You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This updates the Azure instructions to:
- use the Active/Active configuration on the Azure Virtual Gateway
- use bidirectional health checks with a custom target equal to the Customer endpoint
These changes are unlocked by the completion of RM-19633. (The work is done, and shipped, even if the RM is not yet closed)
Copy file name to clipboardExpand all lines: src/content/docs/magic-wan/configuration/manually/third-party/azure.mdx
+33-25Lines changed: 33 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,10 +5,6 @@ title: Microsoft Azure
5
5
6
6
This tutorial provides information on how to connect Cloudflare Magic WAN to your Azure Virtual Network, using the Azure Virtual Network Gateway.
7
7
8
-
:::note
9
-
This configuration guide applies to Azure Virtual Network Gateway in an Active/Standby configuration. Active/Active configuration is not currently supported.
10
-
:::
11
-
12
8
## Prerequisites
13
9
14
10
You will need to have an existing Resource group, Virtual Network, and Virtual Machine created in your Azure account. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/azure/virtual-network/) to learn more on how to create these.
@@ -32,6 +28,20 @@ The Virtual Network Gateway is used to form the tunnel to the devices on your pr
32
28
This configuration guide applies to Azure Virtual Network Gateway which includes the functionality found in the Azure VPN Gateway.
33
29
:::
34
30
31
+
:::note
32
+
Active/Active and Active/Standby configurations are both supported. Two Azure public IP addresses, and two Magic WAN IPsec tunnels, are required for the Active/Active configuration.
33
+
:::
34
+
35
+
#### Active/Active connfiguration
36
+
37
+
1. Create a Virtual Network Gateway.
38
+
2. Create two new public IP addresses or use an existing IPs. Take note of the public IP addresses assigned to the Virtual Network Gateway as these will be the **Customer endpoint** for Magic WAN's IPsec tunnels configuration.
39
+
3. Select the resource group and VNET you have already created.
40
+
4. In **Configuration**, enable **Active-active mode** and disable **Gateway Private IPs**.
41
+
5. Select **Create**.
42
+
43
+
#### Active/Standby connfiguration
44
+
35
45
1. Create a Virtual Network Gateway.
36
46
2. Create a new public IP address or use an existing IP. Take note of the public IP address assigned to the Virtual Network Gateway as this will be the **Customer endpoint** for Magic WAN's IPsec tunnels configuration.
37
47
3. Select the resource group and VNET you have already created.
@@ -53,6 +63,10 @@ We recommend creating a Local Network Gateway for your Cloudflare IPsec tunnel.
53
63
3. In **Address space(s)**, specify the address range of any subnets you wish to access remotely through the Magic WAN connection. For example, if you want to reach a network with an IP range of `192.168.1.0/24`, and this network is connected to your Magic WAN tenant, you would add `192.168.1.0/24` to the local network gateway address space.
54
64
4. Go to the **Advanced** tab > **BGP settings**, and make sure you select **No**.
55
65
66
+
:::note
67
+
A single Cloudflare anycast address must be used in both Active/Active and Active/Standby configurations.
68
+
:::
69
+
56
70
### 4. Configure Local Network Gateway for Magic IPsec tunnel health checks
57
71
58
72
Magic WAN uses [Tunnel Health Checks](/magic-wan/reference/tunnel-health-checks/) to ensure the tunnel is available.
@@ -62,14 +76,14 @@ Tunnel health checks make use of ICMP probes sent from the Cloudflare side of th
62
76
There is an important distinction between how to configure Cloudflare and Azure to support the health checks:
63
77
64
78
- Magic IPsec Tunnel configuration settings requires specifying a discrete IP address (`/31` netmask recommended)
65
-
- Azure Local Network Gateway settings require specifying a subnet (in CIDR notation)
79
+
- Azure Local Network Gateway settings require specifying the Cloudflare Magic WAN Interface Addresss in CIDR notation using a `/32` netmask
66
80
67
81
Cloudflare recommends customers select a unique `/31` subnet ([RFC 1918 - Address Allocation for Private Internets](https://datatracker.ietf.org/doc/html/rfc1918)) for each IPsec tunnel which is treated as a Point-to-Point Link and provides the ideal addressing scheme to satisfy both requirements.
68
82
69
83
Example:
70
84
71
85
```txt
72
-
10.252.3.54/31 - Define as the subnet (in CIDR notation) in Azure Local Network Gateway in the Azure Portal.
86
+
10.252.3.55/32 - Define as the subnet (in CIDR notation) in Azure Local Network Gateway in the Azure Portal.
73
87
10.252.3.55/31 - Define as the discrete IP Address assigned to the Interface Address (VTI - Virtual Tunnel Interface) of the Magic IPsec Tunnel in the Cloudflare Dashboard (see Configure Magic WAN below).
74
88
```
75
89
@@ -85,9 +99,14 @@ To configure the Address Space for the Local Network Gateway to support Tunnel H
85
99
86
100
1. Edit the Local Network Gateway configured in the previous section.
87
101
2. Select **Connections**.
88
-
3. Add the`/31` subnet in CIDR notation (for example, `10.252.3.54/31`) under **Address Space(s)**.
102
+
3. Add the Interface Address of the Magic IPsec Tunnel from the Cloudflare Dashboard in CIDR notation (for example, `10.252.3.55/32`) under **Address Space(s)**.
103
+
4. If using an Active/Active configuration, add the Interface Address of the second Magic IPsec Tunnel from the Cloudflare Dashboard in CIDR notation (for example, `10.252.3.55/32`) under **Address Space(s)**.
89
104
4. Select **Save**.
90
105
106
+
:::note
107
+
The Magic IPsec Tunnel Interface Address should be entered as a `/31` in the Cloudflare Dashboard, but as a `/32` when configuring the Local Network Gateway Address Space(s) in the Azure portal.
108
+
:::
109
+
91
110
### 5. Create an IPsec VPN Connection
92
111
93
112
Choose the following settings when creating your VPN Connection:
@@ -165,10 +184,13 @@ ICMP (ping/traceroute) will work to remote Magic WAN sites, but is not forwarded
165
184
3.**Cloudflare endpoint**: Use the Cloudflare anycast address you have received from your account team. This will also be the IP address corresponding to the Local Network Gateway in Azure. For example, `162.xxx.xxx.xxx`.
166
185
4.**Health check rate**: Leave the default option (Medium) selected.
167
186
5.**Health check type**: Leave the default option (Reply) selected.
@@ -355,20 +377,6 @@ curl --location --request PUT \
355
377
356
378
6. Leave the replay protection setting checked in the Cloudflare dashboard, and wait several minutes before validating connectivity again.
357
379
358
-
## Tunnel health checks and Azure
359
-
360
-
We have identified cases where the IPsec Tunnels configured on the Azure Virtual Network Gateway need to be restarted one time before the tunnel health checks start passing.
361
-
362
-
### Restart Azure tunnels
363
-
364
-
1. Open the Virtual Network Gateway.
365
-
2. Go to **Settings** > **Connections**.
366
-
3. Open the properties of the tunnel.
367
-
4. Go to **Help** > **Reset**.
368
-
5. Select **Reset**.
369
-
370
-
It may take several minutes for the tunnels to reset from the Azure side. Monitor the [tunnel health checks section](/magic-wan/configuration/common-settings/check-tunnel-health-dashboard/) in the Cloudflare dashboard to determine the status.
371
-
372
380
:::note
373
381
Tunnel Health Check percentages are calculated over a one hour period.
0 commit comments