Hello forum!
Hoping to get some fresh eyes on an issue im am dealing with currently.
I have a firewall in Azure connected back to us (HQ) over ipsec VPN. Virtual machines can communicate with HQ with no issues, however, they cannot get to the internet. I see in the logs the traffic is being dropped by my FW. Here is the exact error i am receiving:
Id: c0a801c9-1611-7109-605b-3a433ba90001
Marker: @A@@B@1616558409@C@2612367
Log Server Origin: x.x.x.x
Time: 2021-03-24T13:10:27Z
Interface Direction: inbound
Interface Name: eth1-02
Id Generated By Indexer:false
First: true
Sequencenum: 179
Log ID: 404821
Source: 10.0.100.5
Source Port: 50529
Destination: 20.60.132.4
Destination Port: 443
IP Protocol: 6
Scheme: IKE
Methods: ESP: AES-128 + SHA1 + PFS (group 14)
VPN Peer Gateway: x.x.x.x
Encryption Failure: According to the policy the packet should not have been decrypted
VPN Feature: VPN
Action: Drop
Type: Connection
Policy Name: HB-Custom-Policy
Policy Management: cpman
Db Tag: {3138C08A-7834-2645-8B4F-36751CECDF37}
Policy Date: 2021-03-18T19:00:14Z
Blade: VPN
Origin: HBFW1
Service: TCP/443
Product Family: Access
Logid: 1
File Size: 0
Interface: eth1-02
Description:
The 10.0.100.5 is the VM that is trying to access windows updates 20.60.132.4 in the log details above.
- I have the subnet 10.0.100.0 in the route table pointing to our gateway
- I have a network object for 10.0.100.0/23 in the internet allowed out policy
- I can ping from 10.0.100.5 our GW
Any direction here would be much appreciated.