.
- From the Gateway Endpoint section, select the Start Phase 1 Tunnel When Firebox Starts check box.
- Select the Phase 1 Settings tab.
- From the Version drop-down list, select IKEv2.
- Keep the default values for all other Phase 1 settings.
- Click Save.
The Branch Office VPN page opens.
- From the Tunnels section, click Add.
The Branch Office VPN tunnel configuration page opens.
- From the Gateway drop-down list, select the gateway that you configured.
- From the Addresses section, click Add.
The Tunnel Route Settings page opens.
- From the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the local IP segment. This is the local network protected by the Firebox.
- From the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the remote IP segment. This is the local network protected by Google Cloud.
- Click OK.
- Keep the default values for the Phase 2 Settings tab.
- Click Save.
Configure the Google Cloud VPN
To configure the Google Cloud VPN, perform these steps:
Create a VPC Network
Before you create your VPC Network, you should enable the Compute Engine API. Google charges you for the Compute Engine API in your projects. For more information, go to the Google Cloud documentation.
To create a VPC Network:
- Log in to the Google Cloud Platform.
- Select a project or create a new one. In this example, we use My First Project.
- From the navigation menu, select VPC Network > VPC Networks.
The Product Details page opens.
- Click Enable.
The VPC Networks page opens.
- Click Create VPC Network.
The Create a VPC Network page opens.
- In the Name text box, type a name for the VPC network. In our example, we use cloud-vpc-network.
- From the Subnets section, from the Subnet Creation Mode option, select Custom.
- From the New Subnet section, in the Name text box, type a name for the subnet. In our example, we use subnet-asia-east1-192-168-1.
- From the Region drop-down list, select a specific geographical location where you can host your resources. In our example, we select Asia-East1.
- In the IPv4 Range text box, specify the IP address range for this subnet. In our example, we use 192.168.1.0/24.
- (Optional) For Flow Logs, select On.
- Click Done.
- Keep the default values for all other settings.
- Click Create.
Reserve a Static Address
To reserve a static address;
- From the navigation menu, select VPC Network > IP Addresses.
The IP Addresses page opens.
- Click Reserve External Static IP Address.
The Reserve a Static Address page opens.
- In the Name text box, type a name for the External IP address. In our example, we use google-cloud-vpn-ip.
- From the Region drop-down list, select a region where you want to create the static address. In our example, we select asia-east1 (Taiwan).
- Keep the default values for all other settings.
- Click Reserve.
Create a VPN Connection
To create a VPN connection:
- From the navigation menu, select Networking > Network Connectivity > VPN.
- Click Create VPN Connection.
- From the VPN Options section, select Classic VPN.
- Click Continue.
The Create a VPN Connection page opens.
- From the Google Compute Engine VPN Gateway section, in the Name text box, specify a name for the VPN gateway.
- From the Network drop-down list, select the network you created. In our example, we select cloud-vpc-network.
- From the Region drop-down list, select a region. In our example, we select asia-east1 (Taiwan).
- From the IP Address drop-down list, select the IP address you created. In our example, we select google-cloud-vpn-ip.
- From the Tunnels section, in the Name text box, type a name for the tunnel.
- In the Remote Peer IP Address text box, type the External IP address of the remote peer.
- From the IKE Version drop-down list, select IKEv2.
- In the IKE Pre-shared Key text box, type the IKE pre-shared key for this tunnel.
- For Routing Options, select Policy-based.
- In the Remote Network IP Ranges text box, type the IP address ranges of the remote networks.
- From the Local Subnetworks drop-down list, select subnet-asia-east1-192-168-1.
- Click Done.
- Click Create.
Create the Firewall Rules
To create the firewall rules:
- From the navigation menu, select Networking > VPC Network > Firewall.
- Click Create Firewall Rule.
The Create a Firewall Rule page opens.
- In the Name text box, type a name for this rule.
- For Logs, select On.
- From the Network drop-down list, select the network you created. In our example, we select cloud-vpc-network.
- For Direction of Traffic, select Ingress.
- For Action on Match, select Allow.
- From the Targets drop-down list, select All Instances In the Network.
- From the Source Filter drop-down list, select IP Ranges.
- In the Source IPv4 Ranges text box, type the IP address ranges of remote internal networks.
- For Protocols and Ports, select Allow All or Specified Protocols and Ports. In our example, we select Allow All.
- Keep the default values for all other settings.
- Click Create.
- To create an egress rule, repeat steps 2-13.
- Click Create.
Google Cloud VPN auto-negotiates authentication and encryption settings and the key group with the Firebox. You cannot edit these settings in the Google Cloud VPN configuration.
For more information about Google Cloud VPN configuration and supported IKE ciphers, go to Google Cloud VPN Documentation.
Test the Integration
To test the integration:
- From the Google Cloud Platform navigation menu, select Networking > Network Connectivity > VPN.
- Select the Cloud VPN Tunnelstab. The data shows the VPN is established.
- From Fireware Web UI, select System Status > VPN Statistics.
The VPN Statistics page opens.
- Select the Branch Office VPN tab. The data shows the VPN is established.
- Verify that host behind the Firebox is able to ping the host in the Google Cloud Platform.