Create Branch Office Tunnel WatchGuard
- Fireware
- Wi-Fi Cloud
- AuthPoint
- WatchGuard Cloud
- Self-Help Tools
- Fireware
- Wi-Fi Cloud
- AuthPoint
- WatchGuard Cloud
- Self-Help Tools
Fireware > Fireware Help > Configure Network Settings > Manual Branch Office VPN Tunnels > Manual BOVPN Configuration Examples > Set up a VPN Between Two Fireware v11.x Devices (WSM)

Contents ● Fireware Help
- Explore Fireware Help
- Set Up & Administer Your Firebox
- Network & Firewall Basics
- Set Up WatchGuard System Manager
- Set Up Your Firebox
- About Fireware and Firebox Management
- Prepare to Install Your Firebox
- Connect the Firebox Cables
- About Dynamic IP Addresses on the External Interface
- Enable Your Computer to Connect to Fireware Web UI
- Connect to Fireware Web UI
- About Fireware Web UI
- Connect to Fireware Web UI from an External Network
- About Firebox Setup Wizards
- Complete Your Installation
- Firebox Configuration Best Practices
- Administer Your Firebox
- Administer the Firebox from Policy Manager
- About Fireware Web UI
- About Feature Keys
- About WatchGuard Passphrases and Keys
- Set the Time Zone and Basic System Properties
- Enable NTP and Add NTP Servers
- Manage Users and Roles on Your Firebox
- Define Firebox Global Settings
- Configure the Logon Disclaimer
- Administer Your Firebox From a Remote Location
- Manage the Firebox Configuration File
- Enable Support Access
- Upgrade, Downgrade, and Migration
- Firebox Backup and Restore
- Firebox Reset and Recovery
- About SNMP
- About Subscription Services Expiration
- Renew Subscription Services
- Set Up Firebox Cloud
- Introduction to Firebox Cloud
- Firebox Cloud License Options
- Firebox Cloud Feature Differences
- Deploy Firebox Cloud on Azure
- Deploy Firebox Cloud on AWS
- Protect a Web Server with Firebox Cloud
- Enable Logging for Firebox Cloud
- See Firebox Cloud VM Information
- Administer Firebox Cloud with the CLI
- Changes that Require a Firebox Cloud Reboot
- Set Up FireboxV and XTMv
- Introduction to FireboxV and XTMv
- FireboxV and XTMv Installation Overview
- Deploy FireboxV or XTMv on Hyper-V
- Configure Resources in Hyper-V
- Deploy FireboxV or XTMv on VMware ESXi
- Configure Resources in VMware ESXi
- Configure a FireCluster on VMware ESXi
- Reset FireboxV or XTMv to Factory-Default Settings
- Set Up & Administer WatchGuard Servers
- Set Up WatchGuard Servers
- About the Gateway Firebox
- Find Your Management Server License Key
- Monitor the Status of WatchGuard Servers
- Configure Your WatchGuard Servers
- Configure Server Settings for Your WatchGuard Servers
- Configure Database Maintenance Settings for Your WatchGuard Servers
- Configure Logging Settings for Your WatchGuard Servers
- Configure Notification Settings for Your WatchGuard Servers
- Open WatchGuard Server Center
- Stop and Start Your WatchGuard Servers
- Install or Configure WatchGuard Servers from WatchGuard Server Center
- Exit or Open WatchGuard Server Center
- Set Up WatchGuard Servers
- Certificates
- About Certificates
- Create a Certificate CSR
- Create a CSR with OpenSSL
- Sign a Certificate with Microsoft CA
- Use Certificates for Authentication
- Certificates for Branch Office VPN (BOVPN) Tunnel Authentication
- Certificates for Mobile VPN with IPSec Tunnel Authentication (WSM)
- Certificates for Mobile VPN With IPSec Tunnel Authentication (Web)
- Certificates for Mobile VPN with L2TP Tunnel Authentication
- Certificates for Mobile VPN with IKEv2 Tunnel Authentication
- Configure the Web Server Certificate for Firebox Authentication
- Import and Install a Third-Party Web Server Certificate
- Use Certificates for the HTTPS-Proxy
- Export a Certificate from Your Device
- Convert Certificate Format
- Import a Certificate on a Client Device
- Certificate Portal
- About Elliptic Curve Digital Signature Algorithm (ECDSA) certificates
- Deploy Your Firebox with RapidDeploy
- Set Up & Administer Dimension
- Get Started with WatchGuard Dimension
- Deploy Dimension Behind a Firebox
- Install WatchGuard Dimension
- Connect to WatchGuard Dimension
- Manage Tasks
- Back Up and Restore Historical Data
- Manage your Dimension Server
- Configure and Monitor the Dimension Database
- Configure Access Management Settings
- Manage Dimension System Settings
- Configure Network Settings
- Network Interface Settings
- Network Modes and Interfaces
- Mixed Routing Mode
- Drop-in Mode
- Bridge Mode
- Common Interface Settings
- Advanced Interface Settings
- Network Interface Card (NIC) Settings
- Set Outgoing Interface Bandwidth
- Set DF Bit for IPSec
- PMTU Setting for IPSec
- Use Static MAC Address Binding
- Find the MAC Address of a Computer
- Add Static ARP Entries
- About Spanning Tree Protocol
- Configure Spanning Tree Protocol Settings in the CLI
- About Wildcard IP Addresses
- About LAN Bridges
- About Virtual Local Area Networks (VLANs)
- About Link Aggregation
- About Link Monitor
- About Multi-WAN
- About Multi-WAN Methods
- Multi-WAN Methods and Dynamic Routing
- Multi-WAN and SD-WAN
- Configure the Routing Table Multi-WAN Method
- Configure the Round-Robin Multi-WAN Method
- Find How to Assign Weights to Interfaces
- Configure the Interface Overflow Multi-WAN Method
- Configure the Failover Multi-WAN Method
- Configure Modem Failover
- Advanced Multi-WAN Settings
- Troubleshoot Network Connectivity
- Network Setup Examples
- Network Address Translation (NAT)
- Routes and Routing
- Manual Branch Office VPN Tunnels
- About Manual Branch Office VPNs
- About IPSec VPNs
- Sample VPN Address Information Table
- VPN Tunnel Capacity and Licensing
- About Global VPN Settings
- Quick Start — Set Up a VPN Between Two Fireboxes
- BOVPN Virtual Interfaces
- BOVPN Virtual Interface Examples
- BOVPN Virtual Interface with Dynamic Routing
- BOVPN Virtual Interface with Metric-Based Failover
- BOVPN Virtual Interface with Policy-Based Routing
- BOVPN Virtual Interface for Dynamic Routing to Cisco
- BOVPN Virtual Interface for Dynamic Routing to Microsoft Azure
- BOVPN Virtual Interface for Static Routing to Microsoft Azure
- BOVPN Virtual Interface for Dynamic Routing to Amazon Web Services (AWS)
- BOVPN Virtual Interface for Static Routing to Amazon Web Services (AWS)
- About BOVPN Virtual Interfaces
- Configure a BOVPN Virtual Interface
- BOVPN Virtual Interface Examples
- Configure Manual BOVPN Gateways
- Configure Manual BOVPN Tunnels
- BOVPN and Network Address Translation
- Control Routing Through a Manual BOVPN Tunnel
- Enable Multicast Routing Through a Branch Office VPN Tunnel
- Enable Broadcast Routing Through a Branch Office VPN Tunnel
- Configure Name Resolution Through a Branch Office VPN Tunnel
- Mobile VPN Traffic Through a Branch Office VPN Tunnel
- Branch Office VPN Tunnel Switching
- Define a Route for All Internet-Bound Traffic
- About BOVPN Failover
- Monitor and Troubleshoot BOVPN Tunnels
