Skip to content

Commit 4f9b4eb

Browse files
Merge pull request #247363 from cherylmc/vpnforced
updates
2 parents 5adbda3 + b3f67f3 commit 4f9b4eb

9 files changed

+28
-28
lines changed

articles/vpn-gateway/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
href: vpn-gateway-about-point-to-site-routing.md
4444
- name: About NAT and VPN Gateway
4545
href: nat-overview.md
46-
- name: About site-to-site forced and split tunneling
46+
- name: About site-to-site forced tunneling
4747
href: about-site-to-site-tunneling.md
4848
- name: About zone-redundant gateways for Availability Zones
4949
href: about-zone-redundant-vnet-gateways.md
@@ -225,7 +225,7 @@
225225
href: bgp-how-to-cli.md
226226
- name: BGP diagnostics
227227
href: bgp-diagnostics.md
228-
- name: Configure site-to-site forced and split tunneling
228+
- name: Configure site-to-site forced tunneling
229229
href: site-to-site-tunneling.md
230230
- name: Configure gateway transit for VNet peering
231231
href: vpn-gateway-peering-gateway-transit.md
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
title: 'About forced tunneling and split tunneling'
3-
description: Learn about forced tunneling and split tunneling for VPN Gateway site-to-site connections
2+
title: 'About forced tunneling for site-to-site'
3+
description: Learn about forced tunneling and split tunneling via UDRs for VPN Gateway site-to-site connections
44
titleSuffix: Azure VPN Gateway
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: conceptual
8-
ms.date: 08/01/2023
8+
ms.date: 08/04/2023
99
ms.author: cherylmc
1010
---
1111

12-
# About split tunneling and forced tunneling for site-to-site configurations
12+
# About forced tunneling for site-to-site configurations
1313

14-
This article helps you understand the difference between forced tunneling and split tunneling for VPN Gateway site-to-site (S2S) IPsec connections. By default, Internet-bound traffic from your workloads and VMs within a virtual network is sent directly to the Internet.
14+
This article helps you understand how forced tunneling works for site-to-site (S2S) IPsec connections. By default, Internet-bound traffic from your workloads and VMs within a virtual network is sent directly to the Internet.
1515

1616
Forced tunneling lets you redirect or "force" all Internet-bound traffic back to your on-premises location via S2S VPN tunnel for inspection and auditing. This is a critical security requirement for most enterprise IT policies. Unauthorized Internet access can potentially lead to information disclosure or other types of security breaches.
1717

18-
In some cases, you may want specific subnets to send and receive Internet traffic directly, without going through an on-premises location for inspection and auditing. You can specify this split tunneling behavior using [custom user-defined routes](../virtual-network/virtual-networks-udr-overview.md#user-defined) (UDRs). After configuring forced tunneling, specify a custom UDR for the subnet(s) for which you want to split tunnel Internet traffic. All other subnets continue to be force tunneled to the on-premises location.
18+
In some cases, you may want specific subnets to send and receive Internet traffic directly, without going through an on-premises location for inspection and auditing. One way to achieve this is to specify routing behavior using [custom user-defined routes](../virtual-network/virtual-networks-udr-overview.md#user-defined) (UDRs). After configuring forced tunneling, specify a custom UDR for the subnet(s) for which you want to send Internet traffic directly to the Internet (not to the on-premises location). In this type of configuration, only the subnets that have a specified UDR send Internet traffic directly to the Internet. Other subnets continue to have Internet traffic force-tunneled to the on-premises location.
1919

20-
Split tunneling configurations can also be used when working with peered VNets. A custom UDR can be applied to a subnet of a peered VNet that traverses through the VNet containing the VPN Gateway S2S connection.
20+
You can also create this type of configuration when working with peered VNets. A custom UDR can be applied to a subnet of a peered VNet that traverses through the VNet containing the VPN Gateway S2S connection.
2121

2222
## Considerations
2323

@@ -29,32 +29,32 @@ Forced tunneling is configured using Azure PowerShell. You can't configure force
2929
* **On-premises routes:** To the Azure VPN gateway.
3030
* **Default route:** Directly to the Internet. Packets destined to the private IP addresses not covered by the previous two routes are dropped.
3131

