- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
IPsec Azure
IPsec tunnel from our firewall (Fortigate 100F) to Azure basically works, as soon as we set up NAT or activate NAT rules in Azure, the tunnel breaks down or the traffic does not work. My concern is that we are probably not passing through the NAT range correctly, but I cannot prove this.
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is your NAT address defined in phase2 selector on both ends?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @AUT_Maverick,
Please check phase2 selectors as suggested by AEK. You can also collect ike debugs to see why it is not working. Please refer to this article: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Understanding-IPsec-iked-debug-logs/ta-p/2...
Regards,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please review the following document to verify the Tunnel configuration
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Your concern is quite understandable. Perhaps the problem is actually related to incorrect NAT range transfer configuration. It is recommended to check the correct NAT settings on both sides of the tunnel and ensure that the NAT range is correctly transmitted through the tunnel. It is also worth paying attention to possible conflicts in network settings and routing settings. If in doubt, you can contact Fortigate or Azure support for further assistance.
