IPsec Configuration for BGP

BGP transmits packets in the clear. Therefore for strong security, SonicWALL recommends configuring an IPsec tunnel to use for BGP sessions. The configurations of the IPsec tunnel and of BGP are independent of each other. The IPsec tunnel is configured completely within the VPN configuration section of the SonicOS GUI, while BGP is enabled on the Network > Routing page and then configured on the SonicOS Command Line Interface. When configuring BGP over IPsec, first configure the IPsec tunnel and verify connectivity over the tunnel before configuring BGP.

The following procedure shows a sample IPsec configuration between a SonicWALL and a remote BGP peer, where the SonicWALL is configured for 192.168.168.75/24 on the X0 network and the remote peer is configured for 192.168.168.35/24 on the X0 network.

1
Navigate to the VPN > Settings page and click the Add button under the VPN Policies section. The VPN Policies dialog displays.

2
In the Policy Type drop-down menu, make sure that Site to Site is selected.
3
Select the desired Authentication Method. In this example, we are using IKE using Preshared Secret.
4
Enter a Name for the VPN policy.
5
In the IPsec Primary Gateway Name or Address field, enter the IP address of the remote peer (for this example it is 192.168.168.35).
6
In the IPsec Secondary Gateway Name or Address field, enter 0.0.0.0.
7
Enter a Shared Secret and confirm it.
8
In the Local IKE ID field, enter the IP address of the SonicWall (for this example it is 192.168.168.75)
9
In the Peer IKE ID field, enter the IP address of the remote peer (192.168.168.35).
10
Click on the Network tab.

11
For the local network, select X0 IP from the Choose local network from list drop-down menu.
12
For the remote network, select the remote peer’s IP address from the Choose destination network from list drop-down menu, which is 192.168.168.35 for this example. If the remote IP address is not listed, select Create new address object to create an address object for the IP address.
13
Click on the Proposals tab. You can either use the default IPsec proposals or customize them as you see fit.
14
Click on the Advanced tab.
15
Check the Enable Keep Alive check box.
16

The VPN policy is now configured on the SonicWALL appliance. Now complete the corresponding IPsec configuration on the remote peer. When that is complete, return to the VPN > Settings page and check the Enable check box for the VPN policy to initiate the IPsec tunnel.

Use the ping diagnostic on the SonicWALL to ping the BGP peer IP address and use Wireshark to ensure that the request and response are being encapsulated in ESP packets.

For more detailed information on configuring IPsec, see the VPN chapters in the SonicOS Administrator’s Guide.