|
1 | 1 | ---
|
2 |
| -title: 'Interoperability in Azure back-end connectivity features: Configuration details | Microsoft Docs' |
| 2 | +title: Interoperability in Azure back-end connectivity features - Configuration details |
3 | 3 | description: This article describes configuration details for the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
|
4 |
| -documentationcenter: na |
5 |
| -services: networking |
6 |
| -author: rambk |
7 |
| -manager: tracsman |
8 |
| - |
| 4 | +author: asudbring |
9 | 5 | ms.service: virtual-network
|
10 | 6 | ms.topic: article
|
11 |
| -ms.workload: infrastructure-services |
12 |
| -ms.date: 10/18/2018 |
13 |
| -ms.author: rambala |
14 |
| - |
| 7 | +ms.date: 03/27/2023 |
| 8 | +ms.author: allensu |
15 | 9 | ---
|
16 | 10 |
|
17 |
| -# Interoperability in Azure back-end connectivity features: Test configuration details |
18 |
| - |
19 |
| -This article describes the configuration details of the [test setup][Setup]. The test setup helps you analyze how Azure networking services interoperate at the control plane level and data plane level. |
| 11 | +# Interoperability in Azure back-end connectivity features - Test configuration details |
20 | 12 |
|
21 |
| -## Spoke VNet connectivity by using VNet peering |
| 13 | +This article describes the configuration details of the [test setup](./connectivty-interoperability-preface.md). The test setup helps you analyze how Azure networking services interoperate at the control plane level and data plane level. |
22 | 14 |
|
23 |
| -The following figure shows the Azure Virtual Network peering details of a spoke virtual network (VNet). To learn how to set up peering between two VNets, see [Manage VNet peering][VNet-Config]. If you want the spoke VNet to use the gateways that are connected to the hub VNet, select **Use remote gateways**. |
| 15 | +## Spoke virtual network connectivity by using virtual network peering |
24 | 16 |
|
25 |
| -[![1]][1] |
| 17 | +The following figure shows the Azure Virtual Network peering details of a spoke virtual network. For more information about peering between two virtual networks, see [Manage virtual network peering](../virtual-network/virtual-network-manage-peering.md). If you want the spoke virtual network to use the gateways that are connected to the hub virtual network, select **Use remote gateways**. |
26 | 18 |
|
27 |
| -The following figure shows the VNet peering details of the hub VNet. If you want the hub VNet to permit the spoke VNet to use the hub's gateways, select **Allow gateway transit**. |
| 19 | +:::image type="content" source="./media/backend-interoperability/SpokeVNet_peering.png" alt-text="Screenshot of spoke virtual network's peering."::: |
28 | 20 |
|
29 |
| -[![2]][2] |
| 21 | +The following figure shows the virtual network peering details of the hub virtual network. If you want the hub virtual network to permit the spoke virtual network to use the hub's gateways, select **Allow gateway transit**. |
30 | 22 |
|
31 |
| -## Branch VNet connectivity by using a site-to-site VPN |
| 23 | +:::image type="content" source="./media/backend-interoperability/HubVNet-peering.png" alt-text="Screenshot of Hub virtual network's peering."::: |
32 | 24 |
|
33 |
| -Set up site-to-site VPN connectivity between the hub and branch VNets by using VPN gateways in Azure VPN Gateway. By default, VPN gateways and Azure ExpressRoute gateways use a private autonomous system number (ASN) value of **65515**. You can change the ASN value in VPN Gateway. In the test setup, the ASN value of the branch VNet VPN gateway is changed to **65516** to support eBGP routing between the hub and branch VNets. |
| 25 | +## Branch virtual network connectivity by using a site-to-site VPN |
34 | 26 |
|
| 27 | +Set up site-to-site VPN connectivity between the hub and branch virtual networks by using VPN gateways in Azure VPN Gateway. By default, VPN gateways and Azure ExpressRoute gateways use a private autonomous system number (ASN) value of **65515**. You can change the ASN value in VPN Gateway. In the test setup, the ASN value of the branch virtual network VPN gateway is changed to **65516** to support eBGP routing between the hub and branch virtual networks. |
35 | 28 |
|
36 |
| -[![3]][3] |
37 |
| - |
| 29 | +:::image type="content" source="./media/backend-interoperability/BranchVNet-VPNGW.png" alt-text="Screenshot of VPN Gateway configuration of a branch virtual network."::: |
