- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
trouble of setting S2S between vMX and Azure VPN Gateway
Good Day. Need your help with below setup...
Solved! Go to solution.
- Labels:
-
3rd Party VPN
-
Azure
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
>Since I had two vMX for each org, I was told to deploy first in AZ1 and second in AZ2 for high availability. if I select NONE
If you found it unreliable and intermittently had to restart the VMXs to get AutoVPN going again - would you call that compromised HA? Because that is what you'll experience if you use availability zones.
Actually, since you have two VMX for each org the static route approach is more complicated. You will have to use this approach:
https://documentation.meraki.com/MX/Other_Topics/Deploying_Highly_Available_vMX_in_Azure
What this does is monitor each VMX and updates the static routes in Azure should one fail. Note that the Meraki instructions and the Azure instructions both contain serious grevious errors, and it is quite difficult getting this approach working if you have not done it before (you need to be able to figure out, correct and work through the documentation errors).
You'll need a supernet static route in Azure pointing to a VMX from each org for the branches that sit behind that VMX.
This is where you add the subnets located in Azure in the VMX (you'll need to do this on all VMXs). You'll also need to add routes here for the branches sitting in the other org.
You are much better off configuring the BGP approach:
https://documentation.meraki.com/MX/Deployment_Guides/vMX_and_Azure_Route_Server
So be warned. This is doable, but it is going to be labour-intensive, complex, and it is going to need a good head when running into documentation errors and figuring out what the correct approach is.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Did you check this thread?
https://community.meraki.com/t5/Security-SD-WAN/Azure-S2S-VPN/m-p/132160#M32990
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks, I will have to check this with cloud team. Currently that VPN GW has already made IPSEC with FW and working fine.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This approach will crash and burn.
Also note that you need to install the VMX in passthorugh mode in Azure for your use case. If it was not in passthrough mode when you deployed it you'll need to delete and re-deploy (the mode can not be changed post deployment).
Also make sure you select "none" for availability zones when deploying to get a public IP address that is allowed to accept inbound traffic (if you select an availability zone all inbound traffic is blocked and you can not change this without deleting and re-deploying).
You can make this work without BGP or IPSec by simply using static routes in Azure, and defining local subnets on the VMX (which say what to route to Azure on the Meraki side).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Philip,
Thanks.
vMX is in passthrough mode.
Since I had two vMX for each org, I was told to deploy first in AZ1 and second in AZ2 for high availability. if I select NONE, wouldn't it compromise the HA? Or given additional vMX it should be OK? BTW both are going to be active active. Also is there any documentation link you could refer to which mentions AZ challenge as you suggest?
Static route configured where? Which instance it should be configured on ? Are you referring to UDR or route table? and I can configure supernet covering all physical branches network or subnet per site under local subnet in vMX to advertise towards Azure side and that will anyways reach to vNET gateway and driven further correct? Because given in passthrough mode, I dont think I can configure any static route on vMX anymore.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
>Since I had two vMX for each org, I was told to deploy first in AZ1 and second in AZ2 for high availability. if I select NONE
If you found it unreliable and intermittently had to restart the VMXs to get AutoVPN going again - would you call that compromised HA? Because that is what you'll experience if you use availability zones.
Actually, since you have two VMX for each org the static route approach is more complicated. You will have to use this approach:
https://documentation.meraki.com/MX/Other_Topics/Deploying_Highly_Available_vMX_in_Azure
What this does is monitor each VMX and updates the static routes in Azure should one fail. Note that the Meraki instructions and the Azure instructions both contain serious grevious errors, and it is quite difficult getting this approach working if you have not done it before (you need to be able to figure out, correct and work through the documentation errors).
You'll need a supernet static route in Azure pointing to a VMX from each org for the branches that sit behind that VMX.
This is where you add the subnets located in Azure in the VMX (you'll need to do this on all VMXs). You'll also need to add routes here for the branches sitting in the other org.
You are much better off configuring the BGP approach:
https://documentation.meraki.com/MX/Deployment_Guides/vMX_and_Azure_Route_Server
So be warned. This is doable, but it is going to be labour-intensive, complex, and it is going to need a good head when running into documentation errors and figuring out what the correct approach is.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Philip thanks for this insight.. helps a lot
. So latest development.
We dropped the plan of s2s peering because of need to setup tunnel from every network to azure peer and not just from hub vMX.
Now I have two org to connect with azure so for first org i enabled vnet peering between vmx vnet and vwan hub... then I added azure routes under local network.
but when I added vMx in hub preference for remote site.. couple routes were shown red and couple were green on remote site.
I was able to ping those routes from vMX but not from remote site.. i think I need to convert vMX into routed mode then also add static routes for local networks and then it should work, what do you think??
For second org, I enabled bgp peering between vMX and vWAN and received all routes and also got propogated to remote site but there was no filteration from azure vwan so received every route. Azure is going to release route map in production soon, hope we receive it on time.
One thing though.. given azure FW is coming in between vWAN hub and vMX.. its public IP is being masked to both instances of vMX under every organization. Is this right, will it affect later?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The VMX should be in concentrator mode, not routed mode, and it should be a hub.
It sounds like AutoVPN had not come up between the VMX and some of its spokes. Is that what you are describing?
Did you definitely select an available zone of none?
Enable manual NAT traversal, it is much more reliable. Note you MUST have selected an availability zone of NONE for this to work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Client is refusing to let me select AZ as NONE. As per him, not selecting AZ for both instances would put them in any single AZ and if that AZ fails - both instance will lost the connectivity. Do you have any CISCO documentation confirming this about selecting NONE AZ or this is your experience based on practical scenarios which is not yet documented in Meraki guide.
I have enabled manual NAT traversal, thanks for that but not sure how remote sites will be able to form Auto VPN tunnel with two vMX who are having same masked IP from Azure FW. I have used different UDP port for each vMX but will it work properly do you think?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Now I see all routes in green on remote end which are advertised on local network of vMX however i am not able to ping those from remote sites. I tried to ping SDWAN VNET GW IP and I receive no response found error which means return traffic to be configured from Azure side ? Azure route table should be useful here correct?
