Skip to content

Commit 02dbf28

Browse files
committed
Update site-to-site-vpn-private-peering.md
1 parent 250f414 commit 02dbf28

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/vpn-gateway/site-to-site-vpn-private-peering.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Establishing connectivity is straightforward:
4545

4646
### Traffic from on-premises networks to Azure
4747

48-
For traffic from on-premises networks to Azure, the Azure prefixes are advertised via both the ExpressRoute private peering BGP, and the VPN BGP if BGP is configured on your VPN Gateway. The result is two network routes (paths) toward Azure from the on-premises networks:
48+
For traffic from on-premises networks to Azure, the Azure prefixes are advertised via both the ExpressRoute private peering BGP, and the VPN BGP if BGP is configured on your VPN gateway. The result is two network routes (paths) toward Azure from the on-premises networks:
4949

5050
• One network route over the IPsec-protected path.
5151

@@ -70,15 +70,15 @@ In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN c
7070

7171
1. Configure a Site-to-Site connection. For steps, see the [Site-to-site configuration](./tutorial-site-to-site-portal.md) article. Be sure to pick a gateway with a Standard Public IP.
7272
1. Enable Private IPs on the gateway. Select **Configuration**, then set **Gateway Private IPs** to **Enabled**. Select **Save** to save your changes.
73-
1. On the **Overview** page, select **See More** to view the private IP address. Write down this information to use later in the configuration steps.
73+
1. On the **Overview** page, select **See More** to view the private IP address. Write down this information to use later in the configuration steps. If you have an active-active mode VPN gateway, you'll see two private IP addresses.
7474

75-
:::image type="content" source="media/site-to-site-vpn-private-peering/see-more.png" alt-text="Screenshot of the Overview page with See More selected." lightbox="media/site-to-site-vpn-private-peering/gateway-overview.png":::
75+
:::image type="content" source="media/site-to-site-vpn-private-peering/see-more.png" alt-text="Screenshot of the Overview page with See More selected." lightbox="media/site-to-site-vpn-private-peering/see-more.png":::
7676
1. To enable **Use Azure Private IP Address** on the connection, go to the **Configuration** page. Set **Use Azure Private IP Address** to **Enabled**, then select **Save**.
7777

78-
1. Use the private IP that you wrote down in step 3 as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.
78+
1. Use the private IP address that you wrote down in step 3 as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.
7979

8080
> [!NOTE]
81-
> Configurig BGP on your VPN Gateway is not required to achieve a VPN connection over ExpressRoute private peering.
81+
> Configuring BGP on your VPN gateway is not required to achieve a VPN connection over ExpressRoute private peering.
8282
8383
## <a name="powershell"></a>PowerShell steps
8484

0 commit comments

Comments
 (0)