You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,9 +46,9 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
46
46
47
47
Volume encryption with customer-managed keys with managed HSM extends the [customer-managed keys](configure-customer-managed-keys.md), enabling you to store your keys in a more secure FIPS 140-2 Level 3 HSM service instead of the FIPS 140-2 Level 1 or 2 encryption offered with Azure Key Vault.
You can now create an Azure NetApp Files volume as small as 50 GiB--a reduction from the initial minimum size of 100 GiB. 50 GiB volumes save costs for workloads that require volumes smaller than 100 GiB, allowing you to appropriately size storage volumes. 50 GiB volumes are supported for all protocols with Azure NetApp Files: [NFS](azure-netapp-files-create-volumes.md#50-gib), [SMB](azure-netapp-files-create-volumes-smb.md#50-gib), and [dual-protocol](create-volumes-dual-protocol.md#50-gib). You must register for the feature before creating a volume smaller than 100 GiB.
51
+
You can now create an Azure NetApp Files volume as small as [50 GiB](azure-netapp-files-resource-limits.md)--a reduction from the initial minimum size of 100 GiB. 50 GiB volumes save costs for workloads that require volumes smaller than 100 GiB, allowing you to appropriately size storage volumes. 50 GiB volumes are supported for all protocols with Azure NetApp Files: [NFS](azure-netapp-files-create-volumes.md#50-gib), [SMB](azure-netapp-files-create-volumes-smb.md#50-gib), and [dual-protocol](create-volumes-dual-protocol.md#50-gib). You must register for the feature before creating a volume smaller than 100 GiB.
52
52
53
53
*[Azure NetApp Files double encryption at rest](double-encryption-at-rest.md) is now generally available (GA).
Copy file name to clipboardExpand all lines: articles/vpn-gateway/point-to-site-about.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,12 @@ author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.custom: linux-related-content
8
8
ms.topic: conceptual
9
-
ms.date: 08/08/2024
9
+
ms.date: 09/18/2024
10
10
ms.author: cherylmc
11
11
---
12
12
# About Point-to-Site VPN
13
13
14
-
A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client computer. This solution is useful for telecommuters who want to connect to Azure VNets from a remote location, such as from home or a conference. P2S VPN is also a useful solution to use instead of S2S VPN when you have only a few clients that need to connect to a VNet. Point-to-site configurations require a **route-based** VPN type.
15
-
16
-
This article applies to the current deployment model. See [P2S - Classic](vpn-gateway-howto-point-to-site-classic-azure-portal.md) for legacy deployments.
14
+
A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client computer. This solution is useful for telecommuters who want to connect to Azure virtual networks from a remote location, such as from home or a conference. P2S VPN is also a useful solution to use instead of site-to-site (S2S) VPN when you have only a few clients that need to connect to a virtual network. Point-to-site configurations require a **route-based** VPN type.
17
15
18
16
## <aname="protocol"></a>What protocol does P2S use?
19
17
@@ -29,23 +27,23 @@ Point-to-site VPN can use one of the following protocols:
29
27
30
28
Before Azure accepts a P2S VPN connection, the user has to be authenticated first. There are three authentication types that you can select when you configure your P2S gateway. The options are:
31
29
32
-
*Azure certificate
33
-
* Microsoft Entra ID
34
-
* RADIUS and Active Directory Domain Server
30
+
*[Certificate](#certificate)
31
+
*[Microsoft Entra ID](#entra-id)
32
+
*[RADIUS and Active Directory Domain Server](#active-directory)
35
33
36
34
You can select multiple authentication types for your P2S gateway configuration. If you select multiple authentication types, the VPN client you use must be supported by at least one authentication type and corresponding tunnel type. For example, if you select "IKEv2 and OpenVPN" for tunnel types, and "Microsoft Entra ID and Radius" or "Microsoft Entra ID and Azure Certificate" for authentication type, Microsoft Entra ID will only use the OpenVPN tunnel type since it's not supported by IKEv2.
37
35
38
36
The following table shows authentication mechanisms that are compatible with selected tunnel types. Each mechanism requires corresponding VPN client software on the connecting device to be configured with the proper settings available in the VPN client profile configuration files.
When you configure your P2S gateway for certificate authentication, you upload the trusted root certificate public key to the Azure gateway. You can use a root certificate that was generated using an Enterprise solution, or you can generate a self-signed certificate.
45
43
46
44
To authenticate, each client that connects must have an installed client certificate that's generated from the trusted root certificate. This is in addition to VPN client software. The validation of the client certificate is performed by the VPN gateway and happens during establishment of the P2S VPN connection.
1. Download, install, and configure the Azure VPN Client on the client computer.
72
70
1. Connect.
73
71
74
-
### Active Directory (AD) Domain Server
72
+
### <aname='active-directory'></a>RADIUS - Active Directory (AD) Domain Server authentication
75
73
76
74
AD Domain authentication allows users to connect to Azure using their organization domain credentials. It requires a RADIUS server that integrates with the AD server. Organizations can also use their existing RADIUS deployment.
77
75
78
-
The RADIUS server could be deployed on-premises or in your Azure VNet. During authentication, the Azure VPN Gateway acts as a pass through and forwards authentication messages back and forth between the RADIUS server and the connecting device. So Gateway reachability to the RADIUS server is important. If the RADIUS server is present on-premises, then a VPN S2S connection from Azure to the on-premises site is required for reachability.
76
+
The RADIUS server could be deployed on-premises or in your Azure virtual network. During authentication, the Azure VPN Gateway acts as a pass through and forwards authentication messages back and forth between the RADIUS server and the connecting device. So Gateway reachability to the RADIUS server is important. If the RADIUS server is present on-premises, then a VPN S2S connection from Azure to the on-premises site is required for reachability.
79
77
80
78
The RADIUS server can also integrate with AD certificate services. This lets you use the RADIUS server and your enterprise certificate deployment for P2S certificate authentication as an alternative to the Azure certificate authentication. The advantage is that you don’t need to upload root certificates and revoked certificates to Azure.
81
79
@@ -91,6 +89,10 @@ The client configuration requirements vary, based on the VPN client that you use
## What versions of the Azure VPN Client are available?
93
+
94
+
For information about available Azure VPN Client versions, release dates, and what's new in each release, see [Azure VPN Client versions](azure-vpn-client-versions.md).
95
+
94
96
## <aname="gwsku"></a>Which gateway SKUs support P2S VPN?
95
97
96
98
The following table shows gateway SKUs by tunnel, connection, and throughput. For more information, see [About gateway SKUs](about-gateway-skus.md).
@@ -175,4 +177,5 @@ There are multiple FAQ entries for point-to-site. See the [VPN Gateway FAQ](vpn-
175
177
176
178
*[Configure a P2S connection - Azure certificate authentication](vpn-gateway-howto-point-to-site-resource-manager-portal.md)
177
179
*[Configure a P2S connection - Microsoft Entra ID authentication](point-to-site-entra-gateway.md)
0 commit comments