Skip to content

Commit 286dd5c

Browse files
committed
fixed image links to standard, acrolinx
1 parent fb6de20 commit 286dd5c

File tree

1 file changed

+39
-68
lines changed

1 file changed

+39
-68
lines changed

articles/networking/connectivty-interoperability-configuration.md

Lines changed: 39 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -1,52 +1,45 @@
11
---
2-
title: 'Interoperability in Azure back-end connectivity features: Configuration details | Microsoft Docs'
2+
title: Interoperability in Azure back-end connectivity features - Configuration details
33
description: This article describes configuration details for the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
4-
documentationcenter: na
5-
services: networking
6-
author: rambk
7-
manager: tracsman
8-
4+
author: asudbring
95
ms.service: virtual-network
106
ms.topic: article
11-
ms.workload: infrastructure-services
12-
ms.date: 10/18/2018
13-
ms.author: rambala
14-
7+
ms.date: 03/27/2023
8+
ms.author: allensu
159
---
1610

17-
# Interoperability in Azure back-end connectivity features: Test configuration details
18-
19-
This article describes the configuration details of the [test setup][Setup]. The test setup helps you analyze how Azure networking services interoperate at the control plane level and data plane level.
11+
# Interoperability in Azure back-end connectivity features - Test configuration details
2012

21-
## Spoke VNet connectivity by using VNet peering
13+
This article describes the configuration details of the [test setup](./connectivty-interoperability-preface.md). The test setup helps you analyze how Azure networking services interoperate at the control plane level and data plane level.
2214

23-
The following figure shows the Azure Virtual Network peering details of a spoke virtual network (VNet). To learn how to set up peering between two VNets, see [Manage VNet peering][VNet-Config]. If you want the spoke VNet to use the gateways that are connected to the hub VNet, select **Use remote gateways**.
15+
## Spoke virtual network connectivity by using virtual network peering
2416

25-
[![1]][1]
17+
The following figure shows the Azure Virtual Network peering details of a spoke virtual network. For more information about peering between two virtual networks, see [Manage virtual network peering](../virtual-network/virtual-network-manage-peering.md). If you want the spoke virtual network to use the gateways that are connected to the hub virtual network, select **Use remote gateways**.
2618

27-
The following figure shows the VNet peering details of the hub VNet. If you want the hub VNet to permit the spoke VNet to use the hub's gateways, select **Allow gateway transit**.
19+
:::image type="content" source="./media/backend-interoperability/SpokeVNet_peering.png" alt-text="Screenshot of spoke virtual network's peering.":::
2820

29-
[![2]][2]
3021

31-
## Branch VNet connectivity by using a site-to-site VPN
22+
The following figure shows the virtual network peering details of the hub virtual network. If you want the hub virtual network to permit the spoke virtual network to use the hub's gateways, select **Allow gateway transit**.
3223

33-
Set up site-to-site VPN connectivity between the hub and branch VNets by using VPN gateways in Azure VPN Gateway. By default, VPN gateways and Azure ExpressRoute gateways use a private autonomous system number (ASN) value of **65515**. You can change the ASN value in VPN Gateway. In the test setup, the ASN value of the branch VNet VPN gateway is changed to **65516** to support eBGP routing between the hub and branch VNets.
24+
:::image type="content" source="./media/backend-interoperability/HubVNet-peering.png" alt-text="Screenshot of Hub virtual network's peering.":::
3425

26+
## Branch virtual network connectivity by using a site-to-site VPN
3527

36-
[![3]][3]
28+
Set up site-to-site VPN connectivity between the hub and branch virtual networks by using VPN gateways in Azure VPN Gateway. By default, VPN gateways and Azure ExpressRoute gateways use a private autonomous system number (ASN) value of **65515**. You can change the ASN value in VPN Gateway. In the test setup, the ASN value of the branch virtual network VPN gateway is changed to **65516** to support eBGP routing between the hub and branch virtual networks.
3729

30+
:::image type="content" source="./media/backend-interoperability/BranchVNet-VPNGW.png" alt-text="Screenshot of VPN Gateway configuration of a branch virtual network.":::
3831

3932
## On-premises Location 1 connectivity by using ExpressRoute and a site-to-site VPN
4033

4134
### ExpressRoute 1 configuration details
4235

4336
The following figure shows the Azure Region 1 ExpressRoute circuit configuration toward on-premises Location 1 customer edge (CE) routers:
4437

45-
[![4]][4]
38+
:::image type="content" source="./media/backend-interoperability/ExR1.png" alt-text="Screenshot of ExpressRoute 1 configuration.":::
4639

