Forcepoint Ipsec Guide: Forcepoint Web Security Cloud
Forcepoint Ipsec Guide: Forcepoint Web Security Cloud
2019
©2019, Forcepoint
All rights reserved.
10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759
This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-
readable form without prior consent in writing from Forcepoint.
Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation
and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint LLC shall not be liable for any error or
for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The
information in this documentation is subject to change without notice.
Trademarks
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.
Forcepoint IPsec connectivity is used to securely forward traffic from your network’s
edge devices to the cloud service over a virtual private network (VPN). This guide
introduces the basics of Forcepoint’s IPsec solution, and provides information on
planning and deploying IPsec in your network.
Benefits
Using IPsec to forward traffic to the cloud service can provide a number of benefits.
These include:
● There is no need to install endpoint software on client machines or deploy browser
configuration PAC files through Group Policy Objects - ideal for BYOD or guest
networks.
● Traffic inside the tunnel can be protected via encryption
● The decryption processing burden is offloaded from end-user devices to the IPsec
tunneling infrastructure
● Your network’s internal IP addresses are available to the cloud service, so:
■ Policies can be created based on internal IP addresses or address ranges
■ Authentication bypass can be set based on IP addresses or address ranges
■ Reports can be created using internal IP addresses to identify individual users.
Supported devices
For the latest list of supported devices for use with the Forcepoint IPsec service, see
the knowledge base article IPsec configuration settings. Only the devices listed have
been tested and verified, but other devices that support Forcepoint’s recommended
configuration settings for IPsec, and can forward port 80 and 443 traffic to the tunnel,
can be used.
Forcepoint recommends using the latest firmware for your device.
Note
For detailed guidance on configuring Forcepoint NGFW,
Cisco, Fortinet, Juniper, and Palo Alto devices for IPsec,
please refer to the following articles in the Forcepoint
Knowledge Base:
● Forcepoint NGFW
● Cisco
● Fortinet
● Juniper
● Palo Alto
You must log in to My Account to access these articles.
Supported standards
Forcepoint Web Security Cloud is compliant with the following drafts of Internet Key
Exchange (IKEv1 and IKEv2):
● IKEv1 – RFC 2409/4109 (November 1998/May 2005), supported for PSK and
certificate authentication.
● IKEv2 – RFC 5996 (September 2010), supported and recommended for PSK
authentication.
This chapter outlines the planning and configuration stages required when deploying
Forcepoint IPsec connectivity.
Capacity planning
Forcepoint IPsec supports up to 20k connections and 200Mbps per tunnel. To scale
beyond this, you will need to split traffic between multiple IPsec tunnels. For
example:
● If your requirement is for 10k connections and 500Mbps, you will need 3 tunnels
● If your requirement is for 35k connections and 25Mbps, you will need 2 tunnels.
Forcepoint strongly recommends configuring your device to fail over to another data
center cluster to achieve geographic redundancy.
Note
Connection redundancy is a requirement for the Forcepoint
Web Security Cloud SLA. Redundancy can be achieved
either by using the IPsec service hostname, or by
configuring redundant connections to multiple data
centers.
For most devices, configure the hostname for the Forcepoint IPsec service as the peer
address for your device:
● vpn.forcepoint.net
(Note that this address is .net, not .com.)
This hostname represents multiple geographical data center locations and therefore
provide inter-cluster redundancy in the case of a loss of connectivity to one location.
However, you may not be able to use the hostname, or you may wish to connect to
specific data center locations. This may be the case if either of the following apply:
● Your device does not support using hostnames as the peer address (for example,
Cisco ASA)
● Your organization is governed by data sovereignty regulations that require you to
connect to data centers in specific locations.
In these cases, you must configure your device to connect to multiple data center
locations, using the appropriate IP addresses.
Hostnames and IP addresses for Forcepoint’s IPsec service are listed in the
Knowledge Base article Hostnames and IP addresses for IPsec connectivity.
To decide which data centers are best for your environment, consider:
● Which data centers are nearest
● Any geographical or data sovereignty concerns around where users browse or
where their reporting data is stored
● The degree of resilience that you want to apply to your deployment.
Note
Failover behavior, particularly cross-data-center failover,
could change an end user’s browsing experience. For
example, some sites may change localization or
presentation between a UK data center and a German data
center (for example, www.google.co.uk might
automatically redirect to www.google.de or
www.google.nl, depending on which data center users’
traffic is directed though).
Bear in mind that inter-data-center failover should be an
exceptional occurrence, so this behaviour might be
acceptable in emergency circumstances.
To determine the nearest data center, you can perform a DNS lookup:
$ nslookup vpn.forcepoint.net
Name: vpn.gns.forcepoint.net
Address: 86.111.223.181
The results of this DNS lookup depend on your DNS configuration, and may not
always return the most appropriate data center. Check the returned location against the
list in the Knowledge Base article Hostnames and IP addresses for IPsec
connectivity. The IP addresses returned may not be the same as those listed in the
article.
Device authentication is required to validate the tunnel at both ends. It verifies that the
device connecting to the Forcepoint cloud service belongs to you, and that the service
your device is connecting to is a Forcepoint IPsec data center.
Forcepoint IPsec supports two device authentication methods:
● X.509 compliant digital certificates
● Pre-shared key (PSK).
Forcepoint recommends using digital certificates for device authentication, however
you can choose which authentication method is right for your organization. The two
authentication methods are compared in the following table.
This section details the end-to-end configuration process for setting up your device for
IPsec connectivity.
First steps
You will need the following information for each edge device:
● The MAC address of the device
● For certificate authentication: download the Forcepoint intermediate CA.
● For PSK device authentication: the external egress IP address of the device that
connects to the cloud service.
If you are a hybrid customer, contact Technical Support to obtain a login to the cloud
portal. See Using IPsec with the hybrid service, page 23.
The configuration process is covered step-by-step in Configuration steps, page 10,
and is shown as a flow chart in Setup process: flow chart, page 13.
See the Knowledge Base article IPsec configuration settings for details of the device
configuration settings that are supported for use with the Forcepoint IPsec service.
The article details our recommended settings, as well as a number of other
configuration options that are also supported.
A configuration checklist is provided for your reference in Configuration checklist,
page 14.
Configuration steps
Important
Ensure you enter the device ID exactly as given. Because
this ID is used to identify traffic from the device to the
cloud service, an invalid device ID can result in the service
failing to recognize traffic from the tunnel. In particular, do
not use the device’s IP address as the device ID. This may
result in the tunnel establishing successfully, but traffic
failing to be recognized.
Note: Palo Alto devices do not accept the tilde (~)
character. For Palo Alto devices, enter the key id as colon-
delimited hexadecimal. See the Palo Alto article in the
Forcepoint Knowledge Base for more information.
■ For all other devices, create a connection profile to connect to the appropriate
Forcepoint IPsec peer hostnames/IP addresses. (See the article Hostnames
and IP addresses for IPsec connectivity.)
4. Define IKE authentication settings on your edge device. For instructions on how
to do this on specific devices, see the following articles in the Forcepoint
Knowledge Base:
■ Forcepoint NGFW
■ Cisco
■ Fortinet
■ Juniper
■ Palo Alto
You must log in to My Account to access these articles.
5. If you used an IP address as the peer address for your tunnel (such as on a Cisco
ASA or Palo Alto device), you must manually configure a second tunnel to a
different data center for redundancy. This is required for the Forcepoint Web
Security Cloud SLA. Repeat steps 3 and 4.
6. If required, configure NAT exemptions to ensure that network address translation
is not applied to traffic from client networks that is to be routed through the
tunnel. (See How do I configure my Cisco device to connect to Forcepoint
IPsec?)
7. Browse to the proxy query URL to make sure that the appropriate policy is being
applied to your tunnel. (Also see Test your policies, page 18.)
The query URL is:
http://query.webdefence.global.blackspider.com/?with=all
Configuration checklist
☐ IP address
Backup tunnel ☐ Yes Required if an IP address is
configured? used as the peer address
NAT-T ☐ Enabled
NAT Keep-alive ☐ Enabled, interval of 10s
DPD ☐ Enabled, 10s timeout
ESP tunnel #1 subnet e.g. 10.12.1.0/24
ESP tunnel #2 subnet
ESP tunnel #3 subnet
ESP tunnel #4 subnet
ESP tunnel #5 subnet
ESP tunnel #6 subnet
ESP tunnel #7 subnet
Once you have completed the setup steps in the preceding section, your next steps are
to:
● Enable notification pages for HTTPS sites (if required)
● Set up end-user authentication (if required)
● Configure browsers for NTLM identification (if required)
● Ensure you have configured policies to manage traffic from your network. See
Forcepoint Web Security Cloud Help - Defining Web Policies for information
on policy configuration.
