Skip to content

Commit 370a25f

Browse files
committed
freshness review
1 parent 7bea945 commit 370a25f

File tree

5 files changed

+22
-31
lines changed

5 files changed

+22
-31
lines changed
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

articles/virtual-wan/vpn-over-expressroute.md

Lines changed: 22 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: virtual-wan
88
ms.topic: how-to
9-
ms.date: 09/22/2020
9+
ms.date: 08/24/2023
1010
ms.author: cherylmc
1111
---
1212
# ExpressRoute encryption: IPsec over ExpressRoute for Virtual WAN
@@ -17,7 +17,7 @@ This article shows you how to use Azure Virtual WAN to establish an IPsec/IKE VP
1717

1818
The following diagram shows an example of VPN connectivity over ExpressRoute private peering:
1919

20-
:::image type="content" source="./media/vpn-over-expressroute/vwan-vpn-over-er.png" alt-text="VPN over ExpressRoute":::
20+
:::image type="content" source="./media/vpn-over-expressroute/vwan-vpn-over-er.png" alt-text="Diagram of VPN over ExpressRoute.":::
2121

2222
The diagram shows a network within the on-premises network connected to the Azure hub VPN gateway over ExpressRoute private peering. The connectivity establishment is straightforward:
2323

@@ -57,8 +57,8 @@ In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN c
5757

5858
The following Azure resources and the corresponding on-premises configurations must be in place before you proceed:
5959

60-
- An Azure virtual WAN
61-
- A virtual WAN hub with an [ExpressRoute gateway](virtual-wan-expressroute-portal.md) and a [VPN gateway](virtual-wan-site-to-site-portal.md)
60+
- An Azure virtual WAN.
61+
- A virtual WAN hub with an [ExpressRoute gateway](virtual-wan-expressroute-portal.md) and a [VPN gateway](virtual-wan-site-to-site-portal.md).
6262

6363
For the steps to create an Azure virtual WAN and a hub with an ExpressRoute association, see [Create an ExpressRoute association using Azure Virtual WAN](virtual-wan-expressroute-portal.md). For the steps to create a VPN gateway in the virtual WAN, see [Create a site-to-site connection using Azure Virtual WAN](virtual-wan-site-to-site-portal.md).
6464

@@ -70,49 +70,40 @@ The site resource is the same as the non-ExpressRoute VPN sites for a virtual WA
7070
> The IP address for the on-premises VPN device *must* be part of the address prefixes advertised to the virtual WAN hub via Azure ExpressRoute private peering.
7171
>
7272
73-
1. Go to the Azure portal in your browser.
74-
1. Select the hub that you created. On the virtual WAN hub page, under **Connectivity**, select **VPN sites**.
75-
1. On the **VPN sites** page, select **+Create site**.
76-
1. On the **Create site** page, fill in the following fields:
77-
* **Subscription**: Verify the subscription.
78-
* **Resource Group**: Select or create the resource group that you want to use.
79-
* **Region**: Enter the Azure region for the VPN site resource.
80-
* **Name**: Enter the name by which you want to refer to your on-premises site.
81-
* **Device vendor**: Enter the vendor of the on-premises VPN device.
73+
1. Go to **YourVirtualWAN > VPN sites** and create a site for your on-premises network. For basic steps, see [Create a site](virtual-wan-site-to-site-portal.md). Keep in mind the following settings values:
74+
8275
* **Border Gateway Protocol**: Select "Enable" if your on-premises network uses BGP.
8376
* **Private address space**: Enter the IP address space that's located on your on-premises site. Traffic destined for this address space is routed to the on-premises network via the VPN gateway.
84-
* **Hubs**: Select one or more hubs to connect this VPN site. The selected hubs must have VPN gateways already created.
85-
1. Select **Next: Links >** for the VPN link settings:
86-
* **Link Name**: The name by which you want to refer to this connection.
77+
78+
1. Select **Links** to add information about the physical links. Keep in mind the following settings information:
79+
8780
* **Provider Name**: The name of the internet service provider for this site. For an ExpressRoute on-premises network, it's the name of the ExpressRoute service provider.
8881
* **Speed**: The speed of the internet service link or ExpressRoute circuit.
8982
* **IP address**: The public IP address of the VPN device that resides on your on-premises site. Or, for ExpressRoute on-premises, it's the private IP address of the VPN device via ExpressRoute.
9083

91-
If BGP is enabled, it will apply to all connections created for this site in Azure. Configuring BGP on a virtual WAN is equivalent to configuring BGP on an Azure VPN gateway.
92-
93-
Your on-premises BGP peer address *must not* be the same as the IP address of your VPN to the device or the virtual network address space of the VPN site. Use a different IP address on the VPN device for your BGP peer IP. It can be an address assigned to the loopback interface on the device. However, it *can't* be an APIPA (169.254.*x*.*x*) address. Specify this address in the corresponding VPN site that represents the location. For BGP prerequisites, see [About BGP with Azure VPN Gateway](../vpn-gateway/vpn-gateway-bgp-overview.md).
84+
* If BGP is enabled, it applies to all connections created for this site in Azure. Configuring BGP on a virtual WAN is equivalent to configuring BGP on an Azure VPN gateway.
85+
86+
* Your on-premises BGP peer address *must not* be the same as the IP address of your VPN to the device or the virtual network address space of the VPN site. Use a different IP address on the VPN device for your BGP peer IP. It can be an address assigned to the loopback interface on the device. However, it *can't* be an APIPA (169.254.*x*.*x*) address. Specify this address in the corresponding VPN site that represents the location. For BGP prerequisites, see [About BGP with Azure VPN Gateway](../vpn-gateway/vpn-gateway-bgp-overview.md).
9487

95-
1. Select **Next: Review + create >** to check the setting values and create the VPN site. If you selected **Hubs** to connect, the connection will be established between the on-premises network and the hub VPN gateway.
88+
1. Select **Next: Review + create >** to check the setting values and create the VPN site, then **Create** the site.
89+
1. Next, connect the site to the hub using these basic [Steps](virtual-wan-site-to-site-portal.md#connectsites) as a guideline. It can take up to 30 minutes to update the gateway.
9690

9791
## <a name="hub"></a>3. Update the VPN connection setting to use ExpressRoute
9892

9993
After you create the VPN site and connect to the hub, use the following steps to configure the connection to use ExpressRoute private peering:
10094

101-
1. Go back to the virtual WAN resource page, and select the hub resource. Or navigate from the VPN site to the connected hub.
95+
1. Go to the virtual hub. You can either do this by going to the Virtual WAN and selecting the hub to open the hub page, or you can go to the connected virtual hub from the VPN site.
10296

103-
:::image type="content" source="./media/vpn-over-expressroute/hub-selection.png" alt-text="Select a hub":::
10497
1. Under **Connectivity**, select **VPN (Site-to-Site)**.
10598

106-
:::image type="content" source="./media/vpn-over-expressroute/vpn-select.png" alt-text="Select VPN (Site-to-Site)":::
107-
1. Select the ellipsis (**...**) on the VPN site over ExpressRoute, and select **Edit VPN connection to this hub**.
99+
1. Select the ellipsis (**...**) or right click the VPN site over ExpressRoute, and select **Edit VPN connection to this hub**.
108100

109-
:::image type="content" source="./media/vpn-over-expressroute/config-menu.png" alt-text="Enter configuration menu":::
110-
1. For **Use Azure Private IP Address**, select **Yes**. The setting configures the hub VPN gateway to use private IP addresses within the hub address range on the gateway for this connection, instead of the public IP addresses. This will ensure that the traffic from the on-premises network traverses the ExpressRoute private peering paths rather than using the public internet for this VPN connection. The following screenshot shows the setting:
101+
1. On the **Basics** page, leave the defaults.
111102

112-
:::image type="content" source="./media/vpn-over-expressroute/vpn-link-configuration.png" alt-text="Setting for using a private IP address for the VPN connection" border="false":::
113-
1. Select **Save**.
103+
1. On the **Link connection 1** page, configure the following settings:
114104

115-
After you save your changes, the hub VPN gateway will use the private IP addresses on the VPN gateway to establish the IPsec/IKE connections with the on-premises VPN device over ExpressRoute.
105+
- For **Use Azure Private IP Address**, select **Yes**. The setting configures the hub VPN gateway to use private IP addresses within the hub address range on the gateway for this connection, instead of the public IP addresses. This ensures that the traffic from the on-premises network traverses the ExpressRoute private peering paths rather than using the public internet for this VPN connection.
106+
1. Click **Create** to update the settings. After the settings have been created, the hub VPN gateway will use the private IP addresses on the VPN gateway to establish the IPsec/IKE connections with the on-premises VPN device over ExpressRoute.
116107

117108
## <a name="associate"></a>4. Get the private IP addresses for the hub VPN gateway
118109

@@ -145,7 +136,7 @@ The device configuration file contains the settings to use when you're configuri
145136
"Instance0":"10.51.230.4"
146137
"Instance1":"10.51.230.5"
147138
```
148-
* Configuration details for the VPN gateway connection, such as BGP and pre-shared key. The pre-shared key is automatically generated for you. You can always edit the connection on the **Overview** page for a custom pre-shared key.
139+
* Configuration details for the VPN gateway connection, such as BGP and preshared key. The preshared key is automatically generated for you. You can always edit the connection on the **Overview** page for a custom preshared key.
149140

150141
### Example device configuration file
151142

@@ -214,7 +205,7 @@ The device configuration file contains the settings to use when you're configuri
214205

215206
If you need instructions to configure your device, you can use the instructions on the [VPN device configuration scripts page](~/articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#configscripts) with the following caveats:
216207

217-
* The instructions on the VPN device page are not written for a virtual WAN. But you can use the virtual WAN values from the configuration file to manually configure your VPN device.
208+
* The instructions on the VPN device page aren't written for a virtual WAN. But you can use the virtual WAN values from the configuration file to manually configure your VPN device.
218209
* The downloadable device configuration scripts that are for the VPN gateway don't work for the virtual WAN, because the configuration is different.
219210
* A new virtual WAN can support both IKEv1 and IKEv2.
220211
* A virtual WAN can use only route-based VPN devices and device instructions.

0 commit comments

Comments
 (0)