- Manual BOVPN Configuration Examples
- Set up a VPN Between Two Fireware v11.x Devices (WSM)
- Set up a VPN Between Two Fireware v11.x Devices (Web UI)
- Use a Branch Office VPN for Failover from a Leased Line (BGP)
- Use a Branch Office VPN for Failover from a Leased Line (OSPF)
- Configure Manual Branch Office VPN Tunnel Switching
- Multicast Routing Through a BOVPN Tunnel
- Broadcast Routing Through a BOVPN Tunnel
- Active Directory Authentication Through a BOVPN Tunnel
- Logging Through a BOVPN Tunnel
- Allow Mobile VPN with SSL Users to use Resources Through a BOVPN Tunnel
- Set up a VPN from a Firebox to a Cyberoam Device
- Set up a VPN from a Firebox to a SonicWALL Device
- Set up a VPN from a Firebox to a Cisco ASA Device
- Set up a VPN from a Firebox to a Cisco ISR Device
- Set up a VPN from a Firebox to a Fortinet FortiGate Device
- About TLS VPNs
- Mobile VPN Tunnels
- Select a Mobile VPN Type
- Internet Access Options for Mobile VPN Users
- Virtual IP Addresses and Mobile VPNs
- DNS and Mobile VPNs
- Mobile VPN Setup Overview
- Mobile VPN with IPSec
- About Mobile VPN with IPSec on the Firebox
- System Requirements
- Options for Internet Access Through a Mobile VPN with IPSec Tunnel
- About Mobile VPN Client Configuration Files
- Configure the Firebox for Mobile VPN with IPSec
- Use Certificates for Mobile VPN with IPSec Tunnel Authentication
- Use Two-Factor Authentication with Mobile VPN with IPSec
- Configure the External Authentication Server
- Add Users to a Firebox Mobile VPN Group
- Use Mobile VPN with IPSec with Active Directory Groups
- Lock Down an End User Profile
- Configure DNS and WINS Servers for Mobile VPN with IPSec
- Modify an Existing Mobile VPN with IPSec Group Profile
- Generate Mobile VPN with IPSec Configuration Files
- Configure Policies to Filter IPSec Mobile VPN Traffic
- Distribute the Software and Profiles
- About Mobile VPN Volume Licenses
- Additional Mobile VPN Topics
- Configure Mobile VPN with IPSec to a Dynamic IP Address
- About the IPSec Mobile VPN Client
- Client Requirements
- Activate the IPSec Mobile VPN Client
- Install the IPSec Mobile VPN Client Software
- Connect and Disconnect the Mobile VPN Client
- See Mobile VPN Log Messages
- Secure Your Computer with the Mobile VPN Firewall
- End-User Instructions for WatchGuard IPSec Mobile VPN Client Installation
- Add a Custom Logo to the IPSec Mobile VPN Client
- Use the macOS or iOS Native IPSec VPN Client
- Use Mobile VPN with IPSec with an Android Device
- Troubleshoot Mobile VPN with IPSec
- About Mobile VPN with IPSec on the Firebox
- Mobile VPN with SSL
- Configure the Firebox for Mobile VPN with SSL
- Plan Your Mobile VPN with SSL Configuration
- Use a Wizard to Configure the Firebox for Mobile VPN with SSL
- Choose the Port and Protocol for Mobile VPN with SSL
- Options for Internet Access through a Mobile VPN with SSL Tunnel
- Name resolution for Mobile VPN with SSL
- Configure the External Authentication Server
- Use Two-Factor Authentication with Mobile VPN with SSL
- Install and Connect the Mobile VPN with SSL Client
- Use Mobile VPN with SSL with an OpenVPN Client
- Troubleshoot Mobile VPN with SSL
- Configure the Firebox for Mobile VPN with SSL
- Mobile VPN with L2TP
- About Mobile VPN with L2TP Licensing
- Options for Internet Access Through a Mobile VPN with L2TP Tunnel
- About L2TP User Authentication
- Use the WatchGuard L2TP Setup Wizard
- Edit the Mobile VPN with L2TP Configuration
- About L2TP Policies
- Configure DNS and WINS Servers for Mobile VPN with L2TP
- Configure Client Devices for Mobile VPN with L2TP
- Connect from an L2TP VPN Client
- Troubleshoot Mobile VPN with L2TP
- Mobile VPN with IKEv2
- About Mobile VPN with IKEv2 Licensing
- Internet Access Through a Mobile VPN with IKEv2 Tunnel
- About Mobile VPN with IKEv2 User Authentication
- Use the WatchGuard IKEv2 Setup Wizard
- Edit the Mobile VPN with IKEv2 Configuration
- About IKEv2 Policies
- Configure DNS and WINS Servers for Mobile VPN with IKEv2
- Configure Client Devices for Mobile VPN with IKEv2
- Configure iOS and macOS Devices for Mobile VPN with IKEv2
- Configure Windows Devices for Mobile VPN with IKEv2
- Configure Android Devices for Mobile VPN with IKEv2
- FireCluster
- Quick Start — Set Up a FireCluster
- About Feature Keys and FireCluster
- Features not Supported With FireCluster
- Supported Models for FireCluster
- About FireCluster Management IP Addresses
- Configure FireCluster
- Before You Begin
- Connect the FireCluster Hardware
- Switch and Router Requirements for an Active/Active FireCluster
- Use the FireCluster Setup Wizard
- Configure FireCluster Manually
- Find the Multicast MAC Addresses for an Active/Active Cluster
- Active/Passive Cluster ID and the Virtual MAC Address
- Configure Link Aggregation for a FireCluster
- Configure FireCluster Advanced Settings
- Update the FireCluster Configuration
- Remove or Add a Cluster Member
- Monitor and Control FireCluster Members
- About FireCluster Failover
- FireCluster Upgrade and Migration
- Configure a Replacement (RMA) FireCluster Member
- Disable FireCluster
- Use the Web UI with a FireCluster
- FireCluster Diagnostics
- SSL/TLS Settings Precedence and Inheritance
- Network Interface Settings
- Control Network Traffic
- User Authentication
- About User Authentication
- Set Global Firewall Authentication Values
- Authentication Server Types
- Configure Your Firebox as an Authentication Server
- Authentication and Policies
- Active Directory Authentication
- Configure Active Directory Authentication
- About Active Directory Single Sign-On (SSO)
- How Active Directory SSO Works
- Quick Start — Set Up Active Directory SSO
- Choose Your Active Directory SSO Components
- Install the WatchGuard Active Directory SSO Agent and Event Log Monitor
- Configure the SSO Agent
- Configure the SSO Event Log Monitor
- Install the WatchGuard Active Directory SSO Client
- Install the WatchGuard Active Directory SSO Exchange Monitor
- Configure the SSO Exchange Monitor
- Enable Active Directory SSO on the Firebox
- Example Network Configurations for Active Directory SSO
- Troubleshoot Active Directory SSO
- Use Telnet to Debug the SSO Agent
- About Active Directory SSO Log Files
- Download Active Directory SSO Log Files
- RADIUS Authentication
- Configure a Hotspot
- SAML Single Sign-On (SSO)
- Configure VASCO Server Authentication
- Configure SecurID Authentication
- Install and Configure the Terminal Services Agent
- Configure Terminal Services Settings
- Configure LDAP Authentication
- Use Novell eDirectory for LDAP Authentication
- Policies
- About Policies
- Add Policies to Your Configuration
- Disable or Delete a Policy
- About Policy Tags and Filters
- About Policies by Domain Name (FQDN)
- About Aliases
- Create an Alias
- About Policy Precedence
- Create Schedules for Firebox Actions
- Set an Operating Schedule
