Skip to content

Commit 132b37e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vwan-change-audience
2 parents 09829c9 + c54c10d commit 132b37e

File tree

6 files changed

+179
-15
lines changed

6 files changed

+179
-15
lines changed

articles/azure-netapp-files/azacsnap-release-notes.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: Phil-Jensen
66
ms.service: azure-netapp-files
77
ms.topic: conceptual
8-
ms.date: 10/31/2024
8+
ms.date: 01/14/2025
99
ms.author: phjensen
1010
---
1111

@@ -24,8 +24,8 @@ For specific information on Preview features, refer to the [AzAcSnap Preview](az
2424
AzAcSnap 10a is being released with the following fixes and improvements:
2525

2626
- Fixes and Improvements:
27-
- Allow configurable wait timeout for Microsoft SQL Server. This will help you increase timeout for slow responding systems (default and minimum value is 30 seconds).
28-
- Added a global override variable `MSSQL_CMD_TIMEOUT_SECS` to be used in either the `.azacsnaprc` file or as an environment variable set to the required wait timeout in seconds. For details on configuration refer to the [global override settings to control AzAcSnap behavior](azacsnap-tips.md#global-override-settings-to-control-azacsnap-behavior).
27+
- Allow configurable wait time-out for Microsoft SQL Server. This option helps you increase time-out for slow responding systems (default and minimum value is 30 seconds).
28+
- Added a global override variable `MSSQL_CMD_TIMEOUT_SECS` to be used in either the `.azacsnaprc` file or as an environment variable set to the required wait time-out in seconds. For details on configuration refer to the [global override settings to control AzAcSnap behavior](azacsnap-tips.md#global-override-settings-to-control-azacsnap-behavior).
2929

3030
Download the binary of [AzAcSnap 10a for Linux](https://aka.ms/azacsnap-10a-linux)([signature file](https://aka.ms/azacsnap-10a-linux-signature)) or [AzAcSnap 10a for Windows](https://aka.ms/azacsnap-10a-windows).
3131

@@ -42,13 +42,13 @@ AzAcSnap 10 is being released with the following fixes and improvements:
4242
- New configuration file layout.
4343
- To upgrade pre-AzAcSnap 10 configurations use the `azacsnap -c configure --configuration new` command to create a new configuration file and use the values in your existing configuration file.
4444
- Azure Large Instance storage management via REST API over HTTPS.
45-
- This allows the use of Consistency Group snapshots on supported Azure Large Instance storage.
45+
- This change to the REST API allows the use of Consistency Group snapshots on supported Azure Large Instance storage.
4646
- Fixes and Improvements:
47-
- New `--flush` option which will flush in memory file buffers for local storage, useful for Azure Large Instance and Azure Managed Disk when connected as block storage.
47+
- New `--flush` option which flushes in memory file buffers for local storage, useful for Azure Large Instance and Azure Managed Disk when connected as block storage.
4848
- Logging improvements.
4949
- Features removed:
5050
- AzAcSnap installer for Linux.
51-
- AzAcSnap is now downloadable as a binary for supported versions of Linux and Windows. This simplifies access to the AzAcSnap program allowing you to get started quickly.
51+
- AzAcSnap is now downloadable as a binary for supported versions of Linux and Windows to simplify access to the AzAcSnap program allowing you to get started quickly.
5252
- Azure Large Instance storage management via CLI over SSH.
5353
- CLI over SSH replaced with the REST API over HTTPS.
5454

@@ -123,15 +123,15 @@ AzAcSnap 8 is being released with the following fixes and improvements:
123123
- Restore (`-c restore`) changes:
124124
- New ability to use `-c restore` to `--restore revertvolume` for Azure NetApp Files.
125125
- Backup (`-c backup`) changes:
126-
- Fix for incorrect error output when using `-c backup` and the database has backint configured.
126+
- Fix for incorrect error output when using `-c backup` and the database has "backint" configured.
127127
- Remove lower-case conversion for anfBackup rename-only option using `-c backup` so the snapshot name maintains case of Volume name.
128128
- Fix for when a snapshot is created even though SAP HANA wasn't put into backup-mode. Now if SAP HANA can't be put into backup-mode, AzAcSnap immediately exits with an error.
129129
- Details (`-c details`) changes:
130130
- Fix for listing snapshot details with `-c details` when using Azure Large Instance storage.
131131
- Logging enhancements:
132132
- Extra logging output to syslog (for example, `/var/log/messages`) on failure.
133-
- New mainlog (`azacsnap.log`) to provide a more parse-able high-level log of commands run with success or failure result.
134-
- New global settings file (`.azacsnaprc`) to control behavior of azacsnap, including location of mainlog file.
133+
- New "mainlog" (`azacsnap.log`) to provide a more parse-able high-level log of commands run with success or failure result.
134+
- New global settings file (`.azacsnaprc`) to control behavior of azacsnap, including location of "mainlog" file.
135135

136136
Download the [AzAcSnap 8](https://aka.ms/azacsnap-8) installer.
137137

@@ -157,7 +157,7 @@ AzAcSnap 7 is being released with the following fixes and improvements:
157157
- Backup (`-c backup`) changes:
158158
- Shorten suffix added to the snapshot name. The previous 26 character suffix of "YYYY-MM-DDThhhhss-nnnnnnnZ" was too long. The suffix is now an 11 character hex-decimal based on the ten-thousandths of a second since the Unix epoch to avoid naming collisions, for example, F2D212540D5.
159159
- Increased validation when creating snapshots to avoid failures on snapshot creation retry.
160-
- Time out when executing AzAcSnap mechanism to disable/enable backint (`autoDisableEnableBackint=true`) now aligns with other SAP HANA related operation timeout values.
160+
- Time out when executing AzAcSnap mechanism to disable/enable backint (`autoDisableEnableBackint=true`) now aligns with other SAP HANA related operation time-out values.
161161
- Azure Backup now allows third party snapshot-based backups without impact to streaming backups (also known as "backint"). Therefore, AzAcSnap "backint" detection logic is reordered to allow for future deprecation of this feature. By default this setting is disabled (`autoDisableEnableBackint=false`). For customers who relied on this feature to take snapshots with AzAcSnap and use Azure Backup, keeping this value as true means AzAcSnap 7 continues to disable/enable backint. As this setting is no longer necessary for Azure Backup, we recommend testing AzAcSnap backups with the value of `autoDisableEnableBackint=false`, and then if successful make the same change in your production deployment.
162162
- Restore (`-c restore`) changes:
163163
- Ability to create a custom suffix for Volume clones created when using `-c restore --restore snaptovol` either:
@@ -207,6 +207,8 @@ AzAcSnap v5.0.3 (Build: 20220524.14204) is provided as a patch update to the v5.
207207

208208
- Fix for handling delimited identifiers when querying SAP HANA. This issue only impacted SAP HANA in HSR-HA node when there's a Secondary node configured with "logreplay_readaccss" and is resolved.
209209

210+
Download the [AzAcSnap 5.0.3](https://aka.ms/azacsnap-5) installer.
211+
210212
### AzAcSnap v5.1 Preview (Build: 20220524.15550)
211213

212214
AzAcSnap v5.1 Preview (Build: 20220524.15550) is an updated build to extend the preview expiry date for 90 days. This update contains the fix for handling delimited identifiers when querying SAP HANA as provided in v5.0.3.
@@ -270,7 +272,7 @@ AzAcSnap v5.0.1 (Build: 20210524.14837) is provided as a patch update to the v5.
270272

271273
AzAcSnap v5.0 (Build: 20210421.6349) is now Generally Available and for this build had the following fixes and improvements:
272274

273-
- The hdbsql retry timeout (to wait for a response from SAP HANA) is automatically set to half of the "savePointAbortWaitSeconds" to avoid race conditions. The setting for "savePointAbortWaitSeconds" can be modified directly in the JSON configuration file and must be a minimum of 600 seconds.
275+
- The hdbsql retry time-out (to wait for a response from SAP HANA) is automatically set to half of the "savePointAbortWaitSeconds" to avoid race conditions. The setting for "savePointAbortWaitSeconds" can be modified directly in the JSON configuration file and must be a minimum of 600 seconds.
274276

275277
## March-2021
276278

articles/network-watcher/connection-troubleshoot-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Connection troubleshoot provides the capability to check TCP or ICMP connections
3434
- Virtual machines
3535
- Virtual machine scale sets
3636
- Azure Bastion instances
37-
- Application gateways v2 (except private deployments. For more information, see [Private Application Gateway deployment (preview)](../application-gateway/application-gateway-private-deployment.md))
37+
- Application gateways v2 (except private deployments). For more information, see [Private Application Gateway deployment](../application-gateway/application-gateway-private-deployment.md)
3838

3939
> [!IMPORTANT]
4040
> Connectivity test of connection troubleshoot requires that the virtual machine you run the test from has the ***Network Watcher agent VM extension*** installed. This extension is not required for running other connection troubleshoot tests or on the destination virtual machine.

articles/virtual-wan/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,9 @@
208208
href: certificates-point-to-site.md
209209
- name: Microsoft Entra ID authentication
210210
items:
211-
- name: Configure a P2S VPN
211+
- name: Configure P2S - Microsoft-registered VPN client
212+
href: point-to-site-entra-gateway.md
213+
- name: Configure P2S - manually registered VPN client
212214
href: virtual-wan-point-to-site-azure-ad.md
213215
- name: Configure a tenant
214216
href: openvpn-azure-ad-tenant.md
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: 'Configure P2S User VPN for Microsoft Entra ID authentication: Microsoft-registered client'
3+
titleSuffix: Azure Virtual WAN
4+
description: Learn how to configure Virtual WAN P2S User VPN server settings for Microsoft Entra ID authentication using Microsoft-registered Azure VPN Client.
5+
services: virtual-wan
6+
author: cherylmc
7+
ms.service: azure-virtual-wan
8+
ms.topic: how-to
9+
ms.date: 01/14/2025
10+
ms.author: cherylmc
11+
12+
#Audience ID values are not sensitive data.
13+
14+
---
15+
# Configure P2S User VPN for Microsoft Entra ID authentication – Microsoft-registered app
16+
17+
This article helps you configure point-to-site User VPN connection to Virtual WAN that uses Microsoft Entra ID authentication and the new Microsoft-registered Azure VPN Client App ID.
18+
19+
> [!NOTE]
20+
> The steps in this article apply to Microsoft Entra ID authentication using the new Microsoft-registered Azure VPN Client App ID and associated Audience values. This article doesn't apply to the older, manually registered Azure VPN Client app for your tenant. For the manually registered Azure VPN Client steps, see [Configure P2S using manually registered VPN client](virtual-wan-point-to-site-azure-ad.md).
21+
22+
[!INCLUDE [About Microsoft-registered app](../../includes/virtual-wan-entra-app-id-descriptions.md)]
23+
24+
[!INCLUDE [OpenVPN note](../../includes/vpn-gateway-openvpn-auth-include.md)]
25+
26+
In this article, you learn how to:
27+
28+
* Create a virtual WAN
29+
* Create a User VPN configuration
30+
* Download a virtual WAN User VPN profile
31+
* Create a virtual hub
32+
* Edit a hub to add P2S gateway
33+
* Connect a virtual network to a virtual hub
34+
* Download and apply the User VPN client configuration
35+
* View your virtual WAN
36+
37+
:::image type="content" source="./media/virtual-wan-about/virtualwanp2s.png" alt-text="Screenshot of Virtual WAN diagram." lightbox="./media/virtual-wan-about/virtualwanp2s.png":::
38+
39+
## Before you begin
40+
41+
Verify that you've met the following criteria before beginning your configuration:
42+
43+
* You have a virtual network that you want to connect to. Verify that none of the subnets of your on-premises networks overlap with the virtual networks that you want to connect to. To create a virtual network in the Azure portal, see the [Quickstart](../virtual-network/quick-create-portal.md).
44+
45+
* Your virtual network doesn't have any virtual network gateways. If your virtual network has a gateway (either VPN or ExpressRoute), you must remove all gateways. The steps for this configuration help you connect your virtual network to the Virtual WAN virtual hub gateway.
46+
47+
* Obtain an IP address range for your hub region. The hub is a virtual network that is created and used by Virtual WAN. The address range that you specify for the hub can't overlap with any of your existing virtual networks that you connect to. It also can't overlap with your address ranges that you connect to on premises. If you're unfamiliar with the IP address ranges located in your on-premises network configuration, coordinate with someone who can provide those details for you.
48+
49+
* You need a Microsoft Entra ID tenant for this configuration. If you don't have one, you can create one by following the instructions in [Create a new tenant](/entra/fundamentals/create-new-tenant).
50+
51+
## <a name="wan"></a>Create a virtual WAN
52+
53+
From a browser, navigate to the [Azure portal](https://portal.azure.com) and sign in with your Azure account.
54+
55+
[!INCLUDE [Create a virtual WAN](../../includes/virtual-wan-create-vwan-include.md)]
56+
57+
## <a name="user-config"></a>Create a User VPN configuration
58+
59+
A User VPN configuration defines the parameters for connecting remote clients. It's important to create the User VPN configuration before configuring your virtual hub with P2S settings, as you must specify the User VPN configuration you want to use.
60+
61+
> [!IMPORTANT]
62+
> [!INCLUDE [Microsoft Entra ID note for portal pages](../../includes/vpn-gateway-entra-portal-note.md)]
63+
64+
1. Go to your Virtual WAN. In the left pane, expand **Connectivity** and select the **User VPN configurations** page. On the **User VPN configurations** page, click **+Create user VPN config**.
65+
1. On the **Basics** page, specify the following parameters.
66+
67+
* **Configuration name** - Enter the name you want to call your User VPN Configuration. For example, **TestConfig1**.
68+
* **Tunnel type** - Select OpenVPN from the dropdown menu.
69+
1. At the top of the page, click **Azure Active Directory**. You can view the necessary values on the Microsoft Entra ID page for Enterprise applications in the portal.
70+
71+
:::image type="content" source="./media/virtual-wan-point-to-site-azure-ad/values.png" alt-text="Screenshot of the Microsoft Entra ID page." lightbox="./media/virtual-wan-point-to-site-azure-ad/values.png"::: Configure the following values:
72+
73+
* **Azure Active Directory** - Select **Yes**.
74+
* **Audience** - Enter the corresponding value for the Microsoft-registered Azure VPN Client App ID, Azure Public: `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`. [Custom audience](../vpn-gateway/point-to-site-entra-register-custom-app.md) is also supported for this field.
75+
* **Issuer** - Enter `https://sts.windows.net/<your Directory ID>/`.
76+
* **AAD Tenant** - Enter the TenantID for the Microsoft Entra tenant. Make sure there isn't an `/` at the end of the Microsoft Entra tenant URL.
77+
78+
1. Click **Create** to create the User VPN configuration. You'll select this configuration later in the exercise.
79+
80+
## <a name="site"></a>Create an empty hub
81+
82+
Next, create the virtual hub. The steps in this section create an empty virtual hub to which you can later add the P2S gateway. However, it's always much more efficient to combine creating the hub along with the gateway because each time you make a configuration change to the hub, you have to wait for the hub settings to build.
83+
84+
For demonstration purposes, we'll create an empty hub first, then add the P2S gateway in the next section. But, you can choose to incorporate the P2S gateway settings from the next section at the same time you configure the hub.
85+
86+
[!INCLUDE [Create an empty hub](../../includes/virtual-wan-hub-basics.md)]
87+
88+
After configuring the settings, click **Review + create** to validate, then **Create** the hub. It can take up to 30 minutes to create a hub.
89+
90+
## <a name="hub"></a>Add a P2S gateway to a hub
91+
92+
This section shows you how to add a gateway to an already existing virtual hub. It can take up to 30 minutes to update a hub.
93+
94+
1. Go to your Virtual WAN. In the left pane, expand **Settings** and select **Hubs**.
95+
1. Click the name of the hub that you want to edit.
96+
1. Click **Edit virtual hub** at the top of the page to open the **Edit virtual hub** page.
97+
1. On the **Edit virtual hub** page, check the checkboxes for **Include vpn gateway for vpn sites** and **Include point-to-site gateway** to reveal the settings. Then configure the values.
98+
99+
:::image type="content" source="./media/virtual-wan-point-to-site-azure-ad/hub.png" alt-text="Screenshot shows the Edit virtual hub." lightbox="./media/virtual-wan-point-to-site-azure-ad/hub.png":::
100+
101+
* **Gateway scale units**: Select the Gateway scale units. Scale units represent the aggregate capacity of the User VPN gateway. If you select 40 or more gateway scale units, plan your client address pool accordingly. For information about how this setting impacts the client address pool, see [About client address pools](about-client-address-pools.md). For information about gateway scale units, see the [FAQ](virtual-wan-faq.md#p2s-concurrent).
102+
* **User VPN configuration**: Select the configuration that you created earlier.
103+
* **User Groups to Address Pools Mapping**: Specify address pools. For information about this setting, see [Configure user groups and IP address pools for P2S User VPNs](user-groups-create.md).
104+
105+
1. After configuring the settings, click **Confirm** to update the hub. It can take up to 30 minutes to update a hub.
106+
107+
## <a name="connect-vnet"></a>Connect virtual network to hub
108+
109+
In this section, you create a connection between your virtual hub and your virtual network.
110+
111+
[!INCLUDE [Connect virtual network](../../includes/virtual-wan-connect-vnet-hub-include.md)]
112+
113+
## <a name="download-profile"></a>Download User VPN profile
114+
115+
All of the necessary configuration settings for the VPN clients are contained in a VPN client configuration zip file. The settings in the zip file help you easily configure the VPN clients. The VPN client configuration files that you generate are specific to the User VPN configuration for your gateway. You can download global (WAN-level) profiles, or a profile for a specific hub. For information and additional instructions, see [Download global and hub profiles](global-hub-profile.md). The following steps walk you through downloading a global WAN-level profile.
116+
117+
[!INCLUDE [Download profile](../../includes/virtual-wan-p2s-download-profile-include.md)]
118+
119+
## <a name="configure-client"></a>Configure the Azure VPN Client
120+
121+
Next, you examine the profile configuration package, configure the Azure VPN Client for the client computers, and connect to Azure. See the articles listed in the Next steps section.
122+
123+
## Next steps
124+
125+
Configure the Azure VPN Client. You can use the steps in the VPN Gateway client documentation to configure the Azure VPN Client for Virtual WAN.
126+
127+
* [Azure VPN Client for Linux](../vpn-gateway/point-to-site-entra-vpn-client-linux.md)
128+
* [Azure VPN Client for Windows](../vpn-gateway/point-to-site-entra-vpn-client-windows.md)
129+
* [Azure VPN Client for macOS](../vpn-gateway/point-to-site-entra-vpn-client-mac.md)

0 commit comments

Comments
 (0)