@ohv_ wrote: can you post your config? I never wasnt able to ping any side. First, you need these: Cloud VM Public IP Cloud VM Private Subnet and Mask Local Subnet and Mask Note that this is not a 100% secure as I am using a dynamic IP (see rightid below) Here's my /etc/ipsec.conf conn %default
ikelifetime=1440m
rekeymargin=3m
keyingtries=%forever
keyexchange=ikev1
authby=secret
dpdaction=restart
dpddelay=30
conn remote-site
left=%defaultroute
leftsubnet=<VM Private Subnet/Mask, ex: 10.137.0.0/16>
leftid=<VM Public IP>
leftfirewall=yes
right=%any
rightsubnet=<Local Subnet/Mask, ex: 192.168.0.0/16>
#rightid=123.123.123.123 <Static IP>
rightid=%any # <Dynamic IP>
auto=add
ike=aes256-sha1-modp1024
esp=aes256-sha1 Then, in /etc/ipsec.secrets : %any %any : PSK "Y0ur5tr0ngP@55w0rd" On the MX side: Public IP : your VM public IP Private Subnets : your VM private subnet/mask, ex: 10.137.0.0/16 Policies : Azure Preshared Secret: Your password entered in ipsec.secrets I didn't have to add any routes or iptables, as Strongswan does it automatically. This way, you can communicate with the VM but not with the private subnet (depends on the provider, DigitalOcean blocks it), BUT the VM can see both my local VLANs and my VoIP phones are working perfectly.
... View more