Skip to main content
Versa Networks

Configure IPsec Backhaul

Versa-logo-release-icon.pngFor supported software information, click here.

You use IPsec backhaul to create an IPsec tunnel from the SASE gateway to a non-Versa device. Titan Portal then adds the name of the tunnel to the drop-down menus for WAN static IP routes, steering rules, and firewall rules for route-based IPsec profiles. For policy-based and rule-based VPNs, no zone or menu options are available in static, steering, and security rules. Tunnels use preshared key (PSK) authentication and are built using IKEv1, IKEv2, or both IKEv1 or IKEv2. If you configure the tunnel using IKEv1, ensure that the shared key values for the local authentication and peer authentication are the same.

When you configure IPsec route-based profiles, by default, Titan Portal creates a security rule that allows IPsec traffic, and the rule is displayed in the security rule list. For an IPsec profile, the security rule is created with the same name as IPsec route-based profile name. You cannot edit or delete a system-generated default rule for port forwarding or an IPsec profile. However, you can disable or reorder a default rule to change its priority.

To enable routing over an IPsec tunnel, you must also add a static IP route. For more information, see Configure Routing.

To create an IPsec backhaul:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb, and then click Configure to open the site information window.

    configure-menu-home.jpg
  3. Select the IPsec Backhaul tab, and enter information for the following fields.

    ipsec-backhaul-tab.png
     
    Field Description
    Name Enter a name for the IPsec tunnel. Titan Portal adds the tunnel name to the IPsec drop-down menu in the Static IP Route screen.
    Redistribute Click to make the IPsec tunnel eligible for redistribution into the VPN network when the tunnel is used as the next hop for a static route.
    VRF Select the source virtual routing forwarding (VRF) routing instance.
    Peer Type

    Select the format for the peer type value:

    • Fully qualified domain name (FQDN)
    • Hostname
    • IP address
    Peer Type Value Enter the peer value using the format selected in the Peer Type field.
    Local Authentication (Group of Fields) Enter local authentication information.
    • Authentication Type
    Displays the authentication type (PSK).
    • Identity Type

    Enter the format for the identity type value:

    • Email
    • FQDN
    • IP address
    • Identity Type Value
    Enter a value in the format selected in the Identity Type field.
    • Shared Key
    Enter the preshared key.
    Peer Authentication (Group of Fields) Enter peer authentication information.
    • Authentication Type
    Displays the authentication type (PSK).
    • Identity Type

    Enter the format for the identity type value:

    • Email
    • FQDN
    • IP address
    • Identity Type Value
    Enter a value in the format selected in the Identity Type field.
    • Shared Key
    Enter the preshared key.
    IKE Version (Group of Fields)

    Select the IKE version:

    • IKEv1
    • IKEv2
    • IKEv1 or IKEv2
    • Hash Algorithm

    Select the hash algorithms to use:

    • MD5—MD5 Message Digest Algorithm
    • SHA-1—Secure Hash Algorithm 1 with 160-bit digest
    • SHA-256—Secure Hash Algorithm 2 with 256-bit digest
    • SHA-384—Secure Hash Algorithm 2 with 384-bit digest
    • SHA-512—Secure Hash Algorithm 2 with 512-bit digest
    • Encryption

    Select the encryption algorithms to use:

    • 3DES—Triple DES encryption algorithm
    • AES 128—AES CBC Encryption Algorithm with 128-bit key
    • AES 256—AES CBC Encryption Algorithm with 256-bit key
    • DH Group

    Select the Diffie-Hellman group to use:

    • Diffie-Hellman Group none
    • Diffie-Hellman Group 1—768-bit modulus
    • Diffie-Hellman Group 2—1024-bit modulus
    • Diffie-Hellman Group 5—1536-bit modulus
    • Diffie-Hellman Group 14—2048-bit modulus
    • Diffie-Hellman Group 15—3072-bit modulus
    • Diffie-Hellman Group 16—4096-bit modulus
    • Diffie-Hellman Group 19—256-bit elliptic curve
    • Diffie-Hellman Group 20—384-bit elliptic curve
    • Diffie-Hellman Group 21—521-bit elliptic curve
    • Diffie-Hellman Group 25—192-bit elliptic curve
    • Diffie-Hellman Group 26—224-bit elliptic curve
    • IKE Rekey Time

    Enter the time interval for how often to regenerate the IKE key.

