Answered by:
VPN question with azure new Virtual network feature

Question
-
I'm trying out the new VPN feature and connect it to our on site VPN device. The device is a WatchGuard X500 and we already have a few VPN connections to our other sites. Here is my question:
I configure the gateway (phase1) and the tunnel (phase2) and put in the Azure generated shared key. All looks good but then i get the following error:
2012-06-08 12:59:48 iked Process 5/6 Msg : failed to process ID payload 4 Debug 2012-06-08 12:59:48 iked Cannot process MM ID payload from 157.55.196.151:1032 to 66.60.177.226 cookies i=a37acb38 685bc580 r=f7bf3274 3f7c6ed1 msg_id="0203-5029" Debug 2012-06-08 12:59:49 iked Received fifth message with policy [gateway.azure] from 157.55.196.151:1032 main mode msg_id="0203-5025" Debug 2012-06-08 12:59:49 iked Searching ID: IP address - policy [gateway.azure] peerId [192.168.4.5] msg_id="0203-4011"
Since we are not using a Cisco or Juniper device i'm having issues trying to configure our router to accept the connection. Plus the network on our Azure VPN is 192.168.4.0/24 so i'm not sure where it is getting the 192.168.4.5 IP address from??
What settings should i configure each phase for on our side when trying to connect to Azure VPN? Thanks!
Debug Friday, June 8, 2012 7:37 PM
Answers
-
Hi, EDRandD:
Azure supports the following crypto settings for Phase 2 negotiation:
Authentication/Hashing: hmac-sha1
Encryption: AES128 or 3DES
We recommend a lifetime of 3600 seconds and a lifetime-size of 10240000 KB or more.
Based on the error message, your P2 negotiation failed on the first message at the responder side. That seems to indicate either the responder (i.e. your WatchGuard device) does not like the cryptographic transforms specified by the Azure gateway or it does not recognize the traffic selectors (basically the subnet ranges on both sides) specified in the first message. Please double-check and make sure these parameters are properly specified in your configuration for the WatchGuard device.
I assume you have already got access to the portal. If so, you may drill down to one of your virtual networks. Then you should see a "Download" button at the bottom. Click that and you will find a list of configuration scripts for our supported VPN routers. Download one of them to use that as a reference.
- Marked as answer by Arwind - MSFT Thursday, June 14, 2012 11:34 AM
Tuesday, June 12, 2012 8:14 AM
All replies
-
We are also having the same issue with a Microsoft Threat Management Gateway (TMG) 2010.
Our settings are:
Local Tunnel Endpoint: 1.1.1.1.
Remote Tunnel Endpoint: 2.2.2.2
IKE Phase I Parameters:
Mode: Main mode
Encryption: AES256
Integrity: SHA256
Diffie-Hellman group: Group 2 (1024 bit)
Authentication Method: Pre-shared secret (0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef)
Security Association Lifetime: 28800 seconds
IKE Phase II Parameters:
Mode: ESP tunnel mode
Encryption: AES256
Integrity: SHA256
Perfect Forward Secrecy: OFF
Diffie-Hellman group: Group 2 (1024 bit)
Time Rekeying: ON
Security Association Lifetime: 3600 secondsKbyte Rekeying: ON
Rekey After Sending: 102400000 KbytesSite-to-Site Network IP Subnets:
Subnet: 10.0.0.0/255.255.255.0- Proposed as answer by Ganesh Srinivasan [MSFT] Saturday, June 9, 2012 9:27 PM
Friday, June 8, 2012 7:57 PM -
When i was troubleshooting it was asking for the following settings:
SHA1
AES (128bit)
Try that. I see you are set to 256 and i don't think they support that but i could be wrong i can't get mine to work either :)
- Proposed as answer by Ganesh Srinivasan [MSFT] Saturday, June 9, 2012 9:27 PM
Friday, June 8, 2012 8:00 PM -
Tried below, still no luck. I'm trying to find the cheapest supported router to offer. Bummer SonicWall isn't on the list either.
IKE Phase I Parameters:
Mode: Main mode
Encryption: AES128
Integrity: SHA1
Diffie-Hellman group: Group 2 (1024 bit)
Authentication Method: Pre-shared secret (0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef)
IKE Phase II Parameters:
Mode: ESP tunnel mode
Encryption: AES128
Integrity: SHA1
Perfect Forward Secrecy: OFF
Diffie-Hellman group: Group 2 (1024 bit)
Time Rekeying: ON
Security Association Lifetime: 3600 secondsKbyte Rekeying: ON
Rekey After Sending: 102400000 Kbytes- Proposed as answer by Ganesh Srinivasan [MSFT] Saturday, June 9, 2012 9:27 PM
Friday, June 8, 2012 8:15 PM -
What's your error? Mine is Msg 5 of 6 failed all others passed.
-King
Friday, June 8, 2012 8:16 PM -
Hi!
We support IKE 1 with AES 128 and 3DES.
Please refer to http://tmgblog.richardhicks.com/2011/01/25/configuring-site-to-site-vpn-with-forefront-tmg-and-cisco-pix-and-asa/ for information on how to configure TMG server as a site-to-site VPN solution. Please note that this is not formally supported by Microsoft as part of our virtual network preview program. The supported VPN device list is accessible here (http://www.windowsazure.com/en-us/manage/services/networking/)
We suggest you work with your VPN device manufacturer or leverage their support forums to conffigure Site-to-site VPN.
Thank you.
Saturday, June 9, 2012 9:26 PM -
Hi, EDRandD: Does your WatchGuard router have a command to set peer-id (or proxy-id) for IKE Phase 1 negotiation (I will be very surprised if it does not have such an option, : ))? Please use that command to set the peer-id/proxy-id to be 192.168.4.5. This address you see is actually the IP address of the Azure gateway (i.e. the peer of your WatchGuard router). For the Cisco/Juniper devices we officially support, none of them require such a setting to be explicitly declared, but we are also aware that some device may have such a requirement (and that's also the reason why we do not support these devices officially at this point).Sunday, June 10, 2012 6:38 AM
-
YuanYuan,
That allowed me to successfully connect Phase 1 now I'm having issues with phase two. What settings does Azure need for Phase 2? I get the following errors:
2012-06-11 14:28:46 iked Phase 2 started by peer with message(id 35) from 157.56.161.236:1024 quick mode msg_id="0203-5081"
Debug
2012-06-11 14:28:46 iked PMM rejected Remote P2SA Request, reason code=10102
Debug
2012-06-11 14:28:46 iked WARNING: Rejected phase 2 negotiation from 157.56.161.236 due to not preferred IKE gateway (multi-WAN) msg_id="0205-5205"
Debug
2012-06-11 14:28:46 QuickMode: <
Debug
2012-06-11 14:28:46 iked Rejected QM first message from 157.56.161.236:1024 to 66.60.177.226 cookies i=866d096b 71922f43 r=fef52065 dcaaa5c0 msg_id="0203-5086"
Debug
2012-06-11 14:28:46 iked Sending NO_PROPOSAL_CHOSEN message to 157.56.161.236:1024 msg_id="0203-5060"
Debug
Monday, June 11, 2012 9:06 PM -
EDRand, good luck my friend!
Since we have different VPN's (and my logging is completely different) I've opened a TMG specific thread here:
Tuesday, June 12, 2012 4:05 AM -
Hi, EDRandD:
Azure supports the following crypto settings for Phase 2 negotiation:
Authentication/Hashing: hmac-sha1
Encryption: AES128 or 3DES
We recommend a lifetime of 3600 seconds and a lifetime-size of 10240000 KB or more.
Based on the error message, your P2 negotiation failed on the first message at the responder side. That seems to indicate either the responder (i.e. your WatchGuard device) does not like the cryptographic transforms specified by the Azure gateway or it does not recognize the traffic selectors (basically the subnet ranges on both sides) specified in the first message. Please double-check and make sure these parameters are properly specified in your configuration for the WatchGuard device.
I assume you have already got access to the portal. If so, you may drill down to one of your virtual networks. Then you should see a "Download" button at the bottom. Click that and you will find a list of configuration scripts for our supported VPN routers. Download one of them to use that as a reference.
- Marked as answer by Arwind - MSFT Thursday, June 14, 2012 11:34 AM
Tuesday, June 12, 2012 8:14 AM -
EDRandD,
I'm having the same issues as you connecting a Watchguard to the Azure Gateway. I made it past my Phase 1 issue thanks to you and YuanYuan Yu... but I'm still stuck on Phase 2. Did you resolve your issue?
I seem to have problems regardless of whether I have PFS-Diddie-Hellman Group2 checked or not and I have authentication set to SHA1, Encryption is AEs-128, and key expiry is 1 hour/102400000kb.
Any thoughts? Thanks!
-Chris
Thursday, June 21, 2012 8:25 PM -
Hi, Chris:
Here is a screenshot of a working setup between a WatchGuard XTM 510 router and the Azure gateway. Also please disable PFS for Phase 2. I hope this can help you make progress.
Friday, June 22, 2012 5:46 PM -
Yu,
I'm not in front of my box but looking at it this is exactly what i did on a X550e Watchguard and it didn't work. I'll try again but perhaps the newer XTM models work but the older Edge boxes don't.
I'll keep you posted.
I take it the Internal Gateway IP is .5?
-King
- Edited by EDRandD Friday, June 22, 2012 5:59 PM
Friday, June 22, 2012 5:52 PM -
Chris,
I wasn't able to get it to work on a x550e on software 10.2 which is what all our HA setups are so we just went ahead and purchased a supported device like the Juniper SRX210
What model are you working with?
-King
Friday, June 22, 2012 5:53 PM -
Yu & King -
Thank you both for your advice; I have an XTM device running 11.5.2 and I had already tried what Yu sent in his screenshots (and then once again after reading his post just in case) but I am still unable to make it work. In the case I've done something stupid (which is quite possible) with my subnets, let me tell you what my settings were...
Azure subnets/addresses
Gateway: 168.62.x.y
Main Address Space: 10.4.0.0/16
Subnet FrontEndSubnet: 10.4.2.0/24
Subnet BackEndSubnet: 10.4.3.0/24
Local connectivity gateway subnet: 10.4.1.0/24XTM Config IP settings:
Local Gateway: My IP
Remote Gateway: 168.62.x.y
Gateway ID for tunnel authentication: 10.4.1.5
Tunnell addresses: 192.168.x.y/24 <==>10.4.1.0/24Any last thoughts before we give up and move to a supported device?
Thanks again,
ChrisMonday, June 25, 2012 1:17 PM -
Yu & King,
we have an XTM 330 running 11.5.3 and I had tried to conneted to azure also. The connection works by unchecking the NAT Traversal checkbox, but then it connects but no data running thru the tunnel. It seem to be a NAT-T prob.
I have tried Yu's config and get the following error.
2012-06-25 17:09:32 iked (NATT)Select IPSec Transform : NATDiscovered (1). Orig UDP_ENCAP mode (1), in mode (f003)! Debug 2012-06-25 17:09:32 iked Select IPSec Transform : keylength match 128 Debug 2012-06-25 17:09:32 iked Select IPSec Transform : Remote LifeSec 3600, Local LifeSec 3600 Debug 2012-06-25 17:09:32 iked Select IPSec Transform :Remote LifeKB: 102400000, Local LifeKB: 102400000 Debug 2012-06-25 17:09:32 iked Check SA Payload: found match proposal (localNum 1 peerNum 1) Debug 2012-06-25 17:09:32 iked Rejected QM first message from 168.63.25.115:1032 to 87.139.7.68 cookies i=f67e767f d870c8b8 r=f29a54a8 7bc118ec Debug 2012-06-25 17:09:32 iked IkeNotifyPayloadHtoN : net order spi(0x5c 0xcc 0x93 0xa3) Debug 2012-06-25 17:09:32 iked sendto_with_pktinfo: sendmsg with MARKER via fd=12, DestPort=1032 SrcPort=4500 Debug 2012-06-25 17:09:32 iked Sending PAYLOAD_MALFORMED message to 168.63.25.115:1032 Debug 2012-06-25 17:09:32 iked Process IKE Packet: Sent Error Notify Value 16 when P1SA State is 10 Debug 2012-06-25 17:09:32 iked IkeDeleteQMState: try to delete QMState 0x100eed44 (ID 6) with IsakmpSA 0x100d932c Debug 2012-06-25 17:09:32 iked SA Nego Fail: saHandle 0x1087b968 InitMode 0, reason 2 Debug 2012-06-25 17:09:32 iked findSPINodeBySPI: SPI:0x77001b37 hash:65 : 0x10875e10 Debug 2012-06-25 17:09:32 iked ipsecSpiNodeFree: SPI(0x77001b37) node deleted from hash table. SPI count:9 Debug 2012-06-25 17:09:32 iked findSPINodeBySPI: SPI:0x5ccc93a3 hash:75 : 0x10872dc0 Debug 2012-06-25 17:09:32 iked ipsecSpiNodeFree: SPI(0x5ccc93a3) node deleted from hash table. SPI count:8 Debug 2012-06-25 17:09:32 iked SA Nego Fail: free saHandle Debug 2012-06-25 17:09:32 iked (Delete QMState) rasUserCapacity 5 count 0 Debug 2012-06-25 17:09:32 iked (Delete QMState) maxPendingP2SARequest 128 current 0 Debug 2012-06-25 17:09:32 iked Process IKE Packet: delete QM State with retValue 16 Debug 2012-06-25 17:09:32 iked ike_process_pkt : ProcessData returned error (16) Debug - Joerg
Monday, June 25, 2012 3:19 PM -
Joerg,
We get the same thing and although i was able to get it to connect just like you no data would pass through. Another error we get is
2012-06-25 11:05:56 iked WARNING: Rejected phase 2 negotiation from 157.56.x.x due to not preferred IKE gateway (multi-WAN) msg_id="0205-5205"
So we just gave up and purchased a supported device. However, if you figure it our or i come across a solution i'll let you know.
-King
Monday, June 25, 2012 6:08 PM -
Hi, Chris:
A couple problems with your setup:
1. Your tunnel endpoint definition is incorrect: 192.168.x.y/24 <==>10.4.1.0/24
This should be <Entire address space in your Azure virtual network> <==> <Entire address space for your on-premise network>
So based on what you listed above, the tunnel endpoint routes should be:
192.168.x.y/24 <==> 10.4.0.0/16 (make sure 192.168.x.7/24 is what your specified in your virtual network definition, go to the Azure portal, and then look up the value in "NETWORKS" => "LOCAL NETWORKS" => "ADDRESS SPACE").
2. The gateway ID for tunnel authentication is not guaranteed to be "10.4.1.5". That's just one possible value the Azure gateway can take on. In reality, any address in the gateway subnet (which is 10.4.1.0/24 in your case) is possible (except for the reserved IP addresses such as .0 or .255 obviously). So please check the log of your WatchGuard device to find out what the internal IP of the Azure gateway actually is. Don't just assume .5 is the IP, : ) As I have mentioned, we are aware of a few VPN devices with this problem (i.e. having to know the internal IP of the Azure gateway to be able to bring up the tunnel) and as such, they are not in the official list of supported devices.
Tuesday, June 26, 2012 1:28 AM -
Hi, Joerg & King:
We will definitely need NAT-T mode to be enabled on the device in order to have a properly functioning tunnel. I am not sure how you manage to get to a "Connected" state by unchecking that box, but if I understand IKE correctly, that is just not supposed to work, : )
Due to limited time and resource, we cannot possibility test all the VPN devices (especially given the fact that even for the same vendor, they have different hardware skus and different versions of the underline OS) available out there. Unfortunately, WatchGuard devices are not on the supported device list (although we do have one working setup against a particular WatchGuard device/OS as I mentioned above). But as you can tell (by us answering the questions on this forum and various other support channels), we are still trying to enable our scenario for as many customers as possible, regardless of what devices they currently have in house.
We have actually run into the exact same error as you guys did:
2012-06-18 13:12:42 iked Sending PAYLOAD_MALFORMED message to 168.63.x.x:1032 Debug
2012-06-18 13:12:42 iked Process IKE Packet: Sent Error Notify Value 16 when P1SA State is 10 Debug
2012-06-18 13:12:42 iked IkeDeleteQMState: try to delete QMState 0x8141840 (ID 1) with IsakmpSA 0x811ad20 Debug
2012-06-18 13:12:42 iked SA Nego Fail: saHandle 0x084659a8 InitMode 0, reason 2 Debug
2012-06-18 13:12:42 iked SA Nego Fail: free saHandle Debug
But later on, it just started working magically using the configuration I posted above. Honestly, I think the best option is to contact the customer support from WatchGuard as they probably have the best knowledge of what this specific error message indicates.
Tuesday, June 26, 2012 2:06 AM -
Hi Everyone,
We are trying to get the same setup up and running and are having similar problems.
After using the suggested phase 1 and phase 2 settings on our firebox XTM520 (11.5.3) we succeeded to get the tunnel up and send some traffic to the azure virtual network.The strange thing however is the connection seems to work only when connections are initiated from our side.
When we ping the virtual machine on the other side the virtual machine can also ping machines in our local subnet. After a while (a few seconds) however this stops working until we initiate a connection again from our side.In the watchguard logs we encounter the same PAYLOAD_MALFORMED messages, even when traffic is going over the tunnel.
We will contact watchguard today to see if they can give some extra pointers.
Maarten
Wednesday, June 27, 2012 7:23 AM -
Watchguard support had a look at our setup and they noticed something :
Hello Maarten,
there's something a bit strange.
I can see inside the packet tracer (WebUI -> System Status -> VPN Statistics -> Debug)
That the remote peer sends a Phase2 QM1 first message with number of Transforms = 1
But it actually sends two Transform sets with the same number of Transform
The first one it sends is Transform_ID ESP_AES with proposal:
SHA1-AES128
the second (with the same Transform number) is Transform_ID ESP_3DES Proposal: SHA1-3DES
This can't be correct, either it should only send 1 unique Transform or send as two independant transform sets
I am referencing line numbers 36-140ISAKMP Header
0: f0 9e 1e 45 b1 c7 88 21 I-COOKIE
8: d7 f7 29 55 69 bc 9a 44 R-COOKIE
16: 08 Next Payload - ISA_HASH
17: 10 Version 1.0
18: 20 Exchange is Oakley Quick Mode
19: 01 Flags Encrypted
20: 00 00 00 01 Message ID
24: 00 00 01 1c Payload Length is 284
MSG: 13:59:35 Decrypted Payloads <<QM 1st
HASH Payload
0: 01 Next Payload - ISA_SA
1: 00 Reserved
2: 00 18 Payload Length is 24
4: da 0e ce 1c 4f f7 0a d9 01 2a 3a 57 a8 da ff b5 ....O....*:W....
20: d9 c7 2b b1 ..+.
SA Payload
24: 0a Next Payload - ISA_NONCE
25: 00 Reserved
26: 00 78 Payload Length is 120
28: 00 00 00 01 DOI - IPSEC
32: 00 00 00 01 Situation: IDENTITY_ONLY
PROPOSAL Payload
36: 02 Next Payload - ISA_PROP
37: 00 Reserved
38: 00 38 Payload Length is 56
40: 01 Proposal Number
41: 03 Protocol ID - ESP
42: 04 SPI Size = 4
43: 01 Number of Transforms = 1
44: 88 c5 62 43 SPI
TRANSFORM Payload
48: 00 Next Payload - NONE
49: 00 Reserved
50: 00 2c Payload Length is 44
52: 01 Transform Number is 1
53: 0c Transform ID - ESP_AES
54: 00 00 Reserved
56: 80 04 f0 03 Class=ENCAPSULATION_MODE, Value=Unknown
60: 80 06 00 80 Class=KEY_LENGTH, Value=128
64: 80 05 00 02 Class=HMAC_ALG, Value=HMAC_SHA1
68: 80 01 00 01 Class=SA_LIFE_TYPE, Value=LIFE_SEC
72: 00 02 00 04 Class=SA_LIFE_DURATION, Value=(follows)
76: 00 00 0e 10 Value=3600
80: 80 01 00 02 Class=SA_LIFE_TYPE, Value=LIFE_KB
84: 00 02 00 04 Class=SA_LIFE_DURATION, Value=(follows)
88: 06 1a 80 00 Value=102400000
PROPOSAL Payload
92: 00 Next Payload - NONE
93: 00 Reserved
94: 00 34 Payload Length is 52
96: 02 Proposal Number
97: 03 Protocol ID - ESP
98: 04 SPI Size = 4
99: 01 Number of Transforms = 1
100: 88 c5 62 43 SPI
TRANSFORM Payload
104: 00 Next Payload - NONE
105: 00 Reserved
106: 00 28 Payload Length is 40
108: 01 Transform Number is 1
109: 03 Transform ID - ESP_3DES
