Skip to content

Commit 59db785

Browse files
Merge pull request #248624 from cherylmc/vpngw-transitcopy
Update screenshots
2 parents bb294d7 + 944ba45 commit 59db785

File tree

6 files changed

+30
-26
lines changed

6 files changed

+30
-26
lines changed
231 KB
Loading
Binary file not shown.
203 KB
Loading
275 KB
Loading

articles/vpn-gateway/vpn-gateway-peering-gateway-transit.md

Lines changed: 30 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ titleSuffix: Azure VPN Gateway
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: how-to
8-
ms.date: 11/09/2022
8+
ms.date: 08/18/2023
99
ms.author: cherylmc
1010
ms.custom: devx-track-azurepowershell
1111

@@ -16,28 +16,32 @@ This article helps you configure gateway transit for virtual network peering. [V
1616

1717
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/gatewaytransit.png" alt-text="Diagram of Gateway transit." lightbox="./media/vpn-gateway-peering-gateway-transit/gatewaytransit.png":::
1818

19-
In the diagram, gateway transit allows the peered virtual networks to use the Azure VPN gateway in Hub-RM. Connectivity available on the VPN gateway, including S2S, P2S, and VNet-to-VNet connections, applies to all three virtual networks. The transit option is available for peering between the same, or different deployment models. If you're configuring transit between different deployment models, the hub virtual network and virtual network gateway must be in the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md), not the classic deployment model.
19+
In the diagram, gateway transit allows the peered virtual networks to use the Azure VPN gateway in Hub-RM. Connectivity available on the VPN gateway, including S2S, P2S, and VNet-to-VNet connections, applies to all three virtual networks.
20+
21+
The transit option is available for peering between the same, or different deployment models. If you're configuring transit between different deployment models, the hub virtual network and virtual network gateway must be in the [Resource Manager deployment model](../azure-resource-manager/management/deployment-models.md), not the legacy classic deployment model.
2022
>
2123
22-
In hub-and-spoke network architecture, gateway transit allows spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network. Routes to the gateway-connected virtual networks or on-premises networks will propagate to the routing tables for the peered virtual networks using gateway transit. You can disable the automatic route propagation from the VPN gateway. Create a routing table with the "**Disable BGP route propagation**" option, and associate the routing table to the subnets to prevent the route distribution to those subnets. For more information, see [Virtual network routing table](../virtual-network/manage-route-table.md).
24+
In hub-and-spoke network architecture, gateway transit allows spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network. Routes to the gateway-connected virtual networks or on-premises networks propagate to the routing tables for the peered virtual networks using gateway transit.
25+
26+
You can disable the automatic route propagation from the VPN gateway. Create a routing table with the "**Disable BGP route propagation**" option, and associate the routing table to the subnets to prevent the route distribution to those subnets. For more information, see [Virtual network routing table](../virtual-network/manage-route-table.md).
2327

24-
There are two scenarios in this article:
28+
There are two scenarios in this article. Select the scenario that applies to your environment. Most people use the **Same deployment model** scenario. If you aren't working with a classic deployment model VNet (legacy VNet) that already exists in your environment, you won't need to work with the **Different deployment models** scenario.
2529

2630
* **Same deployment model**: Both virtual networks are created in the Resource Manager deployment model.
27-
* **Different deployment models**: The spoke virtual network is created in the classic deployment model, and the hub virtual network and gateway are in the Resource Manager deployment model.
31+
* **Different deployment models**: The spoke virtual network is created in the classic deployment model, and the hub virtual network and gateway are in the Resource Manager deployment model. This scenario is useful when you need to connect a legacy VNet that already exists in the classic deployment model.
2832

2933
>[!NOTE]
3034
> If you make a change to the topology of your network and have Windows VPN clients, the VPN client package for Windows clients must be downloaded and installed again in order for the changes to be applied to the client.
3135
>
3236
3337
## Prerequisites
3438

