Create a Site-to-Site VPN Between On-Prem Management Center-Managed Threat Defense and Multicloud Defense Gateway
You can create site-to-site IPsec connections between an on-prem management center-managed threat defense and a Multicloud Defense Gateway that complies with all relevant standards. After the VPN connection is established, the hosts behind the firewall can connect to the hosts behind the gateway through the secure VPN tunnel.
Multicloud Defense currently supports Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and Oracle OCI cloud accounts.
Before you begin
Ensure that the following prerequisites are met:
-
The on-prem management center-managed threat defense device must not have any pending changes.
-
The Multicloud Defense Gateway must be in the Active state.
-
The Multicloud Defense Gateway must be VPN enabled. See Enable VPN within the gateway.
-
Read the prerequisites for configuring site-to-site VPN for on-prem management center for more information.
-
Read the Multicloud Defense Gateway prerequisites and limitations for more information.
Procedure
Step 1 | In the left pane, choose . |
Step 2 | Click the create tunnel ( |
Step 3 | In the Peer Devices section, provide the following information: |
Step 4 | In the Tunnel Details section, provide the following information:
|
Step 5 | In the IKE Settings section, click Add IKEv2 Policies to select the policies you want. CDO generates a default Pre-Shared Key for peer 1. This is a secret key string that is configured on the peers. IKE uses this key during the authentication phase. It is used to verify each other when establishing a tunnel between the peers. For more information on the IKE policies, see Configuring the Global IKE Policy |
Step 6 | Click Next. |
Step 7 | In the IPSec Settings section, click Add IKE IPSec Proposals to select the IKE IPSec configuration. The proposals are available depending on the selection that is made in the IKE Settings step. For more information, see Configuring IPSec Proposals. |
Step 8 | Click Next. |
Step 9 | In the Finish section, read the configuration and continue further only if you’re satisfied with your configuration. |
Step 10 | Click Submit. The configurations are pushed automatically to the on-prem management center after clicking Submit. |
What to do next
Ensure you manually deploy these changes to your threat defense devices on your on-prem management center. See Configuration Deployment in the Cisco Secure Firewall Management Center Device Configuration Guide for more information.
) icon on the top right corner and click