Skip to content

Commit 3e0e942

Browse files
Merge pull request #250506 from deeharris-23/patch-3
Clarify that VPN BGP configuration is not necessary
2 parents fa6cc3b + 8d55325 commit 3e0e942

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/vpn-gateway/site-to-site-vpn-private-peering.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Establishing connectivity is straightforward:
5151

5252
### Traffic from on-premises networks to Azure
5353

54-
For traffic from on-premises networks to Azure, the Azure prefixes are advertised via both the ExpressRoute private peering BGP, and the VPN BGP. The result is two network routes (paths) toward Azure from the on-premises networks:
54+
For traffic from on-premises networks to Azure, the Azure prefixes are advertised via both the ExpressRoute private peering BGP, and the VPN BGP if BGP is configured on your VPN Gateway. The result is two network routes (paths) toward Azure from the on-premises networks:
5555

5656
• One network route over the IPsec-protected path.
5757

@@ -87,6 +87,10 @@ In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN c
8787
:::image type="content" source="media/site-to-site-vpn-private-peering/connection.png" alt-text="Gateway Private IPs - Enabled":::
8888
1. Use the private IP that you wrote down in step 3 as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.
8989

90+
>[!NOTE]
91+
> Configurig BGP on your VPN Gateway is not required to achieve a VPN connection over ExpressRoute private peering.
92+
>
93+
9094
## <a name="powershell"></a>PowerShell steps
9195

9296
1. Configure a Site-to-Site connection. For steps, see the [Configure a Site-to-Site VPN](./tutorial-site-to-site-portal.md) article. Be sure to pick a gateway with a Standard Public IP.

0 commit comments

Comments
 (0)