You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Create a virtual network peering - Resource Manager, different subscriptions and Microsoft Entra tenants
14
14
15
-
In this tutorial, you learn to create a virtual network peering between virtual networks created through Resource Manager. The virtual networks exist in different subscriptions that may belong to different Microsoft Entra tenants. Peering two virtual networks enables resources in different virtual networks to communicate with each other with the same bandwidth and latency as though the resources were in the same virtual network. Learn more about [Virtual network peering](virtual-network-peering-overview.md).
15
+
In this tutorial, you learn to create a virtual network peering between virtual networks created through Resource Manager. The virtual networks exist in different subscriptions that might belong to different Microsoft Entra tenants. Peering two virtual networks enables resources in different virtual networks to communicate with each other with the same bandwidth and latency as though the resources were in the same virtual network. Learn more about [Virtual network peering](virtual-network-peering-overview.md).
16
16
17
17
Depending on whether, the virtual networks are in the same, or different subscriptions the steps to create a virtual network peering are different. Steps to peer networks created with the classic deployment model are different. For more information about deployment models, see [Azure deployment model](../azure-resource-manager/management/deployment-models.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
18
18
@@ -26,13 +26,13 @@ Learn how to create a virtual network peering in other scenarios by selecting th
26
26
27
27
A virtual network peering can't be created between two virtual networks deployed through the classic deployment model. If you need to connect virtual networks that were both created through the classic deployment model, you can use an Azure [VPN Gateway](../vpn-gateway/tutorial-site-to-site-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) to connect the virtual networks.
28
28
29
-
This tutorial peers virtual networks in the same region. You can also peer virtual networks in different [supported regions](virtual-network-manage-peering.md#cross-region). It's recommended that you familiarize yourself with the [peering requirements and constraints](virtual-network-manage-peering.md#requirements-and-constraints) before peering virtual networks.
29
+
This tutorial peers virtual networks in the same region. You can also peer virtual networks in different [supported regions](virtual-network-manage-peering.md#cross-region). Familiarize yourself with the [peering requirements and constraints](virtual-network-manage-peering.md#requirements-and-constraints) before peering virtual networks.
30
30
31
31
## Prerequisites
32
32
33
33
# [**Portal**](#tab/create-peering-portal)
34
34
35
-
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35
+
- An Azure account or accounts with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
36
36
37
37
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
38
38
@@ -48,7 +48,7 @@ This tutorial peers virtual networks in the same region. You can also peer virtu
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
51
+
- An Azure account or accounts with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
52
52
53
53
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
54
54
@@ -62,15 +62,15 @@ This tutorial peers virtual networks in the same region. You can also peer virtu
62
62
63
63
- Azure PowerShell installed locally or Azure Cloud Shell.
64
64
65
-
- Sign in to Azure PowerShell and ensure you've selected the subscription with which you want to use this feature. For more information, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps).
65
+
- Sign in to Azure PowerShell and select the subscription with which you want to use this feature. For more information, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps).
66
66
67
67
- Ensure your `Az.Network` module is 4.3.0 or later. To verify the installed module, use the command `Get-InstalledModule -Name "Az.Network"`. If the module requires an update, use the command `Update-Module -Name Az.Network` if necessary.
68
68
69
69
If you choose to install and use PowerShell locally, this article requires the Azure PowerShell module version 5.4.1 or later. Run `Get-Module -ListAvailable Az` to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
70
70
71
71
# [**Azure CLI**](#tab/create-peering-cli)
72
72
73
-
- An Azure account(s) with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
73
+
- An Azure account or accounts with two active subscriptions. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
74
74
75
75
- An Azure account with permissions in both subscriptions or an account in each subscription with the proper permissions to create a virtual network peering. For a list of permissions, see [Virtual network peering permissions](virtual-network-manage-peering.md#permissions).
76
76
@@ -374,7 +374,7 @@ In this section, you sign in as **user-2** and create a virtual network for the
374
374
375
375
# [**Portal**](#tab/create-peering-portal)
376
376
377
-
Repeat the steps in the [previous section](#create-virtual-network) to create a second virtual network with the following values:
377
+
Create a second virtual network with the following values by repeating the steps in the [previous section](#create-virtual-network).
378
378
379
379
| Setting | Value |
380
380
| --- | --- |
@@ -667,7 +667,7 @@ You need the **Resource ID** for **vnet-2** from the previous steps to set up th
667
667
| Virtual network deployment model |**Resource Manager**|
668
668
| I know my resource ID |**Select the box**|
669
669
| Resource ID |**Enter the Resource ID for vnet-2**|
670
-
| Directory | Select the Entra ID directory that corresponds with **vnet-2** and **user-2**|
670
+
| Directory | Select the Microsoft Entra ID directory that corresponds with **vnet-2** and **user-2**|
671
671
|**Remote virtual network peering settings**||
672
672
| Allow 'the peered virtual network' to access 'vnet-1' | Leave the default of **Enabled**|
673
673
| Allow 'the peered virtual network' to receive forwarded traffic from 'vnet-1' |**Select the box**|
@@ -711,7 +711,7 @@ Connect-AzAccount
711
711
712
712
### Change to subscription-1 (optional)
713
713
714
-
You may have to switch back to **subscription-1** to continue with the actions in **subscription-1**.
714
+
You might have to switch back to **subscription-1** to continue with the actions in **subscription-1**.
715
715
716
716
Change context to **subscription-1**.
717
717
@@ -784,7 +784,7 @@ az login
784
784
785
785
### Change to subscription-1 (optional)
786
786
787
-
You may have to switch back to **subscription-1** to continue with the actions in **subscription-1**.
787
+
You might have to switch back to **subscription-1** to continue with the actions in **subscription-1**.
788
788
789
789
Change context to **subscription-1**.
790
790
@@ -843,7 +843,7 @@ You need the **Resource IDs** for **vnet-1** from the previous steps to set up t
843
843
| Virtual network deployment model |**Resource Manager**|
844
844
| I know my resource ID |**Select the box**|
845
845
| Resource ID |**Enter the Resource ID for vnet-2**|
846
-
| Directory | Select the Entra ID directory that corresponds with **vnet-1** and **user-1**|
846
+
| Directory | Select the Microsoft Entra ID directory that corresponds with **vnet-1** and **user-1**|
847
847
|**Remote virtual network peering settings**||
848
848
| Allow 'the peered virtual network' to access 'vnet-1' | Leave the default of **Enabled**|
849
849
| Allow 'the peered virtual network' to receive forwarded traffic from 'vnet-1' |**Select the box**|
@@ -892,7 +892,7 @@ Connect-AzAccount
892
892
893
893
### Change to subscription-2 (optional)
894
894
895
-
You may have to switch back to **subscription-2** to continue with the actions in **subscription-2**.
895
+
You might have to switch back to **subscription-2** to continue with the actions in **subscription-2**.
896
896
897
897
Change context to **subscription-2**.
898
898
@@ -965,7 +965,7 @@ az login
965
965
966
966
### Change to subscription-2 (optional)
967
967
968
-
You may have to switch back to **subscription-2** to continue with the actions in **subscription-2**.
968
+
You might have to switch back to **subscription-2** to continue with the actions in **subscription-2**.
969
969
970
970
Change context to **subscription-2**.
971
971
@@ -996,7 +996,7 @@ az network vnet peering list \
996
996
```
997
997
---
998
998
999
-
The peering is successfully established after you see **Connected** in the **Peering status** column for both virtual networks in the peering. Any Azure resources you create in either virtual network are now able to communicate with each other through their IP addresses. If you're using subnet-1 Azure name resolution for the virtual networks, the resources in the virtual networks aren't able to resolve names across the virtual networks. If you want to resolve names across virtual networks in a peering, you must create your own DNS server or use Azure DNS.
999
+
The peering is successfully established after you see **Connected** in the **Peering status** column for both virtual networks in the peering. Any Azure resources you create in either virtual network are now able to communicate with each other through their IP addresses. If you're using subnet-1 Azure name resolution for the virtual networks, the resources in the virtual networks aren't able to resolve names across the virtual networks. If you want to resolve names across virtual networks in a peering, you must create your own DNS (Domain Name System) server or use Azure DNS.
1000
1000
1001
1001
> [!IMPORTANT]
1002
1002
> If you update the address space in one of the members of the peer, you must resync the connection to reflect the address space changes. For more information, see [Update the address space for a peered virtual network using the Azure portal](/azure/virtual-network/update-virtual-network-peering-address-space#modify-the-address-range-prefix-of-an-existing-address-range)
0 commit comments