Procedure
Step 1—Obtain the One-Time Password (OTP)
The one-time password (OTP) and authentication token are required to obtain and validate authentication certificates used by the firewall device and the WSS.
- Log in to the Web Security Service portal
- Browse to Service mode, select Account Maintenance > Integrations
- If you have no API Credentials listed, create one.
- Click " + New Integration"
- Select API Credentials
- A username and password will be generated.
- Define Expiry and Select Access Options.
- Click Save.
- In the browser, enter the API generation string.
https://portal.threatpulse.com/api/locations?name=location_name&type=cert-firewall
Where location_name is the name you assign.
For example:
https://portal.threatpulse.com/api/locations?name=Store103&type=cert-firewall
Creates a new location, Store103, and defines it as a cert-based firewall IPsec connection.
- The Web Security Service generates the OTP.
For example:
{"oneTimePassword":"4d2e183e-1936-4ffc-b298-00ef9529d1d0"}
Record the OTP value for later reference in this prodcedure. You need this string value (without the quotes) when configuring the firewall device below.
Notes:
- The OTP remains valid for one week. After that, you must generate a new one.
- If you call a new API but use the same location, you receive a new OTP; however, a 30-day timer begins. At the end of the 30 days, the WSS revokes the previous certificate.
- Verify that the WSS created the new location
Step 2—Import the root certificates (2048-bit) to your firewall device
Symantec partners with Entrust to provide authentication certificates. You must import the 2048-bit certificate to your
device.
- Obtain the Entrust 2048 and L1C certificates from Entrust.
- In a browser, navigate to: https://www.entrust.com/get-support/ssl-certificate-support/root-certificate-downloads
- Locate the Entrust.net Certificate Authority (2048) certificate identified by the following:
- Thumbprint: 50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31
- Serial Number: 38 63 de f8
- Click Download and open the file in a text editor.
- In the ASDM interface, select Configuration > Device Management, CA Certificates.
- Click Add.
The device displays the Install Certificate dialog.
- Name the Trustpoint.
For example, Entrust2048.
- Copy the Entrust.net Certification Authority (2048) certificate contents from the text file created in substep 1c.
- Select Paste certificate in PEM format and paste in the certificate contents.
- Click Install Certificate.
- Repeat this sub-step and paste in the contents of the Entrust L1C Chain Certificate (SHA2) certificate.
Step 3—Create an Identity Certificate on the Firewall Device
Configure the device to perform a SCEP challenge and pair the identity certificate.
- In your ADSM interface, access the Identity Certificate dialog.
- Name the Trustpoint as BlueCoatIssuingCA.
- Select Add a new identity certificate.
- You can accept the default Key Pair, but it must be 2048 bits.
- Click Advanced.
The device displays the Advanced Options dialog.
- Enable the SCEP enrollment mode.
- Click the Enrollment tab.
- Select Request from a CA.
- In the Enrollment URL (SCEP) field, enter:
bluecoatasweb.managed.entrust.com/scep
-
Set the SCEP challenge password.
-
Click the SCEP Challenge Password tab.
-
In the Password and Confirm Password fields, enter the OTP that you obtained in Step 1.
-
c. Click OK, which returns you to the Add Identity Certificate dialog.
-
Click Install Certificate.
Step 4—Create the site-to-site VPN tunnel
Enable IKE access on the interface that will establish a VPN tunnel to the WSS.
- In the ASDM interface, click Configuration.
- Click Site-to-Site VPN.
- Click Connection Profiles.
- In the Access Interfaces area, select Allow IKE v1 Access for the (outside) interface.
- In the Connections Profile area, click Add.
The device displays the Add IPsec Site-to-Site Connection Profile dialog.
- Select the Peer IP Address: Static option and enter the regional WSS primary IP address for this location. The Connection Name (selected by default) automatically fills in the same information.
- For the Protected Networks: Local Network option, select the originating hosts or subnets that will transmit web traffic through this tunnel.
- The Protected Networks: Remote Network setting depends on the Access Method:
- For stand-alone deployments, select any.
- For deployments, enter the Symantec WSS explicit proxy IP address: 199.19.250.205.
- You can accept the default Group Policy Name, but verify that the Enable IKE v2 option is cleared (the Web Security Service does not support IKEv2 connections for static IP VPN tunnels).
- Select the Device Certificate that you created in Step 3.
- The Encryption Algorithms: IKE Policy option must contain an rsa-sig authentication.
- Enter an Encryption Algorithms: IPSec Proposal.
- From the left-menu, click Crypto Map Entry.
The device displays the Edit IPsec Site-to-Site Connection Profile screen.
- Define the Crypto Map and enable NAT-T.
- Enable the Perfect Forward Secrecy option.
- Enable the NAT-T option.
- Select the Device Certificate that you created in Step 3.
- Click OK.
- Click OK to close the Connection Profile dialog.
Step 5—Create a backup peer
Enable IKE access on the interface that will establish a VPN tunnel to the WSS.
- In the ASDM interface, click Configuration.
- Click Site-to-Site VPN.
- Select Advanced > Crypto Maps.
- Select the Crypto Map that you created in Step 4 and click Edit.
The device displays the Edit IPSec Rule dialog.
- Enter a second WSS data center IP address.
- Click Add to move it to the peer list.
At any time, you can return to this screen and use the Move Up and Down buttons to change the order.
- Click OK.
Step 6—Define NAT rules
Exclude web traffic on ports 80 and 443 from NAT.
- On the ASDM interface, navigate to the NAT Rules page.
- Click Add.
The device displays the Add NAT Rule dialog.
- (Optional) Select a Source Interface.
- For the Source Address, select the host or internal subnet.
- (Optional) Select a Destination Interface.
- From the Destination Address drop-down, select any.
- From the Service drop-down, select HTTP.
Note: If the HTTP and HTTPS service objects have not been created, you must do so in the ASDM interface.
- Verify that the Action: Translated packet / Source Address option is --Original--.
- Select the Disable Proxy ARP on egress interface option.
- Click OK.
- Repeat this step and create a NAT rule for the HTTPS service.