35-
Before you begin, verify that you have the following virtual networks and permissions:
39+
This article requires the following VNets and permissions. If you aren't working with the different deployment model scenario, you don't need to create the classic VNet.
3640

3741
### <a name="vnet"></a>Virtual networks
3842

39-
| VNet | Deployment model | Virtual network gateway |
40-
|---------------|-----------------------------------------------------------------------|------------------------------------------|
43+
| VNet | Configuration steps| Virtual network gateway|
44+
|---|---|---|
4145
| Hub-RM | [Resource Manager](./tutorial-site-to-site-portal.md) | [Yes](tutorial-create-gateway-portal.md) |
4246
| Spoke-RM | [Resource Manager](./tutorial-site-to-site-portal.md) | No |
4347
| Spoke-Classic | [Classic](vpn-gateway-howto-site-to-site-classic-portal.md#CreatVNet) | No |
@@ -57,28 +61,30 @@ Learn more about [built-in roles](../role-based-access-control/built-in-roles.md
5761

5862
## <a name="same"></a>Same deployment model
5963

60-
In this scenario, the virtual networks are both in the Resource Manager deployment model. Use the following steps to create or update the virtual network peerings to enable gateway transit.
64+
This is the more common scenario. In this scenario, the virtual networks are both in the Resource Manager deployment model. Use the following steps to create or update the virtual network peerings to enable gateway transit.
6165

6266
### To add a peering and enable transit
6367

64-
1. In the [Azure portal](https://portal.azure.com), create or update the virtual network peering from the Hub-RM. Navigate to the **Hub-RM** virtual network. Select **Peerings**, then **+ Add** to open **Add peering**.
68+
1. In the [Azure portal](https://portal.azure.com), create or update the virtual network peering from the Hub-RM. Go to the **Hub-RM** virtual network. Select **Peerings**, then **+ Add** to open **Add peering**.
6569
1. On the **Add peering** page, configure the values for **This virtual network**.
6670

6771
* Peering link name: Name the link. Example: **HubRMToSpokeRM**
6872
* Traffic to remote virtual network: **Allow**
6973
* Traffic forwarded from remote virtual network: **Allow**
70-
* Virtual network gateway: **Use this virtual network's gateway**
74+
* Virtual network gateway: **Use this virtual network's gateway or Route Server**
7175

7276
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/peering-vnet.png" alt-text="Screenshot shows add peering." lightbox="./media/vpn-gateway-peering-gateway-transit/peering-vnet.png":::
7377

7478
1. On the same page, continue on to configure the values for the **Remote virtual network**.
7579

7680
* Peering link name: Name the link. Example: **SpokeRMtoHubRM**
77-
* Deployment model: **Resource Manager**
81+
* Virtual network deployment model: **Resource Manager**
82+
* I know my resource ID: Leave blank. You only need to select this if you don't have read access to the virtual network or subscription you want to peer with.
83+
* Subscription: Select the subscription.
7884
* Virtual Network: **Spoke-RM**
7985
* Traffic to remote virtual network: **Allow**
8086
* Traffic forwarded from remote virtual network: **Allow**
81-
* Virtual network gateway: **Use the remote virtual network's gateway**
87+
* Virtual network gateway: **Use the remote virtual network's gateway or Route Server**
8288

8389
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/peering-remote.png" alt-text="Screenshot shows values for remote virtual network." lightbox="./media/vpn-gateway-peering-gateway-transit/peering-remote.png":::
8490

@@ -87,25 +93,21 @@ In this scenario, the virtual networks are both in the Resource Manager deployme
8793

8894
### To modify an existing peering for transit
8995

90-
If the peering was already created, you can modify the peering for transit.
96+
If you have an already existing peering, you can modify the peering for transit.
9197

92-
1. Navigate to the virtual network. Select **Peerings** and select the peering that you want to modify.
93-
94-
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/peering-modify.png" alt-text="Screenshot shows select peerings." lightbox="./media/vpn-gateway-peering-gateway-transit/peering-modify.png":::
98+
1. Go to the virtual network. Select **Peerings** and select the peering that you want to modify. For example, on the Spoke-RM VNet, select the SpokeRMtoHubRM peering.
9599

96100
1. Update the VNet peering.
97101

98102
* Traffic to remote virtual network: **Allow**
99103
* Traffic forwarded to virtual network; **Allow**
100-
* Virtual network gateway: **Use remote virtual network's gateway**
101-
102-
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/modify-peering-settings.png" alt-text="Screenshot shows modify peering gateway." lightbox="./media/vpn-gateway-peering-gateway-transit/modify-peering-settings.png":::
104+
* Virtual network gateway or Route Server: **Use the remote virtual network's gateway or Route Server**
103105

104106
1. **Save** the peering settings.
105107

106108
### <a name="ps-same"></a>PowerShell sample
107109

108-
You can also use PowerShell to create or update the peering with the example above. Replace the variables with the names of your virtual networks and resource groups.
110+
You can also use PowerShell to create or update the peering. Replace the variables with the names of your virtual networks and resource groups.
109111

110112
```azurepowershell-interactive
111113
$SpokeRG = "SpokeRG1"
@@ -135,26 +137,28 @@ In this configuration, the spoke VNet **Spoke-Classic** is in the classic deploy
135137

136138
For this configuration, you only need to configure the **Hub-RM** virtual network. You don't need to configure anything on the **Spoke-Classic** VNet.
137139

138-
1. In the Azure portal, navigate to the **Hub-RM** virtual network, select **Peerings**, then select **+ Add**.
140+
1. In the Azure portal, go to the **Hub-RM** virtual network, select **Peerings**, then select **+ Add**.
139141
1. On the **Add peering** page, configure the following values:
140142

141143
* Peering link name: Name the link. Example: **HubRMToClassic**
142144
* Traffic to remote virtual network: **Allow**
143145
* Traffic forwarded from remote virtual network: **Allow**
144-
* Virtual network gateway: **Use this virtual network's gateway**
145-
* Remote virtual network: **Classic**
146+
* Virtual network gateway or Route Server: **Use this virtual network's gateway or Route Server**
147+
* Peering link name: This value disappears when you select Classic for the virtual network deployment model.
148+
* Virtual network deployment model: **Classic**
149+
* I know my resource ID: Leave blank. You only need to select this if you don't have read access to the virtual network or subscription you want to peer with.
146150

147151
:::image type="content" source="./media/vpn-gateway-peering-gateway-transit/peering-classic.png" alt-text="Add peering page for Spoke-Classic" lightbox="./media/vpn-gateway-peering-gateway-transit/peering-classic.png":::
148152

149153
1. Verify the subscription is correct, then select the virtual network from the dropdown.
150154
1. Select **Add** to add the peering.
151-
1. Verify the peering status as **Connected** on the Hub-RM virtual network.
155+
1. Verify the peering status as **Connected** on the Hub-RM virtual network.
152156

153157
For this configuration, you don't need to configure anything on the **Spoke-Classic** virtual network. Once the status shows **Connected**, the spoke virtual network can use the connectivity through the VPN gateway in the hub virtual network.
154158

155159
### <a name="ps-different"></a>PowerShell sample
156160

157-
You can also use PowerShell to create or update the peering with the example above. Replace the variables and subscription ID with the values of your virtual network and resource groups, and subscription. You only need to create virtual network peering on the hub virtual network.
161+
You can also use PowerShell to create or update the peering. Replace the variables and subscription ID with the values of your virtual network and resource groups, and subscription. You only need to create virtual network peering on the hub virtual network.
158162

159163
```azurepowershell-interactive
160164
$HubRG = "HubRG1"

0 commit comments

Comments
 (0)