Configure IKE proposal
Configure the IKE proposal for the Private Access service.
Steps
-
Configure an IKEv2 proposal with a supported encryption algorithm, integrity, and DH group:
crypto ikev2 proposal <proposal_name> encryption <supported_ipsec_cipher> integrity <supported_ipsec_cipher> group <supported_dh_group> exit
Example:crypto ikev2 proposal PA_proposal encryption aes-cbc-256 integrity sha256 group 19 exit
-
Configure the IKEv2 policy and associate the proposal that you configured:
crypto ikev2 policy forcepoint proposal <proposal_name> exit
-
Configure two keyrings and define IP address, pre-shared key for each tunnel:
crypto ikev2 keyring PA_keyring1 peer gateway1 address <tunnel1_destination_address> pre-shared-key <pre-shared_key> exit exit crypto ikev2 keyring PA_keyring2 peer gateway2 address <tunnel2_destination_address> pre-shared-key <pre-shared_key> exit exit
-
Configure a separate IKEv2 profile for each tunnel and associate the following:
- The keyring that you created.
- The IKE ID sent by the service (of type FQDN)
- The IKE ID sent by the edge device (of type FQDN or of type IP address).
crypto ikev2 profile PA_profile1 match identity remote fqdn <forcepoint_ike_id> identity local fqdn <local_fqdn_id> authentication local pre-share authentication remote pre-share keyring local PA_keyring1 dpd 10 2 periodic exit
crypto ikev2 profile PA_profile2 match identity remote fqdn <forcepoint_ike_id> identity local fqdn <local_fqdn_id> authentication local pre-share authentication remote pre-share keyring local PA_keyring2 dpd 10 2 periodic exit
The example instructions provided above use a local IKE ID of type FQDN. If you want to use a local IKE ID of type IP address, you can replace the corresponding line as follows:
identity local address <public_ip>
-
Configure a transform set and define the encryption algorithm.
crypto ipsec transform-set PA_set <supported_ipsec_cipher> exit
Example:crypto ipsec transform-set PA_set esp-aes esp-sha256-hmac exit
-
Configure two access lists to match return traffic for private applications to the cloud gateway source IP addresses.
Private Access gateways apply network address translation (NAT) to remote traffic before forwarding it to the hosting site. The first tunnel uses 116.50.59.232 as the source NAT IP address, and the second tunnel uses 116.50.59.234 as the source NAT IP address.
In the following example access lists, the private applications are on the 192.168.122.0/24 private IP network on the hosting site. Each access list captures the traffic that is sent back from this private application network to the corresponding gateway source IP address.
Example:access-list 120 permit tcp 192.168.122.0 0.0.0.255 116.50.59.232 0.0.0.0 access-list 125 permit tcp 192.168.122.0 0.0.0.255 116.50.59.234 0.0.0.0