Skip to content

Commit 0e3e53d

Browse files
authored
Merge pull request #280520 from cherylmc/p2sfaq3
Format FAQ
2 parents 5fbc559 + e3ad4ea commit 0e3e53d

File tree

3 files changed

+73
-88
lines changed

3 files changed

+73
-88
lines changed

articles/vpn-gateway/vpn-gateway-vpn-faq.md

Lines changed: 66 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about frequently asked questions for VPN Gateway cross-premis
44
author: cherylmc
55
ms.service: vpn-gateway
66
ms.topic: conceptual
7-
ms.date: 06/19/2024
7+
ms.date: 07/10/2024
88
ms.author: cherylmc
99
---
1010

@@ -26,7 +26,7 @@ If you specified a DNS server or servers when you created your virtual network,
2626

2727
### Can I connect to multiple sites from a single virtual network?
2828

29-
You can connect to multiple sites by using Windows PowerShell and the Azure REST APIs. See the [Multi-Site and VNet-to-VNet Connectivity](#V2VMulti) FAQ section.
29+
You can connect to multiple sites by using Windows PowerShell and the Azure REST APIs. See the [Multi-site and VNet-to-VNet Connectivity](#V2VMulti) FAQ section.
3030

3131
### Is there an additional cost for setting up a VPN gateway as active-active?
3232

@@ -55,17 +55,17 @@ You can configure your virtual network to use both site-to-site and point-to-sit
5555

5656
For normal functioning, the Azure VPN Gateway must establish a secure, mandatory connection with the Azure control plane, facilitated through Public IPs. This connection relies on resolving communication endpoints via public URLs. By default, Azure Virtual Networks (VNets) utilize the built-in Azure DNS (168.63.129.16) to resolve these public URLs, ensuring seamless communication between the Azure VPN Gateway and the Azure control plane.
5757

58-
In implementation of a custom DNS within the VNet, it is crucial to configure a DNS forwarder that points to the Azure native DNS (168.63.129.16), to maintain uninterrupted communication between the VPN Gateway and control plane. Failure to set up a DNS forwarder to the native Azure DNS can prevent Microsoft from performing operations and maintenance on the Azure VPN Gateway, posing a security risk.
58+
In implementation of a custom DNS within the VNet, it's crucial to configure a DNS forwarder that points to the Azure native DNS (168.63.129.16), to maintain uninterrupted communication between the VPN Gateway and control plane. Failure to set up a DNS forwarder to the native Azure DNS can prevent Microsoft from performing operations and maintenance on the Azure VPN Gateway, posing a security risk.
5959

6060
To proper functionalities and healthy state to your VPN Gateway, consider one of the following configurations DNS configurations in VNet:
6161
1. Revert to the default native Azure DNS by removing the custom DNS within the VNet settings (recommended configuration).
62-
2. Add in your custom DNS configuration a DNS forwarder pointing to the native Azure DNS (IP address: 168.63.129.16). Considering the specific rules and nature of your custom DNS, this setup may not resolve and fix the issue as expected.
62+
2. Add in your custom DNS configuration a DNS forwarder pointing to the native Azure DNS (IP address: 168.63.129.16). Considering the specific rules and nature of your custom DNS, this setup might not resolve and fix the issue as expected.
6363

64-
### Could point-to-site VPN connections be affected from potential vulnerability known as 'tunnel vision'?
64+
### Could point-to-site VPN connections be affected by a potential vulnerability known as "tunnel vision"?
6565

6666
Microsoft is aware of reports discussing network technique that bypasses VPN encapsulation. This is an industry-wide issue impacting any operating system that implements a DHCP client according to its RFC specification and has support for DHCP option 121 routes, including Windows.
6767
As the research notes, mitigations include running the VPN inside of a VM that obtains a lease from a virtualized DHCP server to prevent the local networks DHCP server from installing routes altogether.
68-
More information about vulnerability can be found at [NVD - CVE-2024-3661 (nist.gov)](https://nvd.nist.gov/vuln/detail/CVE-2024-3661)
68+
More information about vulnerability can be found at [NVD - CVE-2024-3661 (nist.gov)](https://nvd.nist.gov/vuln/detail/CVE-2024-3661).
6969

