You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: includes/vpn-gateway-configure-vpn-device-rm-include.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,15 +20,15 @@ The following links provide more configuration information:
20
20
21
21
- For links to device configuration settings, see [Validated VPN devices](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#devicetable). We provide the device configuration links on a best-effort basis, but it's always best to check with your device manufacturer for the latest configuration information.
22
22
23
-
The list shows the versions that we tested. If your OS isn't on the list, it's still possible that the version is compatible. Check with your device manufacturer to verify that the OS version for your VPN device is compatible.
23
+
The list shows the versions that we tested. If the OS version for your VPN device isn't on the list, it still might be compatible. Check with your device manufacturer.
24
24
25
25
- For basic information about VPN device configuration, see [Overview of partner VPN device configurations](../articles/vpn-gateway/vpn-gateway-3rdparty-device-config-overview.md).
26
26
27
27
- For information about editing device configuration samples, see [Editing samples](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#editing).
28
28
29
29
- For cryptographic requirements, see [About cryptographic requirements and Azure VPN gateways](../articles/vpn-gateway/vpn-gateway-about-compliance-crypto.md).
30
30
31
-
- For information about parameter information that you need to complete your configuration, see [Default IPsec/IKE parameters](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#ipsec). The information includes IKE version, Diffie-Hellman (DH) group, authentication method, encryption and hashing algorithms, security association (SA) lifetime, Perfect Forward Secrecy (PFS), and Dead Peer Detection (DPD).
31
+
- For information about parameters that you need to complete your configuration, see [Default IPsec/IKE parameters](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#ipsec). The information includes IKE version, Diffie-Hellman (DH) group, authentication method, encryption and hashing algorithms, security association (SA) lifetime, perfect forward secrecy (PFS), and Dead Peer Detection (DPD).
32
32
33
33
- For IPsec/IKE policy configuration steps, see [Configure custom IPsec/IKE connection policies for S2S VPN and VNet-to-VNet](../articles/vpn-gateway/vpn-gateway-ipsecikepolicy-rm-powershell.md).
Copy file name to clipboardExpand all lines: includes/vpn-gateway-deprecate-sku-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: vpn-gateway
6
6
ms.topic: include
7
7
---
8
8
9
-
### Can I create a new gateway by using the Standard or High Performance SKU after the deprecation date of November 30, 2023?
9
+
### Can I create a new gateway by using the Standard or High Performance SKU after the deprecation announcement on November 30, 2023?
10
10
11
11
No. As of December 1, 2023, you can't create gateways by using the Standard or High Performance SKU. You can create gateways by using VpnGw1 and VpnGw2 for the same price as the Standard and High Performance SKUs, listed respectively on the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/).
12
12
@@ -32,7 +32,7 @@ You can't migrate gateways from a deprecated SKU to an AZ SKU. However, all gate
32
32
* Standard to VpnGw1AZ
33
33
* High Performance to VpnGw2AZ
34
34
35
-
After your gateways are automatically migrated and upgraded to the AZ SKUs, you can then resize within that SKU family if necessary. For AZ SKU pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/). For throughput information by SKU, see [About gateway SKUs](https://go.microsoft.com/fwlink/?linkid=2256302).
35
+
After your gateways are automatically migrated and upgraded to the AZ SKUs, you can resize within that SKU family if necessary. For AZ SKU pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/). For throughput information by SKU, see [About gateway SKUs](https://go.microsoft.com/fwlink/?linkid=2256302).
36
36
37
37
### Will there be any pricing difference for my gateways after migration?
Copy file name to clipboardExpand all lines: includes/vpn-gateway-faq-bgp-include.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ Azure VPN Gateway supports up to 4,000 prefixes. The BGP session is dropped if t
84
84
85
85
### Can I advertise the default route (0.0.0.0/0) to VPN gateways?
86
86
87
-
Yes. Keep in mind that advertising the default route forces all VNet egress traffic toward your on-premises site. It also prevents the virtual network VMs from accepting public communication from the internet directly, such as RDP or SSH from the internet to the VMs.
87
+
Yes. Keep in mind that advertising the default route forces all VNet egress traffic toward your on-premises site. It also prevents the virtual network VMs from accepting public communication from the internet directly, such as Remote Desktop Protocol (RDP) or Secure Shell (SSH) from the internet to the VMs.
