@hfregoso wrote: Whats the stae of your phase 1 ? Is the issue with phase 2? One recommendation is to use proxy ids with Azure, I know proxy ids ar eonly for cisco devices but this is one exception to the rule. I have cli access from the PA220 so I've been running the initial vpn test from there, but I don't have CLI access from the cloud side, yet, so I have not initiated anything from that side, yet. The system logs on either side don't show me anything related to the VPN, so that might be my problem. The proxy IDs is something I have not tried yet, and I was just reading about that yesterday. I will give that a try. I mostly wanted to make sure that, with the VM300 in the Azure cloud, I was treating this setup properly and not overlooking some issue related to the particular environment. The PA220 is coming off a working cable modem connection we use for lab setups, and as far as I know, if I allow access through the public facing interface on the Azure side, there's nothing else I have to do in Azure spcifically. Other than that, on both sides I have the ethernet interfaces with static IP addresses added to virtual routers that allow public facing access, as well as their own security zones. The IPsec tunnels are also in the same securty zones, and both tunnels are in 192.168.100.x/24 subnets with .1 as the IP on one side and .10 as the IP on the other. The peer addresses are correct on each side of the tunnel, and the IKE Gateways have the correct local and peer addresses. I'm using the default IKE Crypto and IPSec crypto on both sides. The one thing I want to try is the proxy IP addressing, so I'll give that a try, but wanted to make sure I wasn't overlooking something special. Thanks in advance for the advice.
... View more