02-12-2018 07:43 AM - edited 03-12-2019 05:00 AM
To who need to configure VPN between ASA and Azure Gateway Cloud, here are commands how to do it on ASA ver 9.8.2
crypto map Outside_map0 1 match address Outside_cryptomap_1
crypto map Outside_map0 1 set pfs group24
crypto map Outside_map0 1 set peer 13.xxxxxxxxxxx
crypto map Outside_map0 1 set ikev2 ipsec-proposal Azure
crypto map Outside_map0 1 set ikev2 pre-shared-key *****
crypto map Outside_map0 1 set security-association lifetime seconds 3600
crypto map Outside_map0 1 set security-association lifetime kilobytes 2048
crypto map Outside_map0 1 set reverse-route
access-list Outside_cryptomap_1 extended permit ip object-group Azure-Exempt object MS_Azure
crypto ipsec ikev2 ipsec-proposal Azure
crypto ipsec profile AzureProfile
crypto ipsec ikev2 ipsec-proposal Azure
protocol esp encryption aes-256
protocol esp integrity sha-384 sha-256 sha-1
crypto ipsec profile AzureProfile
set ikev2 ipsec-proposal Azure
set pfs group24
set security-association lifetime kilobytes 2048
set security-association lifetime seconds 3600
crypto ikev2 enable Outside
On MS side please refer to this guide:
https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-ipsecikepolicy-rm-powershell
05-17-2018 11:51 AM
I have a VPN to Azure as well and wanted to put my config out there with anyone running 9.7 or higher ASA code as policy-based VPN was not working. I couldn't complete Phase1/Phase2, below you will see how I used Route-Based VTI and IKEv2 to get the tunnel up:
interface Tunnel1
nameif VTI_Azure
ip address 169.254.0.1 255.255.255.0
tunnel source interface Outside
tunnel destination 51.XXX.XXX.XX
tunnel mode ipsec ipv4
tunnel protection ipsec profile Azure_profile
route VTI_Azure 10.152.0.0 255.255.0.0 169.254.0.0 1
crypto ipsec ikev2 ipsec-proposal Azure_proposal
protocol esp encryption aes-256
protocol esp integrity sha-256
crypto ipsec profile Azure_profile
set ikev2 ipsec-proposal Azure_proposal
set security-association lifetime kilobytes 2048
set security-association lifetime seconds 3600
crypto ipsec security-association lifetime seconds 3600
crypto ipsec security-association pmtu-aging infinite
crypto ikev2 policy 10
encryption aes-256
integrity sha256
group 2
prf sha
lifetime seconds 28800
crypto ikev2 policy 20
encryption aes-256
integrity sha
group 2
prf sha
lifetime seconds 28800
crypto ikev2 enable Outside
group-policy GroupPolicy_52.XXX.XXX.XX internal
group-policy GroupPolicy_51.XXX.XXX.XX attributes
vpn-tunnel-protocol ikev2
tunnel-group 51.XXX.XXX.XX type ipsec-l2l
tunnel-group 51.XXX.XXX.XX general-attributes
default-group-policy GroupPolicy_51.XXX.XXX.XX
tunnel-group 51.XXX.XXX.XX ipsec-attributes
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
05-25-2018 02:23 PM
02-14-2019 01:16 PM
How did you configure NAT bypass? Did you include VTI interface in that?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide