Share via

Why is my Basic SKU P2S IKEv2 gateway dropping IKE_SA_INIT after the Feb 28, 2026 legacy deadline?

Sepehr Soltanieh 45 Reputation points
2026-03-10T20:32:47.6166667+00:00

We have a P2S IKEv2 VPN gateway (Basic SKU, westus region) that worked reliably for months but stopped accepting connections around March 3-5, 2026. The issue affects all client machines (both Linux/strongswan and Windows 11 native VPN client).

Gateway configuration

  • SKU: Basic (Generation1)
  • VPN type: RouteBased, IKEv2
  • Public IP: Standard SKU, Static
  • P2S auth: Certificate (EAP-TLS)

What happened

We discovered through IKE client logs that the DNS record for our gateway hostname changed without any customer-initiated action:

  • The azuregateway-*.vpn.azure.com hostname previously resolved to our gateway's assigned public IP (let's call it IP-A)
  • It now resolves to a completely different IP (IP-B) that does not respond to IKE

IKE client logs confirm this:

Last successful connection (March 2, 2026):

charon-nm: initiating IKE_SA to IP-A
charon-nm: IKE_SA established

First failed connection (March 5, 2026):

charon-nm: initiating IKE_SA to IP-B
charon-nm: destroying IKE_SA in state CONNECTING without notification

The IKE_SA_INIT is sent but no response is received. The client retransmits 4 times over 60 seconds, then times out. Neither IP-A nor IP-B currently responds to IKE.

What we've ruled out

  • Client certificates are valid (not expired)
  • Root CA cert uploaded to Azure matches the local cert exactly
  • DNS resolution is consistent across all resolvers (Google, Cloudflare, Azure authoritative DNS)
  • No NSG on GatewaySubnet
  • Azure Resource Health reports gateway as "Available"
  • No changes in Azure activity logs for 90 days (no customer-initiated modifications)
  • Gateway reset via az network vnet-gateway reset — did NOT fix the issue
  • Tested connecting directly to the gateway's assigned public IP (IP-A) — also does not respond
  • Reproduced on both Linux and Windows 11 — same failure

Suspected cause

The timing of the breakage (March 3-5) aligns with infrastructure changes Microsoft began after the February 28, 2026 legacy SKU support deadline [1]. We suspect internal platform changes related to the legacy SKU migration timeline may have inadvertently affected our Basic SKU gateway's IKE service and DNS mapping.

We also note contradictory documentation regarding Basic VPN Gateway and public IP SKU compatibility:

  • [1] states: "The VPN Gateway Basic SKU currently supports only the Basic SKU public IP address resource."
  • [2] states: "No, you can't create a Basic SKU VPN gateway with a Basic SKU public IP address after June 2025. New Basic SKU VPN gateways require a Standard public IP address SKU."

Our gateway uses a Basic VPN Gateway SKU with a Standard public IP — a configuration that worked correctly for months and appears to be required by [2], yet is contradicted by [1].

Questions

  1. Has anyone else experienced their Basic SKU P2S VPN gateway breaking around March 3-5, 2026?
  2. Is this related to Azure infrastructure changes after the Feb 28, 2026 legacy SKU deadline?
  3. Why would the azuregateway-*.vpn.azure.com DNS record change to a different IP that doesn't serve IKE?
  4. What is the recommended path to restore P2S connectivity for a Basic SKU gateway in this state?
  5. Can Microsoft clarify the contradictory documentation about Basic VPN Gateway and public IP compatibility ([1] vs [2])?

References

Azure VPN Gateway
Azure VPN Gateway

An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.


Answer accepted by question author
  1. Praveen Bandaru 11,390 Reputation points Microsoft External Staff Moderator
    2026-03-19T16:33:15.84+00:00

    Hello **Sepehr Soltanieh
    **I understand you're experiencing connectivity issues with the Point to Site VPN, where the connection keeps dropping.

    Here are some suggestions to help resolve the problem:

    1. First, check whether the certificate configuration is set up correctly both in the portal and on your local machine.
    2. If everything is configured properly but the issue persists, try re-downloading the P2S VPN client file and remove the existing client file from your local machine and test it.
    3. If the problem still isn't resolved, delete your current VPN configuration and re-create the point -to- site setup. Once that's done, download the new P2S VPN client file, test the connection, and let me know the outcome.

    Additionally, you mentioned that after recreating the point-to-site configuration, your issue was resolved.


    I hope the above answer helps you! Please let us know if you have any further questions.

    Please don't forget to "accept the answer" and "upvote" where the information provided will help you, this can be beneficial to other members of the community.

    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-03-10T20:33:25.8433333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The behavior described cannot be fully explained from the available documentation, but several points are clear from the context.