88
88
89
89
### Can I advertise the exact prefixes as my virtual network prefixes?
90
90
@@ -102,13 +102,13 @@ Yes, you can mix both BGP and non-BGP connections for the same Azure VPN gateway
102
102
103
103
### Does Azure VPN Gateway support BGP transit routing?
104
104
105
-
Yes. BGP transit routing is supported, with the exception that Azure VPN gateways don't advertise default routes to other BGP peers. To enable transit routing across multiple VPN gateways, you must enable BGP on all intermediate connections between virtual networks. For more information, see [About BGP and VPN Gateway](../articles/vpn-gateway/vpn-gateway-bgp-overview.md).
105
+
Yes. BGP transit routing is supported, with the exception that VPN gateways don't advertise default routes to other BGP peers. To enable transit routing across multiple VPN gateways, you must enable BGP on all intermediate connections between virtual networks. For more information, see [About BGP and VPN Gateway](../articles/vpn-gateway/vpn-gateway-bgp-overview.md).
106
106
107
107
### Can I have more than one tunnel between a VPN gateway and my on-premises network?
108
108
109
109
Yes, you can establish more than one site-to-site VPN tunnel between a VPN gateway and your on-premises network. All these tunnels are counted against the total number of tunnels for your Azure VPN gateways, and you must enable BGP on both tunnels.
110
110
111
-
For example, if you have two redundant tunnels between your Azure VPN gateway and one of your on-premises networks, they consume two tunnels out of the total quota for your VPN gateway.
111
+
For example, if you have two redundant tunnels between your VPN gateway and one of your on-premises networks, they consume two tunnels out of the total quota for your VPN gateway.
112
112
113
113
### Can I have multiple tunnels between two Azure virtual networks with BGP?
114
114
@@ -126,12 +126,12 @@ For example, if the Azure VPN peer IP is 10.12.255.30, you add a host route for
126
126
127
127
### Does the virtual network gateway support BFD for S2S connections with BGP?
128
128
129
-
No. Bidirectional Forwarding Detection (BFD) is a protocol that you can use with BGP to detect neighbor downtime more quickly than you can by using standard BGP *keepalive* intervals. BFD uses subsecond timers designed to work in LAN environments, but not across the public internet or WAN connections.
129
+
No. Bidirectional Forwarding Detection (BFD) is a protocol that you can use with BGP to detect neighbor downtime more quickly than you can by using standard BGP keepalive intervals. BFD uses subsecond timers designed to work in LAN environments, but not across the public internet or WAN connections.
130
130
131
131
For connections over the public internet, having certain packets delayed or even dropped isn't unusual, so introducing these aggressive timers can add instability. This instability might cause BGP to dampen routes.
132
132
133
133
As an alternative, you can configure your on-premises device with timers lower than the default 60-second keepalive interval or lower than the 180-second hold timer. This configuration results in a quicker convergence time. However, timers below the default 60-second keepalive interval or below the default 180-second hold timer aren't reliable. We recommend that you keep timers at or above the default values.
134
134
135
135
### Do VPN gateways initiate BGP peering sessions or connections?
136
136
137
-
VPN gateways initiate BGP peering sessions to the on-premises BGP peer IP addresses specified in the local network gateway resources by using the private IP addresses on the VPN gateways. This process is irrespective of whether the on-premises BGP IP addresses are in the APIPA range or are regular private IP addresses. If your on-premises VPN devices use APIPA addresses as BGP IP, you need to configure your BGP speaker to initiate the connections.
137
+
VPN gateways initiate BGP peering sessions to the on-premises BGP peer IP addresses specified in the local network gateway resources by using the private IP addresses on the VPN gateways. This process is irrespective of whether the on-premises BGP IP addresses are in the APIPA range or are regular private IP addresses. If your on-premises VPN devices use APIPA addresses as the BGP IP, you need to configure your BGP speaker to initiate the connections.
Copy file name to clipboardExpand all lines: includes/vpn-gateway-faq-ipsecikepolicy-include.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@
5
5
ms.date: 10/18/2023
6
6
ms.author: cherylmc
7
7
---
8
-
### Is a custom IPsec or IKE policy supported on all Azure VPN Gateway SKUs?
8
+
### Is a custom IPsec/IKE policy supported on all Azure VPN Gateway SKUs?
9
9
10
-
A custom IPsec or IKE policy is supported on all Azure VPN Gateway SKUs except the Basic SKU.
