An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Hi @ Andrew Bates ,
Welcome to Microsoft Q&A Platform
As per Microsoft documentation ( Default IPsec/IKE parameters ), the IKE Phase 1 (Main Mode) SA lifetime on Azure VPN Gateway is fixed at 28,800 seconds and cannot be modified for both route-based and policy-based gateways.
The error 13885 (SA_DELETE) indicates that the Phase 1 SA expired or was deleted by the peer, which forces teardown of the Phase 2 SA and results in traffic interruption.
From the provided logs:
- Azure reports: “Main mode SA lifetime expired or peer sent a delete”
- AWS logs show: “IKE service restarting”
This strongly indicates the remote peer (AWS) initiated the delete during rekey or service restart, not Azure.
Please configure your on-premises VPN devices according to the Microsoft-documented IKE/IPsec parameters mentioned above.
Can Microsoft confirm from gateway-side telemetry whether the SA_DELETE (ErrorCode 13885) was initiated by the Azure gateway or by the remote peer?
The SA_DELETE is most likely initiated by the remote peer (AWS side) due to IKE process restart or rekey handling behavior.
Is DHGroup2 fully supported for IKEv2 Phase 1 rekeys on the current VPN Gateway platform, or are there known stability issues that would recommend upgrading to DHGroup14?
Yes, DHGroup2 is supported, ref these docs for more details
Were there any Azure platform updates applied to VpnGw-External on or around 2026-04-10 that could have affected IKE rekey behavior?
There is no publicly documented change specific to:
- IKE rekey behavior
- DH group handling
- SA lifetime enforcement
You must ensure AWS rekeys BEFORE expiry, not at expiry.
What is the recommended remote peer configuration to ensure seamless in-place rekeys against an Azure VPN Gateway fixed at 28,800s Phase 1 lifetime?
IKE Phase 1 (Main Mode) SA lifetime is fixed at 28,800 seconds on Azure VPN Gateway and is not configurable.
To avoid tunnel drops:
Configure AWS to initiate rekey BEFORE expiry
- Phase 1 lifetime: 28,800s (match Azure)
- Rekey margin: ~10–15% earlier
Ensure:
- PFS settings match (you currently have mismatch: Azure = PFS2, AWS = None )
- Phase 2 lifetime alignment (3600s is OK)
This applies to: Route-based gateways & Policy-based gateways
Follow the Configure custom IPsec/IKE connection policies for S2S VPN and VNet-to-VNet*
How to connect AWS and Azure using a BGP-enabled VPN gateway
Please
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.