This document describes CGW deployment on 2 interface setup where WAN and LAN interfaces need to be on different subnets. 2 interface CGW deployment handles the cases where LAN subnet or private resources do not have direct public/internet access.
Please refer CGW deployment guide to understand single/dual interface solutions.
Use privileged credentials and login to Azure portal.
Check subscription and identify resource group and region to deploy CGW.
Users can use existing vnet (Virtual Networks) but we recommend to create new vnet to avoid modifying existing network configurations. (Refer to Create Network section of this page)
Create 2 subnets, one for WAN and another for LAN network. For eg. WAN subnet 10.19.0.0/24 (default) and LAN subnet 10.19.1.0/24 (Refer to Create Subnet section of this page)
Create a VM on Azure
Navigate to home page and select Virtual machines
Click on Create and select Azure virtual machine
Provide details such as Subscription, Resource group, Virtual machine name, Region, Image (Recommended- ubuntu Server 24.04 LTS – x64 Gen2), VM Architecture (x64), Size (As per throughput requirement, but user can use 1 vCPU and 3.5 GB RAM configuration).
Select Authentication type as SSH public key. Username and key name can be modified or skipped with default values.
Click on Review + create
Select Networking section to validate subnet used for networking
Selected subnet will be configured on primary interface on VM, to provide WAN/Internet connectivity (In current example 10.19.0.0/24)
For higher bandwidth, enable Accelerated Networking
Azure does not allow Accelerated Networking on the VMs with lower size/flavors
Click on Review + create
Validate inputs and configuration for CGW VM and click on Create
Download ssh keys to access CGW later from ssh clients
VM deployment will start and it will show progress on terminal
After VM deployment completes, click on Go to resource
Shutdown VM by clicking on Stop button
Navigate to Home -> Virtual machines and check for CGW VM state. It must show stopped state
Select CGW VM, and on Overview page, select Networking
Click on Attach network interface
Click on Create and attach network interface
Provide inputs:
Check Subscription, resource group, location/region are same where CGW VM was created
Provide name - cgw_p_lan_intf
When HA is enabled for CGW, network interface names must be cgw_p_lan_intf and cgw_s_lan_intf for Primary and Secondary node respectively.
Check for virtual network, make sure it matches with CGW VM’s vnet
Select subnet (Other then default, which was created for LAN interface) for eg. 10.19.1.0/24
Select Static option for Private IP address assignment
Provide static IP address as “10.19.1.251” if LAN subnet selected or configured is 10.19.1.0/24 (Application by default reserves and uses ‘.251’ IP address of the LAN subnet)
When HA is enabled for CGW, IP address must be subnets .251and .252for Primary and Secondary node respectively.
Leave rest everything as it is.
Create the network interface, by clicking on Create button
Once LAN interface is created and attached, it will display on Networking section with the static IP address configured
Navigate to Home -> Virtual machines, select CGW machine and Start VM by clicking on start button
Verify CGW VM is up and running before execution of further processes
After ssh access or login, check WAN/Internet on CGW VM – Use ping command with WAN interface name and check 8.8.8.8 and google.com to verify Internet access
Few times, due to firewall in path, ping may not work. Allow ping to 8.8.8.8, 1.1.1.1 and google.com for CGW WAN IP on firewall.
If no firewall in path, it is possible that Network Security Group (NSG) is not allowing ping to work. Configure inbound and outbound rules for the CGW VM. Add rule or modify existing rule and include ICMP protocol in allow list for any IP range.
For example, in current sample, eth0 is used as WAN interface name
azureuser@cgw:~$ ping -I eth0 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=115 time=13.0 ms
azureuser@cgw:~$ ping -I eth0 google.com
PING google.com (142.250.125.100) 56(84) bytes of data.
64 bytes from jh-in-f100.1e100.net (142.250.125.100): icmp_seq=1 ttl=101 time=25.7 ms
Click on Gateways in the left menu bar → Add Gateway
Name - You may change the name of the CGW
Select Gateway Type as Multi Interface. Fill in the details and add Gateway.
High Availability (HA) - Please select ‘Yes’ if CGW to be deployed in High Availability mode. 2 Ubuntu VMs or any other 2 quantity of recommended hardware needed for HA setup, Please refer HA user manual for more detailed instructions.
Admin Notifications Email - Provide email ID which will receive alerts/notifications related to CGW
LAN Configuration
If NAT is not required on LAN network then select No for option NAT on LAN, else skip it
In case of Multiple LAN subnets, click on + symbol and add additional subnets, else skip it
LAN Subnet - Enter LAN subnet (for eg. 10.19.1.0/24). This will be added as Trustpath automatically to Gateway, so no need to add this as Trustpath again. VERY IMPORTANT: This is the subnet that will be behind the gateway (i.e. plugged into the LAN port of the gateway) that you want remote users to be able to access. This is NOT the subnet that the WAN port of the gateway is on.
LAN Gateway - Specify IP address of the Gateway which will be used by the devices behind CGW in LAN subnet specified in above parameter. Configured LAN Gateway IP will be installed on the CGW machine, so make sure it is not conflicting in network or not installed on any other device statically. If HA (High Availability) is enabled, then do not use .251 and .252 IP addresses as LAN Gateway IP. These IP addresses will be installed on Primary and Secondary nodes respectively.
Next HOP GW for LAN - Provide gateway for LAN traffic. It is required when LAN traffic has to send all traffic to an IP which handles communication with actual core LAN network.
