I got my new router last friday. And as soon I got the time to setup my VPN to azure again, so my Azure Site Recovery service will work again.
Here are my guide to the setup, it how I get to work.
How to setup VPN from a D-Link DSR-N1000 (DSR-N250 or DSR-N500)
Note: It is important that you also take a look at ‘About VPN Devices for Virtual Network Connectivity’ – https://msdn.microsoft.com/en-us/library/azure/jj156075.aspx
The 1st thing you have to do is to create network in Azure
Create a virtual Network in the Microsoft Azure cloud. Choose subnets which are not present in your local networks to avoid IP address conflicts.
- Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com)
- In the left pane click NETWORKS.
- In the bottom left corner click + NEW.
- Click CUSTOM CREATE. The create a virtual network windows opens.
- Enter the Name for the network.
- Select a Location. E.g., West Europe
- Click NEXT
- (optional) Enter or select a DNS server.
- In the right panel enable Configure site-to-site VPN.
- Select Specify a New Local Network from the LOCAL NETWORK drop down.
- Click Next
- Enter a NAME for your local on-premises network.
- Enter the VPN DEVICE IP ADDRESS. This is the external IP address of the Barracuda Firewall running the VPN service.
- In the ADDRESS SPACE section enter the on-premise network(s). E.g., 10.10.200.0/24
- Click Next
- In the Virtual Network Address Spaces section click add subnet:
- Subnet – Enter a name for the subnet.
- Starting IP – Enter the first IP of the IP Range for the subnet. E.g., 10.10.201.0
- CIDR(ADDRESS COUNT) – Select the subnet mask from the list. E.g., /24 for 256 IP addresses
- Click add gateway subnet:
- Starting IP – Enter the first IP for the gateway subnet. E.g., 10.10.201.0
- CIDR (ADDRESS COUNT) – Select the subnet mask from the list. E.g., /29 for 8 IP addresses
- Click OK
The Azure Virtual Network you have just created is now listed in the NETWORK menu in the Azure management interface.
The 2nd thing you to do, is to create a VPN gateway in Azure
Create the Azure VPN Gateway.
- Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
- In the left pane click NETWORKS.
- Click on the Network previously created in Step 1.
- in the top menu click on DASHBOARD.
- In the bottom pane, click CREATE GATEWAY.
- Select Static Routing from the list. Creating the gateway will take a couple of minutes.
When the color of the gateway turns blue, the gateway has been successfully created. The Gateway IP is now displayed below the VPN Gateway image.
Now you can configure IPsec Site-to-Site VPN for the D-Link box
Create a active IPsec VPN connection to DSR-N1000 box
- To go VPN >> IPSec VPN >> Policies
- Press ‘Add New IPSec Policy
- Here you have add all the information
- Policy Name, it is up to you
- Policy Type = Auto Policy
- IP Protocol Version = IPv4
- IKE Version = IKEv1
- L2TP mode = None
- IPSec Mode = Tunnel Mode
- Select Local Gateway = Dedicated WAN
- Remote Endpoint = IP Address
- IP Adress / FQDN = 137.117.203.108 (the gatewat ip address for azure)
- Enable Mode Config = OFF
- Enable NetBios = OFF
- Enable RollOver = OFF
- Protocol = ESP
- Enable DHCP = OFF
- Local IP = Subnet
- Local Start IP Address =10.10.200.0
- Local Subnet Mask = 255.255.255.0
- Remote IP = Subnet
- Remote Start IP Address = 10.10.201.0
- Remote Subnet Mask = 255.255.255.0
- Enable Keepalive = OFF
- Phase1 (IKE SA Parameter)
- Exchange mode = Main
- Direction / Type = Both
- Nat Traversal = ON
- NAT Keep Alive Frequency = 20
- Local Identifier Type = Local WAN IP
- Remote Identifier Type = Remote WAN IP
- Encryption Algorithm
- Authentication Algorithm
- SHA-1 = ON
- Authentication Method = Pre-Shared Key
- Diffie-Hellman (DH) Group = Group 2 (1024 bit)
- SA-Lifetime = 28800
- Enable Dead Peer Detection = OFF