Create a Site-to-Site VPN Tunnel Between Cloud-delivered Firewall Management Center-Managed Threat Defense and Multicloud Defense
You can create site-to-site IPsec connections between a Cloud-delivered Firewall Management Center-managed threat defense and Multicloud Defense from the Security Cloud Control dashboard that complies with all relevant standards. After the VPN connection is established, the hosts behind the firewall can connect to the hosts behind the gateway through the secure VPN tunnel.
Multicloud Defense currently supports Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and Oracle OCI cloud accounts.
Use the following procedure to create a VPN tunnel between a cloud-delivered Firewall Management Center-managed threat defense device and Multicloud Defense from the Security Cloud Control dashboard:
Before you begin
Ensure that the following prerequisites are met:
-
The cloud-delivered Firewall Management Center-managed threat defense device must not have any pending changes.
-
The Multicloud Defense must be onboarded to Security Cloud Control. See Connect Cloud Account.
-
The Multicloud Defense Gateway must be in the Active state.
-
The Multicloud Defense Gateway must be VPN enabled. See Enable VPN within the gateway.
-
Read the Multicloud Defense Gateway prerequisites and limitations for more information.
Procedure
Step 1 | In the navigation pane, choose . |
Step 2 | Click the Create Tunnel ( |
Step 3 | In the Peer Selection area, provide the following information:
|
Step 4 | Click Next. |
Step 5 | In the Peer Details area, provide the following information:
|
Step 6 | Click Next. |
Step 7 | In the Tunnel Details area, provide the following information:
|
Step 8 | Click Next. |
Step 9 | In the IKE Settings area, click Add IKEv2 and add the IKE version for the Internet Key Exchange (IKE) negotiations and specify the privacy configurations. Security Cloud Control generates a default Local Pre-Shared Key. This is a secret key string that is configured on the peers. IKE uses this key during the authentication phase. It is used to verify each other when establishing a tunnel between the peers. |
Step 10 | Click Next. |
Step 11 | In the IPSec Settings area, click Add IKEv2 IPSec Proposals and select the IKE IPSec configuration. The proposals are available depending on the selection that is made in the IKE Settings step. See Configuring IPSec Proposals. |
Step 12 | Click Next. |
Step 13 | In the Finish area, review the configuration and continue further only if you’re satisfied with the configuration. |
Step 14 | Click Submit. The configurations are pushed to the Multicloud Defense Gateway. |
Step 15 | Perform the following steps to deploy the configuration to a cloud-delivered Firewall Management Center-managed threat defense device:
|