Skip to content

Commit 3dfdaf0

Browse files
authored
Merge pull request #95742 from cherylmc/test3
deletetest
2 parents cbece6d + 588884c commit 3dfdaf0

6 files changed

+29
-40
lines changed

articles/vpn-gateway/vpn-gateway-about-vpngateways.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: 'Azure VPN Gateway | Microsoft Docs'
2+
title: 'About Azure VPN Gateway'
33
description: Learn about what a VPN gateway is and the ways you can use a VPN gateway to connect to Azure virtual networks. Including IPsec/IKE Site-to-Site cross-premises and VNet-to-VNet solutions, as well as Point-to-Site VPN.
44
services: vpn-gateway
55
author: cherylmc
66
Customer intent: As someone with a basic network background, but is new to Azure, I want to understand the capabilities of Azure VPN Gateway so that I can securely connect to my Azure virtual networks.
77

88
ms.service: vpn-gateway
99
ms.topic: overview
10-
ms.date: 10/31/2019
10+
ms.date: 11/13/2019
1111
ms.author: cherylmc
1212

1313
---
@@ -49,7 +49,10 @@ The following table can help you decide the best connectivity option for your so
4949

5050
## <a name="gwsku"></a>Gateway SKUs
5151

52-
When you create a virtual network gateway, you specify the gateway SKU that you want to use. Select the SKU that satisfies your requirements based on the types of workloads, throughputs, features, and SLAs. For more information about gateway SKUs, including supported features, production and dev-test, and configuration steps, see the [VPN Gateway Settings - Gateway SKUs](vpn-gateway-about-vpn-gateway-settings.md#gwsku) article. For Legacy SKU information, see [Working with Legacy SKUs](vpn-gateway-about-skus-legacy.md).
52+
When you create a virtual network gateway, you specify the gateway SKU that you want to use. Select the SKU that satisfies your requirements based on the types of workloads, throughputs, features, and SLAs.
53+
54+
* For more information about gateway SKUs, including supported features, production and dev-test, and configuration steps, see the [VPN Gateway Settings - Gateway SKUs](vpn-gateway-about-vpn-gateway-settings.md#gwsku) article.
55+
* For Legacy SKU information, see [Working with Legacy SKUs](vpn-gateway-about-skus-legacy.md).
5356

5457
### <a name="benchmark"></a>Gateway SKUs by tunnel, connection, and throughput
5558

@@ -90,7 +93,6 @@ A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection
9093

9194
Unlike S2S connections, P2S connections do not require an on-premises public-facing IP address or a VPN device. P2S connections can be used with S2S connections through the same VPN gateway, as long as all the configuration requirements for both connections are compatible. For more information about Point-to-Site connections, see [About Point-to-Site VPN](point-to-site-about.md).
9295

93-
9496
![Azure VPN Gateway Point-to-Site connection example](./media/vpn-gateway-about-vpngateways/point-to-site.png)
9597

9698
### Deployment models and methods for P2S

articles/vpn-gateway/vpn-gateway-vpn-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: yushwang
66

77
ms.service: vpn-gateway
88
ms.topic: conceptual
9-
ms.date: 05/14/2019
9+
ms.date: 11/12/2019
1010
ms.author: yushwang
1111
---
1212
# VPN Gateway FAQ

includes/vpn-gateway-classic-sku-support-include.md

Lines changed: 0 additions & 17 deletions
This file was deleted.

includes/vpn-gateway-faq-ipsecikepolicy-include.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
ms.custom: include file
1111
---
1212
### Is Custom IPsec/IKE policy supported on all Azure VPN Gateway SKUs?
13-
Custom IPsec/IKE policy is supported on Azure **VpnGw1, VpnGw2, VpnGw3, Standard**, and **HighPerformance** VPN gateways. The **Basic** SKU is **not** supported.
13+
Custom IPsec/IKE policy is supported on all Azure SKUs except the Basic SKU.
1414

