You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/point-to-site-certificate-gateway.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,9 +70,7 @@ The tunnel type and the authentication type must correspond to the VPN client so
70
70
71
71
## <aname="publicip3"></a>Add another public IP address
72
72
73
-
If you have an active-active mode gateway, you need to specify a third public IP address to configure point-to-site. In the example, we create the third public IP address using the example value **VNet1GWpip3**. If your gateway isn't in active-active mode, you don't need to add another public IP address.
74
-
75
-
:::image type="content" source="./media/vpn-gateway-howto-point-to-site-resource-manager-portal/public-ip.png" alt-text="Screenshot of Point-to-site configuration page - public IP address." lightbox="./media/vpn-gateway-howto-point-to-site-resource-manager-portal/public-ip.png":::
73
+
[!INCLUDE [Add public IP address](../../includes/vpn-gateway-third-public-ip.md)]
76
74
77
75
## <aname="uploadfile"></a>Upload root certificate public key information
Copy file name to clipboardExpand all lines: articles/vpn-gateway/point-to-site-how-to-radius-ps.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,20 @@
1
1
---
2
-
title: 'Connect to a virtual network using P2S and RADIUS authentication: PowerShell'
2
+
title: Connect to a virtual network using P2S and RADIUS authentication - PowerShell
3
3
titleSuffix: Azure VPN Gateway
4
4
description: Learn how to connect VPN clients securely to a virtual network using P2S and RADIUS authentication.
5
5
author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.topic: how-to
8
-
ms.date: 06/20/2024
8
+
ms.date: 12/06/2024
9
9
ms.author: cherylmc
10
10
ms.custom: devx-track-azurepowershell
11
11
12
12
---
13
13
# Configure P2S VPN Gateway server settings - RADIUS authentication
14
14
15
-
This article helps you create a point-to-site (P2S) connection that uses RADIUS authentication. You can create this configuration using either PowerShell, or the Azure portal. If you want to authenticate using a different method, see the following articles:
15
+
This article helps you create a point-to-site (P2S) connection that uses RADIUS authentication. You can create this configuration using either PowerShell, or the Azure portal. If you have an active-active mode VPN gateway, at this time we advise you to use the [Azure portal](point-to-site-radius-gateway.md) article to configure the RADIUS server settings. P2S VPN gateways require an additional IP address when the gateway is in active-active mode.
*[Microsoft Entra ID authentication](openvpn-azure-ad-tenant.md)
19
-
20
-
For more information about point-to-site VPN connections, see [About P2S VPN](point-to-site-about.md).
17
+
For more information about point-to-site VPN connections, see [About point-to-site VPN](point-to-site-about.md).
21
18
22
19
This type of connection requires:
23
20
@@ -27,14 +24,14 @@ This type of connection requires:
27
24
28
25
Limitations:
29
26
30
-
* If you are using IKEv2 with RADIUS, only EAP-based authentication is supported.
27
+
* If you're using IKEv2 with RADIUS, only EAP-based authentication is supported.
31
28
* An ExpressRoute connection can't be used to connect to an on-premises RADIUS server.
32
29
33
30
## <aname="aboutad"></a>About Active Directory (AD) Domain Authentication for P2S VPNs
34
31
35
32
AD Domain authentication allows users to sign in to Azure using their organization domain credentials. It requires a RADIUS server that integrates with the AD server. Organizations can also use their existing RADIUS deployment.
36
33
37
-
The RADIUS server can reside on-premises, or in your Azure VNet. During authentication, the VPN gateway acts as a pass-through and forwards authentication messages back and forth between the RADIUS server and the connecting device. It's important for the VPN gateway to be able to reach the RADIUS server. If the RADIUS server is located on-premises, then a VPN site-to-site connection from Azure to the on-premises site is required.
34
+
The RADIUS server can reside on-premises, or in your Azure virtual network. During authentication, the VPN gateway acts as a pass-through and forwards authentication messages back and forth between the RADIUS server and the connecting device. It's important for the VPN gateway to be able to reach the RADIUS server. If the RADIUS server is located on-premises, then a VPN site-to-site connection from Azure to the on-premises site is required.
38
35
39
36
Apart from Active Directory, a RADIUS server can also integrate with other external identity systems. This opens up plenty of authentication options for P2S VPNs, including MFA options. Check your RADIUS server vendor documentation to get the list of identity systems it integrates with.
40
37
@@ -60,11 +57,11 @@ You can use the example values to create a test environment, or refer to these v
60
57
***Subnet address range: 10.254.1.0/24**
61
58
***Subnet name: GatewaySubnet**<br>The Subnet name *GatewaySubnet* is mandatory for the VPN gateway to work.
62
59
***GatewaySubnet address range: 10.1.255.0/27**
63
-
***VPN client address pool: 172.16.201.0/24**<br>VPN clients that connect to the VNet using this P2S connection receive an IP address from the VPN client address pool.
64
-
***Subscription:** If you've more than one subscription, verify that you're using the correct one.
60
+
***VPN client address pool: 172.16.201.0/24**<br>VPN clients that connect to the virtual network using this P2S connection receive an IP address from the VPN client address pool.
61
+
***Subscription:** If you have more than one subscription, verify that you're using the correct one.
65
62
***Resource Group: TestRG1**
66
63
***Location: East US**
67
-
***DNS Server: IP address** of the DNS server that you want to use for name resolution for your VNet. (optional)
64
+
***DNS Server: IP address** of the DNS server that you want to use for name resolution for your virtual network. (optional)
68
65
***GW Name: Vnet1GW**
69
66
***Public IP name: VNet1GWPIP**
70
67
***VpnType: RouteBased**
@@ -133,13 +130,13 @@ Before you create and configure the virtual network gateway, your RADIUS server
133
130
134
131
1. If you don’t have a RADIUS server deployed, deploy one. For deployment steps, refer to the setup guide provided by your RADIUS vendor.
135
132
1. Configure the VPN gateway as a RADIUS client on the RADIUS. When adding this RADIUS client, specify the virtual network GatewaySubnet that you created.
136
-
1. Once the RADIUS server is set up, get the RADIUS server's IP address and the shared secret that RADIUS clients should use to talk to the RADIUS server. If the RADIUS server is in the Azure VNet, use the CA IP of the RADIUS server VM.
133
+
1. Once the RADIUS server is set up, get the RADIUS server's IP address and the shared secret that RADIUS clients should use to talk to the RADIUS server. If the RADIUS server is in the Azure virtual network, use the CA IP of the RADIUS server VM.
137
134
138
135
The [Network Policy Server (NPS)](/windows-server/networking/technologies/nps/nps-top) article provides guidance about configuring a Windows RADIUS server (NPS) for AD domain authentication.
139
136
140
137
## <aname="creategw"></a>Create the VPN gateway
141
138
142
-
In this step, you configure and create the virtual network gateway for your VNet. For more complete information about authentication and tunnel type, see [Specify tunnel and authentication type](point-to-site-certificate-gateway.md#type) in the Azure portal version of this article.
139
+
In this step, you configure and create the virtual network gateway for your virtual network. For more complete information about authentication and tunnel type, see [Specify tunnel and authentication type](point-to-site-certificate-gateway.md#type) in the Azure portal version of this article.
143
140
144
141
* The -GatewayType must be 'Vpn' and the -VpnType must be 'RouteBased'.
145
142
* A VPN gateway can take 45 minutes or more to build, depending on the [Gateway SKU](about-gateway-skus.md) you select.
@@ -151,14 +148,17 @@ Create the virtual network gateway with the gateway type "Vpn" using [New-AzVirt
* The -RadiusServer can be specified by name or by IP address. If you specify the name and the server resides on-premises, then the VPN gateway might not be able to resolve the name. If that’s the case, then it's better to specify the IP address of the server.
160
157
* The -RadiusSecret should match what is configured on your RADIUS server.
161
-
* The -VpnClientAddressPool is the range from which the connecting VPN clients receive an IP address. Use a private IP address range that doesn't overlap with the on-premises location that you'll connect from, or with the VNet that you want to connect to. Ensure that you have a large enough address pool configured.
158
+
* The -VpnClientAddressPool is the range from which the connecting VPN clients receive an IP address. Use a private IP address range that doesn't overlap with the on-premises location that you'll connect from, or with the virtual network that you want to connect to. Ensure that you have a large enough address pool configured.
159
+
160
+
> [!NOTE]
161
+
> If your VPN gateway is in active-active mode, use the [Azure portal](point-to-site-radius-gateway.md) article steps to specify the RADIUS server settings. P2S configurations require an additional IP address when the gateway is in active-active mode.
## <aname="vpnclient"></a>Configure the VPN client and connect
230
230
231
-
The VPN client profile configuration packages contain the settings that help you configure VPN client profiles for a connection to the Azure VNet.
231
+
The VPN client profile configuration packages contain the settings that help you configure VPN client profiles for a connection to the Azure virtual network.
232
232
233
233
To generate a VPN client configuration package and configure a VPN client, see one of the following articles:
234
234
@@ -262,9 +262,9 @@ To troubleshoot a P2S connection, see [Troubleshooting Azure point-to-site conne
262
262
263
263
[!INCLUDE [Connect to a VM](../../includes/vpn-gateway-connect-vm.md)]
264
264
265
-
* Verify that the VPN client configuration package was generated after the DNS server IP addresses were specified for the VNet. If you updated the DNS server IP addresses, generate and install a new VPN client configuration package.
265
+
* Verify that the VPN client configuration package was generated after the DNS server IP addresses were specified for the virtual network. If you updated the DNS server IP addresses, generate and install a new VPN client configuration package.
266
266
267
-
* Use 'ipconfig' to check the IPv4 address assigned to the Ethernet adapter on the computer from which you're connecting. If the IP address is within the address range of the VNet that you're connecting to, or within the address range of your VPNClientAddressPool, this is referred to as an overlapping address space. When your address space overlaps in this way, the network traffic doesn't reach Azure, it stays on the local network.
267
+
* Use 'ipconfig' to check the IPv4 address assigned to the Ethernet adapter on the computer from which you're connecting. If the IP address is within the address range of the virtual network that you're connecting to, or within the address range of your VPNClientAddressPool, this is referred to as an overlapping address space. When your address space overlaps in this way, the network traffic doesn't reach Azure, it stays on the local network.
0 commit comments