You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/scenario-bgp-peering-hub.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn about BGP peering with an Azure Virtual WAN virtual hub.
5
5
author: cherylmc
6
6
ms.service: virtual-wan
7
7
ms.topic: conceptual
8
-
ms.date: 07/27/2022
8
+
ms.date: 09/06/2022
9
9
ms.author: cherylmc
10
10
11
11
---
@@ -41,7 +41,7 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
41
41
* Public ASNs: 8074, 8075, 12076
42
42
* Private ASNs: 65515, 65517, 65518, 65519, 65520
43
43
* ASNs reserved by IANA: 23456, 64496-64511, 65535-65551
44
-
* While the virtual hub router exchanges BGP routes with your NVA and propagates them to your virtual network, it directly facilitates propagating routes from on-premises via the virtual hub hosted gateways (VPN Gateway/ExpressRoute Gateway/Managed NVA gateways).
44
+
* While the virtual hub router exchanges BGP routes with your NVA and propagates them to your virtual network, it directly facilitates propagating routes from on-premises via the virtual hub hosted gateways (VPN gateway/ExpressRoute gateway/Managed NVA gateways).
45
45
46
46
The virtual hub router has the following limits:
47
47
@@ -51,7 +51,8 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
51
51
* Routes from NVA in a virtual network that are more specific than the virtual network address space, when advertised to the virtual hub through BGP are not propagated further to on-premises.
52
52
* Currently we only support 1,000 routes from the NVA to the virtual hub.
53
53
* Traffic destined for addresses in the virtual network directly connected to the virtual hub cannot be configured to route through the NVA using BGP peering between the hub and NVA. This is because the virtual hub automatically learns about system routes associated with addresses in the spoke virtual network when the spoke virtual network connection is created. These automatically learned system routes are preferred over routes learned by the hub through BGP.
54
-
* This feature is not supported for setting up BGP peering between NVA in spoke VNET and Virtual hub with Azure Firewall.
54
+
* This feature is not supported for setting up BGP peering between an NVA in a spoke VNet and a virtual hub with Azure Firewall.
55
+
* In order for the NVA to exchange routes with VPN and ER connected sites, branch to branch routing must be turned on.
0 commit comments