You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn how to configure IPsec/IKE policy for S2S or VNet-to-VNet connections with Azure VPN Gateways using the Azure portal.
4
+
description: Learn how to configure IPsec/IKE custom policy for S2S or VNet-to-VNet connections with Azure VPN Gateways using the Azure portal.
5
5
services: vpn-gateway
6
6
author: cherylmc
7
7
8
8
ms.service: vpn-gateway
9
9
ms.topic: how-to
10
-
ms.date: 01/12/2023
10
+
ms.date: 01/17/2023
11
11
ms.author: cherylmc
12
12
13
13
---
14
-
# Configure IPsec/IKE policy for S2S VPN and VNet-to-VNet connections: Azure portal
14
+
# Configure custom IPsec/IKE connection policies for S2S VPN and VNet-to-VNet: Azure portal
15
15
16
16
This article walks you through the steps to configure IPsec/IKE policy for VPN Gateway Site-to-Site VPN or VNet-to-VNet connections using the Azure portal. The following sections help you create and configure an IPsec/IKE policy, and apply the policy to a new or existing connection.
17
17
18
-
## <aname="about"></a>About IPsec and IKE policy parameters
19
-
20
-
IPsec and IKE protocol standard supports a wide range of cryptographic algorithms in various combinations. Refer to [About cryptographic requirements and Azure VPN gateways](vpn-gateway-about-compliance-crypto.md) to see how this can help ensure cross-premises and VNet-to-VNet connectivity to satisfy your compliance or security requirements.
21
-
22
-
This article provides instructions to create and configure an IPsec/IKE policy, and apply it to a new or existing VPN gateway connection.
23
-
24
-
### Considerations
25
-
26
-
* IPsec/IKE policy only works on the following gateway SKUs:
27
-
****VpnGw1~5 and VpnGw1AZ~5AZ***
28
-
****Standard*** and ***HighPerformance***
29
-
* You can only specify ***one*** policy combination for a given connection.
30
-
* You must specify all algorithms and parameters for both IKE (Main Mode) and IPsec (Quick Mode). Partial policy specification isn't allowed.
31
-
* Consult with your VPN device vendor specifications to ensure the policy is supported on your on-premises VPN devices. S2S or VNet-to-VNet connections can't establish if the policies are incompatible.
32
-
33
18
## <aname ="workflow"></a>Workflow
34
19
35
-
This section outlines the workflow to create and update IPsec/IKE policy on a S2S VPN or VNet-to-VNet connection:
20
+
The instructions in this article help you set up and configure IPsec/IKE policies as shown in the following diagram.
Refer to [RFC3526](https://tools.ietf.org/html/rfc3526) and [RFC5114](https://tools.ietf.org/html/rfc5114) for more details.
65
48
@@ -71,60 +54,56 @@ This section walks you through the steps to create a Site-to-Site VPN connection
71
54
72
55
### Step 1 - Create the virtual network, VPN gateway, and local network gateway for TestVNet1
73
56
74
-
Create the following resources using the following values. For steps, see [Create a Site-to-Site VPN connection](./tutorial-site-to-site-portal.md).
75
-
76
-
**Virtual network**TestVNet1
77
-
78
-
***Resource group:** TestRG1
79
-
***Name:** TestVNet1
80
-
***Region:** (US) East US
81
-
***IPv4 address space:** 10.1.0.0/16
82
-
***Subnet 1 name:** FrontEnd
83
-
***Subnet 1 address range:** 10.1.0.0/24
84
-
***Subnet 2 name:** BackEnd
85
-
***Subnet 2 address range:** 10.1.1.0/24
86
-
87
-
**VPN gateway:**VNet1GW
88
-
89
-
***Name:** VNet1GW
90
-
***Region:** East US
91
-
***Gateway type:** VPN
92
-
***VPN type:** Route-based
93
-
***SKU:** VpnGw2
94
-
***Generation:** Generation 2
95
-
***Virtual network:** VNet1
96
-
***Gateway subnet address range:** 10.1.255.0/27
97
-
***Public IP address type:** Basic or Standard
98
-
***Public IP address:** Create new
99
-
***Public IP address name:** VNet1GWpip
100
-
***Enable active-active mode:** Disabled
101
-
***Configure BGP:** Disabled
57
+
Create the following resources.For steps, see [Create a Site-to-Site VPN connection](./tutorial-site-to-site-portal.md).
