cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

vMX and Client VPN on Microsoft Azure

Highlighted
Head in the Cloud

vMX and Client VPN on Microsoft Azure

So I'm having som issues with enabling Client VPN on a vMX.

 

I have enabled Client VPN on the vMX, like I've done many time before, double checked users and shared secret but I just can not seem to get the ClientVPN connected.

 

My vMx is deployed and online and all green. However, I'm not able to ping the Public IP, but then again I'm not sure if I'm supposed to be able to ping a Public IP in Azure.

 

I'm testing from my own Mac, and it seems like it can't reach my vMX or the Public IP, which I find odd. I've tried from Home WiFi and Mobile Hotspot.

Log from my Mac:

Spoiler
standard	08:26:41.543802+0100	racoon	plogsetfile: about to add racoon log file: /var/log/racoon.log
standard 08:26:41.548326+0100 racoon accepted connection on vpn control socket.
standard 08:26:41.548367+0100 racoon received bind command on vpn control socket.
standard 08:26:41.549439+0100 racoon New Phase 2
standard 08:26:41.549691+0100 racoon state changed to: IKEv1 quick I start
standard 08:26:41.551206+0100 racoon Connecting.
standard 08:26:41.551662+0100 racoon IPsec-SA request for 52.146.154.95 queued due to no Phase 1 found.
standard 08:26:41.551690+0100 racoon New Phase 1
standard 08:26:41.551717+0100 racoon state changed to: IKEv1 ident I start
standard 08:26:41.552022+0100 racoon initiate new phase 1 negotiation: 192.168.1.53[500]<=>52.146.154.95[500]
standard 08:26:41.552161+0100 racoon begin Identity Protection mode.
standard 08:26:41.552201+0100 racoon IPSec Phase 1 started (Initiated by me).
standard 08:26:41.554889+0100 racoon Resend Phase 1 packet f465dd260cf2a981:0000000000000000
standard 08:26:41.554918+0100 racoon state changed to: IKEv1 ident I msg1 sent
standard 08:26:41.554953+0100 racoon IKE Packet: transmit success. (Initiator, Main-Mode message 1).
standard 08:26:41.554996+0100 racoon >>>>> phase change status = Phase 1 started by us
standard 08:26:42.551901+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:43.651998+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:44.750392+0100 racoon IKE Packet: transmit success. (Phase 1 Retransmit).
standard 08:26:44.750534+0100 racoon Resend Phase 1 packet f465dd260cf2a981:0000000000000000
standard 08:26:44.750612+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:45.849827+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:46.949911+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:47.826864+0100 racoon IKE Packet: transmit success. (Phase 1 Retransmit).
standard 08:26:47.826919+0100 racoon Resend Phase 1 packet f465dd260cf2a981:0000000000000000
standard 08:26:48.049956+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:49.149791+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:50.249824+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:51.116931+0100 racoon IKE Packet: transmit success. (Phase 1 Retransmit).
standard 08:26:51.116967+0100 racoon Resend Phase 1 packet f465dd260cf2a981:0000000000000000
standard 08:26:51.349793+0100 racoon CHKPH1THERE: no established ph1 handler found
standard 08:26:51.561520+0100 racoon vpn_control socket closed by peer.
standard 08:26:51.561544+0100 racoon received disconnect all command.
standard 08:26:51.561578+0100 racoon IPSec disconnecting from server 52.146.154.95
standard 08:26:51.561608+0100 racoon in ike_session_purgephXbydstaddrwop... purging Phase 2 structures
standard 08:26:51.561635+0100 racoon Phase 2 sa expired 192.168.1.53-52.146.154.95
standard 08:26:51.561657+0100 racoon state changed to: Phase 2 expired
standard 08:26:51.561697+0100 racoon in ike_session_purgephXbydstaddrwop... purging Phase 1 and related Phase 2 structures
standard 08:26:51.562447+0100 racoon IPsec-SA needs to be purged: ESP 192.168.1.53[0]->52.146.154.95[0] spi=1224736768(0x49000000)
standard 08:26:51.562503+0100 racoon ISAKMP-SA expired 192.168.1.53[500]-52.146.154.95[500] spi:f465dd260cf2a981:0000000000000000
standard 08:26:51.562527+0100 racoon state changed to: Phase 1 expired
standard 08:26:51.562550+0100 racoon no ph1bind replacement found. NULL ph1.
standard 08:26:51.563059+0100 racoon vpncontrol_close_comm.

From what I see is that the vMX is not even responding. This is also evident from tha fact that there a nothing the the Event Log, about Client VPN establishement.

 

2020-11-20 08_36_10-Event log - Meraki Dashboard – Google Chrome.png

So I think(!) that there is a route missing from the Azure and into my MX, but I have no idea what that should be. My vMX can easily ping out. I can even ping my own public ip address at home.

 

I have created a Route Table, which only contains 1 route, the ClientVPN subnet pointing to the IP address of the vMX

I also have a VNet with the subnet of the vMX and ClientVPN, although I'm not certain this should be neccessary yet. Not untill I need to access services in Azure.