VLAN Configuration
Select Yes if CGW needs to support VLAN network segments. Please refer VLAN user manual for more detailed instructions.
If Yes is selected, please specify VLAN IDs and VLAN subnets.
Specify VLAN Gateway IP
Inter VLAN Communication - Select Yes, if inter VLAN communication should be allowed
Enable/Disable DHCP IP allocation for all VLANs by selecting Yes/No for DHCP for All VLANs option
You may also enable/disable DHCP IP allocation for individual VLAN by selecting Yes/No for DHCP option
By default, VLAN DHCP function will use start range .2 to end range .250
DHCP Configuration
DHCP server - Select Yes, if DHCP IP assignment should happen from CGW on LAN network. Please refer DHCP user manual for more detailed instructions.
If selected Yes, DHCP server will be started for LAN
Specify Start Range and End Range
SD-WAN Configuration
Mostly for CGW deployment on public clouds, you may not need static IPs on WAN interfaces but for specific requirements, it can be added.
Static IP address along with their default gateway can be configured.
Mostly it is required when existing Firewalls are replaced with CGW and ISP provided public IP and gateway need to configured on CGW node directly on WAN interface. Please refer SD-WAN user manual for more detailed instructions.
Configure below parameters, if WAN Static IP is set to Yes, else skip
WAN1 IP(Primary) - Specify IP with subnet for Primary CGW node
WAN1 Gateway(Primary) - Specify gateway IP without subnet for Primary CGW node
In case you want to deploy CGW with 2 WAN interfaces then select Yes for Multi WAN option, else skip it
If selected Yes, you can select Traffic Distribution as Failover or Load Balance
In case of Failover, only one WAN interface / ISP connection will be active
In case of Load Balance, both WAN interfaces / ISP connections will be active and in load balance mode
If Multi WAN is selected with WAN Static IP option, then WAN2 IP (Primary) must be configured with WAN2 gateway (Primary)
Copy the Script for the cyber gateway you just created as shown in the screenshot below
Paste the Script in the VM SSH console
Press Enter
In case, you are unable to login to machine using SSH to copy and run CGW install command, then we recommend you to run pre-install script mentioned below. You have to type it on console, because copy paste won't work on some direct machine consoles.
Please share Workspace and CGW names with us on support@exium.net. We will push installation remotely.
The Cyber gateway deployment will start. At this time, you can leave the deployment running unattended. You will receive an email on the admin email that you specified earlier when the deployment is complete. You can also check the status of the cyber gateway in the Exium admin console. When cyber gateway is deployed successfully and connected, you will see a Green Connected Status as in the screenshot below.
High availability on Azure requires additional configuration. For inside-out access, CGW will need floating IP configured on it's LAN interface. Floating IP will act like a LAN gateway for the machines behind CGW on Azure. It is always attached to active peer and enables external connectivity. On failover, the process of detaching the IP address and reattaching it to the now active peer can take a few minutes.
To enable CGW HA on Azure, you need an Azure Active Directory application and Service Principal that includes the permissions listed below:
User must be Global Administrator to create service principle.
Perform below steps on any of your existing Ubuntu machine. If you don't have any, you can use one of CGW VM and logout from Azure account after configuration completes:
HA-config file az-cgw-mif-ha-param.ini will be created in current directory. Copy az-cgw-mif-ha-param.ini file on your laptop to use it on CGWs post CGW installation. This file must be copied on both CGW machines once they are deployed.
Repeat VM Creation step for CGW secondary node also and create another VM.
Once secondary node is created, copy the install command from admin console.
Copy Install Command for secondary node again:
Replace P with S, in install command, which will look like:
Copy HA-config file az-cgw-mif-ha-param.ini on both CGWs in path /etc/ngcgw/ha/ directory after installation is completed on both CGW nodes. Service will not come up on CGW until HA config file is copied on CGW nodes.
CGW can be configured as default gateway for the resources/VMs on Azure to act as a default gateway for internet access. Note down CGW LAN IP address which was created in earlier steps.
Refer to the below steps:
Navigate to Home -> Virtual networks
Select the vnet created for CGW
Select Subnet
Click on the LAN subnet, in current example it is 10.19.1.0/24 (If not created, click on plus symbol to add subnet)
Navigate to “Route tables” page
Click on plus symbol to create new route table
Provide details for route table creation
Select Subscription,
Select the resource group used for CGW VM creation
Select region where CGW VM is created
Provide name of the VM.
Click on “Review and create” and create it.
Click on “Go to resource”
Click on “Routes” in left panel.
Click on Add to add a new route in table.
Fill all the fields:
Provide name
Select IP addresses in Destination type
Enter 0.0.0.0/0 for default traffic in Destination IP addresses
Select virtual appliance in Next hop type
Enter the LAN interface static IP address which was created and attached to CGW VM during VM creation/deployment. (For eg. 10.19.1.251). Click on Add.
Navigate to Home -> Virtual networks
Select the vnet created for CGW
Select Subnets and click on LAN subnet
Click on CGW LAN subnet, select the route table created in earlier step and save.
Note: Azure private VMs configured within LAN subnet will now be able to securely access internet via CGW as default gateway.
Azure supports different flavors/sizes of VMs as per bandwidth requirements. To achieve throughput or bandwidth in Gbps, you must select VM size with higher resources.
For example, Standard D4ds v4 size can provide bandwidth up to 10Gbps. Azure also restricts egress traffic and VMs which are accessing internet via CGW, must be configured with higher size to achieve best results. Accelerated networking must be enabled on the CGW and as well as on the user machines.