IKEv2 VPN between Microsoft Azure and Vigor Router | DrayTek

IKEv2 VPN between Microsoft Azure and Vigor Router

This article introduces how to set up IPsec tunnel between Microsoft Azure Server and Vigor Router in Dynamic Routing mode. The network topology is illustrated below.

network topology
Microsoft Azure Server Setup

1. Create Virtual Networks by clicking Virtual Networks under All services >> NETWORKING, or search virtual networks.

a screenshot of Azure

2. Click Add to create Virtual networks then enter the necessary settings:

  1. Enter Name
  2. Enter Address Space, e.g. 10.0.0.0/16
  3. Select "Create" New for Source Group
  4. Select a Location close to your router
  5. Leave Subnet settings as default (Azure will create the Subnet automatically then)
  6. Click Create
a screenshot of Azure

3. Create Virtual Network Gateways by clicking Virtual network gateways under All services >> NETWORKING.  In this step, Azure will allocate a public IP for VPN service.

4. Click Add to create Virtual network gateway then enter the necessary settings:

  1. Enter Name
  2. Select "VPN" for Gateway type
  3. Select "Route-Based" for VPN type
  4. Select "VpnGw1" for SKU
  5. Select VNet1 for Virtual Network (VNet1 is the virtual network we created in step1)
  6. Select "Create New" for Public IP and enter any IP. (Not sure why Azure requests to enter an IP address)
  7. Click Create
a screenshot of Azure

5. It may take some time for Azure to arrange the public IP for VPN Network Gateway. After it finishes, we will see the public IP on the same page.

6. Create Local Network Gateway on Azure. We need to input Vigor Router’s Internet IP and its local network in this step, and Vigor Router must connect to the Internet directly, cannot behind a NAT device. Click Add to create Local network gateway then enter the necessary settings:

  1. Enter Name
  2. Enter the WAN IP address of Vigor Router at IP Address
  3. Enter the LAN network of Vigor Router at Address space, in this example it's 192.168.8.0/24.
  4. Click "Use Existing" for Resource group and select VNet.
  5. Click Create
a screenshot of Azure

7. Wait for a few minutes, and we will see the Local Network Gateway profile created on the same page. Click Connections for configuring the VPN connection between Azure to Vigor Router.

8. Create VPN connection in Azure and enter the necessary settings:

  1. Enter Name
  2. Connection type is fixed to Site-to-Site (IPsec)
  3. Select Virtual Gateway as the Azure VPN Public IP we created in step 3.
  4. Select Local Network Gateway which is the remote VPN router’s Public IP and network we created in step 5.
  5. Enter Shared Key (PSK)
  6. Select VNet for Resource Group
  7. Click OK
a screenshot of Azure

We’ve finished the VPN configurations on Azure. Next, we will configure VPN profile on Vigor Router.

Vigor VPN Profile Setup

8. Click an index to Edit VPN profile on Vigor Router via VPN and Remote Access >> LAN to LAN. In Common setting field,

  1. Enable this VPN profile
  2. Select the WAN which is configured for creating Azure VPN for Dial-Out Through
  3. Select Dial-Out for Call Direction
  4. Tick to Enable Always On

In Dial-Out setting field,

  1. Tick IPsec Tunnel and select IKEv2
  2. Enter Azure VPN Server’s Public IP address
  3. Enter IKE Pre-Shared Key
  4. Select AES with Authentication for IPsec Security Method
  5. Click Advanced button for configuring Proposal and Key Lifetime settings

In IKE advanced Setting window,

  1. Select AES 256_SHA1_G2 for the phase1 proposal
  2. Change IKE phase2 key lifetime to 3599 seconds
  3. Click OK

Microsoft Azure VPN server supports Diffie-Hellman Group G2 only so it is necessary for Vigor Router to specify the phase 1 proposal to using G2.

See more details for the Azure VPN setups Here.

In TCP/IP Network Settings field,

  1. Enter 10.0.0.0/16 in Remote Network and Mask field (It is Azure’s virtual network)
  2. Enter 192.168.8.0/24 in Local Network and Mask field
  3. Click OK to save the settings

9. After that, VPN connection from Vigor Router to Azure will be up. We may check the VPN connection status via VPN and Remote Access >> Connection Management page.

For verifying if the packet can be passed correctly through the VPN tunnel, we may try to ping the Virtual Server or Virtual machine in the same Azure Virtual Network.

Vigor VPN Profile Setup

8. Create IPsec VPN profile on Vigor3900 to Microsoft Azure.

Open VPN and Remote Access >> VPN profiles >> IPsec page and then click Add. In Basic tab,

  1. Enable this VPN profile
  2. Enable Auto Dial-Out and select Always On
  3. Select the Dial-Out through Interface (It should be the WAN with the IP which is configured in Azure Local Network Gateway)
  4. Input Vigor3900's local IP in local IP /Subnet Mask
  5. Input Azure Gateway IP as the Remote Host IP
  6. Input Azure Virtual Network Address Space as the Remote IP/ Subnet Mask
  7. Select IKEv2 as IKE Protocol. (Azure Dynamic Routing uses IKEv2)
  8. Enter the Pre-Shared Key we configure in Azure

In Advanced tab, configure 3599 sec for IKE Phase2 key lifetime.

In Proposal tab,

  1. Select AES 256_G2 for the IKE Phase1 proposal
  2. Select SHA1 for IKE Phase1 Authentication
  3. Select AES 256 with auth for the IKE Phase2 proposal
  4. Select SHA1 for IKE Phase2 Authentication
  5. Apply the setting

Microsoft Azure VPN server supports Diffie-Hellman Group G2 only and Phase2 Key Lifetime is 27000 seconds so it is necessary for Vigor Router to specify the phase 1 proposal to using G2.

See more details for the Azure VPN setups Here.

9. After that, VPN connection from Vigor Router to Azure will be up. We may check the VPN connection status via VPN and Remote Access >> Connection Management page.

For verifying if the packet can be passed correctly through the VPN tunnel, we may try to ping the Virtual Server or Virtual machine in the same Azure Virtual Network.

Published On: Dec 05, 2018 

Was this helpful?   


book icon

Related Articles