- About Custom Policies
- About Policy Properties
- About Quotas
- About Policies for Firebox-Generated Traffic
- About Policies for SD-WAN
- Proxies
- About Proxy Policies and ALGs
- Add a Proxy Policy to Your Configuration
- About the DNS-Proxy
- About the Explicit-Proxy
- About the FTP-Proxy
- About the H.323-ALG
- About the HTTP-Proxy
- HTTP Request: General Settings
- HTTP Request: Request Methods
- HTTP Request: URL Paths
- HTTP Request: Header Fields
- HTTP Request: Authorization
- HTTP Response: General Settings
- HTTP Response: Header Fields
- HTTP Response: Content Types
- HTTP Response: Cookies
- HTTP Response: Body Content Types
- HTTP-Proxy Exceptions
- HTTP-Proxy: Data Loss Prevention
- HTTP-Proxy: WebBlocker
- HTTP-Proxy: AntiVirus
- HTTP-Proxy: Reputation Enabled Defense
- HTTP-Proxy: Deny message
- HTTP-Proxy: Proxy and AV Alarms
- HTTP-Proxy: APT Blocker
- Enable Windows Updates Through the HTTP-Proxy
- Use a Caching Proxy Server
- HTTP-Proxy Best Practices
- About the HTTPS-Proxy
- About the IMAP-Proxy
- About the POP3-Proxy
- About the SIP-ALG
- About the SMTP-Proxy
- SMTP-Proxy: General Settings
- SMTP-Proxy: Greeting Rules
- SMTP-Proxy: ESMTP Settings
- SMTP-Proxy: STARTTLS Encryption
- SMTP-Proxy: Authentication
- SMTP-Proxy: Content Types
- SMTP-Proxy: File Names
- SMTP-Proxy: Mail From/Rcpt To
- SMTP-Proxy: Headers
- SMTP-Proxy: AntiVirus
- SMTP-Proxy: Deny Message
- SMTP-Proxy: Data Loss Prevention
- SMTP-Proxy: spamBlocker
- SMTP-Proxy: Proxy and AV Alarms
- SMTP-Proxy: APT Blocker
- SMTP-Proxy: TLS
- Configure the SMTP-Proxy to Quarantine Email
- Protect Your SMTP Server from Email Relaying
- Troubleshoot the SMTP-Proxy
- About the TCP-UDP-Proxy
- Traffic Management & QoS
- About Traffic Management and QoS
- Set Connection Rate Limits
- About QoS Marking
- Get Started with Traffic Management
- About Traffic Management in Fireware v11.9 and Higher
- About Traffic Management in Fireware XTM v11.8.x and Lower
- Use Traffic Management for Managed BOVPN Tunnels
- Traffic Management Examples
- Default Threat Protection
- Quarantine Server
- About the Quarantine Server
- Set Up the Quarantine Server
- Configure the Quarantine Server
- Configure the XTM Device to Quarantine Email
- Define the Quarantine Server Location on the XTM Device
- About the Quarantine Server Client
- Configure User Notification with Microsoft Exchange Server 2003 or 2007
- User Management of Quarantined Messages
- User Authentication
- Manage Security Services
- Access Portal
- Application Control
- About Application Control
- How Application Control Identifies Applications
- Application Control — Begin with Monitoring
- Application Control Reports
- Policy Guidelines for Application Control
- Global Application Control Action
- Configure Application Control Actions
- Use Application Categories
- Configure Application Control for Policies
- Enable Application Control in a Policy
- Get Information About Applications
- Configure the Application Control Update Server
- Application Control and Proxies
- Application Control and WebBlocker
- Manage SSL Applications
- Manage Evasive Applications
- Block User Logins to Skype
- Manage Applications that Use Multiple Protocols
- Monitor Downloads and File Transfers
- Manage Facebook Applications
- Application Control Policy Examples
- Troubleshoot Application Control
- APT Blocker
- Botnet Detection
- Data Loss Prevention
- About Data Loss Prevention
- Configure Data Loss Prevention
- Configure DLP Custom Rule
- Configure DLP Sensors
- Configure DLP Scan Settings
- About DLP Scan Limits
- Configure DLP for Policies
- Configure the DLP Update Server
- Monitor DLP Activity
- Look Up DLP Rules on the Security Portal
- Unlock a File Locked by DLP
- Troubleshoot Data Loss Prevention
- DNSWatch
- About WatchGuard DNSWatch
- Protect Endpoints with DNSWatchGO Client
- Protect Networks with DNSWatch
- About DNSWatchGO Client
- About DNSWatchGO Protected Networks
- About DNSWatch on the Firebox
- Manage Content Filter Policies
- Manage DNSWatch
- Troubleshoot DNSWatch
- About DNSWatchGO Licenses
- Gateway AntiVirus
- Geolocation
- IntelligentAV
- Intrusion Prevention Service
- About Intrusion Prevention Service
- Configure Intrusion Prevention
- Configure the IPS Update Server
- Configure IPS Exceptions
- Configure IPS Notification
- Show IPS Signature Information
- Disable or Enable IPS for a Policy
- Look Up IPS Signatures on the Security Portal
- Troubleshoot Intrusion Prevention Service
- Mobile Security
- Reputation Enabled Defense
- spamBlocker
- Threat Detection and Response
- About Threat Detection and Response
- Quick Start — Set Up Threat Detection and Response
- TDR Deployment Best Practices
- TDR Web UI Navigation, Filters, and Common Features
- TDR Account Types
- Threat Detection and Response Licensing
- Enable TDR Beta Features
- TDR Dashboard
- About TDR Threat Scores
- About TDR Cybercon Levels
- About TDR Baselines
- TDR General Settings
- Configure Your Firebox for TDR
- Manage TDR Hosts and Host Sensors
- TDR Host Sensor Manual Installation
- Install and Configure AD Helper
- Manage TDR Domains
- TDR Host Sensor Automated Installation
- TDR Host Sensor CLI and GPO Installation
- TDR Host Sensor Installation with Jamf
- Prepare the TDR Host Sensor for an OS Image
- TDR Host Sensor System Tray Icon
- Uninstall TDR Host Sensors
- Uninstall TDR AD Helper
- Control Host Sensor Behavior
- TDR Monitoring and Actions
- TDR Support Access
- Reset TDR Settings, Data, and Devices
- WebBlocker
- About WebBlocker
- Get Started with WebBlocker
- Set Up the WebBlocker Server
- About the On-premises WebBlocker Server
- Quick Start – Set Up a WebBlocker Server
- Install the WebBlocker Server
- Administer the WebBlocker Server
- About WebBlocker Categories
- Add WebBlocker Actions
- Configure WebBlocker Actions
- About WebBlocker Exceptions
- Import or Export WebBlocker Actions
- Use WebBlocker Actions in Proxy Definitions
- WebBlocker Global Settings
- About WebBlocker Subscription Services Expiration
- WebBlocker Examples
- Best Practices and Troubleshooting for WebBlocker
- Configure File Exceptions
- Subscription Service Update Server
- Monitor Network Traffic
- Set Up Logging & Reporting for Your Network
- About Firebox Logging and Notification
- Define Where the Firebox Sends Log Messages
- Configure Logging and Notification for a Policy
- Quick Start — Set Up Logging to a WSM Log Server
- Set Up Your WSM Log Server & Report Server
- About the WatchGuard Log Server
- Set Up Your Log Server
- Configure Logging Settings for Your WatchGuard Servers
- Use Scripts, Utilities, and Third-Party Software with the Log Server
- About the Report Server
- Set Up Your Report Server
- Start or Stop the Report Server
- Back Up and Restore the Report Server Database
- Move the Report Directory
- Predefined Reports List
