Skip to content

Commit 10a0bcf

Browse files
Merge pull request #274888 from wtnlee/3pupdates
fixed updates
2 parents 13e930e + 84d234e commit 10a0bcf

File tree

8 files changed

+81
-21
lines changed

8 files changed

+81
-21
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,20 @@
4242
href: work-remotely-support.md
4343
- name: Virtual WAN FAQ
4444
href: virtual-wan-faq.md
45-
- name: NVA in a Virtual WAN hub
46-
href: about-nva-hub.md
47-
- name: Locations and Partners
45+
- name: Virtual Hub third-party integrations
4846
items:
49-
- name: Hub locations and partners
50-
href: virtual-wan-locations-partners.md
51-
- name: Automation guidelines for partners
52-
href: virtual-wan-configure-automation-providers.md
53-
- name: Software-as-a-service (SaaS)
47+
- name: Overview of third-party integrations
48+
href: third-party-integrations.md
49+
- name: Integrated NVAs in the Virtual Hub
50+
href: about-nva-hub.md
51+
- name: Software-as-a-service(SaaS)
5452
href: how-to-palo-alto-cloud-ngfw.md
53+
- name: Branch IPSEC connectivity automation
54+
items:
55+
- name: About branch IPSEC connectivity automation
56+
href: virtual-wan-locations-partners.md
57+
- name: Automation guidelines for partners
58+
href: virtual-wan-configure-automation-providers.md
5559
- name: Architecture
5660
items:
5761
- name: Migrate to Virtual WAN

articles/virtual-wan/about-nva-hub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Deploying NVAs into a Virtual WAN hub provides the following benefits:
3131
> [!IMPORTANT]
3232
> To ensure you get the best support for this integrated solution, make sure you have similar levels of support entitlement with both Microsoft and your Network Virtual Appliance provider.
3333
34-
## Partners
34+
## <a name="partners"></a> Partners
3535

3636
The following tables describe the Network Virtual Appliances that are eligible to be deployed in the Virtual WAN hub and the relevant use cases (connectivity and/or firewall). The Virtual WAN NVA Vendor Identifier column corresponds to the NVA Vendor that is displayed in Azure portal when you deploy a new NVA or view existing NVAs deployed in the Virtual hub.
3737

@@ -55,7 +55,7 @@ Customers can deploy an Azure Firewall along side their connectivity-based NVAs.
5555

5656
### Security provided by NVA firewalls
5757

58-
Customers can also deploy NVAs into a Virtual WAN hub that perform both SD-WAN connectivity and Next-Generation Firewall capabilities. Customers can connect on-premises devices to the NVA in the hub and also use the same appliance to inspect all North-South, East-West, and Internet-bound traffic. Routing to enable these scenarios can be configured via [Routing Intent and Routing Policies](./how-to-routing-policies.md).
58+
Customers can also deploy NVAs into a Virtual WAN hub that performs both SD-WAN connectivity and Next-Generation Firewall capabilities. Customers can connect on-premises devices to the NVA in the hub and also use the same appliance to inspect all North-South, East-West, and Internet-bound traffic. Routing to enable these scenarios can be configured via [Routing Intent and Routing Policies](./how-to-routing-policies.md).
5959

6060
Partners that support these traffic flows are listed as **dual-role SD-WAN connectivity and security (Next-Generation Firewall) Network Virtual Appliances** in the [Partners section](#partners).
6161

31.5 KB
Loading
29.3 KB
Loading
28.6 KB
Loading
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: 'About Third Party Integrations - Virtual WAN hub'
3+
titleSuffix: Azure Virtual WAN
4+
description: Learn about third-party integrations available in a Virtual WAN hub.
5+
author: wtnlee
6+
ms.service: virtual-wan
7+
ms.topic: conceptual
8+
ms.date: 04/26/2024
9+
ms.author: wellee
10+
# Customer intent: As someone with a networking background, I want to learn about third-party integrations in a Virtual WAN hub.
11+
---
12+
# Third-party integrations with Virtual WAN Hub
13+
14+
Virtual WAN hubs offer integrations with third-party networking software solutions, providing connectivity through SD-WAN or VPN and next-generation firewall (NGFW) functionalities. There are three primary deployment models within Virtual WAN for these solutions: **Integrated Network Virtual Appliances (Integrated NVAs)**, **software-as-a-service (SaaS) networking and security solutions** and **Azure Firewall Manager security providers**.
15+
16+
This article focuses on third-party integrations with the Virtual Hub. To facilitate connecting from on-premises to Azure Virtual WAN, certain devices that connect to Azure Virtual WAN have automated features to program both Site-to-site VPN Gateways in Virtual WAN and on-premises devices. This set-up is usually managed through the device's management UI. For detailed guidance on IPsec connectivity automation, see [IPsec automation documentation.](virtual-wan-locations-partners.md)
17+
18+
## Integrated Network Virtual Appliances
19+
20+
Integrated Network Virtual Appliances (NVAs) are Microsoft-managed infrastructure-as-a-service solutions that Microsoft and select NVA providers jointly develop and offer. Integrated Network Virtual Appliances are typically deployed through Azure Marketplace Managed Applications or directly from NVA orchestration software. The backing infrastructure of Network Virtual Appliances is deployed into the Virtual WAN Hub as a Microsoft-owned and managed virtual machine scale-set with Azure Load Balancers directly into the Virtual WAN hub. A subset of Azure infrastructure configurations are available for you to manage, scale, and troubleshoot your NVA deployments in the Virtual WAN hub.
21+
22+
:::image type="content" source="./media/third-party-solutions/integrated-network-virtual-appliances.png" alt-text="Integrated NVA architecture diagram." lightbox="./media/third-party-solutions/integrated-network-virtual-appliances.png":::
23+
24+
As a user of Integrated NVAs, you have the option to choose a scale unit for the NVA infrastructure scale unit up-front that dictates the aggregate throughput of the NVA (see provider documentation for expected throughput at each scale unit). You maintain full control over the software version and settings within the Integrated NVA operating system, as well as full control of software lifecycle management. Depending on the NVA provider, you may use the command-line or NVA-provider orchestration and management software to implement changes to the software version and configuration.
25+
26+
Integrated NVAs typically fall into three categories based on their capabilities:
27+
28+
* **Connectivity**: These NVAs acts as a gateway in the Virtual WAN hub, enabling connections from on-premises data centers or sites using SD-WAN or IPSEC.
29+
* **Next-generation Firewall**: These NVAs function as a security device within the Virtual WAN hub, allowing you to inspect traffic between on-premises, Azure Virtual Networks and the Internet.
30+
* **Dual-role connectivity and Firewall**: These NVAs provide both connectivity and next-generation firewall capabilities on the same device.
31+
32+
For more information on Integrated NVAs in the Virtual WAN hub, see [NVA in the hub documentation](about-nva-hub.md).
33+
34+
The following solutions are currently available as Integrated NVA partners:
35+
36+
|Capability Type(s)| Available Partners|
37+
|--|--|
38+
|Connectivity|Barracuda, VMware (formerly known as Velocloud), Cisco Viptela, Aruba, Versa |
39+
|Next-Generation Firewall (NGFW)|Check Point, Fortinet, Cisco FTDV|
40+
| Dual-role connectivity and NGFW | Fortinet |
41+
42+
For more information and resources on each Integrated NVA solution, see [NVA in the hub partners](about-nva-hub.md#partners).
43+
44+
## Software-as-a-service (SaaS) solutions
45+
46+
Softeware-as-a-service (SaaS) solutions in Virtual WAN are managed by SaaS providers and are deployed directly into your Virtual WAN hub. Software-as-a-service solutions are deployed and transacted through Azure Marketplace. SaaS solutions abstract the underlying infrastructure required to run networking and security software in Virtual WAN, providing customers with a cloud-native operational interface for programming and customizing SaaS configurations.
47+
48+
The SaaS provider handles the complete lifecycle management of the SaaS software, management, and configuration of Azure infrastructure, as well as scalability of the SaaS solution. For specifics on configurations and architecture of Virtual WAN SaaS solutions, consult your SaaS provider's documentation.
49+
50+
:::image type="content" source="./media/third-party-solutions/software-as-a-service.png" alt-text="SaaS architecture diagram." lightbox="./media/third-party-solutions/software-as-a-service.png":::
51+
52+
Currently, Palo Alto Networks Cloud NGFW is the only SaaS solution available in Virtual WAN today, focusing on next-generation firewall inspection use cases. For more information on the SaaS offering provided by Palo Alto Networks, see [Palo Alto Networks Cloud NGFW documentation](how-to-palo-alto-cloud-ngfw.md)
53+
54+
## Azure Firewall Manager security partners providers
55+
56+
Azure Firewall Manager's security partner integrations simplify the process of connecting Virtual WAN to a third-party security-as-a-service (SECaaS) offering, ensuring protected Internet access for users. Unlike SaaS solutions, SECaaS infrastructure isn't deployed directly into the Virtual WAN hub but is still hosted by the SECaaS provider. Deploying a SECaaS solution through Azure Firewall Manager automatically establishes a Site-to-site VPN tunnel between the third-party security infrastructure and the Virtual WAN hub's Site-to-site VPN Gateway.
57+
58+
:::image type="content" source="./media/third-party-solutions/security-as-a-service.png" alt-text="SECaaS architecture diagram." lightbox="./media/third-party-solutions/security-as-a-service.png":::
59+
60+
Management and configuration of the SECaaS solution are accessible through tools provided by the SECaaS provider. Currently, Virtual WAN's SECaaS solutions include the following partners: Check Point, iBoss and zScalar. For more information about Azure Firewall Manager's security partner providers, refer to both [Azure Firewall Manager documentation](../firewall-manager/trusted-security-partners.md) and your preferred provider's documentation.

