You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/vpn-gateway-peering-gateway-transit.md
+30-26Lines changed: 30 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ titleSuffix: Azure VPN Gateway
5
5
author: cherylmc
6
6
ms.service: vpn-gateway
7
7
ms.topic: how-to
8
-
ms.date: 11/09/2022
8
+
ms.date: 08/18/2023
9
9
ms.author: cherylmc
10
10
ms.custom: devx-track-azurepowershell
11
11
@@ -16,28 +16,32 @@ This article helps you configure gateway transit for virtual network peering. [V
16
16
17
17
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/gatewaytransit.png" alt-text="Diagram of Gateway transit." lightbox="./media/vpn-gateway-peering-gateway-transit/gatewaytransit.png":::
18
18
19
-
In the diagram, gateway transit allows the peered virtual networks to use the Azure VPN gateway in Hub-RM. Connectivity available on the VPN gateway, including S2S, P2S, and VNet-to-VNet connections, applies to all three virtual networks. The transit option is available for peering between the same, or different deployment models. If you're configuring transit between different deployment models, the hub virtual network and virtual network gateway must be in the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md), not the classic deployment model.
19
+
In the diagram, gateway transit allows the peered virtual networks to use the Azure VPN gateway in Hub-RM. Connectivity available on the VPN gateway, including S2S, P2S, and VNet-to-VNet connections, applies to all three virtual networks.
20
+
21
+
The transit option is available for peering between the same, or different deployment models. If you're configuring transit between different deployment models, the hub virtual network and virtual network gateway must be in the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md), not the legacy classic deployment model.
20
22
>
21
23
22
-
In hub-and-spoke network architecture, gateway transit allows spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network. Routes to the gateway-connected virtual networks or on-premises networks will propagate to the routing tables for the peered virtual networks using gateway transit. You can disable the automatic route propagation from the VPN gateway. Create a routing table with the "**Disable BGP route propagation**" option, and associate the routing table to the subnets to prevent the route distribution to those subnets. For more information, see [Virtual network routing table](../virtual-network/manage-route-table.md).
24
+
In hub-and-spoke network architecture, gateway transit allows spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network. Routes to the gateway-connected virtual networks or on-premises networks propagate to the routing tables for the peered virtual networks using gateway transit.
25
+
26
+
You can disable the automatic route propagation from the VPN gateway. Create a routing table with the "**Disable BGP route propagation**" option, and associate the routing table to the subnets to prevent the route distribution to those subnets. For more information, see [Virtual network routing table](../virtual-network/manage-route-table.md).
23
27
24
-
There are two scenarios in this article:
28
+
There are two scenarios in this article. Select the scenario that applies to your environment. Most people use the **Same deployment model** scenario. If you aren't working with a classic deployment model VNet (legacy VNet) that already exists in your environment, you won't need to work with the **Different deployment models** scenario.
25
29
26
30
***Same deployment model**: Both virtual networks are created in the Resource Manager deployment model.
27
-
***Different deployment models**: The spoke virtual network is created in the classic deployment model, and the hub virtual network and gateway are in the Resource Manager deployment model.
31
+
***Different deployment models**: The spoke virtual network is created in the classic deployment model, and the hub virtual network and gateway are in the Resource Manager deployment model. This scenario is useful when you need to connect a legacy VNet that already exists in the classic deployment model.
28
32
29
33
>[!NOTE]
30
34
> If you make a change to the topology of your network and have Windows VPN clients, the VPN client package for Windows clients must be downloaded and installed again in order for the changes to be applied to the client.
31
35
>
32
36
33
37
## Prerequisites
34
38
35
-
Before you begin, verify that you have the following virtual networks and permissions:
39
+
This article requires the following VNets and permissions. If you aren't working with the different deployment model scenario, you don't need to create the classic VNet.
36
40
37
41
### <aname="vnet"></a>Virtual networks
38
42
39
-
| VNet | Deployment model | Virtual network gateway|
| Spoke-RM |[Resource Manager](./tutorial-site-to-site-portal.md)| No |
43
47
| Spoke-Classic |[Classic](vpn-gateway-howto-site-to-site-classic-portal.md#CreatVNet)| No |
@@ -57,28 +61,30 @@ Learn more about [built-in roles](../role-based-access-control/built-in-roles.md
57
61
58
62
## <aname="same"></a>Same deployment model
59
63
60
-
In this scenario, the virtual networks are both in the Resource Manager deployment model. Use the following steps to create or update the virtual network peerings to enable gateway transit.
64
+
This is the more common scenario. In this scenario, the virtual networks are both in the Resource Manager deployment model. Use the following steps to create or update the virtual network peerings to enable gateway transit.
61
65
62
66
### To add a peering and enable transit
63
67
64
-
1. In the [Azure portal](https://portal.azure.com), create or update the virtual network peering from the Hub-RM. Navigate to the **Hub-RM** virtual network. Select **Peerings**, then **+ Add** to open **Add peering**.
68
+
1. In the [Azure portal](https://portal.azure.com), create or update the virtual network peering from the Hub-RM. Go to the **Hub-RM** virtual network. Select **Peerings**, then **+ Add** to open **Add peering**.
65
69
1. On the **Add peering** page, configure the values for **This virtual network**.
66
70
67
71
* Peering link name: Name the link. Example: **HubRMToSpokeRM**
68
72
* Traffic to remote virtual network: **Allow**
69
73
* Traffic forwarded from remote virtual network: **Allow**
70
-
* Virtual network gateway: **Use this virtual network's gateway**
74
+
* Virtual network gateway: **Use this virtual network's gateway or Route Server**
* I know my resource ID: Leave blank. You only need to select this if you don't have read access to the virtual network or subscription you want to peer with.
83
+
* Subscription: Select the subscription.
78
84
* Virtual Network: **Spoke-RM**
79
85
* Traffic to remote virtual network: **Allow**
80
86
* Traffic forwarded from remote virtual network: **Allow**
81
-
* Virtual network gateway: **Use the remote virtual network's gateway**
87
+
* Virtual network gateway: **Use the remote virtual network's gateway or Route Server**
1. Go to the virtual network. Select **Peerings** and select the peering that you want to modify. For example, on the Spoke-RM VNet, select the SpokeRMtoHubRM peering.
* Virtual network gateway or Route Server: **Use the remote virtual network's gateway or Route Server**
103
105
104
106
1.**Save** the peering settings.
105
107
106
108
### <aname="ps-same"></a>PowerShell sample
107
109
108
-
You can also use PowerShell to create or update the peering with the example above. Replace the variables with the names of your virtual networks and resource groups.
110
+
You can also use PowerShell to create or update the peering. Replace the variables with the names of your virtual networks and resource groups.
109
111
110
112
```azurepowershell-interactive
111
113
$SpokeRG = "SpokeRG1"
@@ -135,26 +137,28 @@ In this configuration, the spoke VNet **Spoke-Classic** is in the classic deploy
135
137
136
138
For this configuration, you only need to configure the **Hub-RM** virtual network. You don't need to configure anything on the **Spoke-Classic** VNet.
137
139
138
-
1. In the Azure portal, navigate to the **Hub-RM** virtual network, select **Peerings**, then select **+ Add**.
140
+
1. In the Azure portal, go to the **Hub-RM** virtual network, select **Peerings**, then select **+ Add**.
139
141
1. On the **Add peering** page, configure the following values:
140
142
141
143
* Peering link name: Name the link. Example: **HubRMToClassic**
142
144
* Traffic to remote virtual network: **Allow**
143
145
* Traffic forwarded from remote virtual network: **Allow**
144
-
* Virtual network gateway: **Use this virtual network's gateway**
145
-
* Remote virtual network: **Classic**
146
+
* Virtual network gateway or Route Server: **Use this virtual network's gateway or Route Server**
147
+
* Peering link name: This value disappears when you select Classic for the virtual network deployment model.
148
+
* Virtual network deployment model: **Classic**
149
+
* I know my resource ID: Leave blank. You only need to select this if you don't have read access to the virtual network or subscription you want to peer with.
146
150
147
151
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/peering-classic.png" alt-text="Add peering page for Spoke-Classic" lightbox="./media/vpn-gateway-peering-gateway-transit/peering-classic.png":::
148
152
149
153
1. Verify the subscription is correct, then select the virtual network from the dropdown.
150
154
1. Select **Add** to add the peering.
151
-
1. Verify the peering status as **Connected** on the Hub-RM virtual network.
155
+
1. Verify the peering status as **Connected** on the Hub-RM virtual network.
152
156
153
157
For this configuration, you don't need to configure anything on the **Spoke-Classic** virtual network. Once the status shows **Connected**, the spoke virtual network can use the connectivity through the VPN gateway in the hub virtual network.
154
158
155
159
### <aname="ps-different"></a>PowerShell sample
156
160
157
-
You can also use PowerShell to create or update the peering with the example above. Replace the variables and subscription ID with the values of your virtual network and resource groups, and subscription. You only need to create virtual network peering on the hub virtual network.
161
+
You can also use PowerShell to create or update the peering. Replace the variables and subscription ID with the values of your virtual network and resource groups, and subscription. You only need to create virtual network peering on the hub virtual network.
0 commit comments