Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Example: Configure an IPsec VPN Between a vSRX Virtual Firewall and Virtual Network Gateway in Microsoft Azure

date_range 27-May-23

This example shows how to configure an IPsec VPN between a vSRX Virtual Firewall instance and a virtual network gateway in Microsoft Azure.

Before You Begin

Ensure that you have installed and launched a vSRX Virtual Firewall instance in Microsoft Azure virtual network.

See SRX Site-to-Site VPN Configuration Generator and How to troubleshoot a VPN tunnel that is down or not active for additional information.

Overview

You can use an IPsec VPN to secure traffic between two VNETs in Microsoft Azure, with one vSRX Virtual Firewall protecting one VNet and the Azure virtual network gateway protecting the other VNet.

vSRX Virtual Firewall IPsec VPN Configuration

Procedure

Step-by-Step Procedure

To configure IPsec VPN on vSRX Virtual Firewall:

  1. Log in to the vSRX Virtual Firewall in configuration edit mode (see Configure vSRX Using the CLI).

  2. Set the IP addresses for vSRX Virtual Firewall interfaces.

    content_copy zoom_out_map
    set interfaces ge-0/0/0 unit 0 family inet address 10.0.0.10/24 
    set interfaces ge-0/0/1 unit 0 family inet address 10.10.10.10/24 
    set interfaces st0 unit 1 family inet address 10.0.250.10/24 
    
  3. Set up the untrust security zone.

    content_copy zoom_out_map
    set security zones security-zone untrust screen untrust-screen
    set security zones security-zone untrust host-inbound-traffic system-services ike
    set security zones security-zone untrust interfaces ge-0/0/0.0 
    set security zones security-zone untrust interfaces st0.1 
    
  4. Set up the trust security zone.

    content_copy zoom_out_map
    set security zone trust host-inbound-traffic system-services https 
    set security zone trust host-inbound-traffic system-services ssh 
    set security zone trust host-inbound-traffic system-services ping 
    set security security-zone trust interfaces ge-0/0/1.0 
    
  5. Configure IKE.

    content_copy zoom_out_map
    set security ike proposal ike-phase1-proposalA authentication-method pre-shared-keys  
    set security ike proposal ike-phase1-proposalA dh-group group2 
    set security ike proposal ike-phase1-proposalA authentication-algorithm sha-256 
    set security ike proposal ike-phase1-proposalA encryption-algorithm aes-256-cbc  
    set security ike policy ike-phase1-policyA mode main
    set security ike policy ike-phase1-policyA proposals ike-phase1-proposalA
    set security ike policy ike-phase1-policyA pre-shared-key ascii-text <preshared-key>
    set security ike gateway gw-siteB ike-policy ike-phase1-policyA
    set security ike gateway gw-siteB address 52.175.210.65
    set security ike gateway gw-siteB version v2-only
    set security ike gateway gw-siteB external-interface ge-0/0/0.0
    
    Note:

    Be sure to replace 52.175.210.65 in this example with the correct public IP address.

  6. Configure IPsec.

    The following example illustrates a vSRX Virtual Firewall IPsec configuration using the CBC encryption algorithm:

    content_copy zoom_out_map
    set security ipsec proposal ipsec-proposalA protocol esp 
    set security ipsec proposal ipsec-proposalA authentication-algorithm hmac-sha1-96
    set security ipsec proposal ipsec-proposalA encryption-algorithm aes-256-cbc
    set security ipsec proposal ipsec-proposalA lifetime-seconds 7200
    set security ipsec proposal ipsec-proposalA lifetime-kilobytes 102400000
    
    set security ipsec policy ike-phase1-policyA proposals ipsec-proposalA
    set security ipsec vpn ike-vpn-siteB bind-interface st0.1 
    set security ipsec vpn ike-vpn-siteB ike gateway gw-siteB 
    set security ipsec vpn ike-vpn-siteB ike ipsec-policy ike-phase1-policyA 
    set security ipsec vpn ike-vpn-siteB establish-tunnels immediately
    

    If required, you can use AES-GCM as the encryption algorithm in the vSRX Virtual Firewall IPsec configuration instead of CBC:

    content_copy zoom_out_map
    set security ipsec proposal ipsec-proposalA protocol esp 
    set security ipsec proposal ipsec-proposalA encryption-algorithm aes-256-gcm
    set security ipsec proposal ipsec-proposalA lifetime-seconds 7200
    set security ipsec proposal ipsec-proposalA lifetime-kilobytes 102400000
    
    set security ipsec policy ike-phase1-policyA proposals ipsec-proposalA
    set security ipsec vpn ike-vpn-siteB bind-interface st0.1 
    set security ipsec vpn ike-vpn-siteB ike gateway gw-siteB 
    set security ipsec vpn ike-vpn-siteB ike ipsec-policy ike-phase1-policyA 
    set security ipsec vpn ike-vpn-siteB establish-tunnels immediately
    
  7. Configure routing.

    content_copy zoom_out_map
    set routing-instances siteA-vr1 instance-type virtual-router 
    set routing-instances siteA-vr1 interface ge-0/0/0.0 
    set routing-instances siteA-vr1 interface ge-0/0/1.0 
    set routing-instances siteA-vr1 interface st0.1 
    set routing-instances siteA-vr1 routing-options static route 0.0.0.0/0 next-hop 10.0.0.1 
    set routing-instances siteA-vr1 routing-options static route 10.20.20.0/24 next-hop st0.1
    commit
    

Microsoft Azure Virtual Network Gateway Configuration

Procedure

Step-by-Step Procedure

  1. To configure the Microsoft Azure virtual network gateway, refer to the following Microsoft Azure procedure:

    Configure IPsec/IKE policy for S2S VPN or VNet-to-VNet connections

    Ensure the IPSec IKE parameters in Microsoft Azure virtual network gateway match the vSRX Virtual Firewall IPSec IKE parameters when the site-to-site VPN connection is formed.

  2. Verify Active VPN Tunnels.

    Verify that the tunnel is up between the vSRX Virtual Firewall instance and the Azure virtual network gateway.

    content_copy zoom_out_map
    root@> show security ike security-associations
    
    content_copy zoom_out_map
    Index   State  Initiator cookie  Responder cookie  Mode           Remote Address
    8290401 UP     b1adf15fc3dfe0b0  89cc2a12cb7e3cd7  IKEv2          52.175.210.65
    
    content_copy zoom_out_map
    root@> show security ipsec security-associations
    
    content_copy zoom_out_map
    Total active tunnels: 1
      ID    Algorithm       SPI      Life:sec/kb  Mon lsys Port  Gateway
      <131073 ESP:aes-gcm-256/None c0e154e2 5567/  102399997 - root 4500 52.175.210.65
      >131073 ESP:aes-gcm-256/None 383bd606 5567/  102399997 - root 4500 52.175.210.65
    
footer-navigation