articles/virtual-wan/virtual-wan-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Yes, Azure Virtual WAN is Generally Available (GA). However, Virtual WAN consist
1818

1919
### Which locations and regions are available?
2020

21-
For information, see [Available locations and regions](virtual-wan-locations-partners.md#locations).
21+
To view the available regions for Virtual WAN, see [Products available by region](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=virtual-wan). Specify **Virtual WAN** as the product name.
2222

2323
### Does the user need to have hub and spoke with SD-WAN/VPN devices to use Azure Virtual WAN?
2424

@@ -405,7 +405,7 @@ Yes, BGP communities generated by on-premises will be preserved in Virtual WAN.
405405

406406
Yes, BGP communities generated by BGP Peers will be preserved in Virtual WAN. Communities are preserved across the same hub, and across interhub connections. This also applies to Virtual WAN scenarios using Routing Intent Policies.
407407

408-
### What ASN numbers are supported for remotely attached On-Premises networks running BGP?
408+
### What ASN numbers are supported for remotely attached on-premises networks running BGP?
409409

410410
You can use your own public ASNs or private ASNs for your on-premises networks. You can't use the ranges reserved by Azure or IANA:
411411

articles/virtual-wan/virtual-wan-locations-partners.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ ms.topic: conceptual
88
ms.date: 03/05/2024
99
ms.author: cherylmc
1010
ms.custom: references_regions
11-
# Customer intent: As someone with a networking background, I want to find a Virtual WAN partner
11+
# Customer intent: As someone with a networking background, I want to learn more aobut Branch IPsec connectivity automation
1212
---
13-
# Virtual WAN partners, regions, and virtual hub locations
13+
# Virtual WAN Branch IPsec connectivity automation
1414

15-
This article provides information on Virtual WAN supported regions and partners for connectivity into a Virtual WAN hub.
15+
This article provides information on Virtual WAN partners for connectivity into a Virtual WAN hub.
1616

1717
There are two types of offerings that make connecting to Azure easier:
1818

@@ -23,9 +23,9 @@ There are two types of offerings that make connecting to Azure easier:
2323

2424
Some partners offer Network Virtual Appliances (NVAs) that can be deployed directly into the Azure Virtual WAN hub through a solution that is jointly managed by Microsoft Azure and third-party Network Virtual Appliance solution providers.
2525

26-
When a Network Virtual Appliance is deployed into a Virtual WAN hub, it can serve as a third-party gateway with various functionalities. It could serve as an SD-WAN gateway, Firewall or a combination of both. For more information about the benefits of deploying an NVA into a Virtual WAN hub, see [About NVAs in a Virtual WAN hub](about-nva-hub.md).
26+
When a Network Virtual Appliance is deployed into a Virtual WAN hub, it can serve as a third-party gateway with various functionalities. It could serve as an SD-WAN gateway, Firewall or a combination of both. For more information about deploying an NVA into a Virtual WAN hub and available partners, see [About NVAs in a Virtual WAN hub](about-nva-hub.md).
27+
2728

28-
[!INCLUDE [NVA partners](../../includes/virtual-wan-nva-hub-partners.md)]
2929

3030
## <a name="automation"></a>Branch IPsec connectivity automation from partners
3131

@@ -46,10 +46,6 @@ Some connectivity partners may extend the automation to include creating the Azu
4646

4747
The following partners are slated on our roadmap based on a terms sheet signed between the companies indicating the scope of work to automate IPsec connectivity between the partner device and Azure Virtual WAN VPN gateways: 128 Technologies, Arista, F5 Networks, Oracle SD-WAN (Talari), and SharpLink.
4848

49-
## <a name="locations"></a>Available regions
50-
51-
To view the available regions for Virtual WAN, see [Products available by region](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=virtual-wan). Specify **Virtual WAN** as the product name.
52-
5349
## Next steps
5450

5551
* For more information about Virtual WAN, see the [Virtual WAN FAQ](virtual-wan-faq.md).

0 commit comments

Comments
 (0)