Network Security
Site-to-Site VPN with OSPF
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Site-to-Site VPN with OSPF
Where Can I Use This? | What Do I Need? |
---|---|
| No license required |
In this example, each site uses OSPF for dynamic
routing of traffic. The tunnel IP address on each VPN peer is statically
assigned and serves as the next hop for routing traffic between
the two sites.

- Configure the Layer 3 interfaces on each firewall.
- Select NetworkInterfacesEthernet and then select the interface you want to configure for VPN.
- Select Layer3 from the Interface Type list.
- On the Config tab, select the Security Zone to which the interface belongs:
- The interface must be accessible from a zone outside of your trust network. Consider creating a dedicated VPN zone for visibility and control over your VPN traffic.
- If you haven’t yet created the zone, select New Zone from the Security Zone list, define a Name for the new zone, and then click OK.
- Select the Virtual Router to use.
- To assign an IP address to the interface, select the IPv4 tab, click Add in the IP section, and enter the IP address and network mask to assign to the interface, for example 192.168.210.26/24.
- To save the interface configuration, click OK.In this example, the configuration for VPN Peer A is:
- Interface—ethernet1/7
- Security Zone—untrust
- Virtual Router—default
- IPv4—100.1.1.1/24
The configuration for VPN Peer B is:- Interface—ethernet1/11
- Security Zone—untrust
- Virtual Router—default
- IPv4—200.1.1.1/24
- Create a tunnel interface and attach it to a virtual router and security zone.
- Select NetworkInterfacesTunnel and click Add.
- In the Interface Name field, specify a numeric suffix, such as, .11.
- On the Config tab, expand Security Zone to define the zone as follows:
- To use your trust zone as the termination point for the tunnel, select the zone.
- (Recommended) To create a separate zone for VPN tunnel termination, click New Zone. In the Zone dialog, define a Name for the new zone (for example, vpn-tun), and then click OK.
- Select the Virtual Router.
- Assign an IP address to the tunnel interface, select the IPv4 or IPv6 tab, click Add in the IP section, and enter the IP address and network mask/prefix to assign to the interface, for example, 172.19.9.2/24.This IP address will be used as the next hop IP address to route traffic to the tunnel and can also be used to monitor the status of the tunnel.
- To save the interface configuration, click OK.In this example, the configuration for VPN Peer A is:
- Interface—tunnel.41
- Security Zone—vpn_tun
- Virtual Router—default
- IPv4—2.1.1.141/24
The configuration for VPN Peer B is:- Interface—tunnel.40
- Security Zone—vpn_tun
- Virtual Router—default
- IPv4—2.1.1.140/24
- Set up the crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase 2).Complete this task on both peers and make sure to set identical values.
- Select NetworkNetwork ProfilesIKE Crypto. In this example, we use the default profile.
- Select NetworkNetwork ProfilesIPSec Crypto. In this example, we use the default profile.
- Set up the OSPF configuration on the virtual router and attach the OSPF areas with the appropriate interfaces on the firewall.For more information on the OSPF options that are available on the firewall, see Configure OSPF.Use Broadcast as the link type when there are more than two OSPF routers that need to exchange routing information.
- Select NetworkVirtual Routers, and select the default router or add a new router.
- Select OSPF (for IPv4) or OSPFv3 (for IPv6) and select Enable.
- In this example, the OSPF configuration for VPN Peer A is:
- Router ID: 192.168.100.141
- Area ID: 0.0.0.0 that is assigned to the tunnel.1 interface with Link type: p2p
- Area ID: 0.0.0.10 that is assigned to the interface Ethernet1/1 and Link Type: Broadcast
The OSPF configuration for VPN Peer B is:- Router ID: 192.168.100.140
- Area ID: 0.0.0.0 that is assigned to the tunnel.1 interface with Link type: p2p
- Area ID: 0.0.0.20 that is assigned to the interface Ethernet1/15 and Link Type: Broadcast
- Set up the IKE Gateway.This example uses static IP addresses for both VPN peers. Typically, the corporate office uses a statically configured IP address, and the branch side can be a dynamic IP address; dynamic IP addresses aren’t best suited for configuring stable services such as VPN.
- Select NetworkNetwork ProfilesIKE Gateway.
- Click Add and configure the options in the General tab.In this example, the configuration for VPN Peer A is:
- Interface—ethernet1/7
- Local IP address—100.1.1.1/24
- Peer IP address—200.1.1.1/24
- Preshared keys—enter a value
The configuration for VPN Peer B is:- Interface—ethernet1/11
- Local IP address—200.1.1.1/24
- Peer IP address—100.1.1.1/24
- Preshared keys—enter same value as on Peer A
- Select the IKE Crypto profile that you created earlier to use for IKE phase 1.
- Set up the IPSec Tunnel.
- Select NetworkIPSec Tunnels.
- Click Add and configure the options in the General tab.In this example, the configuration for VPN Peer A is:
- Tunnel Interface—tunnel.41
- Type—Auto Key
- IKE Gateway—Select the IKE Gateway defined above.
- IPSec Crypto Profile—Select the IKE Gateway defined above.
The configuration for VPN Peer B is:- Tunnel Interface—tunnel.40
- Type—Auto Key
- IKE Gateway—Select the IKE Gateway defined above.
- IPSec Crypto Profile—Select the IKE Gateway defined above.
- Select Show Advanced Options, select Tunnel Monitor, and specify a Destination IP address to ping for verifying connectivity.
- To define the action on failure to establish connectivity, see Define a Tunnel Monitoring Profile.
- Create policy rules to allow traffic between the sites (subnets).
- Select PoliciesSecurity.
- Create rules to allow traffic between the untrust and the vpn-tun zone and the vpn-tun and the untrust zone for traffic originating from specified source and destination IP addresses.
- Verify OSPF adjacencies and routes from the CLI.Verify that both the firewalls can see each other as neighbors with full status. Also confirm that the IP address of the VPN peer’s tunnel interface and the OSPF Router ID. Use the following CLI commands on each VPN peer.
- show routing protocol ospf neighbor
- show routing route type ospf