This article introduces how to set up IPsec tunnel between Microsoft Azure Server and Vigor Router in Dynamic Routing mode. The network topology is illustrated below.
1. Create Virtual Networks by clicking Virtual Networks under All services >> NETWORKING, or search virtual networks.
2. Click Add to create Virtual networks then enter the necessary settings:
3. Create Virtual Network Gateways by clicking Virtual network gateways under All services >> NETWORKING. In this step, Azure will allocate a public IP for VPN service.
4. Click Add to create Virtual network gateway then enter the necessary settings:
5. It may take some time for Azure to arrange the public IP for VPN Network Gateway. After it finishes, we will see the public IP on the same page.
6. Create Local Network Gateway on Azure. We need to input Vigor Router’s Internet IP and its local network in this step, and Vigor Router must connect to the Internet directly, cannot behind a NAT device. Click Add to create Local network gateway then enter the necessary settings:
7. Wait for a few minutes, and we will see the Local Network Gateway profile created on the same page. Click Connections for configuring the VPN connection between Azure to Vigor Router.
8. Create VPN connection in Azure and enter the necessary settings:
We’ve finished the VPN configurations on Azure. Next, we will configure VPN profile on Vigor Router.
8. Click an index to Edit VPN profile on Vigor Router via VPN and Remote Access >> LAN to LAN. In Common setting field,
In Dial-Out setting field,
In IKE advanced Setting window,
Microsoft Azure VPN server supports Diffie-Hellman Group G2 only so it is necessary for Vigor Router to specify the phase 1 proposal to using G2.
See more details for the Azure VPN setups Here.
In TCP/IP Network Settings field,
9. After that, VPN connection from Vigor Router to Azure will be up. We may check the VPN connection status via VPN and Remote Access >> Connection Management page.
For verifying if the packet can be passed correctly through the VPN tunnel, we may try to ping the Virtual Server or Virtual machine in the same Azure Virtual Network.
8. Create IPsec VPN profile on Vigor3900 to Microsoft Azure.
Open VPN and Remote Access >> VPN profiles >> IPsec page and then click Add. In Basic tab,
In Advanced tab, configure 3599 sec for IKE Phase2 key lifetime.
In Proposal tab,
Microsoft Azure VPN server supports Diffie-Hellman Group G2 only and Phase2 Key Lifetime is 27000 seconds so it is necessary for Vigor Router to specify the phase 1 proposal to using G2.
See more details for the Azure VPN setups Here.
9. After that, VPN connection from Vigor Router to Azure will be up. We may check the VPN connection status via VPN and Remote Access >> Connection Management page.
For verifying if the packet can be passed correctly through the VPN tunnel, we may try to ping the Virtual Server or Virtual machine in the same Azure Virtual Network.
Published On: Dec 05, 2018
Was this helpful?