38 | 30 |
|
39 | 31 | ## On-premises Location 1 connectivity by using ExpressRoute and a site-to-site VPN
|
40 | 32 |
|
41 | 33 | ### ExpressRoute 1 configuration details
|
42 | 34 |
|
43 | 35 | The following figure shows the Azure Region 1 ExpressRoute circuit configuration toward on-premises Location 1 customer edge (CE) routers:
|
44 | 36 |
|
45 |
| -[![4]][4] |
| 37 | +:::image type="content" source="./media/backend-interoperability/ExR1.png" alt-text="Screenshot of ExpressRoute 1 configuration."::: |
46 | 38 |
|
47 |
| -The following figure shows the connection configuration between the ExpressRoute 1 circuit and the hub VNet: |
| 39 | +The following figure shows the connection configuration between the ExpressRoute 1 circuit and the hub virtual network: |
48 | 40 |
|
49 |
| -[![5]][5] |
| 41 | +:::image type="content" source="./media/backend-interoperability/ExR1-Hub-Connection.png" alt-text="Screenshot of connection configuration of ExpressRoute 1 to a hub virtual network Express Route gateway."::: |
50 | 42 |
|
51 | 43 | The following list shows the primary CE router configuration for ExpressRoute private peering connectivity. (Cisco ASR1000 routers are used as CE routers in the test setup.) When site-to-site VPN and ExpressRoute circuits are configured in parallel to connect an on-premises network to Azure, Azure prioritizes the ExpressRoute circuit by default. To avoid asymmetrical routing, the on-premises network also should prioritize ExpressRoute connectivity over site-to-site VPN connectivity. The following configuration establishes prioritization by using the BGP **local-preference** attribute:
|
52 | 44 |
|
@@ -151,78 +143,56 @@ ip route vrf 30 10.10.30.254 255.255.255.255 Tunnel30
|
151 | 143 |
|
152 | 144 | ## On-premises Location 2 connectivity by using ExpressRoute
|
153 | 145 |
|
154 |
| -A second ExpressRoute circuit, in closer proximity to on-premises Location 2, connects on-premises Location 2 to the hub VNet. The following figure shows the second ExpressRoute configuration: |
| 146 | +A second ExpressRoute circuit, in closer proximity to on-premises Location 2, connects on-premises Location 2 to the hub virtual network. The following figure shows the second ExpressRoute configuration: |
155 | 147 |
|
156 |
| -[![6]][6] |
| 148 | +:::image type="content" source="./media/backend-interoperability/ExR2.png" alt-text="Screenshot of ExpressRoute 2 configuration."::: |
157 | 149 |
|
158 |
| -The following figure shows the connection configuration between the second ExpressRoute circuit and the hub VNet: |
| 150 | +The following figure shows the connection configuration between the second ExpressRoute circuit and the hub virtual network: |
159 | 151 |
|
160 |
| -[![7]][7] |
| 152 | +:::image type="content" source="./media/backend-interoperability/ExR2-Hub-Connection.png" alt-text="Screenshot of connection configuration of ExpressRoute 2 to a hub virtual network ExR gateway."::: |
161 | 153 |
|
162 |
| -ExpressRoute 1 connects both the hub VNet and on-premises Location 1 to a remote VNet in a different Azure region: |
| 154 | +ExpressRoute 1 connects both the hub virtual network and on-premises Location 1 to a remote virtual network in a different Azure region: |
163 | 155 |
|
164 |
| -[![8]][8] |
| 156 | +:::image type="content" source="./media/backend-interoperability/ExR2-Remote-Connection.png" alt-text="Screenshot of connection configuration of ExpressRoute 2 to a remote virtual network ExR gateway."::: |
165 | 157 |
|
166 | 158 | ## ExpressRoute and site-to-site VPN connectivity in tandem
|
167 | 159 |
|
168 | 160 | ### Site-to-site VPN over ExpressRoute
|
169 | 161 |
|
170 |
| -You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure VNets. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering][S2S-Over-ExR]. |
| 162 | +You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure virtual networks. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering](../expressroute/site-to-site-vpn-over-microsoft-peering.md). |
171 | 163 |
|
172 | 164 | The primary limitation of configuring a site-to-site VPN that uses Microsoft peering is throughput. Throughput over the IPsec tunnel is limited by the VPN gateway capacity. The VPN gateway throughput is lower than ExpressRoute throughput. In this scenario, using the IPsec tunnel for highly secure traffic and using private peering for all other traffic helps optimize the ExpressRoute bandwidth utilization.
|
173 | 165 |
|
174 | 166 | ### Site-to-site VPN as a secure failover path for ExpressRoute
|
175 | 167 |
|
176 | 168 | ExpressRoute serves as a redundant circuit pair to ensure high availability. You can configure geo-redundant ExpressRoute connectivity in different Azure regions. Also, as demonstrated in our test setup, within an Azure region, you can use a site-to-site VPN to create a failover path for your ExpressRoute connectivity. When the same prefixes are advertised over both ExpressRoute and a site-to-site VPN, Azure prioritizes ExpressRoute. To avoid asymmetrical routing between ExpressRoute and the site-to-site VPN, on-premises network configuration should also reciprocate by using ExpressRoute connectivity before it uses site-to-site VPN connectivity.
|
177 | 169 |
|
178 |
| -For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence][ExR-S2S-CoEx]. |
| 170 | +For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence](../expressroute/expressroute-howto-coexist-resource-manager.md). |
179 | 171 |
|
180 |
| -## Extend back-end connectivity to spoke VNets and branch locations |
| 172 | +## Extend back-end connectivity to spoke virtual networks and branch locations |
181 | 173 |
|
182 |
| -### Spoke VNet connectivity by using VNet peering |
| 174 | +### Spoke virtual network connectivity by using virtual network peering |
183 | 175 |
|
184 |
| -Hub and spoke VNet architecture is widely used. The hub is a VNet in Azure that acts as a central point of connectivity between your spoke VNets and to your on-premises network. The spokes are VNets that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure][Hub-n-Spoke]. |
| 176 | +Hub and spoke virtual network architecture is widely used. The hub is a virtual network in Azure that acts as a central point of connectivity between your spoke virtual networks and to your on-premises network. The spokes are virtual networks that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke). |
185 | 177 |
|
186 |
| -In VNet peering within a region, spoke VNets can use hub VNet gateways (both VPN and ExpressRoute gateways) to communicate with remote networks. |
| 178 | +In virtual network peering within a region, spoke virtual networks can use hub virtual network gateways (both VPN and ExpressRoute gateways) to communicate with remote networks. |
187 | 179 |
|
188 |
| -### Branch VNet connectivity by using site-to-site VPN |
| 180 | +### Branch virtual network connectivity by using site-to-site VPN |
189 | 181 |
|
190 |
| -You might want branch VNets, which are in different regions, and on-premises networks to communicate with each other via a hub VNet. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub. |
| 182 | +You might want branch virtual networks, which are in different regions, and on-premises networks to communicate with each other via a hub virtual network. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub. |
191 | 183 |
|
192 |
| -For more information, see [What is VPN Gateway?][VPN] and [Deploy a highly available NVA][Deploy-NVA]. |
| 184 | +For more information, see [What is VPN Gateway?](../vpn-gateway/vpn-gateway-about-vpngateways.md) and [Deploy a highly available NVA](/azure/architecture/reference-architectures/dmz/nva-ha). |
193 | 185 |
|
194 | 186 | ## Next steps