    1. Similar reports or a specific incident around March 3–5, 2026 are not documented in the provided material. There is no explicit statement that Basic SKU gateways or their DNS mappings were changed or broken on those dates.
    2. The documented platform changes around this timeframe concern:
      • Retirement and migration of legacy VPN Gateway SKUs (Standard, High Performance) and Basic SKU public IP addresses, not the Basic VPN gateway SKU itself.
      • Automatic migration of gateways that still use Standard or High Performance SKUs after March 2026, including SKU upgrades and IP handling. These changes are described for Standard/High Performance SKUs and Basic public IPs, not for a Basic gateway SKU with a Standard public IP. The context does not state that Basic SKU VPN gateways with Standard public IPs would be disabled or have DNS remapped as part of the legacy SKU deprecation.
    3. The documentation in context does not describe any scenario where the azuregateway-*.vpn.azure.com FQDN is remapped to an IP that does not serve IKE, nor any automatic DNS change behavior tied to the February 28, 2026 legacy deadline. DNS behavior for gateway hostnames is not covered in the provided material.
    4. Recommended recovery paths that are documented for legacy SKUs and Basic IP retirement are:
      • Use the Azure portal migration tool to migrate Basic public IP addresses and associated gateways to Standard public IP and newer gateway SKUs that are supported by availability zones. As part of Basic IP migration, legacy SKUs (Standard, High Performance) are automatically migrated to newer SKUs such as VpnGw1AZ or VpnGw2AZ, with improved performance and no IP change when using the portal migration path.
      • For Resource Manager deployments, when changing from a legacy gateway SKU to a new SKU, delete the existing VPN gateway and create a new VPN gateway, then recreate connections.
      While these steps are documented for Standard/High Performance and Basic IP scenarios, they illustrate the supported pattern to restore service when a legacy configuration is affected by retirement: migrate to a current VpnGw* SKU and Standard public IP, or recreate the gateway on a supported SKU. In a situation where a Basic SKU gateway no longer responds to IKE and a reset does not help, the documented, supported path that aligns with current guidance is to:
      • Plan to move off the Basic SKU to a supported VpnGw* SKU (for example, VpnGw1/VpnGw1AZ), and
      • Recreate the gateway and P2S configuration on that SKU, then redistribute the new P2S configuration package to clients.
    5. On the apparent documentation contradiction about Basic VPN Gateway and public IP compatibility:
      • The context explicitly states that Basic SKU public IP addresses are being retired and that new gateways must use Standard SKU public IP addresses starting December 1, 2023, with the note that this limitation does not apply to creating a Basic gateway SKU that uses a Basic public IP address. It also states that Basic gateway SKU does not support IPv6 and does not support RADIUS.
      • A separate Q&A item confirms that the final retirement date for Basic SKU public IP addresses has been extended to the end of March (previously January 31, 2026), and recommends using the migration tool in the Azure portal to migrate Basic public IPs and associated gateways to Standard SKU public IP before that date.
      • The legacy SKU article in context focuses on Standard and High Performance SKUs and their migration to VpnGw1/VpnGw2/VpnGw1AZ/VpnGw2AZ, and on Basic IP migration; it does not explicitly restate all combinations of gateway SKU vs. public IP SKU.
      From the provided material, the consistent, supported direction is:
      • Basic public IP is being retired; customers must migrate Basic public IPs (and associated gateways) to Standard public IP before the retirement deadline, using the migration tool.
      • As part of that migration, legacy gateway SKUs (Standard, High Performance) are automatically upgraded to newer VpnGw*AZ SKUs.
      • The Basic gateway SKU itself is still listed as a valid Generation1 SKU, with P2S SSTP support and no IKEv2/RADIUS support today, and with a note that Basic SKU will start supporting IKEv2 in November 2025.
      The context does not provide a direct, authoritative statement resolving the specific wording conflict between two external articles about “Basic gateway SKU currently supports only Basic public IP” versus “new Basic gateways require Standard public IP after June 2025.” It only clearly documents:
      • Retirement of Basic public IPs and the requirement to migrate them.
      • That new VPN gateways (in general) must use Standard public IPs starting December 1, 2023, with an exception for creating Basic SKU VPN gateways that still use Basic public IPs.

    Given the limitations of the available documentation, the only supported remediation path that aligns with current guidance is to:

    • Move away from the affected Basic SKU gateway by creating a new VPN gateway on a supported VpnGw* SKU with a Standard public IP, and
    • Reconfigure P2S (and S2S, if any) on that new gateway, then distribute updated client configuration.

    For clarification of the DNS behavior and the specific Basic SKU + Standard IP combination, and to investigate the suspected platform-side issue around March 3–5, 2026, opening a support case with Azure Support is necessary; this level of incident detail is not covered in the documentation provided.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.