● Test your policies.
In order for notification pages to be displayed for HTTPS sites - for example, block
pages if the website is in a category that is blocked, or the Pre-logon welcome page for
authentication - you must configure a root certificate on each client machine. This acts
as a Certificate Authority for secure requests to the cloud proxy.
The setting is found on the Web > Block & Notification Pages page, under Settings.
To enable it, mark the checkbox Use certificate to serve notifications for HTTPS
pages.
This page also has a link to download the Forcepoint root certificate, which should be
installed on client machines. For further details, see Forcepoint Web Security Cloud
Help - Configure Block & Notification Pages.
End-user authentication is driven by the setting configured in your Web policy. For
IPsec traffic, the cloud service can perform either NTLM identification or manual
authentication. NTLM identification uses the credentials presented by a user’s
browser, and compares these to the user details you have synchronized with the cloud
service in order to identify the user. Manual authentication requires users to log on
before they can browse, using the email address and password registered with the
cloud service.
The following graphic shows the Access Control tab in the Forcepoint Security
Portal, used to define your authentication settings.
Note
Currently, single sign-on, the endpoint client, and secure
form-based authentication are not supported for use with
Forcepoint IPsec. See Limitations, page 27.
Authentication bypass
Both cloud and hybrid administrators can elect to bypass authentication based on
internal IP addresses, ranges, or subnets. Forcepoint Technical Support must enable
the Internal Bypass Rules for Edge Devices feature for your account. See
Forcepoint Web Security Cloud Help - Bypassing authentication settings for more
information.
NTLM identification also requires that you add the authentication URLs for the
Forcepoint cloud service to your browsers’ local intranet zone.
The following URLs must be trusted:
http://proxy-login.blackspider.com
https://ssl-proxy-login.blackspider.com
For guidance on adding these URLs for various browsers, see the following article in
the Forcepoint Knowledge Base: Configuring browsers for NTLM identification.
A feature is available that allows administrators to generate the device certificate from
within the cloud portal. This can either be done while adding the edge device in the
portal, or later, after the device has been added. To enable this feature, Forcepoint
Technical Support must enable the Device Certificate Generation feature for an
account.
For further information, see Forcepoint Web Security Cloud Help - Generating
device certificates.
To generate a device certificate in the cloud portal, you must have access to the CA’s
private key file and its associated passphrase. The private key file has a name such as
“cakey.pem.” It is either provided with a purchased CA or generated with a self-
signed CA.
For security reasons, the private key data is not saved after the certificate is generated.
This means you must enter the key and passphrase each time you generate a device
certificate for this certificate authority.
Note
Customers using Cisco ISR cannot generate device
certificates within the portal. With ISR, the certificate
signing request (CSR) must be generated on the device and
sent to Forcepoint Technical Support to be signed using
Forcepoint’s certificate authority.
See the Knowledge Base article How do I configure my
Cisco device to connect to Forcepoint IPsec?
This section does not provide a comprehensive tutorial on how to use OpenSSL. It
lists a few points that are relevant to generating your own certificates and CAs. It
assumes that you are familiar with OpenSSL and have a working OpenSSL
installation.
Generating a CA
The following steps are used to generate a CA using OpenSSL. Ensure you have root
permissions on your Linux machine before beginning this process.
1. Create the following directory:
■ /root/ca – to store the openssl.cnf file and run openssl commands
2. Within the /root/ca directory, create the following sub-directories:
■ ca – to store the CA certificate
■ certs – to store the user/identity certificates
■ csr – for certificate signing request
■ private – to store the private key for the CA certificate
3. Copy the file openssl.cnf to the /root/ca directory.
By default, OpenSSL uses the configuration file openssl.cnf for certificate
generation. This configuration file should be available as part of the OpenSSL
installation. A copy of this configuration file can be made and modified to suit the
needs of the organization that generates the certificate.
4. Run the following commands from the /root/ca directory:
touch index.txt
echo 1000 > serial
5. Run the following command from the /root/ca directory to create the Certificate
Authority and private key.
Important
Each device must use its own certificate for IPsec
connectivity. Using the same identity certificate in more
than one device results in an unstable deployment.
