Skip to content

Commit 3e3113a

Browse files
Merge pull request #210251 from cherylmc/patch-4
Update scenario-bgp-peering-hub.md
2 parents 8743999 + bda94c3 commit 3e3113a

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/virtual-wan/scenario-bgp-peering-hub.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about BGP peering with an Azure Virtual WAN virtual hub.
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: conceptual
8-
ms.date: 07/27/2022
8+
ms.date: 09/06/2022
99
ms.author: cherylmc
1010

1111
---
@@ -41,7 +41,7 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
4141
* Public ASNs: 8074, 8075, 12076
4242
* Private ASNs: 65515, 65517, 65518, 65519, 65520
4343
* ASNs reserved by IANA: 23456, 64496-64511, 65535-65551
44-
* While the virtual hub router exchanges BGP routes with your NVA and propagates them to your virtual network, it directly facilitates propagating routes from on-premises via the virtual hub hosted gateways (VPN Gateway/ExpressRoute Gateway/Managed NVA gateways).
44+
* While the virtual hub router exchanges BGP routes with your NVA and propagates them to your virtual network, it directly facilitates propagating routes from on-premises via the virtual hub hosted gateways (VPN gateway/ExpressRoute gateway/Managed NVA gateways).
4545

4646
The virtual hub router has the following limits:
4747

@@ -51,7 +51,8 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
5151
* Routes from NVA in a virtual network that are more specific than the virtual network address space, when advertised to the virtual hub through BGP are not propagated further to on-premises.
5252
* Currently we only support 1,000 routes from the NVA to the virtual hub.
5353
* Traffic destined for addresses in the virtual network directly connected to the virtual hub cannot be configured to route through the NVA using BGP peering between the hub and NVA. This is because the virtual hub automatically learns about system routes associated with addresses in the spoke virtual network when the spoke virtual network connection is created. These automatically learned system routes are preferred over routes learned by the hub through BGP.
54-
* This feature is not supported for setting up BGP peering between NVA in spoke VNET and Virtual hub with Azure Firewall.
54+
* This feature is not supported for setting up BGP peering between an NVA in a spoke VNet and a virtual hub with Azure Firewall.
55+
* In order for the NVA to exchange routes with VPN and ER connected sites, branch to branch routing must be turned on.
5556

5657
## BGP peering scenarios
5758

0 commit comments

Comments
 (0)