- Use the Web Services API to Retrieve Log and Report Data
- Configure ConnectWise Integration for Reports
- About HIPAA Compliance Reports
- About PCI Compliance Reports
- Monitor Your Firebox
- Monitor your Firebox with Fireware Web UI
- Front Panel
- Subscription Services
- FireWatch
- Interfaces
- Traffic Monitor
- Geolocation
- Mobile Security
- Network Discovery
- ARP Table
- Authentication List
- Blocked Sites
- Checksum
- Components List
- DHCP Leases
- Diagnostics
- Dynamic DNS
- Hotspot Clients
- Processes
- Routes
- Multicast Routes
- Server Connection
- Traffic Management
- Users and Roles
- VM Information
- VPN Statistics
- SD-WAN Status
- Rogue AP Detection
- Wireless Statistics
- Monitor Wireless Connections (Gateway Wireless Controller)
- Use Gateway Wireless Controller Maps
- Review User Quotas
- Monitor your Firebox with Firebox System Manager (FSM)
- Start Firebox System Manager
- Set the Refresh Interval and Pause Display
- Basic Device and Network Status (Front Panel)
- Device Log Messages (Traffic Monitor)
- Visual Display of Bandwidth Usage (Bandwidth Meter)
- Visual Display of Policy Usage (Service Watch)
- Traffic and Performance Statistics (Status Report)
- Manage Fault Reports
- Authenticated Users (Authentication List)
- Manage the Blocked Sites List (Blocked Sites)
- Blocked Sites and Traffic Monitor
- Subscription Services Statistics (Subscription Services)
- Gateway AntiVirus Statistics
- Intelligent AntiVirus Statistics
- Application Control and Intrusion Prevention Service Statistics
- WebBlocker Statistics
- spamBlocker Statistics
- Reputation Enabled Defense Statistics
- Geolocation Statistics
- Botnet Detection Statistics
- Data Loss Prevention Statistics
- APT Blocker Statistics
- Subscription Service Status and Manual Signature Updates
- View Monitoring and Status Information for SD-WAN
- Traffic Management Statistics (Traffic Management)
- About HostWatch
- About the Performance Console
- About Certificates and FSM
- Communication Log
- Use Firebox System Manager (FSM)
- See and Synchronize Feature Keys
- Hide Expired Service Warnings
- Synchronize the System Time
- Run Diagnostic Tasks to Learn More About Log Messages
- Clear the ARP Cache
- Clear Alarms
- Rekey BOVPN Tunnels
- Calculate the Fireware Checksum
- Backup and Restore to a USB Drive
- Control FireCluster
- Reboot or Shut Down Your Device
- Update the Wireless Region for a Wireless Device
- Monitor Hardware Health
- Monitor your Firebox with Fireware Web UI
- Monitor Network Activity
- See Log Messages & Reports in Dimension
- See Log Messages & Reports in WebCenter
- Monitor Devices on Your Internal Networks
- Technology Integrations
- Analyze Network Traffic with NetFlow
- Set Up Logging & Reporting for Your Network
- Centrally Manage Your Fireboxes
- Centralized Management with the WSM Management Server
- Set Up the Management Server
- Install and Set Up the WatchGuard Management Server
- Configure Settings for the Management Server
- Configure the Certificate Authority on the Management Server
- Configure License Key, Monitoring, and Notification Settings for the Management Server
- Configure Active Directory Authentication for the Management Server
- Configure Logging Settings for the Management Server
- Define Configuration Management Settings
- Update the Management Server with a New Gateway Firebox Address
- Change the IP Address of a Management Server
- Change the Administrator Passphrase
- Back Up or Restore the Management Server Configuration
- Move the Management Server to a New Computer
- Use WSM to Connect to your Management Server
- Import or Export a Management Server Configuration
- Configure a Management Server Cluster
- Manage Server Licenses and Restrict VPN Tunnel Authentication Options
- Review and Manage the Monitored Report Servers List
- About WatchGuard System Manager
- Start WatchGuard System Manager Tools
- Expire the Lease for a Managed Device
- About Centralized Management Modes
- Change the Centralized Management Mode
- Add Managed Devices to the Management Server
- Use Device Folders
- Configure Management Groups
- Generate Management Reports
- Generate Configuration Reports for Managed Devices
- Administer Managed Devices
- Set Device Management Properties
- Schedule Tasks for Managed Devices
- Update the Configuration For a Fully Managed Device
- Search Managed Devices
- About Filtered View
- Manage Customer Contact Information
- Configure a Firebox as a Managed Device
- Update or Reboot a Device, or Remove a Device from Management
- Remove a Device from Fully Managed Mode
- Managed Branch Office VPN Tunnels (WSM)
- About Management Tunnels
- Configure Management Tunnels
- Create Device Configuration Templates
- About Configuration History and Template Application History
- About Role-Based Administration
- About RapidDeploy from the Management Server
- About the Deployment Center & RapidDeploy from the Management Server
- Set Up the Management Server
- Centralized Management with Dimension
- WatchGuard Cloud on your Firebox
- Centralized Management with the WSM Management Server
- Wireless
- Wireless Firebox Configuration
- Enable Firebox Wireless
- Wireless Device Configuration Options
- Before You Begin
- About Wireless Configuration Settings
- About Wireless Security Settings
- Enable Wireless Connections
- Enable a Wireless Guest Network
- Enable a Hotspot on an Wireless Access Point
- Configure Your External Interface as a Wireless Interface
- About Wireless Radio Settings
- Monitor Wireless Access Points and Clients
- Rogue Access Point Detection
- WatchGuard AP Configuration
- WatchGuard AP Quick Start
- Wireless Access Point Types
- About WatchGuard AP Configuration
- About WatchGuard Wi-Fi Cloud
- WatchGuard AP Requirements and Limitations
- Plan Your Wireless AP Deployment
- About WatchGuard AP Activation
- About WatchGuard AP License Subscriptions
- Basic Wi-Fi Quick Start
- WatchGuard AP Deployment Overview
- Configure VLANs for WatchGuard APs
- About Client Isolation
- Configure WatchGuard APs with the Gateway Wireless Controller
- About WatchGuard AP Automatic Deployment
- About WatchGuard AP Wireless Deployment
- About WatchGuard AP Passphrases
- About WatchGuard AP Remote VPN Deployment
- Configure WatchGuard AP SSIDs
- Configure SSID Security Settings
- Configure RADIUS Server Authentication with Active Directory for Wireless Users
- WatchGuard AP Discovery and Pairing
- Configure WatchGuard AP Settings
- Configure WatchGuard AP Radio Settings
- Configure Gateway Wireless Controller Settings
- WatchGuard AP Trust Store
- Configure MAC Access Control
- Unpair a WatchGuard AP
- Monitor WatchGuard AP Status
- Monitor Wireless Clients
- Troubleshoot WatchGuard APs
- Enable Rogue Access Point Detection with the Gateway Wireless Controller
- View Wireless Deployment Maps
- Enable a Hotspot on a WatchGuard AP
- Reset a WatchGuard AP
- Update WatchGuard AP Firmware on the Gateway Wireless Controller
- Use the WatchGuard Access Point Web UI
- WatchGuard AP Deployment Examples
- Wireless Firebox Configuration
- Dimension
- Get Started with WatchGuard Dimension
- Deploy Dimension Behind a Firebox
- Install WatchGuard Dimension
- Connect to WatchGuard Dimension
- Manage Tasks
- Back Up and Restore Historical Data
- Manage your Dimension Server
- Configure and Monitor the Dimension Database
- Configure Access Management Settings
- Manage Dimension System Settings
- See Log Messages & Reports in Dimension
- Centralized Management with Dimension
- Troubleshooting
- Troubleshoot RapidDeploy
- Troubleshoot User Authentication
- Troubleshoot Single Sign-On (SSO)
- Troubleshoot Hotspot External Guest Authentication
- Troubleshoot Network Connectivity
- Monitor and Troubleshoot BOVPN Tunnels
- Troubleshoot Mobile VPN with IPSec
- Troubleshoot the Shrew Soft VPN Client
- Troubleshoot Mobile VPN with SSL
- Troubleshoot Mobile VPN with L2TP
- Troubleshoot the SMTP-Proxy
- Best Practices and Troubleshooting for WebBlocker
- Troubleshoot Gateway AntiVirus
- Troubleshoot APT Blocker
- Troubleshoot Application Control
- Troubleshoot Intrusion Prevention Service
- Troubleshoot Data Loss Prevention
- Troubleshoot WatchGuard APs
- About WatchGuard Support
- Configuration Examples
Set up a VPN Between Two Fireware Devices (WSM)
A branch office virtual private network (BOVPN) tunnel is a secure way for networks, or for a host and a network, to exchange data across the Internet. This document tells you how to use Policy Manager to define a manual BOVPN tunnel between two Fireboxes.
For the same example as configured in Fireware Web UI, see Set up a VPN Between Two Fireware Devices (Web UI).
For detailed information about BOVPN settings, see:
- About Manual IPSec Branch Office VPNs
- Configure Manual BOVPN Gateways
- Configure Manual BOVPN Tunnels
Determine IP Address and Tunnel Settings
Before you create a manual BOVPN tunnel, we recommend that you determine which IP addresses and settings to use. This topic includes a checklist that can help you plan.
In this example, both endpoints have static external IP addresses. For information on BOVPN tunnels to devices with a dynamic external IP address, see Define Gateway Endpoints for a BOVPN Gateway.
Make sure that you configure the VPN endpoints correctly and that the Phase 1 and Phase 2 settings are the same on both Fireboxes. The VPN tunnel does not build if the settings do not match.
If a setting does not appear in this list, keep the default value for that setting.
BOVPN Tunnel Settings
Site A Firebox
Public IP address: ______________________________
Private IP address: _____________________________
Site B Firebox
Public IP address: ______________________________
Private IP address: _____________________________
Phase1 Settings
Both Fireboxes must use exactly the same values.
For a BOVPN tunnel between two Fireboxes, we recommend that you select Dead Peer Detection (RFC3706), not IKE Keep-Alive. Do not select both. You should always select Dead Peer Detection if both endpoint devices support it.
Credential method: Select Use Pre-Shared Key.
Pre-shared key: ______________________________
IKE Version: IKEv1 ____ IKEv2 ____
Mode (choose one): Main ____ Aggressive ____
NAT Traversal: Yes ____ No ____
NAT Traversal Keep-alive interval: ________________
IKE Keep-alive: Yes ____ No ____
IKE Keep-alive Message interval: ________________
IKE Keep-alive Max failures: ________________
Dead Peer Detection (RFC3706): Yes ____ No ____
Dead Peer Detection Traffic idle timeout: ________________
Dead Peer Detection Max retries: ________________
Authentication algorithm (choose one): MD5___SHA1____ SHA2-256____SHA2-384____SHA2-512____
We recommend SHA-1 or SHA-2
Encryption algorithm (choose one): DES____ 3DES____ AES-128____ AES-192____ AES-256____ AES-GCM-128____AES-GCM-192____AES-GCM-256
We recommend an AES variant. AES-GCM is supported in Fireware v12.2 or higher. AES-GCM is supported for IKEv2 only.
SA Life ________________
Select Hours as the unit for SA life.
Diffie-Hellman Group (choose one): 1____ 2____ 5____14____15____19____20____
Phase 2 Settings
Both Fireboxes must use exactly the same values.
Perfect Forward Secrecy (Diffie-Hellman Group): Disable____ Group1____ Group2____ Group5____ Group14____ Group15____ Group19____ Group20____
Authentication algorithm (choose one): MD5___SHA1____ SHA2-256____SHA2-384____SHA2-512_____ (We recommend SHA-1 or SHA-2)
Encryption algorithm (choose one): DES____ 3DES____AES-128____ AES-192____ AES-256____ AES-GCM-128____AES-GCM-192____AES-GCM-256
We recommend an AES variant. AES-GCM is supported in Fireware v12.2 or higher. AES-GCM is supported for ESP only.
Force Key Expiration Time (Hours): ________________
Force Key Expiration Traffic (kilobytes): ________________
Example Tunnel Settings
This section has the same fields as the previous section, and includes example settings. These settings correspond to the settings that appear in the images in this example.
Site A Firebox
Public IP address: 203.0.113.2
Private network IP address: 10.0.1.0/24
Site B Firebox
Public IP address: 198.51.100.2
Private network IP address: 10.50.1.0/24
Phase 1 Settings
Both sides must use exactly the same values.
Credential method: Select Use Pre-Shared Key.
Pre-shared key: [Specify a strong key]
Version: IKEv1
Mode: Main
NAT Traversal: Enable
NAT Traversal Keep-alive interval: 20 seconds
IKE Keep-alive: Disable
IKE Keep-alive Message interval: none
IKE Keep-alive Max failures: none
Dead Peer Detection (RFC3706): Enable
Dead Peer Detection Traffic idle timeout: 20 seconds
Dead Peer Detection Max retries: 5
Authentication algorithm: SHA256
Encryption algorithm: AES (256-bit)
SA Life: 24 hours
Diffie-Hellman Group: 14
Phase 2 Settings
Both sides must use exactly the same values.
Perfect Forward Secrecy (Diffie-Hellman Group): 14
Type: ESP
Authentication algorithm: SHA256
Encryption algorithm: AES (256-bit)
The settings in this example are the default Phase 1 and 2 settings in Fireware v12.0 and higher. The default Phase 1 and 2 settings are different in Fireware v11.12.4 and lower. For more information about these settings in Fireware v11.12.4 and lower, see Fireware Help version 11.
Configure Site A
You now use Policy Manager to configure the gateway on the Site A Firebox. A gateway is a connection point for one or more tunnels. To configure a gateway, you must specify:
- Credential method (either pre-shared keys or an IPSec Firebox certificate)
- Location of local and remote gateway endpoints, either by IP address or domain information
- Settings for Phase 1 of the Internet Key Exchange (IKE) negotiation
Add a VPN Gateway
- Select VPN > Branch Office Gateways.
The Gateways dialog box appears. - Click Add.
The New Gateway dialog box appears.

- In the Gateway Name text box, type a name to identify this gateway in Policy Manager.
- In the Credential Method area, select Use Pre-Shared Key. Type the shared key.
The shared key must use only standard ASCII characters. - In the Gateway Endpoints section, click Add.
The New Gateway Endpoints Settings dialog box appears.

- From the External Interface drop-down list, select the interface that has the external (public) IP of the Site A Firebox.
- (Fireware v12.2 or higher) To specify an IP address, in the Interface IP Address drop-down list, select Primary Interface IP Address or select a secondary IP address that is already configured on the selected external interface. Tip!The Interface IP Address is the primary IP address you configured on the selected external interface.
- Select By IP Address and type the primary IP address of the Firebox interface.
In Fireware v12.4 or higher, you must specify an IP address type that matches the Address Family setting you configured earlier. For example, if you specified IPv6 Addresses, you must specify an IPv6 address in the By IP Address text box. - In the Remote Gateway section, select Static IP Address.
- In the adjacent text box, type the external (public) IP address of the Site B Firebox.
- Select By IP Address.
- In the adjacent text box, type the external (public) IP address of the Site B Firebox.
- Click OK.

Configure the Phase 1 Settings
Phase 1 of establishing an IPSec connection is where the two peers make a secure, authenticated channel they can use to communicate. This is known as the ISAKMP Security Association (SA).
- Select the Phase 1 Settings tab.

