Hey everyone, Trying to set up a VPN from my MX60 (14.40 firmware) to Azure & AWS, and it seems like I'm hitting every possible roadblock with Azure. Here's a topology of what I'm trying to achieve (don't mind the poor design from a networking n00b): https://www.lucidchart.com/invitations/accept/4624f655-72b1-49b7-9a97-6ab6254be063 Since MX appliances aren't compatible with Azure Virtual Network Gateways, I basically followed the instruction set here (http://www.ifm.net.nz/cookbooks/meraki-vpn-to-azure.html), and am trying to connect to a StrongSwan instance that's in its own Azure VNet (which is paired with my main Azure VNet) policies. Support seems to think there's a Phase 1 lifetime mismatch, so I figured I'd post my settings here to see if anyone with a better eye can point out what I might be doing wrong: Preset Azure IPSec policies Non-Meraki peer settings StrongSwan ipsec.conf file: conn %default ikelifetime=28800s rekeymargin=3600s keyingtries=%forever keyexchange=ikev1 aggressive=no authby=psk dpdaction=restart dpddelay=30 conn remote-site left=%defaultroute leftsubnet=10.1.0.0/24 (Azure's encryption domain) leftid=**.***.***.*** (StrongSwan VM public IP) leftfirewall=yes right=%any rightsubnet=192.168.1.0/24 (My network's encryption domain) rightid=***.**.***.** (MX60 public IP) auto=add ike=aes256-sha1-modp1024 esp=aes256-sha1 StrongSwan ipsec.secrets file: %any %any : PSK "presharedkey" Azure Route table StrongSwan syslog: Aug 22 22:31:36 StrongSwan charon: 13[IKE] remote host is behind NAT Aug 22 22:31:36 StrongSwan charon: 13[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ] Aug 22 22:31:36 StrongSwan charon: 13[NET] sending packet: from 10.1.0.4[500] to ***.**.***.**[500] (244 bytes) Aug 22 22:31:36 StrongSwan charon: 05[NET] received packet: from ***.**.***.**[4500] to 10.1.0.4[4500] (76 bytes) Aug 22 22:31:36 StrongSwan charon: 05[ENC] parsed ID_PROT request 0 [ ID HASH ] Aug 22 22:31:36 StrongSwan charon: 05[CFG] looking for pre-shared key peer configs matching 10.1.0.4...***.**.***.**[192.168.1.140] Aug 22 22:31:36 StrongSwan charon: 05[IKE] no peer config found Aug 22 22:31:36 StrongSwan charon: 05[ENC] generating INFORMATIONAL_V1 request 1626992101 [ HASH N(AUTH_FAILED) ] Aug 22 22:31:36 StrongSwan charon: 05[NET] sending packet: from 10.1.0.4[4500] to ***.**.***.**[4500] (92 bytes) Meraki Event log: Troubleshooting steps taken: All address spaces have internet access Port forwarding configured for 4500 and 500 172.16 (AWS VPC), 10.0 (Azure Main VNet), and 10.1 (Azure VPN VNet) can all ping each other and pass all traffic 192.168 (Corporate Network) and 172.16 (AWS VPC) can ping each other and pass all traffic 192.168 can't reach anything in the 10.* space - no ping and not unique traffic Double-checked ipsec.conf to match MX IPSec policies Tried different PSKs, including super simple ones Changed ipsec.conf 'authby' parameter to 'secret' Rebooted MX and StrongSwan instance Nothing seems to work. Any idea here?
... View more