简体   繁体   English

何时在基于Azure策略的基本VNet网关,IKEv1站点到站点连接上执行NAT-T命名

[英]When is NAT-T natting performed on Azure policy based basic VNet gateway, IKEv1 site-to-site connection

I have a strange requirement for IKEv1 VPN to a Cisco ASA and Checkpoint system with Azure. 我对使用Azure的Cisco ASA和Checkpoint系统的IKEv1 VPN提出了奇怪的要求。

We setup two Azure policy based VNet gateways, virtual networks and associated virtual machines. 我们设置了两个基于Azure策略的VNet网关,虚拟网络和关联的虚拟机。

The connection has to be IKEv1 AES-256-SHA1-DHGroup2 site-to-site connection per their test and production environments so we setup one for test and production. 每个测试和生产环境的连接必须是IKEv1 AES-256-SHA1-DHGroup2站点到站点的连接,因此我们为测试和生产设置了一个。

The third party system does not support RFC1918 addressing within VPN tunnels (encryption domain) and/or Peers. 第三方系统不支持VPN隧道(加密域)和/或Peer中的RFC1918寻址。 There must be publicly assigned IP addresses for the VPN tunnel, as well as a publicly routed IP address for the peer. VPN隧道必须有公共分配的IP地址,对等方必须有公共路由的IP地址。

They recommend using subnets within the tunnel negotiations, and using your access-lists to narrow this down to specific hosts (subnet SA's vs. host SA's). 他们建议在隧道协商中使用子网,并使用访问列表将其范围缩小到特定主机(子网SA与主机SA)。 In the event you need to “hide” multiple hosts behind a single IP address, you should PAT using a publicly assigned address to be included in the VPN tunnel. 如果您需要“隐藏”单个IP地址后面的多个主机,则应使用公共分配的地址进行PAT,以将其包括在VPN隧道中。 NAT-T (UDP Encapsulation of IPSEC) is not supported due to global configuration items which affect multiple customers. 由于全局配置项会影响多个客户,因此不支持NAT-T(IPSEC的UDP封装)。

My question is when is NAT-T performed when connecting to an Azure virtual network gateway in policy-based (IKEv1) mode on site-to-site (S2S) connections? 我的问题是,在站点到站点(S2S)连接上以基于策略(IKEv1)模式连接到Azure虚拟网络网关时,何时执行NAT-T? Is it done at all or when is it performed? 它是完成的还是何时执行的? Is it only performed if there is a load balancer out front? 仅在前面有负载均衡器时才执行吗?

To clarify: Have you gone through this suggestion : Site-to-Site – VPN connection over IPsec (IKE v1 and IKE v2). 澄清一下:您是否通过了以下建议:站点到站点–通过IPsec(IKE v1和IKE v2)的VPN连接。 This type of connection requires a VPN device or RRAS. 此类连接需要VPN设备或RRAS。 For more information, see Site-to-Site: https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-site-to-site-resource-manager-portal 有关更多信息,请参见站点到站点: https : //docs.microsoft.com/zh-cn/azure/vpn-gateway/vpn-gateway-howto-site-to-site-resource-manager-portal

Point-to-Site – VPN connection over SSTP (Secure Socket Tunneling Protocol). 点对站点–通过SSTP(安全套接字隧道协议)的VPN连接。 This connection does not require a VPN device. 此连接不需要VPN设备。 For more information, see Point-to-Site: https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal 有关更多信息,请参见指向站点: https : //docs.microsoft.com/zh-cn/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal

VNet-to-VNet – This type of connection is the same as a Site-to-Site configuration. VNet到VNet –这种连接类型与站点到站点配置相同。 VNet to VNet is a VPN connection over IPsec (IKE v1 and IKE v2). VNet到VNet是通过IPsec(IKE v1和IKE v2)的VPN连接。 It does not require a VPN device. 它不需要VPN设备。 For more information, see VNet-to-VNet: https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal 有关更多信息,请参见VNet-to-VNet: https ://docs.microsoft.com/zh-cn/azure/vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal

Multi-Site – This is a variation of a Site-to-Site configuration that allows you to connect multiple on-premises sites to a virtual network. 多站点–这是站点到站点配置的一种变体,它使您可以将多个本地站点连接到虚拟网络。

Only the traffic that has a destination IP that is contained in the virtual network Local Network IP address ranges that you specified will go through the virtual network gateway. 只有指定的虚拟网络“本地网络IP地址”范围中包含目标IP的流量才会通过虚拟网络网关。 Traffic has a destination IP located within the virtual network stays within the virtual network. 流量具有位于虚拟网络内的目标IP并停留在虚拟网络内。 Other traffic is sent through the load balancer to the public networks, or if forced tunneling is used, sent through the Azure VPN gateway 其他流量通过负载平衡器发送到公共网络,或者如果使用强制隧道,则通过Azure VPN网关发送

I think I tried to answer the same questions on the MSDN forum. 我想我试图在MSDN论坛上回答相同的问题。 Just re-iterate the answers: 只需重申一下答案即可:

  1. NAT-T is performed on the outer packets/addresses of IPsec packets. NAT-T在IPsec数据包的外部数据包/地址上执行。
  2. Azure VPN gateway does NOT perform any NAT/PAT functionality on the inner packets in/out of IPsec tunnels. Azure VPN网关不对传入/传出IPsec隧道的内部数据包执行任何NAT / PAT功能。 So if you use public IP addresses inside of your on-premises network and your Azure virtual network they will stay the same to/from the Azure VPN gateways and IPsec tunnels. 因此,如果您在本地网络和Azure虚拟网络内部使用公用IP地址,则它们将与Azure VPN网关和IPsec隧道之间保持相同。
  3. You can use public IP address spaces as "private" IP addresses on your Azure VMs / Azure virtual network. 您可以将公用IP地址空间用作Azure VM / Azure虚拟网络上的“专用” IP地址。 These will be treated like "private" addresses by the Azure VPN gateways. Azure VPN网关会将这些地址视为“专用”地址。 We will not NAT those inner packets. 我们不会对那些内部数据包进行NAT。

Hope this helps. 希望这可以帮助。

Thanks, Yushun [MSFT] 谢谢,玉顺[MSFT]

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 具有基于策略的站点到站点连接的同一网络上的Azure指向站点VPN - Azure Point to Site VPN on Same Network that is having Policy based Site-to-Site connection 使用Azure CNI和站点到站点VPN VNet时,如何从Pod子网中拆分AKS群集子网 - How to split AKS cluster subnet from pod subnet when using Azure CNI and a site-to-site VPN VNet Azure上的站点到站点VPN - Site-to-site VPN on Azure Azure站点到站点网络 - Azure Site-to-Site Networking 可以在VNET中的Web应用程序+ Azure VM与本地VLAN之间进行站点到站点VPN吗? - Site-to-Site VPN between Web App + Azure VM within VNET & on-prem VLAN possible? Azure VNET 到 VNET 到站点到站点 VPN 连接 - Azure VNET to VNET to site to site VPN connectivity Azure站点到站点连接和SQL IaaS - Azure Site-To-Site connectivity and SQL IaaS 使用 Oracle OCI 的 Azure 站点到站点 VPN - Azure Site-To-Site VPN with Oracle OCI 识别通过资源管理器配置的 Azure 站点到站点 v2 VPN 隧道的连接状态 - Identifying Connection State of Azure Site-to-Site v2 VPN tunnels provisioned via Resource Manager 是否可以使用站点到站点 (VPN) 连接来连接两个 Azure VNet? - Is it possible to connect two Azure VNets using site-to-site (VPN) connection?
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM