09-13-2024 05:10 AM
good day, in-between TAC support renewal so can't open a case on this , so figured i'd ask of The Community
are there any add'l steps for Azure Gateway-side for traffic-flow thru FTD-based s2s ikev2 tunnel ?
got the Tunnel 'up' but no traffic ....
have seen some few articles commenting on the azure powershell commands needing to get applied in THAT side of the fence.
checking if any recent Azure gateway <-> FTD (via fmc) implementations done successfully recently?
thanks for any feedback / links
Eddie
09-13-2024 05:12 AM
good day, in-between TAC support renewal so can't open a case on this , so figured i'd ask of The Community
are there any add'l steps for Azure Gateway-side for traffic-flow thru FTD-based s2s ikev2 tunnel ?
got the Tunnel 'up' but no traffic ....
have seen some few articles commenting on the azure powershell commands needing to get applied in THAT side of the fence.
checking if any recent Azure gateway <-> FTD (via fmc) implementations done successfully recently?
thanks for any feedback / links
Eddie
09-13-2024 05:27 AM
Tunnel up that excellent
No traffic moslty you need NAT exempt (no-NAT)
And check you select bypass ACP or run ACP allow traffic from IN to OUT and OUT to IN
MHM
09-13-2024 10:46 AM
As other mention' do you use ikev2 policy or route based vpn ?
MHM
09-13-2024 08:15 AM
Also make sure both sides are set for Route based. I have seen this with Azure - manualy go over the VPN configuration in Azure and make sure Route based is in use in Azure or vise-versa.
09-13-2024 10:38 AM - edited 09-13-2024 10:39 AM
Use route-based (VTI) as noted by @buffkata . That way there's no need to mess with NAT or NAT exemption. If the IKEv2 SA is up with a VTI on the FTD side, check the IPsec SAs for encaps and decaps. There we look for rough parity as traffic in means traffic should return. If encaps are not incrementing, make sure the traffic is arriving at the firewall (packet capture) and being send to the tunnel by the config (packet-tracer tool).
Oh - and move to 7.4.2 when you can. 7.3 is a short term release and almost never recommended for use in the long term.
09-13-2024 12:42 PM
ok, thnx for the feedback, did a Route-based VTI method, added a Static Route to the Remote-inside(protected)network segments , to use the VTI interface. and now not even getting the Tunnel to establish , pings / events aren't showing that traffic trying to go thru the Azure-RB-based policy flow (where it WAS during Policy-Based method, at least) . thoughts ? thnx
09-13-2024 11:22 AM
is POLICY-Based / IKE v2 setup , currently . thnx all .
yeah, def considering move to 7.4.2 , once TAC contract back in place and i can get HELP if needed...(as i have the sw already)
09-13-2024 11:33 AM
Show crypto ipsec sa
If the aws selector is 0.0.0.0 and your side selector is x.x.x.x
Then you run policy based and aws use route based vpn
MHM
09-24-2024 02:41 AM
If you could please share your sanitized configs of both sides for review.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide