An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Hi @ Kayo Shido,
Welcome to Microsoft Q&A Platform.
As discussed, intermittent S2S VPN disconnections after replacing an on-premises firewall are most commonly caused by an IPsec/IKE lifetime mismatch, DPD mismatch, or a cryptographic parameter mismatch during Security Association (SA) rekey.
Based on the VPN logs, Phase 1 is failing while Phase 2 is successful.
After resetting the VPN Gateway, the tunnel is still not disconnecting. Please follow the ‘Reset a gateway’ documentation to reset the VPN gateway.
You can also check the below configuration if you face any issue
- Even if the tunnel establishes successfully, mismatched Phase 2 lifetimes (Azure default 27000 seconds) frequently cause traffic drops during renegotiation.
- DPD timeout values that are too short can cause intermittent tunnel drops during transient latency or packet loss. Microsoft recommends configuring DPD timeout between 30 and 45 seconds to avoid unnecessary renegotiation events.
- IKE Main Mode SA lifetime is fixed at 28,800 seconds on the Azure VPN gateways.
UsePolicyBasedTrafficSelectors is an optional parameter on the connection. If you set UsePolicyBasedTrafficSelectors to $True on a connection, it configures the VPN gateway to connect to an on-premises policy-based VPN firewall.
If still facing an issue Troubleshooting: Azure Site-to-Site VPN disconnects intermittently
Default IPsec/IKE parameters and IPsec/IKE policy
Please
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.