Azure VPN does not work if NAT-T is involved

NewToAzure 11 Reputation points
2022-06-06T18:16:58.573+00:00

Hi all,
I have a Cisco ASA firewall, where if I created a Route Based VPN " gtwy, local connection and connection, I can get both a policy based and route based working on the ASA side to my Azure VPN.

My issue is, I have a ISP route with a new ISP and the peer IP is on this router. So it is doing a one to one NAT and when I do a Azure peering to this IP, where NAT-T is in use, I cannot get it to work.
Phase 1 and 2 come up on the ASA, and I see my packets being encrypted and sent through the tunnel, but I get no replies from the Azure side, even though the Connection shows Connected.

If I look at the effective routes on my test Azure VM server, I see the routes to my OnPrem subnet pointing to the Virtual gateway, and I am allowing ping through my NSG and Windows firewall, but I see no traffic hit my ASA.

Reminder, if I change this back to the IP address on my ASAs outside interface, it comes up fine and xmt and rcv works fine.
Only issue is when NAT-T is involved.
MS docs say NAT-T is supported, but I cant get it to work.

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,795 questions
{count} votes

2 answers

Sort by: Most helpful
  1. Jackson Martins 10,606 Reputation points MVP Volunteer Moderator
    2022-06-06T22:59:02.857+00:00

    Hi!
    I need to ask a few questions, but the first is: what SKU are you using in Vpngw? Second, based on my understanding, your scenario looks like the below

    don`t work
    Host 1 -> ASA -> ISP NAT -> Public IP <> Azure GW <- vnet <- host

    works fine
    Host 1 -> ASA -> ISP Public IP <> Azure GW <- vnet <- host

    did you create any nat rules in azure?


  2. Chuck Chitchalerntham 1 Reputation point
    2022-12-02T20:13:18.533+00:00

    Hello,

    NAT-T works with Azure VPN. On your Firewall, make sure you add route of the Azure VPNGW public IP via ISP2, since all traffic goes out default route ISP1. Otherwise the return packet will never reach ISP2 FW interface - sample diagram, not sure of your requirements.

    sample. say my Azure VPN GW is 20.20.20.20

    route ISP 0.0.0.0 0.0.0.0 ISPGW 1
    route ISP2 20.20.20.20 255.255.255.255 ISP2GW 1

    266629-image.png

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.