1515
### How many policies can I specify on a connection?
1616
You can only specify ***one*** policy combination for a given connection.
@@ -21,22 +21,22 @@ No, you must specify all algorithms and parameters for both IKE (Main Mode) and
2121
### What are the algorithms and key strengths supported in the custom policy?
2222
The following table lists the supported cryptographic algorithms and key strengths configurable by the customers. You must select one option for every field.
2323

24-
| **IPsec/IKEv1, IKEv2** | **Options** |
25-
| --- | --- |
26-
| IKEv1, IKEv2 Encryption | AES256, AES192, AES128, DES3, DES |
27-
| IKEv1, IKEv2 Integrity | SHA384, SHA256, SHA1, MD5 |
28-
| DH Group | DHGroup24, ECP384, ECP256, DHGroup14 (DHGroup2048), DHGroup2, DHGroup1, None |
29-
| IPsec Encryption | GCMAES256, GCMAES192, GCMAES128, AES256, AES192, AES128, DES3, DES, None |
30-
| IPsec Integrity | GCMAES256, GCMAES192, GCMAES128, SHA256, SHA1, MD5 |
31-
| PFS Group | PFS24, ECP384, ECP256, PFS2048, PFS2, PFS1, None |
32-
| QM SA Lifetime | Seconds (integer; **min. 300**/default 27000 seconds)<br>KBytes (integer; **min. 1024**/default 102400000 KBytes) |
33-
| Traffic Selector | UsePolicyBasedTrafficSelectors ($True/$False; default $False) |
34-
| | |
24+
| **IPsec/IKEv2** | **Options** |
25+
| --- | --- |
26+
| IKEv2 Encryption | AES256, AES192, AES128, DES3, DES |
27+
| IKEv2 Integrity | SHA384, SHA256, SHA1, MD5 |
28+
| DH Group | DHGroup24, ECP384, ECP256, DHGroup14 (DHGroup2048), DHGroup2, DHGroup1, None |
29+
| IPsec Encryption | GCMAES256, GCMAES192, GCMAES128, AES256, AES192, AES128, DES3, DES, None |
30+
| IPsec Integrity | GCMAES256, GCMAES192, GCMAES128, SHA256, SHA1, MD5 |
31+
| PFS Group | PFS24, ECP384, ECP256, PFS2048, PFS2, PFS1, None |
32+
| QM SA Lifetime | Seconds (integer; **min. 300**/default 27000 seconds)<br>KBytes (integer; **min. 1024**/default 102400000 KBytes) |
33+
| Traffic Selector | UsePolicyBasedTrafficSelectors ($True/$False; default $False) |
34+
| | |
3535

3636
> [!IMPORTANT]
3737
> 1. DHGroup2048 & PFS2048 are the same as Diffie-Hellman Group **14** in IKE and IPsec PFS. See [Diffie-Hellman Groups](#DH) for the complete mappings.
3838
> 2. For GCMAES algorithms, you must specify the same GCMAES algorithm and key length for both IPsec Encryption and Integrity.
39-
> 3. IKEv1 and IKEv2 Main Mode SA lifetime is fixed at 28,800 seconds on the Azure VPN gateways.
39+
> 3. IKEv2 Main Mode SA lifetime is fixed at 28,800 seconds on the Azure VPN gateways.
4040
> 4. QM SA Lifetimes are optional parameters. If none was specified, default values of 27,000 seconds (7.5 hrs) and 102400000 KBytes (102GB) are used.
4141
> 5. UsePolicyBasedTrafficSelector is an option parameter on the connection. See the next FAQ item for "UsePolicyBasedTrafficSelectors"
4242

includes/vpn-gateway-gwsku-include.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,22 @@
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: include
8-
ms.date: 11/04/2019
8+
ms.date: 11/12/2019
99
ms.author: cherylmc
1010
ms.custom: include file
1111
---
1212

