Hey everyone,
Trying to set up a VPN from my MX60 (14.40 firmware) to Azure & AWS, and it seems like I'm hitting every possible roadblock with Azure. Here's a topology of what I'm trying to achieve (don't mind the poor design from a networking n00b):
https://www.lucidchart.com/invitations/accept/4624f655-72b1-49b7-9a97-6ab6254be063
Since MX appliances aren't compatible with Azure Virtual Network Gateways, I basically followed the instruction set here (http://www.ifm.net.nz/cookbooks/meraki-vpn-to-azure.html), and am trying to connect to a StrongSwan instance that's in its own Azure VNet (which is paired with my main Azure VNet) policies.
Support seems to think there's a Phase 1 lifetime mismatch, so I figured I'd post my settings here to see if anyone with a better eye can point out what I might be doing wrong:
Preset Azure IPSec policiesNon-Meraki peer settings
StrongSwan ipsec.conf file:
conn %default
ikelifetime=28800s
rekeymargin=3600s
keyingtries=%forever
keyexchange=ikev1
aggressive=no
authby=psk
dpdaction=restart
dpddelay=30
conn remote-site
left=%defaultroute
leftsubnet=10.1.0.0/24 (Azure's encryption domain)
leftid=**.***.***.*** (StrongSwan VM public IP)
leftfirewall=yes
right=%any
rightsubnet=192.168.1.0/24 (My network's encryption domain)
rightid=***.**.***.** (MX60 public IP)
auto=add
ike=aes256-sha1-modp1024
esp=aes256-sha1
StrongSwan ipsec.secrets file:
%any %any : PSK "presharedkey"
Azure Route table
StrongSwan syslog:
Aug 22 22:31:36 StrongSwan charon: 13[IKE] remote host is behind NAT
Aug 22 22:31:36 StrongSwan charon: 13[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Aug 22 22:31:36 StrongSwan charon: 13[NET] sending packet: from 10.1.0.4[500] to ***.**.***.**[500] (244 bytes)
Aug 22 22:31:36 StrongSwan charon: 05[NET] received packet: from ***.**.***.**[4500] to 10.1.0.4[4500] (76 bytes)
Aug 22 22:31:36 StrongSwan charon: 05[ENC] parsed ID_PROT request 0 [ ID HASH ]
Aug 22 22:31:36 StrongSwan charon: 05[CFG] looking for pre-shared key peer configs matching 10.1.0.4...***.**.***.**[192.168.1.140]
Aug 22 22:31:36 StrongSwan charon: 05[IKE] no peer config found
Aug 22 22:31:36 StrongSwan charon: 05[ENC] generating INFORMATIONAL_V1 request 1626992101 [ HASH N(AUTH_FAILED) ]
Aug 22 22:31:36 StrongSwan charon: 05[NET] sending packet: from 10.1.0.4[4500] to ***.**.***.**[4500] (92 bytes)
Meraki Event log:
Troubleshooting steps taken:
All address spaces have internet access
Port forwarding configured for 4500 and 500
172.16 (AWS VPC), 10.0 (Azure Main VNet), and 10.1 (Azure VPN VNet) can all ping each other and pass all traffic
192.168 (Corporate Network) and 172.16 (AWS VPC) can ping each other and pass all traffic
192.168 can't reach anything in the 10.* space - no ping and not unique traffic
Double-checked ipsec.conf to match MX IPSec policies
Tried different PSKs, including super simple ones
Changed ipsec.conf 'authby' parameter to 'secret'
Rebooted MX and StrongSwan instance
Nothing seems to work. Any idea here?