You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/about-site-to-site-tunneling.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ titleSuffix: Azure VPN Gateway
5
5
author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.topic: concept-article
8
-
ms.date: 09/22/2023
8
+
ms.date: 03/31/2025
9
9
ms.author: cherylmc
10
10
---
11
11
@@ -38,7 +38,7 @@ You can configure forced tunneling by setting the Default Site for your route-ba
38
38
39
39
By default, all Internet-bound traffic goes directly to the Internet if you don't have forced tunneling configured. When forced tunneling is configured, all Internet-bound traffic is sent to your on-premises location.
40
40
41
-
In some cases, you may want Internet-bound traffic only from certain subnets (but not all subnets) to traverse from the Azure network infrastructure directly out to the Internet, rather than to your on-premises location. This scenario can be configured using a combination of forced tunneling and virtual network custom user-defined routes (UDRs). For steps, see [Route Internet-bound traffic for specific subnets](site-to-site-tunneling.md#udr).
41
+
In some cases, you might want Internet-bound traffic only from certain subnets (but not all subnets) to traverse from the Azure network infrastructure directly out to the Internet, rather than to your on-premises location. This scenario can be configured using a combination of forced tunneling and virtual network custom user-defined routes (UDRs). For steps, see [Route Internet-bound traffic for specific subnets](site-to-site-tunneling.md#udr).
Copy file name to clipboardExpand all lines: articles/vpn-gateway/vpn-gateway-ipsecikepolicy-rm-powershell.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure IPsec/IKE custom policy for S2S or VNet-to-V
5
5
author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.topic: how-to
8
-
ms.date: 05/29/2024
8
+
ms.date: 03/31/2025
9
9
ms.author: cherylmc
10
10
ms.custom: devx-track-azurepowershell
11
11
@@ -100,7 +100,7 @@ $LNGIP6 = "131.107.72.22"
100
100
101
101
#### 2. Create the virtual network, VPN gateway, and local network gateway
102
102
103
-
The following samples create the virtual network, TestVNet1, with three subnets, and the VPN gateway. When substituting values, it's important that you always name your gateway subnet specifically GatewaySubnet. If you name it something else, your gateway creation fails. It can take 45 minutes or more for the virtual network gateway to create. During this time, if you are using Azure Cloud Shell, your connection may time out. This doesn't affect the gateway create command.
103
+
The following samples create the virtual network, TestVNet1, with three subnets, and the VPN gateway. When substituting values, it's important that you always name your gateway subnet specifically GatewaySubnet. If you name it something else, your gateway creation fails. It can take 45 minutes or more for the virtual network gateway to create. During this time, if you're using Azure Cloud Shell, your connection might time out. This doesn't affect the gateway create command.
Create the local network gateway. You may need to reconnect and declare the following variables again if Azure Cloud Shell timed out.
122
+
Create the local network gateway. You might need to reconnect and declare the following variables again if Azure Cloud Shell timed out.
123
123
124
124
Declare variables.
125
125
@@ -172,7 +172,7 @@ You can optionally add "-UsePolicyBasedTrafficSelectors $True" to the create con
172
172
> Once an IPsec/IKE policy is specified on a connection, the Azure VPN gateway will only send or accept
173
173
> the IPsec/IKE proposal with specified cryptographic algorithms and key strengths on that particular
174
174
> connection. Make sure your on-premises VPN device for the connection uses or accepts the exact
175
-
> policy combination, otherwise the S2S VPN tunnel will not establish.
175
+
> policy combination, otherwise the S2S VPN tunnel won't establish.
176
176
177
177
## <aname ="vnet2vnet"></a>Create a VNet-to-VNet connection with IPsec/IKE policy
178
178
@@ -229,7 +229,7 @@ It can take about 45 minutes or more to create the VPN gateway.
229
229
230
230
### Step 2: Create a VNet-toVNet connection with the IPsec/IKE policy
231
231
232
-
Similar to the S2S VPN connection, create an IPsec/IKE policy, then apply the policy to the new connection. If you used Azure Cloud Shell, your connection may have timed out. If so, re-connect and state the necessary variables again.
232
+
Similar to the S2S VPN connection, create an IPsec/IKE policy, then apply the policy to the new connection. If you used Azure Cloud Shell, your connection might have timed out. If so, re-connect and state the necessary variables again.
> Once an IPsec/IKE policy is specified on a connection, the Azure VPN gateway will only send or accept
271
271
> the IPsec/IKE proposal with specified cryptographic algorithms and key strengths on that particular
272
272
> connection. Make sure the IPsec policies for both connections are the same, otherwise the
273
-
> VNet-to-VNet connection will not establish.
273
+
> VNet-to-VNet connection won't establish.
274
274
275
275
After you complete these steps, the connection is established in a few minutes, and you'll have the following network topology as shown in the beginning:
276
276
@@ -287,7 +287,7 @@ The last section shows you how to manage IPsec/IKE policy for an existing S2S or
287
287
The same steps apply to both S2S and VNet-to-VNet connections.
288
288
289
289
> [!IMPORTANT]
290
-
> IPsec/IKE policy is supported on *Standard* and *HighPerformance* route-based VPN gateways only. It does not work on the Basic gateway SKU or the policy-based VPN gateway.
290
+
> IPsec/IKE policy is supported on *Standard* and *HighPerformance* route-based VPN gateways only. It doesn't work on the Basic gateway SKU or the policy-based VPN gateway.
0 commit comments