32-
* Forced tunneling must be associated with a VNet that has a route-based VPN gateway. Your forced tunneling configuration overrides the default route for any subnet in its VNet. You need to set a "default site" among the cross-premises local sites connected to the virtual network. Also, the on-premises VPN device must be configured using 0.0.0.0/0 as traffic selectors.
32+
* In this scenario, forced tunneling must be associated with a VNet that has a route-based VPN gateway. Your forced tunneling configuration overrides the default route for any subnet in its VNet. You need to set a "default site" among the cross-premises local sites connected to the virtual network. Also, the on-premises VPN device must be configured using 0.0.0.0/0 as traffic selectors.
3333

3434
* ExpressRoute forced tunneling isn't configured via this mechanism, but instead, is enabled by advertising a default route via the ExpressRoute BGP peering sessions. For more information, see the [ExpressRoute Documentation](../expressroute/index.yml).
3535

3636
## Forced tunneling
3737

38-
The following example shows all traffic being forced through the VPN gateway back to the on-premises location for inspection and auditing. Configure [forced tunneling](site-to-site-tunneling.md) by specifying a default site.
38+
The following example shows all Internet traffic being forced through the VPN gateway back to the on-premises location for inspection and auditing. Configure [forced tunneling](site-to-site-tunneling.md) by specifying a default site.
3939

4040
**Forced tunneling example**
4141

4242
:::image type="content" source="./media/about-site-to-site-tunneling/forced-tunnel.png" alt-text="Diagram shows forced tunneling." lightbox="./media/about-site-to-site-tunneling/forced-tunnel-high-res.png":::
4343

44-
## Split tunneling
44+
## Forced tunneling and UDRs
4545

46-
You may want Internet-bound traffic from certain subnets (but not all subnets) to traverse from the Azure network infrastructure directly out to the Internet. This scenario can be configured using a combination of forced tunneling and virtual network custom user-defined routes. For steps, see [Split tunneling](site-to-site-tunneling.md).
46+
You may want Internet-bound traffic from certain subnets (but not all subnets) to traverse from the Azure network infrastructure directly out to the Internet. This scenario can be configured using a combination of forced tunneling and virtual network custom user-defined routes. For steps, see [Forced tunneling and UDRs](site-to-site-tunneling.md).
4747

48-
**Split tunneling example**
48+
**Forced tunneling and UDRs example**
4949

50-
:::image type="content" source="./media/about-site-to-site-tunneling/split-tunnel.png" alt-text="Diagram shows split tunneling." lightbox="./media/about-site-to-site-tunneling/split-tunnel-high-res.png":::
50+
:::image type="content" source="./media/about-site-to-site-tunneling/tunnel-user-defined-routing.png" alt-text="Diagram shows split tunneling." lightbox="./media/about-site-to-site-tunneling/tunnel-user-defined-routing-high-res.png":::
5151

52-
* **Frontend subnet**: Internet-bound traffic is split tunneled directly to the Internet using a custom UDR that specifies this setting. The workloads in the Frontend subnet can accept and respond to customer requests from the Internet directly.
52+
* **Frontend subnet**: Internet-bound traffic is tunneled directly to the Internet using a custom UDR that specifies this setting. The workloads in the Frontend subnet can accept and respond to customer requests from the Internet directly.
5353

5454
* **Mid-tier and Backend subnets**: These subnets continue to be force tunneled because a default site has been specified for the VPN gateway. Any outbound connections from these two subnets to the Internet are forced or redirected back to an on-premises site via S2S VPN tunnels through the VPN gateway.
5555

5656
## Next steps
5757

58-
* See [How to configure split tunneling and forced tunneling for VPN Gateway S2S connections](site-to-site-tunneling.md).
58+
* See [How to configure forced tunneling for VPN Gateway S2S connections](site-to-site-tunneling.md).
5959

6060
* For more information about virtual network traffic routing, see [VNet traffic routing](../virtual-network/virtual-networks-udr-overview.md).
-4.13 KB
Loading
-2.23 KB
Loading
Binary file not shown.
Binary file not shown.
40 KB
Loading
19.2 KB
Loading

articles/vpn-gateway/site-to-site-tunneling.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: 'Configure split or forced tunneling for site-to-site connections: PowerShell'
2+
title: 'Configure forced tunneling for site-to-site connections: PowerShell'
33
description: Learn how to split or force tunnel traffic for VPN Gateway site-to-site connections using PowerShell.
44
titleSuffix: Azure VPN Gateway
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: how-to
8-
ms.date: 08/01/2023
8+
ms.date: 08/04/2023
99
ms.author: cherylmc
1010
---
11-
# Configure forced tunneling and split tunneling for site-to-site connections
11+
# Configure forced tunneling for site-to-site connections
1212

13-
The steps in this article help you configure forced tunneling and split tunneling for site-to-site (S2S) IPsec connections. For more information, see [About forced tunneling and split tunneling for VPN Gateway](about-site-to-site-tunneling.md).
13+
The steps in this article help you configure forced tunneling for site-to-site (S2S) IPsec connections. For more information, see [About forced tunneling for VPN Gateway](about-site-to-site-tunneling.md).
1414

15-
By default, Internet-bound traffic from your VMs goes directly to the Internet via the VPN gateway S2S connection. If you want to force all Internet-bound traffic through the VPN gateway to an on-premises site for inspection and auditing, you can do so by configuring **forced tunneling**. After you configure forced tunneling, if desired, you can split tunnel Internet-bound traffic for specified subnets using custom user-defined routes (UDRs).
15+
By default, Internet-bound traffic from your VMs goes directly to the Internet. If you want to force all Internet-bound traffic through the VPN gateway to an on-premises site for inspection and auditing, you can do so by configuring **forced tunneling**. After you configure forced tunneling, if desired, you can route Internet-bound traffic directly to the Internet for specified subnets using custom user-defined routes (UDRs).
1616

17-
:::image type="content" source="./media/about-site-to-site-tunneling/split-tunnel.png" alt-text="Diagram shows split tunneling." lightbox="./media/about-site-to-site-tunneling/split-tunnel-high-res.png":::
17+
:::image type="content" source="./media/about-site-to-site-tunneling/tunnel-user-defined-routing.png" alt-text="Diagram shows split tunneling." lightbox="./media/about-site-to-site-tunneling/tunnel-user-defined-routing-high-res.png":::
1818

19-
The following steps help you configure a forced tunneling scenario by specifying a default site. Optionally, using custom UDR, you can then split tunnel traffic by specifying that Internet-bound traffic from the Frontend subnet goes directly to the Internet, instead of to the on-premises site.
19+
The following steps help you configure a forced tunneling scenario by specifying a default site. Optionally, using custom UDR, you can route traffic by specifying that Internet-bound traffic from the Frontend subnet goes directly to the Internet, rather than to the on-premises site.
2020

2121
* The VNet you create has three subnets: Frontend, Mid-tier, and Backend with four cross-premises connections: DefaultSiteHQ, and three branches.
22-
* You specify the default site for your VPN gateway using PowerShell, which forces all traffic back to the on-premises location. The default site can't be configured using the Azure portal.
23-
* The Frontend subnet is assigned a UDR to send traffic directly to the Internet, bypassing the VPN gateway.
24-
* The Mid-tier and Backend subnets continue to have traffic force tunneled back to the on-premises site via the VPN gateway because a default site is specified.
22+
* You specify the default site for your VPN gateway using PowerShell, which forces all Internet traffic back to the on-premises location. The default site can't be configured using the Azure portal.
23+
* The Frontend subnet is assigned a UDR to send Internet traffic directly to the Internet, bypassing the VPN gateway. Other traffic is routed normally.
24+
* The Mid-tier and Backend subnets continue to have Internet traffic force tunneled back to the on-premises site via the VPN gateway because a default site is specified.
2525

2626
## Create a VNet and subnets
2727

@@ -134,7 +134,7 @@ To assign a default site for the gateway, you use the **-GatewayDefaultSite** pa
134134

135135
At this point, all Internet-bound traffic is now configured to be force tunneled to *DefaultSiteHQ*. Note that the on-premises VPN device must be configured using 0.0.0.0/0 as traffic selectors.
136136

137-
* If you want to only configure forced tunneling, and not split tunnel Internet traffic for specific subnets, you can skip to the [Establish Connections](#establish-s2s-vpn-connections) section of this article to create your connections.
137+
* If you want to only configure forced tunneling, and not route Internet traffic directly to the Internet for specific subnets, you can skip to the [Establish Connections](#establish-s2s-vpn-connections) section of this article to create your connections.
138138
* If you want specific subnets to send Internet-bound traffic directly to the Internet, continue with the next sections to configure custom UDRs and assign routes.
139139

140140
## Create route tables and routes

0 commit comments

Comments
 (0)