IPsec connection details

For IPsec connections, configuration information is displayed for each tunnel. Use these details to configure your edge device for IPsec tunnel connectivity. Connections are created by Forcepoint. Some items can be edited by administrators.

Click the panel under Connections to edit site connection settings.

Table 1.
Category Option Description Editable?
Name A descriptive name for the connection. Yes
Status The current connectivity status of the tunnel:
  • Active: the service has seen recent activity from the site.
  • Idle: no activity has been detected for more than 1 hour.
  • Not connected: no traffic has been detected from the tunnel. The edge device might not have been configured.
  • Status unavailable: the current connection status cannot be displayed.
N/A
Your router details Pre-shared key The pre-shared key used for tunnel authentication. Yes
IKE ID type The device IKE ID is used to identify traffic from the tunnel. Use either a fully qualified domain name (FQDN) for your device, or its public egress IP address. You must configure this value on your edge device as the initiator IKE ID for the tunnel.
  • FQDN: a fully qualified hostname for the edge device (required for devices with dynamic IP addresses).
  • Public IP address: the public egress IP address of the edge device. Traffic from your tunnel must originate from this address. Required for devices that do not support hostnames as the IKE ID. If using this option, the IP address of your device must be static.
Yes
IPsec connection settings Destination FQDN The fully-qualified destination DNS hostname for the selected region. N/A
Forcepoint IKE ID The responder IKE identity of the Forcepoint gateway. N/A
Tunnel destination IP address The destination (data center) IP address of the tunnel. N/A
Monitoring IP address The monitoring IP address can be pinged via the tunnel to monitor the status of the tunnel connection. N/A
Note: For guidance on configuring your edge device to connect to the service using IPsec tunneling, including details of verified devices, best practice guidance, and configuration examples, refer to the following guides:
  • IPsec Connectivity Guide for Forcepoint Private Access
  • How to connect Forcepoint NGFW to Private Access over a VPN