- From the Mode drop-down list, select Main.
The example uses Main Mode because both endpoints have static IP addresses. If one endpoint has a dynamic IP address, you must use Aggressive mode. - Select NAT Traversal and Dead Peer Detection (RFC3706). These are the recommended settings for a BOVPN tunnel between two Fireboxes.
- In the Transform Settings area, select the default transform and click Edit.

- From the Authentication and Encryption drop-down lists, select your preferred algorithm. In our example, we use SHA256 and AES (256-bit).
- In the SA Life text box, type 24 and select Hours.
- From the Key Group drop-down list, select a Diffie-Hellman group. In our example, we select Diffie-Hellman Group 14.
- Click OK. Leave all other Phase 1 settings with their default values.
- Click OK.
The gateway you added appears in the Gateways list.

- Click Close to close the Gateways dialog box.
Add a VPN Tunnel
After you define gateways, you can make tunnels between them. The process for making a tunnel includes:
- Specify routes (local and remote endpoints for the tunnel)
- Configure Phase 2 of the Internet Key Exchange (IKE) negotiation
From Policy Manager:
- Select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Click Add.
The New Tunnel dialog box appears.

- In the Tunnel Name text box, type a name for the tunnel.
- From the Gateway drop-down list, select the gateway you just created.
- Select the Add this tunnel to the BOVPN-Allow policies check box at the bottom of the dialog box if you want to add the tunnel to the BOVPN-Allow.in and BOVPN-Allow.out policies. These policies allow all traffic that matches the tunnel routes. If you want to restrict traffic through the tunnel, clear this check box and use the BOVPN Policy Wizard to create policies for types of traffic that you want to allow through the tunnel. For more information, see Define Custom Tunnel Policies.
- In the Addresses area, click Add.
The Tunnel Route Settings dialog box appears.

- In the Local and Remote sections, configure one of these options to specify which devices behind the local Firebox can communicate through the tunnel.
- (Fireware v12.3.1 or lower) Type an IPv4 address in the text box.
- (Fireware v12.4 or higher) Type an IPv4 or IPv6 address in the text box.
The IP address you specify must be of the same address family (IPv4 or IPv6) as the gateway. - Click the button adjacent to the Local drop-down list to specify a host IP address, network address, range of host IP addresses, or a host name.
For IPv6, if you select Host Name, your local computer must be able to resolve the host name to an IPv6 address. - (Fireware v12.4 or higher) Select the Any IPv4 or Any IPv6 box to specify a zero route (0.0.0.0/0 or ::/0).
- From the Direction drop-down list, click the tunnel direction. The tunnel direction determines which endpoint of the VPN tunnel can start a VPN connection through the tunnel.
- Click OK.
The tunnel route appears in the Addresses tab of the New Tunnel dialog.

Configure the Phase 2 Settings
Phase 2 settings include settings for a security association (SA), which defines how data packets are secured when they are passed between two endpoints. The SA keeps all information necessary for the Firebox to know what it should do with the traffic between the endpoints.
- From the New Tunnel dialog box, select the Phase 2 Settings tab.

- Select the PFS check box to enable Perfect Forward Secrecy (PFS).
- Select a Diffie-Hellman Group from the drop-down list. In our example, we select Diffie-Helman Group 14.
- The Firebox contains one default proposal, which appears in the IPSec Proposals list. This proposal specifies the ESP data protection method, AES 256-bit encryption, and SHA256 authentication. For this example, we use the default proposal. You can either:
- Use the default proposal.
- Remove the default proposal. Then select a different proposal in the drop-down list and click Add.
- Add an additional proposal, as described in Add a Phase 2 Proposal.
- Click OK to return to the Branch Office IPSec Tunnel dialog box.
The tunnel you added appears on the Branch Office IPSec Tunnels list.

- Click Close and save the changes to the Firebox.
The Firebox at Site A is now configured.
Configure Site B
You now use Policy Manager to configure the gateway at Site B that has an Firebox with Fireware 11.x or higher.
Add a VPN Gateway
- Select VPN > Branch Office Gateways.
The Gateways dialog box appears. - Click Add.
The New Gateway dialog box appears. - In the Gateway Name text box, type a name to identify this gateway in Policy Manager.
- Click the General Settings tab.
- In the Credential Method area, select Use Pre-Shared Key. Type the shared key.
This shared key must use only standard ASCII characters. - In the Gateway Endpoints section, click Add.
The New Gateway Endpoints Settings dialog box appears.

- In the External Interfacedrop-down list, select the interface that has the external (public) IP of the Site B Firebox.
- (Fireware v12.2 or higher) To specify an IP address, in the Interface IP Address drop-down list, select Primary Interface IP Address or select a secondary IP address that is already configured on the selected external interface. Tip!The Interface IP Address is the primary IP address you configured on the selected external interface.
- Select By IP Address and type the primary IP address of the Firebox interface.
In Fireware v12.4 or higher, you must specify an IP address type that matches the Address Family setting you configured earlier. For example, if you specified IPv6 Addresses, you must specify an IPv6 address in the By IP Address text box. - In the Remote Gateway section, select Static IP Address.
- In the adjacent text box, type the external (public) IP address of the Site A Firebox.
- Select By IP Address.
- n the adjacent text box, type the external (public) IP address of the Site A Firebox.
- Click OK.
The gateway pair you defined appears in the list of gateway endpoints.

Configure the Phase 1 Settings
Phase 1 of establishing an IPSec connection is where the two peers make a secure, authenticated channel they can use to communicate. This is known as the ISAKMP Security Association (SA).
- Select the Phase 1 Settings tab.

- From the Mode drop-down list, select Main.
The example uses Main Mode because both endpoints have static IP addresses. If one endpoint has a dynamic IP address, you must use Aggressive mode. - Select NAT Traversal and Dead Peer Detection (RFC3706).
- In the Transform Settings section, select the default transform and click Edit.

- From the Authentication and Encryption drop-down lists, select SHA2-256 and AES (256-bit).
- In the SA Life text box, type 24. In the drop-down list, select Hours.
- In the Key Group drop-down list, select a Diffie-Helman Group. In our example, we select Diffie-Hellman Group 14.
- Click OK. Keep the default values for all other Phase 1 settings.
- Click Close to close the Gateways dialog box.
The gateway you added appears on the Branch Office VPN page in the Gateways list.
Add a VPN Tunnel
After you define gateways, you can make tunnels between them. When you make a tunnel you must specify:
- Routes (local and remote endpoints for the tunnel)
- Settings for Phase 2 of the Internet Key Exchange (IKE) negotiation
To add a VPN tunnel:
- Select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Click Add.
The New Tunnel dialog box appears. - In the Tunnel Name text box, type a name for the tunnel.
- From the Gateway drop-down list, select the gateway you created.
- To add the tunnel to the BOVPN-Allow.in and BOVPN-Allow.out policies, select the Add this tunnel to the BOVPN-Allow policies check box. These policies allow all traffic that matches the tunnel routes. If you want to restrict traffic through the tunnel, clear this check box and use the BOVPN Policy Wizard to create policies for types of traffic that you want to allow through the tunnel.
- In the Addresses area, click Add.
The Tunnel Route Settings dialog box appears.

- In the Local and Remote sections, configure one of these options to specify which devices behind the local Firebox can communicate through the tunnel.
- (Fireware v12.3.1 or lower) Type an IPv4 address in the text box.
- (Fireware v12.4 or higher) Type an IPv4 or IPv6 address in the text box.
The IP address you specify must be of the same address family (IPv4 or IPv6) as the gateway. - Click the button adjacent to the Local drop-down list to specify a host IP address, network address, range of host IP addresses, or a host name.
For IPv6, if you select Host Name, your local computer must be able to resolve the host name to an IPv6 address. - (Fireware v12.4 or higher) Select the Any IPv4 or Any IPv6 box to specify a zero route (0.0.0.0/0 or ::/0).
- Click OK.
The tunnel route appears in the Addresses tab of the New Tunnel dialog.

Configure the Phase 2 Settings
Phase 2 settings include settings for a security association (SA), which defines how data packets are secured when they are passed between two endpoints. The SA keeps all information necessary for the Firebox to know what it should do with the traffic between the endpoints.
- From the New Tunnel dialog box, click the Phase 2 Settings tab.

- Select the PFS check box to enable Perfect Forward Secrecy (PFS).
- If you enable PFS, in the Enable Perfect Forward Secrecy drop-down list, select a Diffie-Hellman group. In our example, we select Diffie-Hellman Group 14.
- The Firebox contains one default proposal, which appears in the IPSec Proposals list. This proposal specifies the ESP data protection method, AES 256-bit encryption, and SHA256 authentication. For this example, we use the default proposal. You can either:
- Use the default proposal.
- Remove the default proposal. Then select a different proposal in the drop-down list and click Add.
- Add an additional proposal, as described in Add a Phase 2 Proposal.
- Click OK to return to the Branch Office IPSec Tunnel dialog box.
The tunnel you added appears on the Branch Office IPSec Tunnels list.

- Click Close and save the changes to your Firebox.
The Firebox at Site B is now configured.
After both ends of the tunnel are configured, the tunnel opens and traffic passes through the tunnel. If the tunnel does not work, examine the log files on both Fireboxes for the time period you tried to start the tunnel. Log messages appear in the log file to indicate where the failure is located in the configuration and which settings might be part of the problem. You can also review the log messages in real-time with Firebox System Manager.
Give Us Feedback ● Get Support ● All Product Documentation ● Technical Search
© 2019 WatchGuard Technologies, Inc. All rights reserved. WatchGuard and the WatchGuard logo are registered trademarks or trademarks of WatchGuard Technologies in the United States and/or other countries. All other tradenames are the property of their respective owners.