Hi everyone,
I’m helping a friend with their small business after their server died, and I volunteered to migrate them to the cloud. There are a maximum of 5 users, with 2 working from home frequently.
However, I’ve run into some challenges. Since it’s a small company, they’re reluctant to pay for an Azure VPN Gateway SKU, which starts at $140/month. Instead, I deployed a Basic SKU and connected their on-premises network to Azure. Some of their applications require Active Directory (AD) for authentication.
Initially, I set up a Mobile SSL VPN, but it turned out to be incredibly slow. After some advice, I upgraded to an IKEv2 Mobile VPN.
Here are the network details:
Azure DC: 10.3.1.4/16
Azure Subnet: 10.3.1.0/16
Local Network: 10.1.1.0/24
Mobile VPN SSL: 10.1.10.0/24
IKEv2 Mobile VPN: 10.1.20.0/24
No matter how many static routes I configure or which local addresses I assign to the tunnel, it won’t route properly. When connected to the IKEv2 VPN, users can see and ping the Domain Controller (DC), but they can’t route traffic to the Azure DC, network, or subnet.
The current version of WatchGuard (12.3.0) doesn’t seem to allow configuring rules to force VPN traffic through the tunnel unless done locally. This likely means I’ll need to configure NAT to allow users to access external networks.
The only way I’ve managed to get this to work is by setting the IKEv2 Mobile VPN Virtual Address Pool to match the local network. However, this results in IP address overlap, which I know could cause significant problems down the line. But it’s the only solution that’s worked so far.
My Questions:
Is it okay to leave the IP addresses overlapping in this scenario, or is it a recipe for disaster?
Are there any other solutions I should try?
I’m considering pushing them to invest in an extended license so we can upgrade the system. In the meantime, any advice or ideas would be greatly appreciated.
Thanks in advance for your help!
Shaun