Skip to content

Commit 385c61a

Browse files
Merge pull request #286948 from cherylmc/p2s-about
Add client versions
2 parents a67ca0c + 9807e84 commit 385c61a

File tree

1 file changed

+16
-13
lines changed

1 file changed

+16
-13
lines changed

articles/vpn-gateway/point-to-site-about.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,12 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: conceptual
9-
ms.date: 08/08/2024
9+
ms.date: 09/18/2024
1010
ms.author: cherylmc
1111
---
1212
# About Point-to-Site VPN
1313

14-
A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client computer. This solution is useful for telecommuters who want to connect to Azure VNets from a remote location, such as from home or a conference. P2S VPN is also a useful solution to use instead of S2S VPN when you have only a few clients that need to connect to a VNet. Point-to-site configurations require a **route-based** VPN type.
15-
16-
This article applies to the current deployment model. See [P2S - Classic](vpn-gateway-howto-point-to-site-classic-azure-portal.md) for legacy deployments.
14+
A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client computer. This solution is useful for telecommuters who want to connect to Azure virtual networks from a remote location, such as from home or a conference. P2S VPN is also a useful solution to use instead of site-to-site (S2S) VPN when you have only a few clients that need to connect to a virtual network. Point-to-site configurations require a **route-based** VPN type.
1715

1816
## <a name="protocol"></a>What protocol does P2S use?
1917

@@ -29,23 +27,23 @@ Point-to-site VPN can use one of the following protocols:
2927

3028
Before Azure accepts a P2S VPN connection, the user has to be authenticated first. There are three authentication types that you can select when you configure your P2S gateway. The options are:
3129

32-
* Azure certificate
33-
* Microsoft Entra ID
34-
* RADIUS and Active Directory Domain Server
30+
* [Certificate](#certificate)
31+
* [Microsoft Entra ID](#entra-id)
32+
* [RADIUS and Active Directory Domain Server](#active-directory)
3533

3634
You can select multiple authentication types for your P2S gateway configuration. If you select multiple authentication types, the VPN client you use must be supported by at least one authentication type and corresponding tunnel type. For example, if you select "IKEv2 and OpenVPN" for tunnel types, and "Microsoft Entra ID and Radius" or "Microsoft Entra ID and Azure Certificate" for authentication type, Microsoft Entra ID will only use the OpenVPN tunnel type since it's not supported by IKEv2.
3735

3836
The following table shows authentication mechanisms that are compatible with selected tunnel types. Each mechanism requires corresponding VPN client software on the connecting device to be configured with the proper settings available in the VPN client profile configuration files.
3937

4038
[!INCLUDE [All client articles](../../includes/vpn-gateway-vpn-multiauth-tunnel-mapping.md)]
4139

42-
### Certificate authentication
40+
### <a name="certificate"></a>Certificate authentication
4341

4442
When you configure your P2S gateway for certificate authentication, you upload the trusted root certificate public key to the Azure gateway. You can use a root certificate that was generated using an Enterprise solution, or you can generate a self-signed certificate.
4543

4644
To authenticate, each client that connects must have an installed client certificate that's generated from the trusted root certificate. This is in addition to VPN client software. The validation of the client certificate is performed by the VPN gateway and happens during establishment of the P2S VPN connection.
4745

48-
#### <a name='certificate-workflow'></a>Certificate Workflow
46+
#### <a name='certificate-workflow'></a>Certificate authentication workflow
4947

5048
At a high level, you need to perform the following steps to configure Certificate authentication:
5149

@@ -61,21 +59,21 @@ You can configure your P2S gateway to allow VPN users to authenticate using Micr
6159

6260
[!INCLUDE [entra app id descriptions](../../includes/vpn-gateway-entra-app-id-descriptions.md)]
6361

64-
#### <a name='entra-workflow'></a>Microsoft Entra ID Workflow
62+
#### <a name='entra-workflow'></a>Microsoft Entra ID authentication workflow
6563

6664
At a high level, you need to perform the following steps to configure Microsoft Entra ID authentication:
6765

68-
1. If using manual app registration, perform the necessary steps on the Entra tenant.
66+
1. If using manual app registration, perform the necessary steps on the Microsoft Entra tenant.
6967
1. Enable Microsoft Entra ID authentication on the P2S gateway, along with the additional required settings (client address pool, etc.).
7068
1. Generate and download VPN client profile configuration files (profile configuration package).
7169
1. Download, install, and configure the Azure VPN Client on the client computer.
7270
1. Connect.
7371

74-
### Active Directory (AD) Domain Server
72+
### <a name='active-directory'></a>RADIUS - Active Directory (AD) Domain Server authentication
7573

7674
AD Domain authentication allows users to connect to Azure using their organization domain credentials. It requires a RADIUS server that integrates with the AD server. Organizations can also use their existing RADIUS deployment.
7775

78-
The RADIUS server could be deployed on-premises or in your Azure VNet. During authentication, the Azure VPN Gateway acts as a pass through and forwards authentication messages back and forth between the RADIUS server and the connecting device. So Gateway reachability to the RADIUS server is important. If the RADIUS server is present on-premises, then a VPN S2S connection from Azure to the on-premises site is required for reachability.
76+
The RADIUS server could be deployed on-premises or in your Azure virtual network. During authentication, the Azure VPN Gateway acts as a pass through and forwards authentication messages back and forth between the RADIUS server and the connecting device. So Gateway reachability to the RADIUS server is important. If the RADIUS server is present on-premises, then a VPN S2S connection from Azure to the on-premises site is required for reachability.
7977

8078
The RADIUS server can also integrate with AD certificate services. This lets you use the RADIUS server and your enterprise certificate deployment for P2S certificate authentication as an alternative to the Azure certificate authentication. The advantage is that you don’t need to upload root certificates and revoked certificates to Azure.
8179

@@ -91,6 +89,10 @@ The client configuration requirements vary, based on the VPN client that you use
9189

9290
[!INCLUDE [All client articles](../../includes/vpn-gateway-vpn-client-install-articles.md)]
9391

92+
## What versions of the Azure VPN Client are available?
93+
94+
For information about available Azure VPN Client versions, release dates, and what's new in each release, see [Azure VPN Client versions](azure-vpn-client-versions.md).
95+
9496
## <a name="gwsku"></a>Which gateway SKUs support P2S VPN?
9597

9698
The following table shows gateway SKUs by tunnel, connection, and throughput. For more information, see [About gateway SKUs](about-gateway-skus.md).
@@ -175,4 +177,5 @@ There are multiple FAQ entries for point-to-site. See the [VPN Gateway FAQ](vpn-
175177

176178
* [Configure a P2S connection - Azure certificate authentication](vpn-gateway-howto-point-to-site-resource-manager-portal.md)
177179
* [Configure a P2S connection - Microsoft Entra ID authentication](point-to-site-entra-gateway.md)
180+
178181
**"OpenVPN" is a trademark of OpenVPN Inc.**

0 commit comments

Comments
 (0)