Azure network and vFTD and Cisco Anyconnect (Secure Client) issue

Christophe_M 40 Reputation points
2023-12-31T09:58:32.3833333+00:00

Hi!

Please, I need help with the Cisco Anyconnect (Cisco Secure Client) and Azure vFTD. I've tried a bunch of options and feel like I'm missing something. May be some one made the same things.

I attached a schema of my test connection lab. The root of idea is unite few networks in one: two on-prem offices, cloud resources and FTD (for Anyconnect only). I managed to implement everything except the connectivity of Anyconnect. All branches can ping each other and also can work cloud resources (linux vm and FTD INSIDE iFace) and vice versa. However, when someone connect to vFTD by Cisco Secure Client all resources are unreachable.

  1. I created NAT exemption rules on FTD for SSLVPN traffic.
  2. All Security Groups have ICMP any any allow rule for a test.
  3. I tested ping to a cloud linux VM and to one branch server (started tcpdump on these VMs) from sslvpn client and saw that VMs got ICMP request and sent replies! But these replies never reached the remote sslvpn enpoint.
  4. FTD capture-traffic feature doesn't see sslvpn traffic. TShoot tracer shows ALLOWED/NO NAT points.
  5. Added SSLVPN subnet to VNet of FTD.

I belive that I missed cloud routing or something like this.

Thank you and Happy New Year!

azure

Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,734 questions
{count} votes

Accepted answer
  1. KapilAnanth-MSFT 49,421 Reputation points Microsoft Employee Moderator
    2024-01-16T08:15:00.26+00:00

    @Christophe_M

    Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.

    I'm glad that the issue was resolved.

    Since the Microsoft Q&A community has a policy that "The question author cannot accept their own answer. They can only accept answers by others", I'll repost your solution in case you'd like to "Accept" the answer. Environment:

    • You had 2 VNETs peered.
    • One had a Azure VPN Gateway (and S2S Connection) while the other had a 3rd party NVA establish connectivity to remote clients.
    • You wanted to establish the following connectivity
        1. Remote clients should be able to ping Azure servers and vice versa
        1. Remote clients should be able to ping OnPrem servers and vice versa via Azure VNET.
      Observation:
    • Azure will not be aware of the remote clients address range as you are using a 3rd party NVA and the configuration is done in the OS
    • We have to make the platform aware of the routes by incorporating UDRs (Route Table)

    Solution:

    1.

    • For traffic from Azure to Remote Clients, We create a Route Table and added the nextHop for Remote VPN Client address pool as the NVA.
    • This way, all traffic destined to remote clients are routed to the NVA by Azure.
    • For return traffic, the NVA's OS already knows the routes of the VNET and thus, no need for additional configuration.
    • The same logic applies here, however the Route Table must be added at the GatewaySubnet.
    • You confirmed this resolved the issue.

    Thanks for your continued contribution on Q&A and appreciate much for taking the time to share your feedback.

    Thanks,

    Kapil


    Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.