Configure IPsec tunnels
Configure primary and secondary tunnels on the Cisco ASA/FTD device using the details from Analyze > Tunnels > Setup Info in Forcepoint ONE SSE.
Steps
-
Configure an access-list to allow port 80 and 443 traffic from specific subnets or traffic types to the tunnel:
access-list FP extended permit tcp <internal_subnet> <subnet_mask> any4 eq www access-list FP extended permit tcp <internal_subnet> <subnet_mask> any4 eq https
-
Configure the IPsec encryption algorithm:
crypto ipsec ikev2 ipsec-proposal <ipsec-proposal_name> protocol esp encryption <supported_IPsec_algorithm> protocol esp integrity <supported_algorithm>
Note: If AES-GCM is configured as the ESP encryption algorithm, then the integrity must be set as NULL. -
Configure an IKE encryption algorithm and DH group:
crypto ikev2 policy 1 encryption <supported_ike_algorithm> group <supported_dh_group>
-
Configure a tunnel-group for the primary tunnel:
tunnel-group <primary_destination_address> type ipsec-l2l tunnel-group <primary_destination_address> ipsec-attributes ikev2 remote-authentication pre-shared-key <pre-shared-key> ikev2 local-authentication pre-shared-key <pre-shared-key>
-
Configure a tunnel-group for the secondary tunnel:
tunnel-group <secondary_destination_address> type ipsec-l2l tunnel-group <secondary_destination_address> ipsec-attributes ikev2 remote-authentication pre-shared-key <pre-shared-key> ikev2 local-authentication pre-shared-key <pre-shared-key>
-
Enable the IKE protocol on the egress interface:
crypto ikev2 enable <outgoing_interface>
-
Configure the IKE ID.
- If using the egress IP address as the IKE ID:
crypto isakmp identity address
- If using the device hostname as the IKE ID:
crypto isakmp identity hostname
Note: Cisco ASA/FTD will send the device hostname as the IKE ID if a valid domain is not configured on the device. For example, if domain-name is not configured and the hostname of the device is ASA1, the device will send ASA1 as the IKE ID. Forcepoint ONE SSE recommends you configure a valid domain on your device. For example, if the domain-name is fp.com, the device will automatically send ASA1.fp.com as the IKE ID. Ensure the same fully qualified domain name is configured for the device in the Forcepoint ONE SSE. - If using the egress IP address as the IKE ID: