Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ike v1 or v2 #5236

Closed
akalbfell opened this issue Mar 2, 2018 — with docs.microsoft.com · 6 comments
Closed

Ike v1 or v2 #5236

akalbfell opened this issue Mar 2, 2018 — with docs.microsoft.com · 6 comments

Comments

Copy link

I had issues using route based vpn gateway and ikev2 with my ASA. Tunnel would drop, not come up, all sorts of odd things. Finally read somewhere MS doesn't support that setup for the ASA. Using policy based vpn gateway and ikev1 I have had no issues.


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

  • ID: 400bf897-2cdd-39e8-85df-34ad53ca7838
  • Version Independent ID: 606caa65-a95f-07b1-98a3-202479e6ce5e
  • Content
  • Content Source
  • Service: vpn-gateway
@AdamS-MSFT
Copy link
Member

@akalbfell thanks for the feedback, I assigned the case to the author for further review.

Copy link

Hello Gentlemen,

IKEv2 does work between Azure and FTD but not out the box. A bit of tweaking has to take place. I have implemented 4 of these IKEv2 Tunnels in the Field with no issues. Actually, one client in particular, was trying to get away from IKEv1 since they stated they needed IKEv2 for some sort of AD integration they were attempting through the tunnel. If FTD/ASA is on the FMC already, it takes about 6-8 hours to complete tunnel, with full configuration. Otherwise, it can take longer.

Copy link

Also, if you want IKEv2, it has to be route-based on the Azure side, since IKEv2 is not supported on Policy-Based Azure.

@akalbfell
Copy link
Author

akalbfell commented Mar 4, 2018

Thanks for the response. I should have mentioned I didn't make any changes to the parameters of the phase 1 settings when using Ikev2 route based. My issues were with default settings.

@yushwang
Copy link
Contributor

yushwang commented Mar 6, 2018

Folks,

The specific doc described how to use the custom IPsec/IKE policy on an Azure route-based VPN gateway to connect to Cisco ASA with access-list-based Traffic Selectors. It was called out in the beginning of the doc and also in the "Notes" section. Please let us know if there are specific issues regarding the descriptions or specifications. IKEv2 was called out in the beginning of the page.

We can take it under review if the ask here is about adding a doc for Cisco ASA using IKEv1 and Azure policy-based VPN gateway. Please let us know. Otherwise, we can close or resolve this issue.

Thanks,
Yushun [MSFT]

@yushwang
Copy link
Contributor

yushwang commented Mar 6, 2018

#please-close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants