Skip to content

Commit 31b77e6

Browse files
authored
Merge pull request #284081 from cherylmc/policies-include
VPN Gateway tls include
2 parents 8f67ade + 130853a commit 31b77e6

File tree

3 files changed

+34
-43
lines changed

3 files changed

+34
-43
lines changed

articles/vpn-gateway/ikev2-openvpn-from-sstp.md

Lines changed: 11 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to transition to OpenVPN protocol or IKEv2 from SSTP to o
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 05/15/2024
8+
ms.date: 08/08/2024
99
ms.author: cherylmc
1010

1111
---
@@ -23,9 +23,8 @@ Point-to-site VPN can use one of the following protocols:
2323

2424
* IKEv2 VPN, a standards-based IPsec VPN solution. IKEv2 VPN can be used to connect from Mac devices (macOS versions 10.11 and above).
2525

26-
>[!NOTE]
27-
>IKEv2 and OpenVPN for P2S are available for the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md) only. They are not available for the classic deployment model. The Basic gateway SKU does not support IKEv2 or OpenVPN protocols. If you are using the Basic SKU, you will have to delete and recreate a production SKU virtual network gateway.
28-
>
26+
> [!NOTE]
27+
> IKEv2 and OpenVPN for P2S are available for the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md) only. They are not available for the classic deployment model. The Basic gateway SKU does not support IKEv2 or OpenVPN protocols. If you are using the Basic SKU, you will have to delete and recreate a production SKU virtual network gateway.
2928
3029
## <a name="migrate"></a>Migrating from SSTP to IKEv2 or OpenVPN
3130

@@ -43,9 +42,8 @@ To add IKEv2 to an existing gateway, go to the "point-to-site configuration" tab
4342

4443
:::image type="content" source="./media/ikev2-openvpn-from-sstp/add-tunnel-type.png" alt-text="Screenshot that shows the Point-to-site configuration page with the Tunnel type drop-down open, and IKEv2 and SSTP(SSL) selected." lightbox="./media/ikev2-openvpn-from-sstp/add-tunnel-type.png":::
4544

46-
>[!NOTE]
45+
> [!NOTE]
4746
> When you have both SSTP and IKEv2 enabled on the gateway, the point-to-site address pool will be statically split between the two, so clients using different protocols will be assigned IP addresses from either sub-range. Note that the maximum amount of SSTP clients is always 128, even if the address range is larger than /24 resulting in a bigger amount of addresses available for IKEv2 clients. For smaller ranges, the pool will be equally halved. Traffic Selectors used by the gateway may not include the point-to-site address range CIDR, but the two sub-range CIDRs.
48-
>
4947
5048
### Option 2 - Remove SSTP and enable OpenVPN on the Gateway
5149

@@ -63,9 +61,8 @@ If you're using Windows 10 or later, you can also use the [Azure VPN Client](poi
6361

6462
### What are the client configuration requirements?
6563

66-
>[!NOTE]
67-
>For Windows clients, you must have administrator rights on the client device in order to initiate the VPN connection from the client device to Azure.
68-
>
64+
> [!NOTE]
65+
> For Windows clients, you must have administrator rights on the client device in order to initiate the VPN connection from the client device to Azure.
6966
7067
Users use the native VPN clients on Windows and Mac devices for P2S. Azure provides a VPN client configuration zip file that contains settings required by these native clients to connect to Azure.
7168

@@ -74,9 +71,8 @@ Users use the native VPN clients on Windows and Mac devices for P2S. Azure provi
7471

7572
The zip file also provides the values of some of the important settings on the Azure side that you can use to create your own profile for these devices. Some of the values include the VPN gateway address, configured tunnel types, routes, and the root certificate for gateway validation.
7673

77-
>[!NOTE]
78-
>[!INCLUDE [TLS version changes](../../includes/vpn-gateway-tls-change.md)]
79-
>
74+
> [!NOTE]
75+
> [!INCLUDE [TLS version changes](../../includes/vpn-gateway-tls-change.md)]
8076
8177
### <a name="gwsku"></a>Which gateway SKUs support P2S VPN?
8278

@@ -85,8 +81,7 @@ The following table shows gateway SKUs by tunnel, connection, and throughput. Fo
8581
[!INCLUDE [aggregate throughput sku](../../includes/vpn-gateway-table-gwtype-aggtput-include.md)]
8682

8783
> [!NOTE]
88-
> The Basic SKU has limitations and does not support IKEv2, or RADIUS authentication. See the [VPN Gateway settings](vpn-gateway-about-vpn-gateway-settings.md#gwsku) article for more information.
89-
>
84+
> The Basic SKU has limitations and does not support IKEv2, or RADIUS authentication.
9085
9186
### <a name="IKE/IPsec policies"></a>What IKE/IPsec policies are configured on VPN gateways for P2S?
9287

@@ -129,22 +124,8 @@ The following table shows gateway SKUs by tunnel, connection, and throughput. Fo
129124
| AES256 | SHA1 | GROUP_NONE |
130125

131126
### <a name="TLS policies"></a>What TLS policies are configured on VPN gateways for P2S?
132-
**TLS**
133-
134-
|**Policies** |
135-
|---|
136-
|TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
137-
|TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
138-
|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
139-
|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
140-
|TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
141-
|TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
142-
|TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
143-
|TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
144-
|TLS_RSA_WITH_AES_128_GCM_SHA256 |
145-
|TLS_RSA_WITH_AES_256_GCM_SHA384 |
146-
|TLS_RSA_WITH_AES_128_CBC_SHA256 |
147-
|TLS_RSA_WITH_AES_256_CBC_SHA256 |
127+
128+
[!INCLUDE [TLS policies table](../../includes/vpn-gateway-tls-policies.md)]
148129

149130
### <a name="configure"></a>How do I configure a P2S connection?
150131

articles/vpn-gateway/point-to-site-about.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: conceptual
9-
ms.date: 05/23/2024
9+
ms.date: 08/08/2024
1010
ms.author: cherylmc
1111
---
1212
# About Point-to-Site VPN
@@ -145,18 +145,7 @@ The tables in this section show the values for the default policies. However, th
145145

146146
## <a name="TLS policies"></a>What TLS policies are configured on VPN gateways for P2S?
147147

148-
**TLS**
149-
150-
|**Policies** |
151-
|---|
152-
|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
153-
|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
154-
|TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384|
155-
|TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
156-
|**TLS_AES_256_GCM_SHA384 |
157-
|**TLS_AES_128_GCM_SHA256 |
158-
159-
**Only supported on TLS1.3 with OpenVPN
148+
[!INCLUDE [TLS policies table](../../includes/vpn-gateway-tls-policies.md)]
160149

161150

162151
## <a name="configure"></a>How do I configure a P2S connection?

includes/vpn-gateway-tls-policies.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
ms.topic: include
3+
author: cherylmc
4+
ms.service: azure-vpn-gateway
5+
ms.date: 08/08/2024
6+
ms.author: cherylmc
7+
8+
---
9+
10+
**TLS**
11+
12+
|**Policies** |
13+
|---|
14+
|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
15+
|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
16+
|TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384|
17+
|TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
18+
|**TLS_AES_256_GCM_SHA384 |
19+
|**TLS_AES_128_GCM_SHA256 |
20+
21+
**Only supported on TLS1.3 with OpenVPN

0 commit comments

Comments
 (0)