Skip to main content
1
Configure your VPN gateway to support:
  • IPsec site-to-site tunnels
  • Pre-shared key (PSK) authentication
  • Static routing (dynamic routing is not supported)
  • IKEv1 or IKEv2
2
Configure your firewall and VPN gateway to allow IPsec traffic:
  • Ports: UDP 500 and UDP 4500
3
Use the information provided by QA Wolf to complete your VPN configuration:
  • QA Wolf VPN gateway public IP address(es): Configure these as the remote IPsec peer
  • Pre-shared key (PSK): Set as the tunnel authentication secret
  • Assigned subnet: Add static routes to allow traffic to and from QA Wolf

Compatibility

  • Fully supported: AWS Site-to-Site VPN, Google Cloud VPN, Azure VPN Gateway
  • Supported with configuration: Cisco ASA, Palo Alto, FortiGate
  • Not supported: Dynamic-routing-only VPNs (for example, BGP-only)
If your VPN solution is not listed as fully compatible, contact your QA Wolf engineering lead to confirm interoperability before setup.
Last modified on February 9, 2026