Microsoft Azure
This guide will show you how to connect your Microsoft Azure cloud to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.
Last updated
Was this helpful?
This guide will show you how to connect your Microsoft Azure cloud to the GoodAccess Gateway via a site-to-site connection using the IPsec protocol.
Last updated
Was this helpful?
You need a virtual network gateway in Azure. If you don't have one, .
Click + Add new, enter the Cloud name and subnet, and select Gateway.
Choose IPSec Protocol, fill out the Settings configuration form, and click Save.
Set the configuration as follows:
Endpoint - IP address
IP address - IP of your GoodAccess Gateway
Address spaces - Subnet of your GoodAccess Gateway
The remaining settings are up to you.
Click Review + create and then Create.
Go to Virtual network gateways (you can use the searchbar), and select your virtual network gateway.
Go to Connections, click + Add, and set the configuration as follows:
Connection type - Site-to-site (IPsec)
The remaining settings are up to you.
Click Next : Settings >, and set the configuration as follows:
Virtual network gateway - Choose from the dropdown
Local network gateway - Choose from the dropdown
IKE Protocol - IKEv2
IPsec / IKE policy - Custom
IPsec SA lifetime in seconds - Tunnel Lifetime (Phase 2)
DPD timeout in seconds - Dead Peer Detection Delay
The remaining settings are up to you.
Click Review + create, and then Create.
You have now successfully connected your Azure resources to GoodAccess.
Firewall rules
Make sure you allow connections from your GoodAccess Gateway private subnet to the resources in your Virtual Network (VNet) (e.g., virtual machines, databases, etc.).
Depending on your Azure security setup, you may need to allow this communication in:
Network Security Groups (NSGs)
Azure Firewall
Log in to the , and go to Local network gateways (you can use the searchbar), and click + Create.
Shared key (PSK) - Shared Secret
IKE Phase 1 & 2 - Must match configuration from GoodAccess