You can configure your local Barracuda CloudGen Firewall to connect to the static IPsec VPN gateway service in the Windows Azure cloud using an IKEv1 IPsec VPN tunnel.
Before You Begin
- Create and configure a Windows Azure static VPN gateway for your virtual network.
- You will need the following information:
- VPN gateway
- External IP address for the Barracuda CloudGen Firewall
- Remote and local networks
Step 1. Create a Network in the Windows Azure Cloud
Create a virtual network in the Windows Azure cloud. Choose subnets that are not present in your local networks to avoid IP address conflicts.
- Log into your Windows Azure Management Portal (https://manage.windowsazure.com).
- In the left pane, click NETWORKS.
- In the bottom-left corner click + NEW.
- Click CUSTOM CREATE. The create a virtual network windows opens.
- Enter the Name for the network.
- Select an affinity group, or create a new affinity group.
- Click NEXT
.
- (optional) Enter or select a DNS server.
- In the right panel, enable Configure site-to-site VPN.
- Select Specify a New Local Network from the LOCAL NETWORK drop-down list.
- Click Next
.
- Enter a NAME for your local on-premises network.
- Enter the VPN DEVICE IP ADDRESS. This is the external IP address of the Barracuda CloudGen Firewall running the VPN service.
- In the ADDRESS SPACE section, enter the on-premise network(s). E.g.,
10.10.200.0/24
- Click Next
.
- In the Virtual Network Address Spaces section, click add subnet:
- Subnet – Enter a name for the subnet.
- Starting IP – Enter the first IP of the IP Range for the subnet. E.g.,
10.10.201.0
- CIDR(ADDRESS COUNT) – Select the subnet mask from the list. E.g., /24 for 256 IP addresses.
- Click add gateway subnet:
- Starting IP – Enter the first IP for the gateway subnet. E.g.,
10.10.201.0
- CIDR (ADDRESS COUNT) – Select the subnet mask from the list. E.g., /29 for 8 IP addresses.
- Starting IP – Enter the first IP for the gateway subnet. E.g.,
- Click OK.
.
The Azure Virtual Network you have just created is now listed in the NETWORK menu in the Azure management interface.
Step 2. Create a VPN Gateway for the Windows Azure Network
Create the Azure VPN Gateway.
- Log into your Windows Azure Management Portal ( https://manage.windowsazure.com ).
- In the left pane, click NETWORKS.
- Click on the Network previously created in Step 1.
- in the top menu, click on DASHBOARD.
- In the bottom pane, click CREATE GATEWAY.
- Select Static Routing from the list. Creating the gateway will take a couple of minutes.
When the color of the gateway turns blue, the gateway has been successfully created. The Gateway IP is now displayed below the VPN Gateway image.
Step 3. Configure IPsec Site-to-Site VPN on the CloudGen Firewall
Create an active IPsec VPN connection on the local firewall.
- Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Site to Site.
- Click the IPSEC IKEv1 Tunnels tab.
- Click Lock.
- Right-click the table, and select New IPsec IKEv1 tunnel. The IPsec Tunnel window opens.
- In the Name field, enter your tunnel name. E.g.,
NG2AzureVPNGateway
- In the Basics tab, enter the Phase1 and Phase2 encryption settings:
- Phase 1
- Encryption – Select AES-256.
- Hash Meth. – Select SHA.
- DH Group – Select Group 2.
- Lifetime – Enter
28800
.
- Phase 2
- Encryption – Select AES-256.
- Hash Meth. – Select SHA256.
- Perfect Forward Secrecy – Disable.
- Lifetime – Enter
3600
.
- Phase 1
- Configure the local network settings. Click the Local Networks tab and specify the following settings:
- Local IKE Gateway – Enter the external IP address of the firewall. E.g.,
62.99.0.40
- Network Address – Enter your local on-premises network and click Add. E.g.,
10.10.200.0/24
- Local IKE Gateway – Enter the external IP address of the firewall. E.g.,
- Configure the remote network settings. Click the Remote Networks tab and specify the following settings:
- Remote IKE Gateway – Enter the Gateway IP Address of the Azure VPN Gateway created in Step 2. E.g.,
137.117.205.83
- Network Address – Enter the Azure subnet(s) configured in the Azure Virtual Network and click Add. E.g.,
10.10.201.0/24
.
Click on the Peer Identification tab, and enter the Azure MANAGE KEY passphrase.
- Remote IKE Gateway – Enter the Gateway IP Address of the Azure VPN Gateway created in Step 2. E.g.,
- Click OK.
Click Send Changes and Activate.
Step 4. Create an Access Rule
Create a pass access rule to allow traffic from the local network to the remote network.
- Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > Firewall > Firewall Rules.
- Create a PASS access rule:
- Bi-Directional – Enable.
- Source – Select the local on-premises network(s).
- Service – Select the service you want to have access to the remote network or Any for complete access.
- Destination – Select the network object containing the remote Azure Virtual Network subnet(s).
- Connection Method – Select No Src NAT.
- Click OK.
- Move the access rule up in the rule list, so that it is the first rule to match this traffic.
- Click Send Changes and Activate.
Your Barracuda CloudGen Firewall will now automatically connect to the Azure VPN Gateway.