|
195 | 187 |
|
196 |
| -Learn about [control plane analysis][Control-Analysis] of the test setup and the views of different VNets or VLANs in the topology. |
197 |
| - |
198 |
| -Learn about [data plane analysis][Data-Analysis] of the test setup and Azure network monitoring feature views. |
199 |
| - |
200 |
| -See the [ExpressRoute FAQ][ExR-FAQ] to: |
201 |
| -- Learn how many ExpressRoute circuits you can connect to an ExpressRoute gateway. |
202 |
| -- Learn how many ExpressRoute gateways you can connect to an ExpressRoute circuit. |
203 |
| -- Learn about other scale limits of ExpressRoute. |
204 |
| - |
205 |
| - |
206 |
| -<!--Image References--> |
207 |
| -[1]: ./media/backend-interoperability/SpokeVNet_peering.png "Spoke VNet's VNet peering" |
208 |
| -[2]: ./media/backend-interoperability/HubVNet-peering.png "Hub VNet's VNet peering" |
209 |
| -[3]: ./media/backend-interoperability/BranchVNet-VPNGW.png "VPN Gateway configuration of a branch VNet" |
210 |
| -[4]: ./media/backend-interoperability/ExR1.png "ExpressRoute 1 configuration" |
211 |
| -[5]: ./media/backend-interoperability/ExR1-Hub-Connection.png "Connection configuration of ExpressRoute 1 to a hub VNet ExR gateway" |
212 |
| -[6]: ./media/backend-interoperability/ExR2.png "ExpressRoute 2 configuration" |
213 |
| -[7]: ./media/backend-interoperability/ExR2-Hub-Connection.png "Connection configuration of ExpressRoute 2 to a hub VNet ExR gateway" |
214 |
| -[8]: ./media/backend-interoperability/ExR2-Remote-Connection.png "Connection configuration of ExpressRoute 2 to a remote VNet ExR gateway" |
215 |
| - |
216 |
| -<!--Link References--> |
217 |
| -[Setup]: ./connectivty-interoperability-preface.md |
218 |
| -[ExpressRoute]: ../expressroute/expressroute-introduction.md |
219 |
| -[VPN]: ../vpn-gateway/vpn-gateway-about-vpngateways.md |
220 |
| -[VNet]: ../virtual-network/tutorial-connect-virtual-networks-portal.md |
221 |
| -[Control-Analysis]: ./connectivty-interoperability-control-plane.md |
222 |
| -[Data-Analysis]: ./connectivty-interoperability-data-plane.md |
223 |
| -[ExR-FAQ]: ../expressroute/expressroute-faqs.md |
224 |
| -[S2S-Over-ExR]: ../expressroute/site-to-site-vpn-over-microsoft-peering.md |
225 |
| -[ExR-S2S-CoEx]: ../expressroute/expressroute-howto-coexist-resource-manager.md |
226 |
| -[Hub-n-Spoke]: /azure/architecture/reference-architectures/hybrid-networking/hub-spoke |
227 |
| -[Deploy-NVA]: /azure/architecture/reference-architectures/dmz/nva-ha |
228 |
| -[VNet-Config]: ../virtual-network/virtual-network-manage-peering.md |
| 188 | +Learn about [control plane analysis](./connectivty-interoperability-control-plane.md) of the test setup and the views of different virtual networks or VLANs in the topology. |
| 189 | + |
| 190 | +Learn about [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup and Azure network monitoring feature views. |
| 191 | + |
| 192 | +See the [ExpressRoute FAQ](../expressroute/expressroute-faqs.md) to: |
| 193 | + |
| 194 | +- Learn how many ExpressRoute circuits you can connect to an ExpressRoute gateway. |
| 195 | + |
| 196 | +- Learn how many ExpressRoute gateways you can connect to an ExpressRoute circuit. |
| 197 | + |
| 198 | +- Learn about other scale limits of ExpressRoute. |
0 commit comments