- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- R81.20 VSX VTI routing
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
R81.20 VSX VTI routing
Hi ,
This my first post so apologies if I don't follow the expected etticate while I get used to the forum.
Anyway the issue I have created a routed VPN to Azure for our orgs new Remote client VPN . As I can see the VTI tunnels are working . However , outbound traffic routes to the wrp external interface . The logs stat traffic is encrypted by the community. Also traffic does get to the Azure infrastructure. The reason for my post is the logs for inbound traffic from the Azure side show the traffic hitting the VTI tunnel .
Is this normal behaviour ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Let me take a "stab" at it, as the saying goes. So, Im fairly experienced with tunnels to Azure, I had helped lots of customers with it, plus had done extensive testing in the lab as well.
So, I have some question for ya.
1) is this numbered or unnumbered VTI?
2) Regardless what answer is to question1 (though it is somewhat important), can you please share how the route is configured for the subnet on Azure side? (please blur out any sensitive info)
3) As far as topology in smart console, this is SUPER IMPORTANT and it has to be correct...make sure anti-spoofing is disabled and actual remote peer matched EXACTLY how its configured in smart console interoperable object.
4) Is remote peer external IP added to be exmpred for anti spoof checks on external interface? Because if not, it should be
5) Do you have a route to external IP of the peer with default gateway of your upstream router IP?
Thats all I can think of for now.
Best,
Andy
