Configure IPSec from the VeloCloud Orchestrator to a Netskope POP

Configure IPSec from the VeloCloud Orchestrator to a Netskope POP

Configuring Netskope and VeloCloud requires four primary steps to achieve a working configuration. The steps are:

  1. Configure Tunnel credentials in the Netskope tenant.
  2. Configure an NSD tunnel from a gateway on the VeloCloud Orchestrator.
  3. Verify connectivity.
  4. Test Security policies in the Netskope UI.

Configure Tunnel Credentials in the Netskope UI

To create the IPSec VPN tunnels for the VeloCloud Orchestrator in the Netskope UI, see Creating an IPSec Site.

Configure an NSD Tunnel from a Gateway on the VeloCloud Orchestrator

  1. Log in to the VeloCloud Orchestrator and verify that your VeloCloud Edge Appliance is online.
    image5.jpg
  2. Configure the Velocloud Non-SD-WAN Tunnel via the Gateway. Go to Configure > Network Services > Non SD-WAN Destinations via Gateway. Click New and then enter and select the initial parameters:
    • Tunnel Name: Enter a name that makes sense to your topology.
    • Type: Select Generic IKEv2 Router (Route Based VPN) from the dropdown list.
      Velocloud2.png
    • Public IP: Enter the Primary Netskope POP IP address for the Primary Gateway, and the Failover POP IP address for the Secondary Gateway.
  3. Click Next and wait for the new tunnel to be created.
  4. Enter and select these parameters:
    image9.jpg
    • Local Auth ID: Select FQDN from the dropdown list and enter your unique customer ID URL.
    • Site Subnets: Disable Site Subnets by selecting the checkbox.
    • Redundant VeloCloud Cloud VPN: Enable this checkbox, which establishes the IPSEC tunnels from both the Primary and Secondary Velocloud Gateways.
  5. Click Advanced to access the fields to set the pre-shared key, encryption, and needed for the tunnel to authenticate and establish.

    Enter and select these parameters:

    Velocloud4.png
    • Enable Tunnel(s): Enable the checkbox.
    • PSK: Enter the pre-shared key used in the Netskope configuration.
    • Encryption: Select AES 128 from the dropdown list.
  6. Click Save Changes. Once saved, confirm the tunnel settings are reflected in the VCO dashboard.
    Velocloud5.png
  7. Configure the Profile to use the newly created NSD Tunnel via Gateway. Go to Configure > Profiles and select Quick Start Profile. Alternatively, select New Profile and provide a name and (optionally) a description.
    Velocloud6.png

    When finished, click Create.

  8. In the new or Quick Start profile, toggle Cloud VPN to ON and enable the newly created Tunnel.
    Velocloud7.png
  9. Create a Business Policy to send the intended traffic over this NSD tunnel to Netskope for inspection. Select the Business Policy tab.
    Velocloud8.png
  10. Click New Rule.
    Velocloud9.png
  11. For Match, select these parameters:
    • Source: Select Any.
    • Destination: Select Define… and then Internet.
    • Application: Select Define… and then Web and All Web.
    image23.png

    Click OK.

    In the above policy, Velocloud is only redirecting Internet destined HTTP/HTTPS traffic to the Netskope POP using the IPSec tunnel.

    The newly created policy is installed at the top and will be inspected first .

    image24.jpg

Verify Connectivity

The required configuration on the VeloCloud Orchestrator is complete and the tunnel should be online. Verify connectivity between the VC Gateway and the Netskope Security Cloud.

In VeloCloud Orchestrator, go to Monitor > Network Services.

image25.jpg

You should see that the IPSEC tunnels to both the Primary and Secondary Netskope POPs are connected successfully, the status shows connected (green dot) with the primary tunnel in use and being green, while the redundant tunnel is offline but available.

Test Security Policies in the Netskope UI

  1. Go back to the Netskope UI to configure some Security policies for testing purposes. Go to Policies > Real-time Protection. Configure a policy to block all gambling-related web sites. Enter and select these parameters:
    • Users: Select All Users and click Next.
    • Cloud Apps and Web: Select Category and start typing Gambling in the Search field. When Gambling appears, select that option, and then click Next.
    • DLP/Threat Protection: Select None and click Next.
    • Select Activities: Click Select Activities, select Browse, and click Save. Click Next.
      image26.jpg
    • Additional Attributes: Click Access Method, select IPSec, and click Save. Click User Type, select User, and click Save. Click Next.
    • Action: Select Block from the Action dropdown list, and then select a Block Template. Click Next.
    • Notification: Select None and click Next.
    • Set Policy: Enter a policy name, like Block Gambling Sites, and click Save.
      image27.jpg

    When finished, click Save.

  2. Go to Policies > Real-time Protection. Click Apply Changes. At this point, the policy has been applied and there are currently 0 Hits.
    image28.jpg
  3. Log in to a Windows-based Client on the LAN network of the Edge for this Customer. Try to browse to a Gambling-based site.
    image29.png

    This action is being blocked per the Real-time Protection policy created in the Netskope UI.

    Note that the hit count in the Real-time Protection policy violation hits.

    image30.jpg

    Also, you can go to Skope IT in the UI and see this activity in the Page Events.

    image31.jpg
  4. Finally, to verify from the VeloCloud that the traffic is indeed hitting the NSD Tunnel via Gateway, check the flows.
    image32.png

    Note that the traffic destined to the URL in question (http://www.bet365.com) is indeed going via Internet Backhaul and hitting the Netskope POP.

Share this Doc

Configure IPSec from the VeloCloud Orchestrator to a Netskope POP

Or copy link

In this topic ...