Salesforce

How to Configure a Route-Based SD-WAN between an On-Premises FlexEdge Secure SD-WAN Engine and Microsoft Azure

« Go Back
Information
000008073
How to Configure a Route-Based SD-WAN between an On-Premises FlexEdge Secure SD-WAN Engine and Microsoft Azure
The attached document describes how to configure a Route-Based SD-WAN between a Forcepoint FlexEdge Secure SD-WAN Engine (previously NGFW) and Microsoft Azure gateway.

Table of Contents

 

Introduction

The purpose of this document is to describe the configuration steps needed on the Forcepoint FlexEdge Secure SD-WAN Manager (SMC) to configure two Route-Based VPN (RBVPN) tunnels between Forcepoint FlexEdge Secure SD-WAN Engine (previously Next Generation Firewall or NGFW) and Azure VPN gateways.

For this environment we are using 2 internal networks behind the Secure SD-WAN Engine, which will be connected to the Azure Cloud. In case of Azure, there are 2 different sites (Test and Production) with 2 different endpoints. The Test site has two protected networks behind it and the Production site has three networks:
01_Diagram.PNG

Note For a Policy-Based VPN with Azure, see How to configure a policy-based VPN between an on-premises Forcepoint NGFW Engine and Microsoft Azure.

The configuration was created using SMC version 7.1.1 and Secure SD-WAN Engine version 7.1.0.
Back to the top
 

Configuration Overview

The general workflow for configuring a Route-Based VPN to Azure is divided in two steps. The first step is to configure settings on the SMC for Forcepoint FlexEdge Secure SD-WAN Engine and consists of the following main tasks:

  1. Configure the Secure SD-WAN Engine
  2. Create the External SD-WAN Gateway Elements
  3. Create a SD-WAN Profile
  4. Create a Route-Based SD-WAN Tunnels
  5. Add Access Rules to Allow the Traffic

The second step is to configure a Route-Based VPN on the Azure portal. For detailed Azure configuration instructions, refer to the Azure Documentation.
Back to the top
 

Secure SD-WAN Engine Configuration

The Forcepoint FlexEdge Secure SD-WAN Engine configuration consists of the following main tasks:

  1. Configure the Secure SD-WAN Engine
  2. Create External Gateway for Azure
  3. Create a SD-WAN Profile
  4. Create a Route-Based SD-WAN Tunnels
  5. Add Access Rules to Allow the Traffic

​​​​​​​Back to the top
 

Configure the Secure SD-WAN Engine

The first step is to add required configuration on the Secure SD-WAN Engine properties. Let's first add two tunnel interfaces that will be used on the Route-Based Secure SD-WAN Tunnels:

  1. Login to SMC with the Management Client
  2. Open the NGFW Engine element for editing and navigate to Interfaces
  3. Click the Add button > Tunnel Interface
  4. Select the Tunnel Interface ID, optionally define the Zone and write a Comment, and click OK
  5. Add a second tunnel interface repeating steps 3 and 4
02_Interfaces.PNG
Note If you are planning to use dynamic routing between Secure SD-WAN and Azure gateways, make sure to add an IP address for each tunnel interface. The example setup will be using static routing.

The second step on the Engine properties is to add routes to the Azure networks:
  1. Switch to the Routing page on the Engine properties
  2. Right-click the first tunnel interface, and add relevant Azure networks. In the example setup, the first tunnel interface will be used for Azure production network access and thus we will add networks 10.10.10.0/24, 192.168.221.0/24 and 172.16.0.0/12
  3. Right-click the second tunnel interface, and add relevant Azure networks. In the example setup, this tunnel interface will be used for test environment access and thus we'll add networks 192.168.251.0/24 and 192.168.252.0/24
03_Routing.PNG

Before saving the Secure SD-WAN Engine settings, verify that the external interface is enabled as a VPN endpoint:
  1. Navigate to SD-WAN Endpoints on the Engine properties
  2. Make sure that Enabled checkbox is set for the external interface endpoint entry
04_Endpoints.PNG
  1. Click the Save button to save the Engine settings
​​​​​​​Back to the top
 

Create the External SD-WAN Gateway Elements

An External SD-WAN Gateway elements represent VPN gateways that are external to local SMC. As there are two Azure gateways, we will need to create two external gateway elements:

  1. In the Management Client, navigate to Configuration Secure SD-WAN SD-WAN Gateways
  2. Click the New button > External SD-WAN Gateway
  3. Give a Name for the gateway (e.g. Azure-Production) on the General tab
  4. Switch to the Endpoints tab, click Add to create a new endpoint giving a Name for the endpoint and defining settings to match your Azure production gateway settings
05_Production_gateway.PNG
  1. Click OK to save the endpoint
  2. Click the Enabled checkbox to enable the endpoint
06_Enable_endpoint.PNG
  1. Click OK to save the external gateway element
  2. Repeat the steps to create an external gateway element for the Azure test environment gateway
​​​​​​​Back to the top
 

Create a SD-WAN Profile

A SD-WAN (or VPN) Profile element defines settings related to authentication, integrity checking, and encryption. We will create a SD-WAN Profile to match the setting Azure VPN gateways support. The default settings are documented on the Microsoft Azure About VPN devices documentation page.