7070
## <a name="privacy"></a>Privacy
7171

@@ -103,9 +103,9 @@ No. A gateway type can't be changed from policy-based to route-based, or from ro
103103

104104
Yes, traffic selectors can be defined via the *trafficSelectorPolicies* attribute on a connection via the [New-AzIpsecTrafficSelectorPolicy](/powershell/module/az.network/new-azipsectrafficselectorpolicy) PowerShell command. For the specified traffic selector to take effect, ensure the [Use Policy Based Traffic Selectors](vpn-gateway-connect-multiple-policybased-rm-ps.md#enablepolicybased) option is enabled.
105105

106-
The custom configured traffic selectors will be proposed only when an Azure VPN gateway initiates the connection. A VPN gateway accepts any traffic selectors proposed by a remote gateway (on-premises VPN device). This behavior is consistent between all connection modes (Default, InitiatorOnly, and ResponderOnly).
106+
The custom configured traffic selectors are proposed only when an Azure VPN gateway initiates the connection. A VPN gateway accepts any traffic selectors proposed by a remote gateway (on-premises VPN device). This behavior is consistent between all connection modes (Default, InitiatorOnly, and ResponderOnly).
107107

108-
### Do I need a 'GatewaySubnet'?
108+
### Do I need a GatewaySubnet?
109109

110110
Yes. The gateway subnet contains the IP addresses that the virtual network gateway services use. You need to create a gateway subnet for your virtual network in order to configure a virtual network gateway. All gateway subnets must be named 'GatewaySubnet' to work properly. Don't name your gateway subnet something else. And don't deploy VMs or anything else to the gateway subnet.
111111

@@ -141,7 +141,7 @@ Yes, the Set Pre-Shared Key API and PowerShell cmdlet can be used to configure b
141141

142142
### Can I use other authentication options?
143143

144-
We're limited to using pre-shared keys (PSK) for authentication.
144+
We're limited to using preshared keys (PSK) for authentication.
145145

146146
### How do I specify which traffic goes through the VPN gateway?
147147

@@ -168,7 +168,7 @@ They're required for Azure infrastructure communication. They're protected (lock
168168

169169
A virtual network gateway is fundamentally a multi-homed device with one NIC tapping into the customer private network, and one NIC facing the public network. Azure infrastructure entities can't tap into customer private networks for compliance reasons, so they need to utilize public endpoints for infrastructure communication. The public endpoints are periodically scanned by Azure security audit.
170170

171-
### <a name="vpn-basic"></a>Can I create a VPN gateway with the Basic gateway SKU in the portal?
171+
### <a name="vpn-basic"></a>Can I create a VPN gateway using the Basic gateway SKU in the portal?
172172

173173
No. The Basic SKU isn't available in the portal. You can create a Basic SKU VPN gateway using Azure CLI or PowerShell.
174174

@@ -212,23 +212,69 @@ We support Windows Server 2012 Routing and Remote Access (RRAS) servers for site
212212

213213
Other software VPN solutions should work with our gateway as long as they conform to industry standard IPsec implementations. Contact the vendor of the software for configuration and support instructions.
214214

215-
### Can I connect to a VPN gateway via point-to-site when located at a Site that has an active site-to-site connection?
215+
### Can I connect to a VPN gateway via point-to-site when located at a site that has an active site-to-site connection?
216216

217-
Yes, but the Public IP address(es) of the point-to-site client must be different than the Public IP address(es) used by the site-to-site VPN device, or else the point-to-site connection won't work. point-to-site connections with IKEv2 can't be initiated from the same Public IP address(es) where a site-to-site VPN connection is configured on the same Azure VPN gateway.
217+
Yes, but the Public IP address(es) of the point-to-site client must be different than the Public IP address(es) used by the site-to-site VPN device, or else the point-to-site connection won't work. Point-to-site connections with IKEv2 can't be initiated from the same Public IP address(es) where a site-to-site VPN connection is configured on the same Azure VPN gateway.
218218

219-
## <a name="P2S"></a>Point-to-site - Certificate authentication
219+
## <a name="P2S"></a>Point-to-site FAQ
220220

221-
This section applies to the Resource Manager deployment model.
221+
[!INCLUDE [P2S FAQ All](../../includes/vpn-gateway-faq-p2s-all-include.md)]
222+
223+
## <a name="P2S-cert"></a>Point-to-site - certificate authentication
222224

223225
[!INCLUDE [P2S Azure cert](../../includes/vpn-gateway-faq-p2s-azurecert-include.md)]
224226

225227
## <a name="P2SRADIUS"></a>Point-to-site - RADIUS authentication
226228

227-
This section applies to the Resource Manager deployment model.
229+
### Is RADIUS authentication supported on all Azure VPN Gateway SKUs?
230+
231+
RADIUS authentication is supported for all SKUs except the Basic SKU.
232+
233+
For legacy SKUs, RADIUS authentication is supported on Standard and High Performance SKUs.
234+
235+
### Is RADIUS authentication supported for the classic deployment model?
236+
237+
No. RADIUS authentication isn't supported for the classic deployment model.
238+
239+
### What is the timeout period for RADIUS requests sent to the RADIUS server?
240+
241+
RADIUS requests are set to timeout after 30 seconds. User defined timeout values aren't supported today.
242+
243+
### Are 3rd-party RADIUS servers supported?
244+
245+
Yes, 3rd-party RADIUS servers are supported.
246+
247+
### What are the connectivity requirements to ensure that the Azure gateway is able to reach an on-premises RADIUS server?
248+
249+
A site-to-site VPN connection to the on-premises site, with the proper routes configured, is required.
250+
251+
### Can traffic to an on-premises RADIUS server (from the Azure VPN gateway) be routed over an ExpressRoute connection?
252+
253+
No. It can only be routed over a site-to-site connection.
254+
255+
### Is there a change in the number of SSTP connections supported with RADIUS authentication? What is the maximum number of SSTP and IKEv2 connections supported?
256+
257+
There's no change in the maximum number of SSTP connections supported on a gateway with RADIUS authentication. It remains 128 for SSTP, but depends on the gateway SKU for IKEv2. For more information on the number of connections supported, see [About gateway SKUs](about-gateway-skus.md).
258+
259+
### What is the difference between doing certificate authentication using a RADIUS server vs. using Azure native certificate authentication (by uploading a trusted certificate to Azure)?
260+
261+
In RADIUS certificate authentication, the authentication request is forwarded to a RADIUS server that handles the actual certificate validation. This option is useful if you want to integrate with a certificate authentication infrastructure that you already have through RADIUS.
262+
263+
When using Azure for certificate authentication, the Azure VPN gateway performs the validation of the certificate. You need to upload your certificate public key to the gateway. You can also specify list of revoked certificates that shouldn’t be allowed to connect.
264+
265+
### Does RADIUS authentication support Network Policy Server (NPS) integration for multifactor authorization (MFA)?
266+
267+
If your MFA is text based (SMS, mobile app verification code etc.) and requires the user to enter a code or text in the VPN client UI, the authentication won't succeed and isn't a supported scenario. See [Integrate Azure VPN gateway RADIUS authentication with NPS server for multifactor authentication](vpn-gateway-radius-mfa-nsp.md).
268+
269+
### Does RADIUS authentication work with both IKEv2, and SSTP VPN?
270+
271+
Yes, RADIUS authentication is supported for both IKEv2, and SSTP VPN.
272+
273+
### Does RADIUS authentication work with the OpenVPN client?
228274

229-
[!INCLUDE [vpn-gateway-point-to-site-faq-include](../../includes/vpn-gateway-faq-p2s-radius-include.md)]
275+
RADIUS authentication is supported for the OpenVPN protocol.
230276

231-
## <a name="V2VMulti"></a>VNet-to-VNet and Multi-Site connections
277+
## <a name="V2VMulti"></a>VNet-to-VNet and multi-site connections
232278

233279
[!INCLUDE [vpn-gateway-vnet-vnet-faq-include](../../includes/vpn-gateway-faq-vnet-vnet-include.md)]
234280

@@ -244,9 +290,9 @@ Yes. See the [BGP](#bgp) section for more information.
244290
**Classic deployment model**<br>
245291
Transit traffic via Azure VPN gateway is possible using the classic deployment model, but relies on statically defined address spaces in the network configuration file. BGP isn't yet supported with Azure Virtual Networks and VPN gateways using the classic deployment model. Without BGP, manually defining transit address spaces is very error prone, and not recommended.
246292

247-
### Does Azure generate the same IPsec/IKE pre-shared key for all my VPN connections for the same virtual network?
293+
### Does Azure generate the same IPsec/IKE preshared key for all my VPN connections for the same virtual network?
248294

249-
No, Azure by default generates different pre-shared keys for different VPN connections. However, you can use the `Set VPN Gateway Key` REST API or PowerShell cmdlet to set the key value you prefer. The key MUST only contain printable ASCII characters except space, hyphen (-) or tilde (~).
295+
No, Azure by default generates different preshared keys for different VPN connections. However, you can use the `Set VPN Gateway Key` REST API or PowerShell cmdlet to set the key value you prefer. The key MUST only contain printable ASCII characters except space, hyphen (-) or tilde (~).
250296

251297
### Do I get more bandwidth with more site-to-site VPNs than for a single virtual network?
252298

@@ -298,7 +344,7 @@ You can also connect to your virtual machine by private IP address from another
298344

299345
### If my virtual machine is in a virtual network with cross-premises connectivity, does all the traffic from my VM go through that connection?
300346

301-
No. Only the traffic that has a destination IP that is contained in the virtual network Local Network IP address ranges that you specified will go through the virtual network gateway. Traffic has a destination IP located within the virtual network stays within the virtual network. Other traffic is sent through the load balancer to the public networks, or if forced tunneling is used, sent through the Azure VPN gateway.
347+
No. Only the traffic that has a destination IP that is contained in the virtual network Local Network IP address ranges that you specified goes through the virtual network gateway. Traffic has a destination IP located within the virtual network stays within the virtual network. Other traffic is sent through the load balancer to the public networks, or if forced tunneling is used, sent through the Azure VPN gateway.
302348

303349
### How do I troubleshoot an RDP connection to a VM
304350

includes/vpn-gateway-faq-p2s-azurecert-include.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
ms.date: 10/18/2023
66
ms.author: cherylmc
77
---
8-
[!INCLUDE [P2S FAQ All](vpn-gateway-faq-p2s-all-include.md)]
8+
99

1010
### What should I do if I'm getting a certificate mismatch when connecting using certificate authentication?
1111

@@ -29,17 +29,12 @@ You can use your Enterprise PKI solution (your internal PKI), Azure PowerShell,
2929

3030
### <a name="certsettings"></a>Are there instructions for certificate settings and parameters?
3131

32-
* **Internal PKI/Enterprise PKI solution:** See the steps to [Generate certificates](../articles/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md#generatecert).
33-
34-
* **Azure PowerShell:** See the [Azure PowerShell](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site.md) article for steps.
35-
36-
* **MakeCert:** See the [MakeCert](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-makecert.md) article for steps.
37-
38-
* **OpenSSL:**
32+
For .cer and .pfx file format, see:
3933

40-
* When exporting certificates, be sure to convert the root certificate to Base64.
34+
* [PowerShell](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site.md)
35+
* [Makecert](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-makecert.md)
4136

42-
* For the client certificate:
37+
For .pem file format, see:
4338

44-
* When creating the private key, specify the length as 4096.
45-
* When creating the certificate, for the *-extensions* parameter, specify *usr_cert*.
39+
* [Linux - OpenSSL](../articles/vpn-gateway/point-to-site-certificates-linux-openssl.md)
40+
* [Linux - strongSwan](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-linux.md)

includes/vpn-gateway-faq-p2s-radius-include.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

0 commit comments

Comments
 (0)