03-22-2018 01:21 PM - edited 03-12-2019 05:08 AM
I have a Firepower 2110 being managed by Firepower Management Center (FMC), both in firmware version 6.2.2. I've spent the last couple of days trying to configure a S2S VPN with an Azure "Virtual Network Gateway"to no success.
The available documentation from Microsoft provides support for only the ASA software and I have been unable to translate those instructions to a working tunnel with my FTD device via FMC.
The VPN Log provides the following message:
Message ID: 751022 |
In the VPN configuration for Node A (Local) I have network 10.1.1.0/24 listed as protected. Node B (Azure) I have 10.100.0.0/16 protected.
In Azure I have 10.1.1.0/24 listed as the "Address space". There isn't much more available for configuration. I did use PowerShell to create the Connection and included the "UsePolicyBasedTrafficSelectors $True" option as advised by the Microsoft documentation to allow for policy based option with IKEv2
https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps
Does anyone know of or have had a successful Site 2 Site VPN configuration between an FTD device and the Azure cloud?
Thanks,
Brandon
Solved! Go to Solution.
05-15-2019 12:19 AM
07-13-2020 12:18 PM
Hi, I just finished building site-to-site VPN tunnel between Cisco Firepower FTD controlled by FMC to Microsoft Azure cloud. Relatively easy, but has multiple confusion points. Basically primary confusing point is the fact that for Azure side you are not directly configuring some Phase 1 parameters. Some of phase 1 parameters simply not possible to configure and you have to just follow Microsoft recommendations. Some other phase 1 parameters are presented in format which network person not immediately catch without special attention.
By the way - during my work I also hit issue explained in following article - "Azure VPN with IKEv2 & INITIATOR role" https://community.cisco.com/t5/vpn/azure-vpn-with-ikev2-amp-initiator-role/m-p/3194432#M118371
Since that article doesn't have resolution listed I will point it to this article.
So, back to confusion points:
1. Primary. When on Azure you configuring Virtual Network Subnet and Virtual Network Gateway Subnet Azure VPN automatically adds these two subsets to encrypted domain. So, entire subnet is added no matter if you only wants to include just few hosts. So, on premise side configuration you should add entire subnet as your remote subnet even if for local you can proceed with multiple /32 host records.
2. Phase 1 timer is always 28,800 sec. No option to change it on Azure side.
3. It must be IKEv2 - no option to change this.
4. Other parameters can be changed I believe.
- For example DH group for phase 1 is group 2 by default, but can be changed with DhGroup parameter.
- Phase 1 Encryption I believe AES-256 by default with SHA-1 Integrity, but they can be tuned by IkeEncryption and IkeIntegrity variables.
- SALifeTimeSeconds value is timer for phase 2 Ipsec.
- Don't forget PolicyBasedTrafficSelectors :True
One more thing - Azure gateway not accepting ping, so DPD has to be off. On Cisco side it is configured as disabled keepalive.
Good luck to everyone.
07-23-2020 02:20 AM
Hi, we are trying to setup a Site-to-Site VPN between Azure VPN Gateway & a Cisco Firepower TD.
Although Cisco Firepower isn’t listed as a validated VPN device in the devices list I can’t imagine that it won’t work with Azure.
We asked our partner to setup the VPN, but without success.
I’m a total Firewall/Networking & Firepower noob but I verified the following settings based on the Cisco sample config
At first sight the IPsec/IKE parameters seem to correspond between the onprem FW & Azure VPN Gateway.
In the Cisco sample config they use the AES-GCM-NULL-SHA policy instead of the SHA256_AES256_DH24 policy.
Also the ISAKMP keepalive is enabled while in the sample config it says it should be turned off because not supported by Azure.
Can this be an issue?
Can anyone put me in the right direction to troubleshoot this?
Thanks!
Azure Policy
"UsePolicyBasedTrafficSelectors": true,
"IpsecPolicies": [
{
"SALifeTimeSeconds": 3600,
"SADataSizeKilobytes": 1024000000,
"IpsecEncryption": "AES256",
"IpsecIntegrity": "SHA256",
"IkeEncryption": "AES256",
"IkeIntegrity": "SHA256",
"DhGroup": "DHGroup24",
"PfsGroup": "PFS24"
}
07-23-2020 06:32 AM
07-23-2020 08:42 AM
12-27-2020 08:16 PM
Hi,
I have built the S2S VPN between Cisco FTD 2110 and Azure VNG as per this post, and it did really smooth provided if we had set ikve and ipsec phases correctly. This S2S VPN is created for our development team to have access of non-prod servers and have their work done.
Now i need one more help, since i already have a Remote VPN running since most employees nowadays working from home.
Is there a way wherein, if our system engineer creates a number of user accounts in the non-prod AD server and development team can access these non-prod servers by putting the credentials as they do for connecting remote VPN connection via ANYCONNECT client, so soon as they put the credentials of the non-prod environment the clients detects this and redirects to the non-prod server network.
So is it possible to use the remote vpn anyconnect client to access the site to site vpn tunnel ?
Hope you guys understood..
07-13-2020 01:46 PM
thank you for your willingness to assist.
08-11-2021 12:36 PM
Hello Brandon,
Is the Powershell piece still relevant in 2021?
I'm seeing the UsePolicyBasedTrafficSelectors in the GUI.
08-11-2021 12:38 PM
Needless to say, I'm having an issue connecting a clients Firepower Threat Defense to our Azure Virtual Network Gateway.
Any help would be appreciated.
08-25-2021 01:29 AM
Thank you, It worked.
I managed to fix our VPN with Azure.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide