Skip to content

Commit 2602425

Browse files
Merge pull request #254172 from cherylmc/policy
vpn table
2 parents 224c38a + 5d42210 commit 2602425

File tree

1 file changed

+9
-14
lines changed

1 file changed

+9
-14
lines changed

articles/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps.md

Lines changed: 9 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,19 +6,19 @@ author: cherylmc
66
ms.service: vpn-gateway
77
ms.custom: devx-track-azurepowershell
88
ms.topic: how-to
9-
ms.date: 08/10/2022
9+
ms.date: 10/09/2023
1010
ms.author: cherylmc
1111
---
12-
# Connect Azure VPN gateways to multiple on-premises policy-based VPN devices using PowerShell
12+
# Connect a VPN gateway to multiple on-premises policy-based VPN devices - PowerShell
1313

1414
This article helps you configure an Azure route-based VPN gateway to connect to multiple on-premises policy-based VPN devices leveraging custom IPsec/IKE policies on S2S VPN connections.
1515

1616
## <a name="about"></a>About policy-based and route-based VPN gateways
1717

1818
Policy-based *vs.* route-based VPN devices differ in how the IPsec traffic selectors are set on a connection:
1919

20-
* **Policy-based** VPN devices use the combinations of prefixes from both networks to define how traffic is encrypted/decrypted through IPsec tunnels. It is typically built on firewall devices that perform packet filtering. IPsec tunnel encryption and decryption are added to the packet filtering and processing engine.
21-
* **Route-based** VPN devices use any-to-any (wildcard) traffic selectors, and let routing/forwarding tables direct traffic to different IPsec tunnels. It is typically built on router platforms where each IPsec tunnel is modeled as a network interface or VTI (virtual tunnel interface).
20+
* **Policy-based** VPN devices use the combinations of prefixes from both networks to define how traffic is encrypted/decrypted through IPsec tunnels. It's typically built on firewall devices that perform packet filtering. IPsec tunnel encryption and decryption are added to the packet filtering and processing engine.
21+
* **Route-based** VPN devices use any-to-any (wildcard) traffic selectors, and let routing/forwarding tables direct traffic to different IPsec tunnels. It's typically built on router platforms where each IPsec tunnel is modeled as a network interface or VTI (virtual tunnel interface).
2222

2323
The following diagrams highlight the two models:
2424

@@ -29,14 +29,9 @@ The following diagrams highlight the two models:
2929
![route-based](./media/vpn-gateway-connect-multiple-policybased-rm-ps/routebasedmultisite.png)
3030

3131
### Azure support for policy-based VPN
32-
Currently, Azure supports both modes of VPN gateways: route-based VPN gateways and policy-based VPN gateways. They are built on different internal platforms, which result in different specifications:
32+
Currently, Azure supports both modes of VPN gateways: route-based VPN gateways and policy-based VPN gateways. They're built on different internal platforms, which result in different specifications. For more information about gateways, throughput,and connections, see [About VPN Gateway settings](vpn-gateway-about-vpn-gateway-settings.md).
3333

34-
| Category | Policy-based VPN Gateway | Route-based VPN Gateway | Route-based VPN Gateway | Route-based VPN Gateway
35-
| -------- | ----------------------- | ---------------------- | ---------------------- | ----------------------- |
36-
| **Azure Gateway SKU** | Basic | Basic | VpnGw1, VpnGw2, VpnGw3, VpnGw1AZ, VpnGw2AZ, VpnGw3AZ | VpnGw4, VpnGw5, VpnGw4AZ, VpnGw5AZ |
37-
| **IKE version** | IKEv1 | IKEv2 | IKEv1 and IKEv2 | IKEv1 and IKEv2 |
38-
| **Max. S2S connections** | **1** | 10 | 30 | 100 |
39-
| | | | | |
34+
[!INCLUDE [vpn table type](../../includes/vpn-gateway-vpn-type-table.md)]
4035

4136
Previously, when working with policy-based VPNs, you were limited to using the policy-based VPN gateway Basic SKU and could only connect to 1 on-premises VPN/firewall device. Now, using custom IPsec/IKE policy, you can use a route-based VPN gateway and connect to multiple policy-based VPN/firewall devices. To make a policy-based VPN connection using a route-based VPN gateway, configure the route-based VPN gateway to use prefix-based traffic selectors with the option **"PolicyBasedTrafficSelectors"**.
4237

@@ -49,7 +44,7 @@ The following diagram shows why transit routing via Azure VPN gateway doesn't wo
4944

5045
![policy-based transit](./media/vpn-gateway-connect-multiple-policybased-rm-ps/policybasedtransit.png)
5146

52-
As shown in the diagram, the Azure VPN gateway has traffic selectors from the virtual network to each of the on-premises network prefixes, but not the cross-connection prefixes. For example, on-premises site 2, site 3, and site 4 can each communicate to VNet1 respectively, but cannot connect via the Azure VPN gateway to each other. The diagram shows the cross-connect traffic selectors that are not available in the Azure VPN gateway under this configuration.
47+
As shown in the diagram, the Azure VPN gateway has traffic selectors from the virtual network to each of the on-premises network prefixes, but not the cross-connection prefixes. For example, on-premises site 2, site 3, and site 4 can each communicate to VNet1 respectively, but can't connect via the Azure VPN gateway to each other. The diagram shows the cross-connect traffic selectors that aren't available in the Azure VPN gateway under this configuration.
5348

5449
## <a name="workflow"></a>Workflow
5550

@@ -77,7 +72,7 @@ This section shows you how to enable policy-based traffic selectors on a connect
7772

7873
#### Connect to your subscription and declare your variables
7974

80-
1. If you are running PowerShell locally on your computer, sign in using the *Connect-AzAccount* cmdlet. Or, instead, use Azure Cloud Shell in your browser.
75+
1. If you're running PowerShell locally on your computer, sign in using the *Connect-AzAccount* cmdlet. Or, instead, use Azure Cloud Shell in your browser.
8176

8277
2. Declare your variables. For this exercise, we use the following variables:
8378

@@ -203,4 +198,4 @@ The following line shows whether the policy-based traffic selectors are used for
203198
## Next steps
204199
Once your connection is complete, you can add virtual machines to your virtual networks. See [Create a Virtual Machine](../virtual-machines/windows/quick-create-portal.md) for steps.
205200
206-
Also review [Configure IPsec/IKE policy for S2S VPN or VNet-to-VNet connections](vpn-gateway-ipsecikepolicy-rm-powershell.md) for more details on custom IPsec/IKE policies.
201+
Also review [Configure IPsec/IKE policy for S2S VPN or VNet-to-VNet connections](vpn-gateway-ipsecikepolicy-rm-powershell.md) for more details on custom IPsec/IKE policies.

0 commit comments

Comments
 (0)