Note
Customers using Cisco ISR devices cannot sign their own
certificates. The certificate signing request (CSR) must be
generated on the device and sent to Forcepoint Technical
Support to be signed using Forcepoint’s certificate
authority.
Note
The above command uses the configuration file
openssl.cnf. The default configuration file shipped in most
OpenSSL packages can be used, or you can change the
default parameters in the configuration file to suit your
specific needs.
If you are using Forcepoint Web Security Cloud with the hybrid service, the following
additional steps are required:
● If you do not have a cloud portal account, contact Forcepoint Technical Support to
add your edge device details in the cloud before setting up your device.
● Special Sync Service configuration is required. See IP-based policy enforcement
in hybrid deployments, page 23.
● If you have installed the Forcepoint root certificate and wish to see notification
pages, in the Forcepoint Security Manager, navigate to Web > Settings > Hybrid
Configuration > User Access > HTTPS Notification Pages, and mark the Use
the hybrid SSL certificate... checkbox. This ensures that notification pages (such
as block pages) are displayed for HTTPS requests.
In order to use IP address-based policies for users whose requests go through the
hybrid service, a configuration change is required on the Sync Service machine.
1. Log on to the Sync Service machine with Administrator privileges.
2. Navigate to the Websense\bin directory:
■ Linux:
/opt/Websense/bin
■ Windows:
c:\Program Files\Websense\Web Security\bin
or
c:\Program Files (x86)\Websense\Web Security\bin
3. Open the SyncService.ini file in a text editor.
4. Add the following line under the “SyncServiceHTTPPort” entry:
OptimizePolicyExtract=False
When you are finished, the file will look something like this:
[service]
SyncServiceHTTPAddress = <ip_address>
SyncServiceHTTPPort = 55832
OptimizePolicyExtract=False
5. Save and close the file.
6. Use the Windows Services tool or the /opt/Websense/WebsenseDaemonControl
command to restart Sync Service.
The following items are known limitations of the Forcepoint IPsec solution.
● To support PAC file enforcement, you must use the alternate (port 80/443) PAC
file address. The standard PAC file address (using port 8082/8087) is not
supported.
● Forcepoint Web Security Endpoint is not supported for use with Forcepoint IPsec.
● The service does not support certificate revocation lists for invalid certificates.
● The service does not support self-signed identity certificates.
● Secure form-based authentication is not supported for use with Forcepoint IPsec.
● Using an authentication bypass rule to force NTLM, basic authentication, or the
welcome page does not work with IPsec tunneling if a URL destination is
configured.
● Basic authentication does not work for iTunes with IPsec tunneling.
● Single sign-on using the SAML standard is not supported for use with Forcepoint
IPsec.
● Windows XP support: SSL decryption and scanning of HTTPS traffic for Internet
Explorer on Windows XP is not possible, since it does not support Server Name
Indication (SNI). SNI is required for HTTPS decryption, to extract the destination
hostname and create a decryption certificate.
● Dropbox is not supported for use with the Protected Cloud Apps feature in
Forcepoint Web Security Cloud with IPsec tunneling.
● Forcepoint’s local point of presence (also known as vPoP) IP addresses cannot be
used with IPsec tunneling.
● Some web pages may not load properly in Safari after successful user
authentication. Ensure the Block cookies option is set to Never in Safari’s privacy
preferences.
Forcepoint IPsec has the following requirements for Internet Explorer and Safari:
● Internet Explorer: version 7 and above is required. Versions earlier than this do
not support SNI, which is required by Forcepoint IPsec.
● Safari: if the customer policy has authentication enabled, Safari users must change
the Block cookies setting to Never to ensure web pages load properly:
The following table lists some problems that may be encountered in configuring and
establishing your tunnel, with some suggested actions.
If you continue to have issues after checking all the items above, please contact
Technical Support. To aid troubleshooting, please complete the Configuration
checklist and provide this information to your support representative.
To help diagnose network issues, you can generate a .HAR (HTTP Archive) file to log
your browser’s interaction with a particular website. HAR files can be generated using
Google Chrome’s Developer Tools, as well as other software packages.
For detailed configuration and troubleshooting advice for supported devices, see the
device-specific help articles linked from the article IPsec configuration settings in the
Forcepoint Knowledge Base.