110: 00 00 Reserved
112: 80 04 f0 03 Class=ENCAPSULATION_MODE, Value=Unknown
116: 80 05 00 02 Class=HMAC_ALG, Value=HMAC_SHA1
120: 80 01 00 01 Class=SA_LIFE_TYPE, Value=LIFE_SEC
124: 00 02 00 04 Class=SA_LIFE_DURATION, Value=(follows)
128: 00 00 0e 10 Value=3600
132: 80 01 00 02 Class=SA_LIFE_TYPE, Value=LIFE_KB
136: 00 02 00 04 Class=SA_LIFE_DURATION, Value=(follows)
140: 06 1a 80 00 Value=102400000if there are multiple transforms then it should show inside the Proposal Payload Number of Transforms = 2
and then inside the Transform Payload: Transform Number is 1
and for the second Transform Number is 2
But from my point of view this is definetly wrong
That it works for a short moment when you initiate is pretty clear since you only have 1 Transform set configuredI tried to add a second proposal (3DES and AES128bit) but the problem described above still exists : both have transform number 1.
Any ideas ?
Maarten
Wednesday, June 27, 2012 12:46 PM -
Hi to all,
we talk to Watchguard Support also. It seems to be a non standard configuration and has to be reconfigured on Azure.
The remote peer sends a Phase2 QM1 first message with number of Transforms = 1
But it actually sends two Transform sets with the same number of Transform
The first one it sends is Transform_ID ESP_AES with proposal:
SHA1-AES128
the second (with the same Transform number) is Transform_ID ESP_3DES Proposal: SHA1-3DES
This can't be correct, either it should only send 1 unique Transform or send as two independent transform sets.
- Joerg
Thursday, June 28, 2012 10:48 AM -
YuanYuan, Winner, Agile, Kingaday and everyone else this was all good info. But after reading some of your replies and talking to support myself i've come to the realization that watchguard XTM and Edge simply won't work with Azure due to some differences in the handshake. Azure Virtual network is a preview and not a final product so i hope one day they will support watchguard or visa versa but Azure simply doesn't support the device so i've moved on.
I purchased a Juniper SRX210 and was able to get it working within a day and that's only because i have never configured or even seen JunoOs before in my life :). I'm still having issue's with it routing to my network but that's just my lack of understanding the CLI and not Azure because i'm able to ping both side's via the device. Anyone know how to setup a Juno to route traffic from one network to another via a VPN i'm all ears :) i know its easy but just different then what i'm used to.
anyway thanks everyone and i encourage you to leave your tickets open with Watchguard because that means they will always address them when things change with Azure. Its NEW and these are NEW type problems but good problems.
-King
Thursday, June 28, 2012 6:36 PM -
Hi, Joerg, Maarten, King:
Thanks a lot for the feedback. The feedback from Watchguard's support crew is very insightful. It is true that for maximum compatibility, the Azure gateway announces two crypto transforms (AES128 and 3DES) and the problem Watchguard folks identified in the logs is very interesting. I have sent an email to our IPSec team already to ask for their inputs on this issue. As King said, Windows Azure Virtual Network is still in CTP, so we are trying to identify as many such issues as possible and incorporate the learnings into the ongoing development in order to deliver a more robust product. Unfortunately, due to limited time and resources, we cannot realistically test/validate our technology against every single VPN device out there. But that is the whole point of having a CTP release, we chose to push out these features so that we can collect feedback from early adopters like you guys and adjust our priorities based on what the real users out there are trying to do instead of imagining what they should be while sitting in our offices. While we are investigating this problem internally, in the meantime, the best option for you may just either switch to a support hardware devices or use a software solution that is proven to work (say Microsoft TMG Server 2010). I really apologize for any inconvenience this may have cost.
