Skip to content

Commit 5485dcb

Browse files
committed
Fix Acrolinx issues
1 parent e17edea commit 5485dcb

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/vpn-gateway/site-to-site-high-bandwidth-tunnel.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,14 @@ ms.date: 07/14/2025
1414
# Create a Site-to-Site High Bandwidth tunnels in the Azure portal
1515
The Azure VPN Gateway High Bandwidth tunnels feature, a part of the Advanced Connectivity set of features, introduces significant improvements in tunnel throughput, enabling high-performance IPsec connections between the on-premises network and the Azure VNet. These High Bandwidth tunnels are established between a VPN device on-premises and the Azure VPN Gateway deployed in the Azure VNet, transiting through an ExpressRoute private peering. Utilizing private IP address networks on-premises, these tunnels create a secure overlay network between the on-premises infrastructure and the Azure VNet.
1616

17-
The High Bandwidth tunnels meet customer security compliance requirements by providing end-to-end encryption, effectively overcoming encryption bottlenecks. It allows for the establishment of four tunnels between the Azure VPN Gateway and the on-premises VPN device. The High Bandwidth tunnels allows the creation of two Connections with two IPsec tunnels for each Connection. Each IPsec tunnel can deliver a throughput of 5Gbps, achieving a total encrypted aggregate throughput of 20Gbps. The network diagram clarifies the configuration:
17+
The High Bandwidth tunnels meet customer security compliance requirements by providing end-to-end encryption, effectively overcoming encryption bottlenecks. It allows for the establishment of four tunnels between the Azure VPN Gateway and the on-premises VPN device. The High Bandwidth tunnels allow for the creation of two Connections with two IPsec tunnels for each Connection. Each IPsec tunnel can deliver a throughput of 5 Gbps, achieving a total encrypted aggregate throughput of 20 Gbps. The network diagram clarifies the configuration:
1818

1919
![1]
2020

2121
## Prerequisites
2222
The VPN High Bandwidth tunnels require the presence of FastPath in an ExpressRoute Connection. Currently FastPath is supported only in ExpressRoute Direct Port Pair. Therefore, the ExpressRoute circuit required to be deployed on ExpressRoute Direct port pair for the correct setting of the solution.
2323

24-
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a Virtual Network (VNet). In the article the Azure VNet is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26
24+
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a Virtual Network (VNet). The Azure VNet is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26
2525

