Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Example: Configure an IPsec VPN Between Two vSRX Virtual Firewall Instances

This example shows how to configure an IPsec VPN between two instances of vSRX Virtual Firewall in Microsoft Azure.

Before You Begin

Ensure that you have installed and launched a vSRX Virtual Firewall instance in Microsoft Azure virtual network.

See SRX Site-to-Site VPN Configuration Generator and How to troubleshoot a VPN tunnel that is down or not active for additional information.

Overview

You can use an IPsec VPN to secure traffic between two VNETs in Microsoft Azure using two vSRX Virtual Firewall instances.

vSRX Virtual Firewall IPsec VPN Configuration

vSRX1 VPN Configuration

Step-by-Step Procedure

To configure IPsec VPN on vSRX1:

  1. Log in to the vSRX1 in configuration edit mode (see Configure vSRX Using the CLI).

  2. Set the IP addresses for vSRX1 interfaces.

  3. Set up the untrust security zone.

  4. Set up the trust security zone.

  5. Configure IKE.

    Note:

    Be sure to replace 198.51.100.10 in this example with the correct public IP address.

  6. Configure IPsec.

  7. Configure routing.

vSRX2 VPN Configuration

Step-by-Step Procedure

To configure IPsec VPN on vSRX2:

  1. Log in to the vSRX2 in configuration edit mode (See Configure vSRX Using the CLI.

  2. Set the IP addresses for the vSRX2 interfaces.

  3. Set up the untrust security zone.

  4. Set up the trust security zone.

  5. Configure IKE.

    Note:

    Be sure to replace 203.0.113.10 in this example with the correct public IP address. Also note that the SiteB local-identity and remote-identity should be in contrast with the SiteA local-identity and remote-identity.

  6. Configure IPsec.

  7. Configure routing.

Verification

Verify Active VPN Tunnels

Purpose

Verify that the tunnel is up on both vSRX Virtual Firewall instances.

Action