It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure IKEv2 DNS Resolution Settings on SecureEdge

  • Last updated on

The Barracuda SecureEdge Manager allows you to configure IPsec IKEv2 DNS resolution settings. All DNS requests to a DNS server behind the IKEv2 tunnel will come from the SecureEdge appliance you have configured this tunnel on with the IP defined in the field name DNS Routed IP as the source IP. This IP must be allowed in any ACL of the DNS server, and the setup behind the IKEv2 tunnel must be configured to route this IP back over the IKEv2 tunnel. Note the following when using IKEv2 DNS resolution settings:

  • This setting allows you to use DNS servers located behind a static IKEv2 VPN tunnel to resolve DNS requests.

  • For them to work, you must update your SecureEdge appliances to firmware version 10.0.0 or higher.

  • By default, they have no values for your new or existing IPsec tunnels.

  • The IKEv2 DNS resolution IP address can be defined from either a public or private range. You must specify the DNS-routed IP as a single valid IPv4 address.

  • The same DNS-routed IP can be configured on multiple IPsec VPN tunnels.

  • They are configurable on your Sites and Edge services.

  • When you edit an existing static IPsec tunnel with BGP enabled, the existing DNS-routed IP address will be automatically removed and ignored.

Requirements and Limitations

  • When creating general settings for an IPsec tunnel on your SecureEdge appliance, you must disable the Initiates field for your connected Barracuda-hosted Edge Service or Edge Service for vWAN. However, you can enable the Initiates field for your connected Site or Private Edge Service.

Configure IKEv2 DNS Resolution Settings on SecureEdge

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.

  2. In the left menu, click the Tenants/Workspaces icon and select the workspace you want to configure the IPsec IKEv2 tunnel for.

  3. Go to Integration > IPsec VPN.

  4. The IPsec VPN page opens. To add a tunnel, click Add an IPsec Connection.

    add-an-ipsec.png
  5. The Create IPsec Tunnel window opens. In the General tab, specify values for the following:

    • Enable – Click to enable.

    • Initiates – Click to disable. Note: When enabled, this indicates that your SecureEdge device will initiate the IPsec tunnel.

      • In the GENERAL INFORMATION section, specify values for the following: 

        • Name – Enter a unique tunnel name.

        • Description – Enter a brief description.

      • In the AUTHENTICATION section, specify values for the following: 

        • Authentication – Select the authentication method from the drop-down menu.

        • Shared Secret – Enter the shared secret to use a shared passphrase to authenticate.

          general.png

  6. Click Next.

  7. In the Source/Destination tab, specify values for the following:

    • Enable BGP – Click to disable.

    • In the SOURCE section, specify values for the following:

      • Type – Select the type from the drop-down list. You can choose either Edge Service or Site. For example, in this case, select Edge Service.

      • Peer – Select the peer from the drop-down list. E.g.,  Campus, an Edge Service.

      • Local ID – Enter the local ID. E.g., West-Europe-WAN1.

      • DNS Routed IP – Enter the DNS-routed IP of the local side of the tunnel. E.g., 192.168.1.20.

      • Network Addresses – Add the IP address of the local network, and click +. E.g., 192.168.1.0/24.Note: You must enter a valid network address in CIDR format.

        source.png
    • In the DESTINATION section, specify values for the following:

      • Remote Gateway – Enter a remote gateway.

      • Remote ID – Enter a unique ID. VPN tunnels without remote ID will not establish successfully.

      • Network Address – Add the IP address of the remote network, and click +. E.g., 10.14.40.0/24.

        destination.png
  8. Click Next.

  9. In the Phases tab, enter the Phase1 and Phase2 encryption settings:

    • PHASE 1

      • Encryption – Select AES256.

      • Hash – Select SHA256.

      • DH-Group – Select Group 2.

      • Proposal Handling – Select Strict

      • Lifetime – Enter 28800

        phase-1.png
    • PHASE 2

      • Encryption – Select AES256.

      • Hash – Select SHA256.

      • DH-Group – Select Group 2.

      • Proposal Handling – Select Strict

      • Lifetime – Enter 3600

      • Traffic Volume Enabled – Click to disable.

        phase2.png
  10. Click Next.

  11. In the Network tab, specify the values for the following:
    In the NETWORK SETTINGS section, specify the values for the following: 

    • One VPN Tunnel Per Subnet Pair – Click to enable.

    • Universal Traffic Selectors – Click to enable.  

    • Force UDP Encapsulation – Click to enable.  

    • IKE Reauthentication – Click to disable. 

    In the DEAD PEER DETECTION section, specify the values for the following: 

    • Action When Detected – Select Restart.

    • Delay – Enter 30.

      network.png
  12. Click Save.

  13. Verify that your IPsec tunnel configuration has been created successfully and click Finish.

    finish.png

After the configuration is complete, you can see a new IPsec tunnel is shown on the IPsec VPN page, and the status of the field name (e.g., Enabled) can be verified. 

tunnel.png