2626
The full list of required objects are:
2727
- ExpressRoute Direct Port
@@ -53,7 +53,7 @@ Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connect
5353
```
5454
After enabling FastPath, the value of **$connection.ExpressRouteGatewayBypass** should have the value **$true**.
5555

56-
In the Azure management portal navigate to the Connections blade of your ExpressRoute circuit. Under Settings-Configuration, verified the FastPath setting to Enable
56+
In the Azure management portal, navigate to the Connections blade of your ExpressRoute circuit. Under Settings-Configuration, verified the FastPath setting to Enable
5757

5858
![3]
5959

@@ -66,9 +66,9 @@ Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connecti
6666
At this stage of deployment, the Azure VNet is connected to the on-premises networks, and ExpressRoute is properly configured to support High Bandwidth tunnels.
6767

6868
## <a name="on-premises network"></a>Advertisement of the on-premises network to the ExpressRoute circuit
69-
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN devices must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers. If other on-prem networks are advertised to ExpressRoute, this runs the risk of "leaking" these routes to the VNet which could bypass the VPN Gateway and traffic could go directly to the ExpressRoute gateway, bypassing encryption. So it's important to only advertise the VPN Device tunnel IPs over ExpressRoute.
69+
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN devices must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers. If other on-prem networks are advertised to ExpressRoute, this runs the risk of "leaking" these routes to the VNet, which could bypass the VPN Gateway and traffic could go directly to the ExpressRoute gateway, bypassing encryption. So it's important to only advertise the VPN Device tunnel IPs over ExpressRoute.
7070

71-
The routes between the VPN Device and the VPN Gateway should contain the detailed on-prem networks, this can be via static routes or BGP, but keep your on-prem networks in this routeing "channel" to ensure Azure traffic to on-prem is encrypted before entering the ExpressRoute data path (inside the VPN tunnel).
71+
The routes between the VPN Device and the VPN Gateway should contain the detailed on-prem networks, routing can be via static routes or Border Gateway Protocol (BGP). By keeping your on-prem networks in this routing "channel" you'll ensure Azure traffic to on-prem is encrypted before entering the ExpressRoute data path, traveling inside the VPN tunnel.
7272

7373
If you do add routes to ExpressRoute that you wish to encrypt, a UDR will be needed on the VNets pointing to the VPN Gateway as the next hop to ensure that traffic is put into the encrypted tunnel before transiting ExpressRoute.
7474

@@ -102,11 +102,11 @@ In the Azure portal:
102102

103103
> [!NOTE]
104104
> To select the High Bandwidth VPN Gateway in the Azure portal, enable the **Enable Advanced Connectivity** property during gateway creation. When this option is selected, Azure automatically configures the gateway in active-active mode.
105-
> High Bandwidth tunnels can be deployed with static routing or BGP. The High Bandwidth tunnels is supported only in VPN Gateway route-based.
105+
> High Bandwidth tunnels can be deployed with static routing or BGP. The High Bandwidth tunnels are supported only in VPN Gateway route-based gateways.
106106
107107
A gateway can take 45 minutes or more to fully create and deploy. You can see the deployment status on the **Overview** page for your gateway.
108108

109-
In a High Bandwidth VPN Gateway setup, traffic is routed through the private IP addresses of the VPN Gateway instance. Although two public IP addresses are still assigned during deployment, their exclusive function is to facilitate communication with the Azure control plane. These public IPs are not involved in establishing IPsec tunnels.
109+
In a High Bandwidth VPN Gateway setup, traffic is routed through the private IP addresses of the VPN Gateway instance. Although two public IP addresses are still assigned during deployment, their exclusive function is to facilitate communication with the Azure control plane. These public IPs aren't involved in establishing IPsec tunnels.
110110

111111
## <a name="LocalNetworkGateway"></a>Create a local network gateway
112112

@@ -135,7 +135,7 @@ Create two local network gateways by using the following values:
135135

136136
![8]
137137

138-
After the deployment of the two Local Network Gateways you are ready to proceed with VPN Connections.
138+
After the deployment of the two Local Network Gateways you're ready to proceed with VPN Connections.
139139

140140
## <a name="CreateConnection"></a>Create VPN Connections
141141
The VPN High Bandwidth Gateway supports a maximum of two VPN Connections.
@@ -146,7 +146,7 @@ Create two Connections by using the following values:
146146
* **Name**: vpnConn1
147147
* **Virtual network gateway**: vpnHB
148148
* **Local network gateway name**: vpnConn1
149-
* **Shared key**: For this example, **abc123** is used as an exampole. But you can use whatever is compatible with your VPN hardware. The important thing is that the values match on both sides of the connection.
149+
* **Shared key**: For this example, **abc123** is used as an example. But you can use whatever is compatible with your VPN hardware. The important thing is that the values match on both sides of the connection.
150150

151151
* **Connection type**: Site-to-site
152152
* **Name**: vpnConn2
@@ -252,7 +252,7 @@ You can customize site-to-site configurations in various ways. For more informat
252252

253253
## Clean up resources
254254

255-
If you are not going to continue to use these resources, your should delete them.
255+
If you aren't going to continue to use these resources, you should delete them.
256256

257257
1. Enter the name of your resource group in the **Search** box at the top of the portal and select it from the search results.
258258
1. Select **Delete resource group**.
@@ -265,7 +265,7 @@ For more information about VPN Gateway, see the [VPN Gateway FAQ](vpn-gateway-vp
265265
<!--Link References-->
266266

267267
<!--Image References-->
268-
[1]: ./media/site-to-site-high-bandwidth-tunnel/transit-hb-tunnels.png "transit High Bandwidth IPsec tunnels"
268+
[1]: ./media/site-to-site-high-bandwidth-tunnel/transit-hb-tunnels.png "Transit High Bandwidth IPsec tunnels"
269269
[2]: ./media/site-to-site-high-bandwidth-tunnel/er-gateway.png "ExpressRoute gateway"
270270
[3]: ./media/site-to-site-high-bandwidth-tunnel/expressroute-connection-fastpath.png "ExpressRoute Connection with FastPath enabled"
271271
[4]: ./media/site-to-site-high-bandwidth-tunnel/vpn-gw-hb.png "VPN Gateway High Bandwidth tunnels"

0 commit comments

Comments
 (0)