Create an Azure Virtual Network Gateway IPSec VPN to PFSense
| 5 minutes
Microsoft Azure IPSec VPN PFSense Virtual Network Gateway

My latest lab excapades required deploying some VMs into Azure using vRealize Automation. Before I did that though, I wanted to configure private network access between my Azure VNet and my lab network to support things like Domain Joining, Lab DNS lookups, SaltStack Config management, etc. My lab network is managed by a virtual PFSense appliance so this post will cover PFSense configuration too.

The IPSec tunnel only needs to exist while I’m deploying and testing things. I don’t need it running 24 hours, nor do I need the advanced configurations or sizing. The tunnel will also be established between two public IPs so I will not be covering NAT traversal.

Design

My end goal is to have bidirectional communications between subnets in Azure and all my lab subnets managed by PFSense.

Expected layout of my IPSec tunnel

What you’ll need

  • Azure Subscription
  • PFSense appliance (virtual or physical)
  • Eyeballs or a screen reader
  • Existing VNet in Azure with a gateway subnet

Azure

  1. Login to the Azure Portal (https://portal.azure.com).

Create the Local Network Gateway

  1. In the Search bar, search for “Local Network Gateways”.

    A “Local Network Gateway” is essentially an object describing your on-premises or external VPN endpoint and the networks that you will be presenting from that endpoint. In my case, it’s my PFSense gateway, and it’ll be my lab supernet 10.1.0.0/16.
  2. Click the Create button.

  3. In the wizard that appears, enter the details of your on-prem VPN endpoint.

  4. I will not being configuring advanced settings like BGP over this tunnel so click Review + create.
  5. Review your settings and click Create.

Create the Virtual Network Gateway

  1. In the Search bar, search for “Virtual Network Gateways” and click it.

  2. Click the Create button.

  3. In the Virtual Network Gateway wizard, fill out the Gateway details.

  4. Scroll down and configure the Public IP details. For my case, I’ll create a new one.

  5. Click Next and tag your new Virtual Network Gateway. I prefer to tag my lab related items so I can pretend I manage my costs well in Azure.

  6. Click Review + create. If you’re happy with your inputs click Create. The Virtual Network Gateway deployment time varies from 2-15 minutes (seriously I had one when I was testing this and it took about 15 to deploy). Go make a coffee and it should be done by then.
  7. Once the Virtual Network Gateway deployment has completed, go to the resource and locate the Public IP address (sorry I had to blur it). Copy the IP address somewhere, you’ll need it for PFSense.

Define an IPSec Connection for the Azure Virtual Network Gateway

  1. In the Virtual Network Gateway Resource click Connections -> Add.

    These “Connections” are definitions that you create, describing the details about a specific tunnel for the Virtual Network Gateway to consume.
  2. In the Add Connection wizard, complete the details ensuring you change the “Local network gateway” value to the one you created earlier, and most importantly a pre-shared key (PSK) that you have recorded somewhere. Ideally it’s more complex than what I have here.

  3. When you’re happy with your settings, click OK. The new connection will be created and associated to your Virtual Network Gateway.

    Note: The Status will change from “Updating” to “Unknown” and stay that way until we’ve completed the PFSense configuration.

PFSense

The PFSense component looks more complicated than it is as all the options/nerd-knobs are on full display. I glossed right over them and had no issues.

Create IPSec Phase 1 in PFSense

  1. Login to your PFSense Admin portal.
  2. In the top menu, click VPN > IPSec.

  3. Click the Add P1 button.

  4. In the wizard, start entering the details for the “General Information” and “IKE Endpoint Configuration” sections.

  5. In the “Phase 1 Proposal (Authentication)” section, enter your pre-shared key (PSK) as we did for the Virtual Network Gateway Connection.

  6. In the “Phase 1 Proposal (Encryption Algorithm)” section we need to specify how the initial Phase 1 communications will be encrypted. The settings here need to match Microsoft’s default configurations for Virtual Network Gateways, specifically the settings related to IKEv2 Route Based policies that we’re using: RouteBased VPN IPsec Security Association (IKE Quick Mode SA) Offers. I use AES256+SHA256+DH2 as my configuration:

  7. Scroll past the two remaining sections “Expiration and Replacement” and “Advanced Options”. For our situation we don’t need to worry about them.
  8. Click Save.

Create IPSec Phase 2 in PFSense

  1. Back on the IPSec page, click the Show Phase 2 Entries button and click Add P2.

    Each “Phase 2” section defines a network (subnet) we are expecting to receive traffic from in Azure, and a network (subnet) we’re expecting to send from on-premises to Azure. We also define the encryption mechanism used for the traffic in the tunnel.
  2. Start by specifying a Description and defining the Local Network and Remote Network details.

  3. Under “Phase 2 Proposal (SA/Key Exchange)”, select the AES256-GCM algorithm with a “PFS key group” value of 14.

  4. Scroll to the bottom and click Save.
  5. On the “Tunnels” page click Apply Changes.

Status Check

  1. In the top menu, go to Status > IPSec.
  2. You’ll see our new IPSec connection and it might be in a disconnected state. If it is (like mine), click the Connect P1 and P2s.

  3. Assuming everything is done correctly, you’ll see the Phase 1 tunnel establish. Click the Show child SA entries button to see the state of your Phase 2 that you created.

  4. Jumping back to the Azure Portal, find your Virtual Network Gateway and go to Connections. You’ll see the Connection we defined earlier has now changed state to “Connected”.

Testing

Before you start testing communications between your local networks and Azure networks, you’ll need to configure firewall rules for the IPsec interface in PFsense. Here’s a quick look at what I’ve configured to ensure my VMs in Azure can reach back to my on-prem networks:

I’ve got a test machine in Azure, attached to a basic network security group and with no public IP associated:

Notice the lack of Public IP Address

From my on-prem jumpbox I RDP to it and ping my Domain Controller:

DNS lookup using my DNS server:


I’ll be exploring this capability further in future posts. Leave a comment and let me know what you think or if you have suggestions for my configurations.

About Stellios Williams
Senior Cloud Solutions Architect - Service Providers VMware
This is my personal tech related blog for anything private and public cloud - including homelabs! My postings are my own and don’t necessarily represent VMware’s positions, strategies or opinions. Any technical guidance or advice is given without warranty or consideration for your unique issues or circumstances.
Comments
comments powered by Disqus
Advertisement