58
+
59
+
1. Create the virtual network**TestVNet1** using the following values.
60
+
61
+
***Resource group:** TestRG1
62
+
***Name:** TestVNet1
63
+
***Region:** (US) East US
64
+
***IPv4 address space:** 10.1.0.0/16
65
+
***Subnet 1 name:** FrontEnd
66
+
***Subnet 1 address range:** 10.1.0.0/24
67
+
***Subnet 2 name:** BackEnd
68
+
***Subnet 2 address range:** 10.1.1.0/24
69
+
70
+
1. Create the virtual network gateway**VNet1GW** using the following values.
71
+
72
+
***Name:** VNet1GW
73
+
***Region:** East US
74
+
***Gateway type:** VPN
75
+
***VPN type:** Route-based
76
+
***SKU:** VpnGw2
77
+
***Generation:** Generation 2
78
+
***Virtual network:** VNet1
79
+
***Gateway subnet address range:** 10.1.255.0/27
80
+
***Public IP address type:** Basic or Standard
81
+
***Public IP address:** Create new
82
+
***Public IP address name:** VNet1GWpip
83
+
***Enable active-active mode:** Disabled
84
+
***Configure BGP:** Disabled
102
85
103
86
### Step 2 - Configure the local network gateway and connection resources
104
87
105
-
Create the local network gateway resource.
88
+
1.Create the local network gateway resource**Site6** using the following values.
106
89
107
-
**Local network gateway** Site6
90
+
***Name:** Site6
91
+
***Resource Group:** TestRG1
92
+
***Location:** East US
93
+
***Local gateway IP address:** 5.4.3.2 (example value only - use the IP address of your on-premises device)
94
+
***Address Spaces** 10.61.0.0/16, 10.62.0.0/16 (example value only)
108
95
109
-
***Name:** Site6
110
-
***Resource Group:** TestRG1
111
-
***Location:** East US
112
-
***Local gateway IP address:** 5.4.3.2 (example value only - use the IP address of your on-premises device)
113
-
***Address Spaces** 10.61.0.0/16, 10.62.0.0/16 (example value only)
96
+
1. From the virtual network gateway, add a connection to the local network gateway using the following values.
114
97
115
-
**Connection:** VNet1 to Site6
116
-
117
-
From the virtual network gateway, add a connection to the local network gateway.
118
-
119
-
***Connection name:** VNet1toSite6
120
-
***Connection type:** IPsec
121
-
***Local network gateway:** Site6
122
-
***Shared key:** abc123 (example value - must match the on-premises device key used)
123
-
***IKE protocol:** IKEv2
98
+
***Connection name:** VNet1toSite6
99
+
***Connection type:** IPsec
100
+
***Local network gateway:** Site6
101
+
***Shared key:** abc123 (example value - must match the on-premises device key used)
102
+
***IKE protocol:** IKEv2
124
103
125
104
### Step 3 - Configure a custom IPsec/IKE policy on the S2S VPN connection
126
105
127
-
In this section, configure a custom IPsec/IKE policy with the following algorithms and parameters:
106
+
Configure a custom IPsec/IKE policy with the following algorithms and parameters:
128
107
129
108
* IKE Phase 1: AES256, SHA384, DHGroup24
130
109
* IKE Phase 2(IPsec): AES256, SHA256, PFS None
@@ -144,12 +123,12 @@ In this section, configure a custom IPsec/IKE policy with the following algorith
144
123
145
124
1. Once all the options are selected, select **Save** to commit the changes to the connection resource. The policy will be enforced in about a minute.
146
125
147
-
> [!IMPORTANT]
148
-
>
149
-
> * Once an IPsec/IKE policy is specified on a connection, the Azure VPN gateway will only send or accept the IPsec/IKE proposal with specified cryptographic algorithms and key strengths on that particular connection. Make sure your on-premises VPN device for the connection uses or accepts the exact policy combination, otherwise the S2S VPN tunnel will not establish.
150
-
>
151
-
> ***Policy-based traffic selector** and **DPD timeout** options can be specified with **Default** policy, without the custom IPsec/IKE policy.
152
-
>
126
+
> [!IMPORTANT]
127
+
>
128
+
> * Once an IPsec/IKE policy is specified on a connection, the Azure VPN gateway will only send or accept the IPsec/IKE proposal with specified cryptographic algorithms and key strengths on that particular connection. Make sure your on-premises VPN device for the connection uses or accepts the exact policy combination, otherwise the S2S VPN tunnel will not establish.
129
+
>
130
+
> ***Policy-based traffic selector** and **DPD timeout** options can be specified with **Default** policy, without the custom IPsec/IKE policy.
131
+
>
153
132
154
133
## Create VNet-to-VNet connection with custom policy
0 commit comments