    Range: 3600 through 28800 seconds
    Default: 3600 seconds

    IPsec Transforms (Group of Fields) Select the IPsec transform and Diffie-Hellman group.
    • Hash Algorithm

    Select the hash algorithms to use:

    • MD5—MD5 Message Digest Algorithm
    • SHA-1—Secure Hash Algorithm 1 with 160-bit digest
    • SHA-256—Secure Hash Algorithm 2 with 256-bit digest
    • SHA-384—Secure Hash Algorithm 2 with 384-bit digest
    • SHA-512—Secure Hash Algorithm 2 with 512-bit digest
    • XCBC—Extended Cypher Block Chaining
    • Encryption

    Select the encryption algorithm to use:

    • 3DES—Triple DES encryption algorithm
    • AES128—AES CBC encryption algorithm with 128-bit key
    • AES128-CTR—AES counter mode encryption algorithm with 128-bit key
    • AES128-GCM—AES GCM encryption algorithm with 128-bit key
    • AES256—AES CBC encryption algorithm with 256-bit key
    • AES256-GCM—AES GCM encryption algorithm with 128-bit key
    • NULL
    • Perfect Forward Secrecy Group

    Select the Diffie-Hellman groups to use for PFS:

    • Diffie-Hellman Group none
    • Diffie-Hellman Group 1—768-bit modulus
    • Diffie-Hellman Group 2—1024-bit modulus.
    • Diffie-Hellman Group 5—1536-bit modulus
    • Diffie-Hellman Group 14—2048-bit modulus
    • Diffie-Hellman Group 15—3072-bit modulus
    • Diffie-Hellman Group 16—4096-bit modulus
    • Diffie-Hellman Group 19—256-bit elliptic curve
    • Diffie-Hellman Group 20—384-bit elliptic curve
    • Diffie-Hellman Group 21—521-bit elliptic curve
    • Diffie-Hellman Group 25—192-bit elliptic curve
    • Diffie-Hellman Group 26—224-bit elliptic curve
    • IPsec Rekey Time

    Enter the time interval for how often to regenerate the IPsec key.

    Range: 3600 through 28800 seconds
    Default: 3600 seconds

    Tunnel Network (Route-Based Only) (Group of Fields) Configure a route-based tunnel.
    • Tunnel IP Local Address
    Enter the IP address of the local tunnel interface in CIDR format. If you do not specify an address, the IP address is automatically generated.
    • Tunnel IP Remote Address
    Enter the IP address of the remote tunnel interface. If you do not specify an address, the IP address is automatically generated.
    Policy-Based VPN

    Click the Policy-Based VPN toggle to turn on VPN policies configuration options. Then click the rule-icon.png Add Rule icon to add a policy. You can configure a tunnel using either route-based or policy-based options. Note that a route-based VPN needs a static route, but a policy-based VPN does not require one. You can add a static route in a route-based IPsec backhaul profile only for provider organizations.

     

    policy-based-vpn.png

     

    In the Policy-Based VPN popup window, enter information for the following fields.

     

    policy-based-vpn1.png
     

    • Name—Enter a name for the policy.
    • Protocol—Select a protocol:
      • Any
      • ICMP
      • TCP
      • UDP
    • Source IP—Enter the IPv4 source address or prefix.
    • Port—Enter the source port number.
    • Destination IP—Enter the IPv4 destination address or prefix.
    • Port—Enter the destination port number.
    • Click Add.

     

  4. Click the vsa-add-ipsec-profile-icon.png Add IPsec Profile icon. Doing so saves the tunnel to the IPsec VPN screen but not the Titan cloud.

    add-ipsec-profile.png

    To change the IPsec tunnel type from a route-based tunnel to a policy-based tunnel, or vice versa, you must delete the existing IPsec tunnel and then publish the configuration. Then, add the IPsec tunnel with required tunnel type, and publish the configuration again.
     
  5. To display tunnel details, click the eye-icon.png Eye icon.
  6. To edit a tunnel, click the Pencil icon.
  7. To delete a tunnel, click the Trash icon.
  8. Click Save, and then click Publish from the drop-down list.

Supported Software Information

Releases 10.3.4 and later support all content described in this article.

Additional Information

Configure Routing

  • Was this article helpful?