To create a SD-WAN Profile element in SMC:
  1. In the Management Client, navigate to Configuration Secure SD-WAN Other Elements Profiles SD-WAN Profiles
  2. Click the New button > SD-WAN Profile
  3. Give a Name for the element on the General tab
  4. Enable settings according to the Azure documentation on the IKE SA tab
07_IKE_SA_settings.PNG
  1. Enable settings according to the Azure documentation on the IPsec SA tab
08_IPsec_SA_settings.PNG
  1. Click OK to save the SD-WAN Profile element
​​​​​​​Back to the top
 

Create the Route-Based SD-WAN Tunnels

The last VPN related configuration step in SMC is to create Route-Based VPN Tunnels between the Secure SD-WAN Engine and two Azure gateway:

  1. In the Management Client, navigate to Configuration Secure SD-WAN Route-Based SD-WAN Tunnels
  2. Click the New button > Route-Based SD-WAN Tunnel
  3. Define the Route-Based SD-WAN Tunnel Properties:
    1. (Optional) Give a Name for the element
    2. Leave Tunnel Type to default VPN selection
    3. Change the SD-WAN Profile to the custom profile created on the previous step
    4. The Pre-Shared Key will be automatically generated
    5. Select the NGFW gateway element as the Local Gateway and make sure the first tunnel interface is selected on the Interface setting
    6. Select the Azure production gateway element as the Remote Gateway
    7. Click OK to save Route-Based SD-WAN Tunnel
09-RBVPN_tunnel1.PNG
  1. (Optional) If you wish to use custom Pre-Shared Key:
    1. Open the Route-Based SD-WAN Tunnel element again
    2. Click the Edit button next to Pre-Shared Key
    3. Define the custom key
    4. Click OK to save the key
    5. Click OK to save Route-Based SD-WAN Tunnel
  2. Repeat steps 3 and 4 to create second Route-Based SD-WAN Tunnel between the Secure SD-WAN Engine and Azure test environment gateway
10-RBVPN_tunnel2.PNG

​​​​​​​Back to the top
 

Add Access Rules to Allow the Traffic

The last configuration needed on the SMC side is to add Access Rules to allow traffic between protected networks:
  1. In the Management Client, click the Dashboards button > Engines
  2. Right-click the Secure SD-WAN Engine element > Current Policy Edit
  3. Select a suitable spot in the policy and click the ID cell of the rule above > Add Rule After
  4. Add Access Rules that allow desired traffic between on-premises networks and Azure networks:
11-Access_Rules.PNG
Note The rules needed depend on your setup and requirements. The example rules above were created to allow specific protocol access from on-prem network to the Azure production network, and full access to Azure Test Site network, while no access is allowed from the Azure networks to the on-prem networks.
  1. Click the Save and Install button to install new configuration the Secure SD-WAN Engine
​​​​​​​Back to the top
 

Configure the Azure Environment and Verify Connectivity

Once everything has been configured on the Secure SD-WAN Manager and Engine side, you'll need to configure Route-Based VPN etc. definitions in your Azure environment. For detailed Azure configuration instructions, refer to the Azure Documentation.

When the Azure configuration has been deployed, verify that traffic is allowed and working through each tunnel. The log should show connections allowed. The SD-WAN SAs monitoring view (right-click the Secure SD-WAN Engine > Monitoring SD-WAN SAs) should show IKE and IPsec SA established with each Azure gateway after traffic through the tunnel was generated.

If the VPN negotiation fails or traffic does not work, see NGFW Site-to-Site VPN Troubleshooting Guide for guidance on how to troubleshoot VPN issues.
​​​​​​​Back to the top ​​​​​​​



Keywords: Next Generation Firewall; site-to-site VPN; Route-Based VPN; Microsoft Azure; configuration example

 

This content was created by the Network Security Technical Marketing team.


CHANGELOG:
04/21/2021 thyvarinen - updating file permissions to get it available in the Hub.
04/28/2021 thyvarinen - cleared "URL Name" to get it updated from old KB ID to article name and added smart link to policy-based VPN with Azure article.
07/08/2022 thyvarinen - Updated keywords and categories.
11/28/2023 thyvarinen - Moved the outdated instructions from PDF to the article content updating instructions for the current SMC and Engine versions. Disabled PDF sharing.
4/30/24 fixed smartlink
Additional Information
Not Checked
How-to-configure-a-route-based-VPN-between-an-on-premises-Forcepoint-NGFW-Engine-and-Microsoft-Azure
System Information

Powered by