Skip to content

Commit 0f06102

Browse files
committed
Update for name of BGP route propagation feature
1 parent 80989db commit 0f06102

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/firewall/tutorial-hybrid-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 02/21/2020
8+
ms.date: 03/24/2020
99
ms.author: victorh
1010
customer intent: As an administrator, I want to control network access from an on-premises network to an Azure virtual network.
1111
---
@@ -49,7 +49,7 @@ A hybrid network uses the hub-and-spoke architecture model to route traffic betw
4949
Additionally, routes to the gateway-connected virtual networks or on-premises networks will automatically propagate to the routing tables for the peered virtual networks using the gateway transit. For more information, see [Configure VPN gateway transit for virtual network peering](../vpn-gateway/vpn-gateway-peering-gateway-transit.md).
5050

5151
- Set **UseRemoteGateways** when you peer VNet-Spoke to VNet-Hub. If **UseRemoteGateways** is set and **AllowGatewayTransit** on remote peering is also set, the spoke virtual network uses gateways of the remote virtual network for transit.
52-
- To route the spoke subnet traffic through the hub firewall, you need a User Defined route (UDR) that points to the firewall with the **Disable BGP route propagation** option set. The **Disable BGP route propagation** option prevents route distribution to the spoke subnets. This prevents learned routes from conflicting with your UDR.
52+
- To route the spoke subnet traffic through the hub firewall, you need a User Defined route (UDR) that points to the firewall with the **Virtual network gateway route propagation** option disabled. The **Virtual network gateway route propagation** disabled option prevents route distribution to the spoke subnets. This prevents learned routes from conflicting with your UDR.
5353
- Configure a UDR on the hub gateway subnet that points to the firewall IP address as the next hop to the spoke networks. No UDR is required on the Azure Firewall subnet, as it learns routes from BGP.
5454

5555
See the [Create Routes](#create-the-routes) section in this tutorial to see how these routes are created.

0 commit comments

Comments
 (0)