Both the Vnet and RouteTable are in the same Ressource Group as the vMX Managed App.

I did not allow the vMX Managed App to create VNets and Subnets. I did that on my own as well.

 

I've tried setting the ClientVPN on my Mac to both Full Tunnel, and Split Tunne, to no avail.

 

Looking at the NIC for the vMX VM, there are no NSGs applied, so that should be OK. 

2020-11-20 08_42_29-merakivmxNic - Microsoft Azure – Google Chrome.png

 

Any ideas on what I'm doing wrong?

 

12 REPLIES 12
Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

I've also done a traceroute from my own mac. It seems that it ends somewhere in Microsoft Azure

 

rbnielsen@The-Gibson ~ % traceroute 52.146.154.95
traceroute to 52.146.154.95 (52.146.154.95), 64 hops max, 52 byte packets
1 192.168.2.1 (192.168.2.1) 4.767 ms 2.304 ms 2.222 ms
2 192.168.1.1 (192.168.1.1) 3.875 ms 2.720 ms 3.169 ms
3 lo0-0.vsk2nqe30.dk.ip.tdc.net (2.106.92.193) 8.201 ms 8.336 ms 8.652 ms
4 ae2-0.fhnqe11.dk.ip.tdc.net (83.88.16.207) 9.542 ms 8.354 ms 9.115 ms
5 ae1-0.alb2nqp8.dk.ip.tdc.net (83.88.19.119) 22.806 ms 16.014 ms *
6 104.44.37.83 (104.44.37.83) 18.571 ms 16.465 ms 25.737 ms
7 ae24-0.ear01.ham30.ntwk.msn.net (104.44.24.21) 21.265 ms 21.480 ms 22.874 ms
8 be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17) 44.815 ms
be-20-0.ibr01.ham30.ntwk.msn.net (104.44.21.14) 45.915 ms
be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17) 44.947 ms
9 be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131) 45.002 ms 45.383 ms 44.945 ms
10 be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190) 45.524 ms 46.605 ms 45.491 ms
11 be-9-0.ibr02.dub08.ntwk.msn.net (104.44.19.214) 45.360 ms
be-11-0.ibr02.lon24.ntwk.msn.net (104.44.16.2) 45.643 ms
be-9-0.ibr01.lon24.ntwk.msn.net (104.44.18.144) 174.930 ms
12 ae122-0.icr02.dub08.ntwk.msn.net (104.44.11.82) 45.882 ms
be-8-0.ibr02.dub08.ntwk.msn.net (104.44.17.90) 45.684 ms
ae122-0.icr02.dub08.ntwk.msn.net (104.44.11.82) 45.110 ms
13 ae120-0.icr01.dub08.ntwk.msn.net (104.44.11.86) 59.649 ms * *
14 * * *
^C

Highlighted
Kind of a big deal

Re: vMX and Client VPN on Microsoft Azure

You should be able to ping the public IP address of the VMX.

 

I'm guessing the Azure firewall rules are not allowing the traffic.

Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

Do you know where I can edit does Firewall rules? Because I can't see them anywhere. 😕
Highlighted
Kind of a big deal

Re: vMX and Client VPN on Microsoft Azure

Network security group. 

Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

The only place I could choose Network Security Group, as under the Nic, of the Ressource Group, was a created after the managed app.
And in the NSG, there are no rules, whatsoever.
Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

Hm..
Do I need to create a Firewall in Azure, in the same resource group as the vMX?
My vMX cam online and connected to the Dashboard without a Firewall in the first place.
Highlighted
Kind of a big deal

Re: vMX and Client VPN on Microsoft Azure

No.  There will be an existing NSG (network security group) controlling inbound access.  You'll want to add icmp, udp/500 and udp/4500.

Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

I can't find any NSGs.

 

Skærmbillede 2020-11-23 kl. 05.50.41.png

 This is the only place I have, where I can choose Network Security Groups.

Highlighted
Kind of a big deal

Re: vMX and Client VPN on Microsoft Azure

What happens if you edit it?

Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

Not much.

 

Skærmbillede 2020-11-23 kl. 06.50.21.png

Skærmbillede 2020-11-23 kl. 06.50.34.png

 

Now.. This is a test setup, on a "Free Trial Version".

Could it be that I'm not being allowed the full feature set?

Highlighted
Kind of a big deal

Re: vMX and Client VPN on Microsoft Azure

You must need to define the network security group somewhere else then.

 

There are no restrictions on the trial version.

Highlighted
Head in the Cloud

Re: vMX and Client VPN on Microsoft Azure

There really isn't any other place I can define the network security groups.

There's there Resource Group shown above with the VM, Nic, Public IP and Disk, and then there is an RG with the Managed App, VNet and a Routetable.Finally, there is a NetworkWatcherRG in which I can't really do any changes.

 

The 'mrg-cisco-meraki-vmx-XX' is the one that gets created when deploying the Meraki Managed App in Azure, and it seems to be Read Only, so I can't really modify its settings.

Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.