47-
The following figure shows the connection configuration between the ExpressRoute 1 circuit and the hub VNet:
40+
The following figure shows the connection configuration between the ExpressRoute 1 circuit and the hub virtual network:
4841

49-
[![5]][5]
42+
:::image type="content" source="./media/folder/image.png" alt-text="Screenshot of connection configuration of ExpressRoute 1 to a hub virtual network Express Route gateway.":::
5043

5144
The following list shows the primary CE router configuration for ExpressRoute private peering connectivity. (Cisco ASR1000 routers are used as CE routers in the test setup.) When site-to-site VPN and ExpressRoute circuits are configured in parallel to connect an on-premises network to Azure, Azure prioritizes the ExpressRoute circuit by default. To avoid asymmetrical routing, the on-premises network also should prioritize ExpressRoute connectivity over site-to-site VPN connectivity. The following configuration establishes prioritization by using the BGP **local-preference** attribute:
5245

@@ -151,78 +144,56 @@ ip route vrf 30 10.10.30.254 255.255.255.255 Tunnel30
151144

152145
## On-premises Location 2 connectivity by using ExpressRoute
153146

154-
A second ExpressRoute circuit, in closer proximity to on-premises Location 2, connects on-premises Location 2 to the hub VNet. The following figure shows the second ExpressRoute configuration:
147+
A second ExpressRoute circuit, in closer proximity to on-premises Location 2, connects on-premises Location 2 to the hub virtual network. The following figure shows the second ExpressRoute configuration:
155148

156-
[![6]][6]
149+
:::image type="content" source="./media/backend-interoperability/ExR2.png" alt-text="Screenshot of ExpressRoute 2 configuration.":::
157150

158-
The following figure shows the connection configuration between the second ExpressRoute circuit and the hub VNet:
151+
The following figure shows the connection configuration between the second ExpressRoute circuit and the hub virtual network:
159152

160-
[![7]][7]
153+
:::image type="content" source="./media/backend-interoperability/ExR2-Hub-Connection.png" alt-text="Screenshot of connection configuration of ExpressRoute 2 to a hub virtual network ExR gateway.":::
161154

162-
ExpressRoute 1 connects both the hub VNet and on-premises Location 1 to a remote VNet in a different Azure region:
155+
ExpressRoute 1 connects both the hub virtual network and on-premises Location 1 to a remote virtual network in a different Azure region:
163156

164-
[![8]][8]
157+
:::image type="content" source="./media/backend-interoperability/ExR2-Remote-Connection.png" alt-text="Screenshot of connection configuration of ExpressRoute 2 to a remote virtual network ExR gateway.":::
165158

166159
## ExpressRoute and site-to-site VPN connectivity in tandem
167160

168161
### Site-to-site VPN over ExpressRoute
169162

170-
You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure VNets. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering][S2S-Over-ExR].
163+
You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure virtual networks. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering](../expressroute/site-to-site-vpn-over-microsoft-peering.md).
171164

172165
The primary limitation of configuring a site-to-site VPN that uses Microsoft peering is throughput. Throughput over the IPsec tunnel is limited by the VPN gateway capacity. The VPN gateway throughput is lower than ExpressRoute throughput. In this scenario, using the IPsec tunnel for highly secure traffic and using private peering for all other traffic helps optimize the ExpressRoute bandwidth utilization.
173166

174167
### Site-to-site VPN as a secure failover path for ExpressRoute
175168

176169
ExpressRoute serves as a redundant circuit pair to ensure high availability. You can configure geo-redundant ExpressRoute connectivity in different Azure regions. Also, as demonstrated in our test setup, within an Azure region, you can use a site-to-site VPN to create a failover path for your ExpressRoute connectivity. When the same prefixes are advertised over both ExpressRoute and a site-to-site VPN, Azure prioritizes ExpressRoute. To avoid asymmetrical routing between ExpressRoute and the site-to-site VPN, on-premises network configuration should also reciprocate by using ExpressRoute connectivity before it uses site-to-site VPN connectivity.
177170

178-
For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence][ExR-S2S-CoEx].
171+
For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence](../expressroute/expressroute-howto-coexist-resource-manager.md).
179172

180-
## Extend back-end connectivity to spoke VNets and branch locations
173+
## Extend back-end connectivity to spoke virtual networks and branch locations
181174

182-
### Spoke VNet connectivity by using VNet peering
175+
### Spoke virtual network connectivity by using virtual network peering
183176

184-
Hub and spoke VNet architecture is widely used. The hub is a VNet in Azure that acts as a central point of connectivity between your spoke VNets and to your on-premises network. The spokes are VNets that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure][Hub-n-Spoke].
177+
Hub and spoke virtual network architecture is widely used. The hub is a virtual network in Azure that acts as a central point of connectivity between your spoke virtual networks and to your on-premises network. The spokes are virtual networks that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke).
185178

186-
In VNet peering within a region, spoke VNets can use hub VNet gateways (both VPN and ExpressRoute gateways) to communicate with remote networks.
179+
In virtual network peering within a region, spoke virtual networks can use hub virtual network gateways (both VPN and ExpressRoute gateways) to communicate with remote networks.
187180

188-
### Branch VNet connectivity by using site-to-site VPN
181+
### Branch virtual network connectivity by using site-to-site VPN
189182

190-
You might want branch VNets, which are in different regions, and on-premises networks to communicate with each other via a hub VNet. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub.
183+
You might want branch virtual networks, which are in different regions, and on-premises networks to communicate with each other via a hub virtual network. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub.
191184

192-
For more information, see [What is VPN Gateway?][VPN] and [Deploy a highly available NVA][Deploy-NVA].
185+
For more information, see [What is VPN Gateway?](../vpn-gateway/vpn-gateway-about-vpngateways.md) and [Deploy a highly available NVA](/azure/architecture/reference-architectures/dmz/nva-ha).
193186

194187
## Next steps
195188

196-
Learn about [control plane analysis][Control-Analysis] of the test setup and the views of different VNets or VLANs in the topology.
189+
Learn about [control plane analysis](./connectivty-interoperability-control-plane.md) of the test setup and the views of different virtual networks or VLANs in the topology.
197190

198-
Learn about [data plane analysis][Data-Analysis] of the test setup and Azure network monitoring feature views.
191+
Learn about [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup and Azure network monitoring feature views.
192+
193+
See the [ExpressRoute FAQ](../expressroute/expressroute-faqs.md) to:
199194

200-
See the [ExpressRoute FAQ][ExR-FAQ] to:
201195
- Learn how many ExpressRoute circuits you can connect to an ExpressRoute gateway.
196+
202197
- Learn how many ExpressRoute gateways you can connect to an ExpressRoute circuit.
203-
- Learn about other scale limits of ExpressRoute.
204-
205-
206-
<!--Image References-->
207-
[1]: ./media/backend-interoperability/SpokeVNet_peering.png "Spoke VNet's VNet peering"
208-
[2]: ./media/backend-interoperability/HubVNet-peering.png "Hub VNet's VNet peering"
209-
[3]: ./media/backend-interoperability/BranchVNet-VPNGW.png "VPN Gateway configuration of a branch VNet"
210-
[4]: ./media/backend-interoperability/ExR1.png "ExpressRoute 1 configuration"
211-
[5]: ./media/backend-interoperability/ExR1-Hub-Connection.png "Connection configuration of ExpressRoute 1 to a hub VNet ExR gateway"
212-
[6]: ./media/backend-interoperability/ExR2.png "ExpressRoute 2 configuration"
213-
[7]: ./media/backend-interoperability/ExR2-Hub-Connection.png "Connection configuration of ExpressRoute 2 to a hub VNet ExR gateway"
214-
[8]: ./media/backend-interoperability/ExR2-Remote-Connection.png "Connection configuration of ExpressRoute 2 to a remote VNet ExR gateway"
215-
216-
<!--Link References-->
217-
[Setup]: ./connectivty-interoperability-preface.md
218-
[ExpressRoute]: ../expressroute/expressroute-introduction.md
219-
[VPN]: ../vpn-gateway/vpn-gateway-about-vpngateways.md
220-
[VNet]: ../virtual-network/tutorial-connect-virtual-networks-portal.md
221-
[Control-Analysis]: ./connectivty-interoperability-control-plane.md
222-
[Data-Analysis]: ./connectivty-interoperability-data-plane.md
223-
[ExR-FAQ]: ../expressroute/expressroute-faqs.md
224-
[S2S-Over-ExR]: ../expressroute/site-to-site-vpn-over-microsoft-peering.md
225-
[ExR-S2S-CoEx]: ../expressroute/expressroute-howto-coexist-resource-manager.md
226-
[Hub-n-Spoke]: /azure/architecture/reference-architectures/hybrid-networking/hub-spoke
227-
[Deploy-NVA]: /azure/architecture/reference-architectures/dmz/nva-ha
228-
[VNet-Config]: ../virtual-network/virtual-network-manage-peering.md
198+
199+
- Learn about other scale limits of ExpressRoute.

0 commit comments

Comments
 (0)