13-
When you create a virtual network gateway, you need to specify the gateway SKU that you want to use. Select the SKU that satisfies your requirements based on the types of workloads, throughputs, features, and SLAs. For virtual network gateway SKUs in Azure Availability Zones, see [Azure Availability Zones Gateway SKUs](../articles/vpn-gateway/about-zone-redundant-vnet-gateways.md).
13+
When you create a virtual network gateway, you need to specify the gateway SKU that you want to use. Select the SKU that satisfies your requirements based on the types of workloads, throughputs, features, and SLAs. For virtual network gateway SKUs in Azure Availability Zones, see [Azure Availability Zones gateway SKUs](../articles/vpn-gateway/about-zone-redundant-vnet-gateways.md).
1414

1515
### <a name="benchmark"></a>Gateway SKUs by tunnel, connection, and throughput
1616

1717
[!INCLUDE [Aggregated throughput by SKU](./vpn-gateway-table-gwtype-aggtput-include.md)]
1818

19-
[!INCLUDE [classic SKU](./vpn-gateway-classic-sku-support-include.md)]
19+
> [!NOTE]
20+
> VpnGw SKUs (VpnGw1, VpnGw1AZ, VpnGw2, VpnGw2AZ, VpnGw3, VpnGw3AZ, VpnGw4, VpnGw4AZ, VpnGw5, and VpnGw5AZ) are supported for the Resource Manager deployment model only. Classic virtual networks should continue to use the old (legacy) SKUs.
21+
> * For information about working with the legacy gateway SKUs (Basic, Standard, and HighPerformance), see [Working with VPN gateway SKUs (legacy SKUs)](../articles/vpn-gateway/vpn-gateway-about-skus-legacy.md).
22+
> * For ExpressRoute gateway SKUs, see [Virtual Network Gateways for ExpressRoute](../articles/expressroute/expressroute-about-virtual-network-gateways.md).
23+
>
2024
2125
### <a name="feature"></a>Gateway SKUs by feature set
2226

includes/vpn-gateway-table-gwtype-aggtput-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: include
8-
ms.date: 11/04/2019
8+
ms.date: 11/12/2019
99
ms.author: cherylmc
1010
ms.custom: include file
1111
---
@@ -41,7 +41,7 @@
4141

4242
* On a single tunnel a maximum of 1 Gbps throughput can be achieved. Aggregate Throughput Benchmark in the above table is based on measurements of multiple tunnels aggregated through a single gateway. The Aggregate Throughput Benchmark for a VPN Gateway is S2S + P2S combined. **If you have a lot of P2S connections, it can negatively impact a S2S connection due to throughput limitations.** The Aggregate Throughput Benchmark is not a guaranteed throughput due to Internet traffic conditions and your application behaviors.
4343

44-
* To help our customers understand the relative performance of SKUs using different algorithms, we used publicly available iPerf and CTSTraffic tools to measure performances. The table below lists the results of performance tests for Generation 1, VpnGw SKUs. As you can see, the best performance is obtained when we used GCMAES256 algorithm for both IPsec Encryption and Integrity. We got average performance when using AES256 for IPsec Encryption and SHA256 for Integrity. When we used DES3 for IPsec Encryption and SHA256 for Integrity we got lowest performance.
44+
To help our customers understand the relative performance of SKUs using different algorithms, we used publicly available iPerf and CTSTraffic tools to measure performances. The table below lists the results of performance tests for Generation 1, VpnGw SKUs. As you can see, the best performance is obtained when we used GCMAES256 algorithm for both IPsec Encryption and Integrity. We got average performance when using AES256 for IPsec Encryption and SHA256 for Integrity. When we used DES3 for IPsec Encryption and SHA256 for Integrity we got lowest performance.
4545

4646
|**Generation**|**SKU** | **Algorithms<br>used** | **Throughput<br>observed** | **Packets per second<br>observed** |
4747
|--- |--- | --- | --- | --- |

0 commit comments

Comments
 (0)