Skip to content

Commit 4c0fb54

Browse files
Merge pull request #280629 from cherylmc/active-active
include
2 parents 25c372e + aa98bf3 commit 4c0fb54

File tree

3 files changed

+25
-8
lines changed

3 files changed

+25
-8
lines changed

articles/vpn-gateway/vpn-gateway-about-vpn-gateway-settings.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about VPN Gateway resources and configuration settings.
44
author: cherylmc
55
ms.service: vpn-gateway
66
ms.topic: conceptual
7-
ms.date: 02/29/2024
7+
ms.date: 07/11/2024
88
ms.author: cherylmc
99
ms.custom: devx-track-azurepowershell
1010
ms.devlang: azurecli
@@ -17,7 +17,6 @@ The values in this article specifically apply to VPN gateways (virtual network g
1717

1818
* For values that apply to -GatewayType 'ExpressRoute', see [Virtual network gateways for ExpressRoute](../expressroute/expressroute-about-virtual-network-gateways.md).
1919
* For zone-redundant gateways, see [About zone-redundant gateways](about-zone-redundant-vnet-gateways.md).
20-
* For active-active gateways, see [About highly available connectivity](vpn-gateway-highlyavailable.md).
2120
* For Virtual WAN gateways, see [About Virtual WAN](../virtual-wan/virtual-wan-about.md).
2221

2322
## <a name="gwtype"></a>Gateways and gateway types
@@ -57,6 +56,14 @@ If you already have a policy-based gateway, you aren't required to change your g
5756

5857
[!INCLUDE [Route-based and policy-based table](../../includes/vpn-gateway-vpn-type-table.md)]
5958

59+
## <a name="active"></a>Active-active VPN gateways
60+
61+
You can create an Azure VPN gateway in an active-active configuration, where both instances of the gateway VMs establish S2S VPN tunnels to your on-premises VPN device.
62+
63+
[!INCLUDE [active-active gateways](../../includes/vpn-gateway-active-active-gateway-include.md)]
64+
65+
For information about using active-active gateways in a highly available connectivity scenario, see [About highly available connectivity](vpn-gateway-highlyavailable.md).
66+
6067
## <a name="connectiontype"></a>Connection types
6168

6269
In the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md), each configuration requires a specific virtual network gateway connection type. The available Resource Manager PowerShell values for `-ConnectionType` are:

articles/vpn-gateway/vpn-gateway-highlyavailable.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about highly available configuration options using Azure VPN
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: article
8-
ms.date: 06/23/2023
8+
ms.date: 07/11/2024
99
ms.author: cherylmc
1010

1111
---
@@ -50,11 +50,7 @@ You can create an Azure VPN gateway in an active-active configuration, where bot
5050

5151
:::image type="content" source="./media/vpn-gateway-highlyavailable/active-active.png" alt-text="Diagram shows an on-premises site with private I P subnets and on-premises V P N connected to two active Azure V P N gateway to connect to subnets hosted in Azure.":::
5252

53-
In this configuration, each Azure gateway instance has a unique public IP address, and each will establish an IPsec/IKE S2S VPN tunnel to your on-premises VPN device specified in your local network gateway and connection. Note that both VPN tunnels are actually part of the same connection. You'll still need to configure your on-premises VPN device to accept or establish two S2S VPN tunnels to those two Azure VPN gateway public IP addresses.
54-
55-
Because the Azure gateway instances are in active-active configuration, the traffic from your Azure virtual network to your on-premises network will be routed through both tunnels simultaneously, even if your on-premises VPN device may favor one tunnel over the other. For a single TCP or UDP flow, Azure attempts to use the same tunnel when sending packets to your on-premises network. However, your on-premises network could use a different tunnel to send packets to Azure.
56-
57-
When a planned maintenance or unplanned event happens to one gateway instance, the IPsec tunnel from that instance to your on-premises VPN device will be disconnected. The corresponding routes on your VPN devices should be removed or withdrawn automatically so that the traffic will be switched over to the other active IPsec tunnel. On the Azure side, the switch over will happen automatically from the affected instance to the active instance.
53+
[!INCLUDE [active-active gateways](../../includes/vpn-gateway-active-active-gateway-include.md)]
5854

5955
### Dual-redundancy: active-active VPN gateways for both Azure and on-premises networks
6056

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
ms.topic: include
3+
author: cherylmc
4+
ms.service: vpn-gateway
5+
ms.date: 07/11/2024
6+
ms.author: cherylmc
7+
8+
---
9+
10+
In this configuration, each Azure gateway instance has a unique public IP address, and each will establish an IPsec/IKE S2S VPN tunnel to your on-premises VPN device specified in your local network gateway and connection. Both VPN tunnels are actually part of the same connection. You'll still need to configure your on-premises VPN device to accept or establish two S2S VPN tunnels to those two Azure VPN gateway public IP addresses.
11+
12+
Because the Azure gateway instances are in active-active configuration, the traffic from your Azure virtual network to your on-premises network will be routed through both tunnels simultaneously, even if your on-premises VPN device might favor one tunnel over the other. For a single TCP or UDP flow, Azure attempts to use the same tunnel when sending packets to your on-premises network. However, your on-premises network could use a different tunnel to send packets to Azure.
13+
14+
When a planned maintenance or unplanned event happens to one gateway instance, the IPsec tunnel from that instance to your on-premises VPN device will be disconnected. The corresponding routes on your VPN devices should be removed or withdrawn automatically so that the traffic will be switched over to the other active IPsec tunnel. On the Azure side, the switch over will happen automatically from the affected instance to the active instance.

0 commit comments

Comments
 (0)