Connect Forcepoint NGFW to Forcepoint Private Access over a VPN
These instructions explain how to configure a highly available IPsec VPN connection on a Forcepoint Next Generation Firewall (Forcepoint NGFW) for inbound private application traffic coming from Forcepoint Private Access.
Retrieve tunnel information from the Private Access management portal
In the Private Access management portal, look up the tunnel information and review the supported IKE and IPsec parameters.
Create a VPN Profile element
In the Management Client, create a VPN Profile element for the VPN connection to Private Access.
Create Host elements
In the Management Client, create Host elements to define the source IP addresses that are used for incoming private application traffic.
Create External VPN Gateway elements
In the Management Client, create two External VPN Gateway elements to represent the cloud end of each connection.
Configure the endpoint and sites for the NGFW Engine
In the Management Client, configure the endpoint and sites for the NGFW Engine.
Create Policy-Based VPN elements
In the Management Client, create a Policy-Based VPN element for each of the two tunnels, then define the topology and tunnel settings.
Configure rules for policy-based VPN traffic
In the Management Client, add access rules to allow the traffic that you want to accept from both VPN tunnels. Review and modify the NAT rules if necessary.