title | description | ms.topic | ms.date |
---|---|---|---|
Create an IPSec tunnel into Azure VMware Solution |
Learn how to create a Virtual WAN hub to establish an IPSec tunnel into Azure VMware Solutions. |
how-to |
10/02/2020 |
In this article, we'll go through the steps to establish a VPN (IPsec IKEv1 and IKEv2) site-to-site tunnel terminating in the Microsoft Azure Virtual WAN hub. We'll create an Azure Virtual WAN hub and a VPN gateway with a public IP address attached to it. Then we'll create an Azure ExpressRoute gateway and establish an Azure VMware Solution endpoint. We'll also go over the details of enabling a policy-based VPN on-premises setup.
The Azure Virtual hub contains the Azure VMware Solution ExpressRoute gateway and the site-to-site VPN gateway. It connects an on-premise VPN device with an Azure VMware Solution endpoint.
To create the site-to-site VPN tunnel, you'll need to create a public-facing IP address terminating on an on-premises VPN device.
-
In the Azure portal, search on Virtual WANS. Select +Add. The Create WAN page opens.
-
Enter the required fields on the Create WAN page and then select Review + Create.
Field Value Subscription Value is pre-populated with the subscription belonging to the resource group. Resource group The Virtual WAN is a global resource and isn't confined to a specific region. Resource group location To create the Virtual WAN hub, you need to set a location for the resource group. Name Type Select Standard, which will allow more than just the VPN gateway traffic. :::image type="content" source="media/create-ipsec-tunnel/create-wan.png" alt-text="Create WAN.":::
-
In the Azure portal, select the Virtual WAN you created in the previous step, select Create virtual hub, enter the required fields, and then select Next: Site to site.
Field Value Region Selecting a region is required from a management perspective. Name Hub private address space Enter the subnet using a /24
(minimum).:::image type="content" source="media/create-ipsec-tunnel/create-virtual-hub.png" alt-text="Create Virtual hub.":::
-
On the Site-to-site tab, define the site-to-site gateway by setting the aggregate throughput from the Gateway scale units drop-down.
[!TIP] One scale unit = 500 Mbps. The scale units are in pairs for redundancy, each supporting 500 Mbps.
-
On the ExpressRoute tab, create an ExpressRoute gateway.
[!TIP] A scale unit value is 2 Gbps.
It takes approximately 30 minutes to create each hub.
-
In Recent resources in the Azure portal, select the virtual WAN you created in the previous section.
-
In the Overview of the virtual hub, select Connectivity > VPN (Site-to-site), and then select Create new VPN site.
:::image type="content" source="media/create-ipsec-tunnel/create-vpn-site-basics.png" alt-text="Create VPN site.":::
-
On the Basics tab, enter the required fields and then select Next : Links.
Field Value Region The same region you specified in the previous section. Name Device vendor Border Gateway Protocol Set to Enable to ensure both Azure VMware Solution and the on-premises servers advertise their routes across the tunnel. If disabled, the subnets that need to be advertised must be manually maintained. If subnets are missed, HCX will fail to form the service mesh. For more information, see About BGP with Azure VPN Gateway. Private address space Enter the on-premises CIDR block. It's used to route all traffic bound for on-premises across the tunnel. The CIDR block is only required if you don't enable BGP. Connect to -
On the Links tab, fill in the required fields and select Review + create. Specifying link and provider names allow you to distinguish between any number of gateways that may eventually be created as part of the hub. BGP and autonomous system number (ASN) must be unique inside your organization.
This section applies only to policy-based VPNs. Policy-based (or static, route-based) VPN setups are driven by on-premise VPN device capabilities in most cases. They require on-premise and Azure VMware Solution networks to be specified. For Azure VMware Solution with an Azure Virtual WAN hub, you can't select any network. Instead, you have to specify all relevant on-premise and Azure VMware Solution Virtual WAN hub ranges. These hub ranges are used to specify the encryption domain of the policy base VPN tunnel on-premise endpoint. The Azure VMware Solution side only requires the policy-based traffic selector indicator to be enabled.
-
In the Azure portal, go to your Virtual WAN hub site; under Connectivity, select VPN (Site to site).
-
Select your VPN site name and then the ellipsis (...) at the far right; then select edit VPN section to this hub.
:::image type="content" source="media/create-ipsec-tunnel/edit-vpn-section-to-this-hub.png" alt-text="Edit VPN section to this hub." lightbox="media/create-ipsec-tunnel/edit-vpn-section-to-this-hub.png":::
-
Edit the connection between the VPN site and the hub, and then select Save.
- Internet Protocol Security (IPSec), select Custom.
- Use policy-based traffic selector, select Enable
- Specify the details for IKE Phase 1 and IKE Phase 2(ipsec).
:::image type="content" source="media/create-ipsec-tunnel/edit-vpn-connection.png" alt-text="Edit VPN section":::
Your traffic selectors or subnets that are part of the policy-based encryption domain should be:
- The virtual WAN hub /24
- The Azure VMware Solution private cloud /22
- The connected Azure virtual network (if present)
-
Check the box next to your VPN site name (see preceding VPN Site to site screenshot) and then select Connect VPN sites. In the Pre-shared key field, enter the key previously defined for the on-premise endpoint. If you don't have a previously defined key, you can leave this field blank and a key will be automatically generated for you.
Only enable Propagate Default Route if you're deploying a firewall in the hub and it is the next hop for connections through that tunnel.
Select Connect. A connection status screen will show the status of the tunnel creation.
-
Go to the Virtual WAN overview. Open the VPN site page and download the VPN configuration file to apply it to the on-premises endpoint.
-
Now we'll patch the Azure VMware Solution ExpressRoute into the Virtual WAN hub. (This step requires first creating your private cloud.)
Go to the Connectivity section of Azure VMware Solution private cloud. On the ExpressRoute tab, select + Request an authorization key. Name it and select Create. (It may take about 30 seconds to create the key.) Copy the ExpressRoute ID and the authorization key.
:::image type="content" source="media/create-ipsec-tunnel/express-route-connectivity.png" alt-text="Copy Express Route ID and authorization key.":::
[!NOTE] The authorization key will disappear after some time, so copy it as soon as it appears.
-
Next, we'll link Azure VMware Solution and the VPN gateway together in the Virtual WAN hub. In the Azure portal, open the Virtual WAN you created earlier. Select the created Virtual WAN hub and then select ExpressRoute in the left pane. Select + Redeem authorization key.
:::image type="content" source="media/create-ipsec-tunnel/redeem-authorization-key.png" alt-text="Redeem authorization key.":::
Paste the authorization key into the Authorization key field and the ExpressRoute ID into the Peer circuit URI field. Make sure to select Automatically associate this ExpressRoute circuit with the hub. Select Add to establish the link.
-
To test your connection, Create an NSX-T segment and provision a VM on the network. Test by pinging both the on-premise and Azure VMware Solution endpoints.