Friday, June 29, 2012 9:12 AM -
Hi to all,
Thanks for screenshots and debug informations. I have now the same error messages for QM on phase 2.
I hope that Microsoft made the change soon...
Christophe.
c.girod
Friday, June 29, 2012 10:10 AM -
Hi, c.girod & all:
I have talked to our IPSec team about this issue. After reviewing the report from WatchGuard support, here is the response they provided:
"
I see nothing wrong with the way we construct the SA payload.
You may map the below explanation to the relevant RFC sections:
http://tools.ietf.org/html/rfc2408#section-3.6
and
Sec 4.5 here http://tools.ietf.org/html/rfc2407
There are 2 ESP proposals with 1 transform each.
The first proposal, first transform has Transform-ID of AES. The authentication algo for ESP is specified via attributes. So attribute of type authentication algo = HMAC-SHA1
The second proposal , first transform has -ID of 3DES. Attribute of type authentication algo = HMAC-SHA1
"
So in short, we are not sending 1 proposal with 2 transforms. We (Windows Azure) are sending 2 proposals, each with a single transform.
Another fact is this configuration of the Windows Azure gateway works with many other VPN devices out there (Cisco ASA, Cisco ISR, Cisco ASR, Juniper SRX, Juniper SSG, etc), and we are not doing anything different there.
So if you still have the support ticket open with WatchGuard, would you please relay this message back to them and see what they have to say? Their current hypothesis does not seem to be valid to us for the reasons explained above.
I will also try to see if we have some other way for reaching WatchGuard directly, but I cannot guarantee anything here as I am just a developer not a business relationship person, : )
Wednesday, July 4, 2012 7:17 PM -
Hi YuanYuan,
Do you know what is used for the Windows Azure Gateway (Cisco, TMG, or other) it could help for debug.
also, could the IPsec team publish the full settings for IPSEC connection instead of script dedicated to Cisco or Juniper hardware. we don't know default settings of all hardware ...
thanks for your help.
Christophe.
c.girod
Friday, July 6, 2012 8:26 AM -
Hi, Chris:
Unfortunately, we cannot disclose the implementation detail of the Azure gateway on the public forum for various reasons. Hope you can understand, : )
The second request is a great suggestion. We will work with our documentation team to see how we can include that in the official MSDN doc for the next release.
For now, here is the a quick summary for the IPSec settings we support:
IKE Phase I Parameters:
Mode: Main mode
Encryption: AES128 or 3DES
Integrity: SHA1
Diffie-Hellman group: Group 2 (1024 bit)
Authentication Method: Pre-shared key
Security Association Lifetime: 28800 seconds
IKE Phase II Parameters:
Mode: ESP tunnel mode
Encryption: AES128 or 3DES
Integrity: SHA1
Perfect Forward Secrecy: OFF
Diffie-Hellman group: Group 2 (1024 bit)
Time Rekeying: ON
Security Association Lifetime: 3600 seconds
Security Association Lifesize: 102400000 Kbytes
- Edited by YuanYuan Yu (MSFT) Tuesday, July 10, 2012 10:09 AM
Tuesday, July 10, 2012 10:04 AM -
I had the same error and found something interesting regarding using Watchguard VPN and Azure. We've got a XTM 330 running Fireware XTM v11.7.2. By setting the gateway ID to the same IP as the remote gateway the VPN tunnel connects automatically without any errors and seems to be stable. I’ve also set both phase 1 and 2 to use 256 bit AES (this is used in the Cisco sample configuration scripts).
- Proposed as answer by Henrik Aldermo Monday, April 22, 2013 2:19 PM
- Edited by Henrik Aldermo Monday, April 22, 2013 3:08 PM Spelling
Monday, April 22, 2013 1:52 PM -
Thanks for your post, i will try from our watchguard
c.girod
Monday, April 22, 2013 2:53 PM