With the December 2016 release of the Web Gateway Cloud Service site-to-cloud traffic redirection is now supported. Site-to-Cloud traffic redirection is made possible by using IPSec tunnels. This allows remote offices to securely redirect web traffic to the Web Gateway Cloud Service for filtering and policy enforcement.
Your on-premise firewall or router use policy based routing to send all externally bound web traffic (80, 443) over an IPSec tunnel to the Web Gateway Cloud Service to be filtered according to your organization's web policy.
IMPORTANT: Only externally bound port 80 and 443 traffic should be forwarded over the IPSec tunnel. Any other traffic forwarded may be dropped on the other side of the tunnel.
Below we'll go over the basics of what you'll need in order to get your IPSec tunnel configured. We'll need information about your network like external IPs and internal subnet ranges. This information will be added in ePO Cloud so that the Web Gateway Cloud Service can identify your connections and assign the right policy. Once the Web Gateway Cloud Service is configured we can setup the IPSec tunnel in your on-premise firewall or router. This guide will include basic information to get the IPSec tunnel configured on your device, and vendor specific guides will be posted as they are written.
To configure the Web Gateway Cloud Service, we need your external IPs and your internal subnet ranges. Contact your network team if you have a number of IP ranges your organization owns, or simply ask Google "What is my IP?", if you have a single IP you want to test with.
Now that you have your external IP and internal subnet, we can configure the Web Gateway Cloud Service. We will need to create a site-to-site definition in the authentication settings within ePO Cloud. We will need to give the cloud service four things:
To determine where you'll be redirecting traffic, you first need to find the IPs of the closest Web Gateway Cloud Service points of presence (PoPs) to your location. To find this, perform a DNS lookup using the following commands, and replace XXXXXXXXX with your customer ID. Be sure to perform the nslookups from the environment where the IPSec tunnel will be configured.
This will give you the first and second closest points of presence. Take note of the IPs for later steps.
Once the Web Gateway Cloud Service is configured, it's ready to accept traffic from your network. Now we'll need to configure the on-premise device (firewall or router) to actually perform the traffic redirection. Below are details needed for configuring the IPSec tunnel and not policy based routing.
IMPORTANT: As noted above, policy based routing is not covered below. After configuring the IPSec tunnel, only external bound port 80 and 443 traffic should pass through through the IPSec tunnel. This configuration varies from device to device, but is required for good user experience.
Details about phase 1:
* Represents recommended setting.
* Only supported for IKEv1
Details about phase 2:
* Represents recommended setting.
* Only supported for IKEv1
Repeat the above steps for the 2nd closest PoP that was noted when we determined the closest PoPs.
There is a number of devices that McAfee has configured with the IPSec tunnel to the Web Gateway Cloud Service.
There is also a preliminary but tested configuration for Juniper Netscreen using SSG5 until it is posted you can request from me.
Did you already try to connect a Checkpoint FW to the Web Gateway Cloud Service?
If so will you please share your experiences? Thanks
Frank
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA