Dell SonicWALL TZ400 and Firebox Branch Office VPN Integration Guide
Deployment Overview
WatchGuard provides integration instructions to help our customers configure WatchGuard products to work with products created by other organizations. If you need more information or technical support about how to configure a third-party product, see the documentation and support resources for that product.
This integration guide describes how to configure a Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Dell SonicWALL® TZ400.
Integration Summary
The hardware and software used in this guide include:
- WatchGuard Firebox
- Fireware v12.8.2.B668649
- Dell SonicWALL TZ400
- SonicOS Enhanced Version 6.5.4.11-97n
Topology
This diagram shows the topology for a BOVPN connection between a Firebox and a SonicWALL TZ400.
Configure the Firebox
To configure a Branch Office VPN (BOVPN) connection on the Firebox:
- Log in to Fireware Web UI.
- Select VPN > Branch Office VPN.
The Branch Office VPN configuration page opens. - In the Gateways section, click Add.
- In the Gateway Name text box, type a name to identify this BOVPN gateway.
- From the Address Family drop-down list, select IPv4 Addresses.
- In the Credential Method section, select Use Pre-Shared Key.
- In the adjacent text box, type the pre-shared key.
- From the drop-down list, select String-Based .
- In the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens.
- From the External Interface drop-down list, select External.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
The Primary Interface IP Address is the primary IP address you configured on the selected external interface. - Select By IP Address.
- In the adjacent text box, type the primary IP address of the External Firebox interface.
- Select the Remote Gateway tab.
- Select Static IP Address.
- In the adjacent text box, type the IP address of your SonicWALL WAN connection.
- Select By IP Address.
- In the adjacent text box, type the IP address of your SonicWALL WAN connection.
- Keep the default settings for all other options.
- Click OK.
- In the Gateway Endpoint section, select the Start Phase 1 tunnel when Firebox starts check box.
- Select the Phase 1 Settings tab.
- From the Version drop-down list, select IKEv2.
- Keep all other Phase 1 settings as the default values.
- Click Save.
- In the Tunnels section, click Add.
- From the Gateway drop-down list, select the gateway that you configured.
- In the Addresses section, click Add.
- In the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the local IP segment. This the local network protected by the Firebox.
- In the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type the remote IP segment. This the local network protected by the Dell SonicWALL device.
- Click OK.
- Keep the default Phase 2 Settings.
- Click Save.
Configure the Dell SonicWALL TZ400
Zone and Interface Settings
- Log in to the Dell SonicWALL TZ400 Web UI at https://<IP address of TZ400>. The default IP address is 192.168.168.168.
- Configure interfaces and zones. For information about how to configure interfaces and zones, see the Dell SonicWALL TZ400 documentation.
IPSec VPN Settings
To configure IPSec VPN settings:
- Select Manage > Policies > Objects > Address Objects.
- To add a new object, click Add.
- In the Name text box, type the object name. In our example, the name is WGINT.
- From the Zone Assignment drop-down list, select VPN.
- From the Type drop-down list, select Network.
- In the Network text box, type the network address.
- In the Netmask/Prefix Length text box, type the netmask.
- Click Add.
- Click Close.
- Select Manage > Connectivity > VPN > Base Settings.
- In the VPN Policies section, click Add.
- From the Policy Type drop-down list, select Site to Site.
- From the Authentication Method drop-down list, select IKE using Preshared Secret.
- In the Name text box, type a descriptive name for this VPN. In our example, the name is VPN with WG.
- In the IPsec Primary Gateway Name or Address text box, type the peer IP address.
- Select Mask Shared Secret.
- In the Shared Secret and Confirm Shared Secret text boxes, type the pre-shared secret key.
- From the Local IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the SonicWALL outgoing public IP address.
- From the Peer IKE ID drop-down list, select IPv4 Address. In the adjacent text box, type the WatchGuard Firebox public IP address.
- For all other settings, keep the default values.
- Select the Network tab.
- In the Local Networks section, select Choose local network from list. From the adjacent drop-down list, select X2 Subnet.
- In the Remote Networks section, select Choose destination network from list. From the adjacent drop-down list, select WGINT.
- Select the Proposals tab.
- In the IKE (Phase 1) Proposal section, from the Exchange drop-down list, select IKEv2 Mode.
- From the DH Group drop-down list, select Group 14.
- From the Encryption drop-down list, select AES-256.
- From the Authentication drop-down list, select SHA256.
- In the Ipsec (Phase 2) Proposal section, from the Protocol drop-down list, select ESP.
- From the Encryption drop-down list, select AES-256.
- From the Authentication drop-down list, select SHA256.
- Select the Enable Perfect Forward Secrecy check box.
- From the DH Group drop-down list, select Group 14.
- For all other settings, keep the default values.
- Select the Advanced tab.
- In the Advanced Settings section, select the Enable Keep Alive check box.
- For VPN Policy bound to, from the adjacent drop-down list, select Interface X1.
- For all other settings, keep the default values.
- Click OK.
- Keep all default settings in Advanced VPN Settings.
Test the Integration
- Log in to the Firebox Web UI.
- Select System Status > VPN Statistics.
- Verify the VPN tunnel is active.
- Log in to the Dell SonicWALL TZ400 Web UI.
- Verify the VPN tunnel is active.
- Verify the hosts behind the Firebox and behind the SonicWALL can successfully ping each other.