IBM Cloud Docs
Connecting to a Cisco Firepower Thread Defense peer (route-based)

Connecting to a Cisco Firepower Thread Defense peer (route-based)

You can use IBM Cloud VPN for VPC to securely connect your VPC to an on-premises network through a VPN tunnel. This topic provides guidance about how to configure your Cisco FTDv to connect to VPN for VPC.

Review VPN gateway limitations before you connect to your on-premises peer.

These instructions are based on Cisco FTDv, Cisco Firepower Thread Defender, Version 7.0.4.

Before you begin

The first step in configuring your Cisco FTDv for use with VPN for VPC is to ensure that the following prerequisite conditions are met:

  • Cisco FTDv is online and functional with a proper license.
  • You have a credential for accessing the Firepower Device Manager Web UI.
  • You have at least one configured and verified functional internal interface.
  • You have at least one configured and verified functional external interface.

Connecting an IBM route-based VPN to a Cisco Firepower Thread Defense peer

To connect to a Cisco Firepower Thread Defense peer, follow these steps:

  1. Log in to the Firepower Device Manager and click Device in the menu bar to view the Device Summary page. Then, click View Configuration in the Site-to-Site VPN group.

    Device Summary
    Device summary

  2. Create the first IPsec tunnel. On the Site-to-Site VPN page, click the + button to create a site-to-site VPN connection or, if there are no connections yet, you can click the CREATE SITE-TO-SITE CONNECTION button.

  3. On the New Site-to-site VPN page, define the endpoints of the point-to-point VPN connection. To do so, configure the following settings:

    • Connection Profile Name - Provide a name for this connection, up to 64 characters without spaces. You cannot use an IP address as the name.
    • Type - Select Route Based (VTI) to use the routing table, primarily static routes, to define the local and remote networks that should participate in the tunnel.
    • Local VPN Access Interface - Select the interface to which the remote peer can connect. Provide a link-local address.
    • Remote IP Address - Enter the smaller IBM gateway members public IP for the primary IPsec tunnel.

    Define Endpoints
    Define endpoints

    You can create a virtual tunnel interface (VTI) by clicking the Create new Virtual Interface link in the Local VPN Access Interface menu. Be careful to choose the link-local address and make sure that it is not overlapping with other addresses on the device. In this example, we used 169.254.0.0/30 for our primary tunnel. There are two available IP addresses 169.254.0.1 and 169.254.0.1 in this subnet with a 30-bit netmask. The first IP address 169.254.0.1 was used as the VTI on the FTDv. The second IP address 169.254.0.2 was used as the IBM VPN gateway VTI address.

    Create Virtual Tunnel Interface
    Create Virtual Tunnel Interface

  4. Click NEXT. On the Privacy Configuration page, define the privacy configuration for the VPN.

    • Enable the IKE VERSION 2 toggle button and configure the Internet Key Exchange (IKE) Policy.

      Add IKE v2 Policy
      Add IKE v2 Policy

    • Configure the IPSec Proposal settings, which define the combination of security protocols and algorithms that secure traffic in an IPsec tunnel.

      Add IKE v2 IPSec Proposal
      Add IKE v2 IPSec Proposal

    • Specify the Pre-shared Key that is defined on both the local and remote device. The key can be 1-127 alphanumeric characters. Then, click NEXT.

      Pre-Shared Key
      Pre-shared Key

  5. Review the summary and click FINISH.

  6. To create the secondary IPsec tunnel, follow these steps:

    1. Click the + button from the Device Summary page.

    2. Repeat steps 3 through 5 with the following exceptions:

      • For the Remote IP Address, use the greater IBM Gateway members public IP for the secondary IPsec tunnel.
      • Use the same IKE VERSION 2 configuration and IPSec Proposals as the primary tunnel.
  7. Create an access control policy to permit traffic across the VPN. To do so, follow these steps:

    1. Click Policies from the menu bar.

    2. Click the + button to add an access rule. Select your local network object for Source, and your remote network object as Destination. You can create network objects for the Source and the Destination.

    3. Specify the rule Title. Select Allow for Action, and then click OK.

      Add Access Rule
      Add Access Rule

  8. Repeat step 7 to create another access control policy for the returning traffic. This time, the remote network object is the Source, and the local network object is the Destination.

  9. Add a static route to allow your local networks to pass through the primary IPsec VPN tunnel. To do so, go to Device > Routing > + button and complete the following information:

    • Name - Specify a name for the status route.
    • Interface - Select the primary virtual tunnel interface that you already created.
    • Networks - Specify the network object that you created for the remote subnet.
    • Gateway - Create a network object with an IP from the same subnet as the primary virtual tunnel.
    • Metric - Specify the metric for the primary tunnel. This metric must be less than the secondary tunnel.

    Create access control policy
    Create access control policy

  10. Click OK.

  11. Add a static route to allow your local networks to pass through the secondary IPsec VPN tunnel. To do so, go to Device > Routing > + button and complete the following information:

    • Name - Specify a name for the status route (for example, local-to-ibm-secondary).
    • Interface - Select the secondary virtual tunnel interface that you already created.
    • Networks - Specify the network object that you created for the remote subnet.
    • Gateway - Create a network object with an IP from the same subnet as the secondary virtual tunnel.
    • Metric - Specify the metric for the secondary tunnel. This metric must be greater than the primary tunnel.

    Add Static Route
    Add Static Route

  12. Click OK.

  13. Configure TCP MSS clamping to avoid unnecessary fragmentation. Go to Device > Advanced Configuration > FlexConfig > FlexConfig Objects >+ button and create a FlexConfig object with the sysopt connection tcpmss 1360 command.

    FlexConfig Policy
    FlexConfig Policy

  14. Go to Device > Advanced Configuration > FlexConfig > FlexConfig Policy and add the FlexConfig object that you created. Click SAVE.

    Edit FlexConfig Object
    Edit FlexConfig Object

  15. Deploy your changes:

    Pending Changes
    Pending Changes

  16. To verify that the IPsec VPN is working, run the show crypto ikev2 sa command from the CLI console, and make sure that the hosts from both subnets can reach one another.

     command{: caption="The show crypto ikev2 sa command" caption-side="bottom"}

    Command output
    Command output