10
+
A custom IPsec/IKE policy is supported on all Azure VPN Gateway SKUs except the Basic SKU.
11
11
12
12
### How many policies can I specify on a connection?
13
13
@@ -35,23 +35,23 @@ The following table lists the corresponding Diffie-Hellman groups that the custo
35
35
36
36
For more information, refer to [RFC3526](https://tools.ietf.org/html/rfc3526) and [RFC5114](https://tools.ietf.org/html/rfc5114).
37
37
38
-
### Does the custom policy replace the default IPsec or IKE policy sets for VPN gateways?
38
+
### Does the custom policy replace the default IPsec/IKE policy sets for VPN gateways?
39
39
40
40
Yes. After you specify a custom policy on a connection, Azure VPN Gateway uses only that policy on the connection, both as IKE initiator and IKE responder.
41
41
42
-
### If I remove a custom IPsec or IKE policy, does the connection become unprotected?
42
+
### If I remove a custom IPsec/IKE policy, does the connection become unprotected?
43
43
44
-
No, IPsec or IKE still helps protect the connection. After you remove the custom policy from a connection, the VPN gateway reverts to the [default list of IPsec or IKE proposals](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#RouteBasedOffers) and restarts the IKE handshake with your on-premises VPN device.
44
+
No, IPsec/IKE still helps protect the connection. After you remove the custom policy from a connection, the VPN gateway reverts to the [default list of IPsec/IKE proposals](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#RouteBasedOffers) and restarts the IKE handshake with your on-premises VPN device.
45
45
46
-
### Would adding or updating an IPsec or IKE policy disrupt my VPN connection?
46
+
### Would adding or updating an IPsec/IKE policy disrupt my VPN connection?
47
47
48
48
Yes. It could cause a small disruption (a few seconds) as the VPN gateway tears down the existing connection and restarts the IKE handshake to reestablish the IPsec tunnel with the new cryptographic algorithms and parameters. Ensure that your on-premises VPN device is also configured with the matching algorithms and key strengths to minimize the disruption.
49
49
50
50
### Can I use different policies on different connections?
51
51
52
-
Yes. A custom policy is applied on a per-connection basis. You can create and apply different IPsec or IKE policies on different connections.
52
+
Yes. A custom policy is applied on a per-connection basis. You can create and apply different IPsec/IKE policies on different connections.
53
53
54
-
You can also choose to apply custom policies on a subset of connections. The remaining ones use the Azure default IPsec or IKE policy sets.
54
+
You can also choose to apply custom policies on a subset of connections. The remaining ones use the Azure default IPsec/IKE policy sets.
55
55
56
56
### Can I use a custom policy on VNet-to-VNet connections?
57
57
@@ -68,9 +68,9 @@ The default DPD timeout is 45 seconds on VPN gateways. You can specify a differe
68
68
> [!NOTE]
69
69
> Setting the timeout to shorter periods causes IKE to rekey more aggressively. The connection can then appear to be disconnected in some instances. This situation might not be desirable if your on-premises locations are farther away from the Azure region where the VPN gateway resides, or if the physical link condition could incur packet loss. We generally recommend that you set the timeout to *between 30 and 45* seconds.
70
70
71
-
### Does a custom IPsec or IKE policy work on ExpressRoute connections?
71
+
### Does a custom IPsec/IKE policy work on ExpressRoute connections?
72
72
73
-
No. An IPsec or IKE policy works only on S2S VPN and VNet-to-VNet connections via the VPN gateways.
73
+
No. An IPsec/IKE policy works only on S2S VPN and VNet-to-VNet connections via the VPN gateways.
74
74
75
75
### How do I create connections with the IKEv1 or IKEv2 protocol type?
76
76
@@ -82,7 +82,7 @@ For information about SKU types and support for IKEv1 and IKEv2, see [Connect a
82
82
83
83
### Is transit between IKEv1 and IKEv2 connections allowed?
84
84
85
-
Yes. Transit between IKEv1 and IKEv2 connections is supported.
85
+
Yes.
86
86
87
87
### Can I have IKEv1 site-to-site connections on the Basic SKU for the route-based VPN type?
Copy file name to clipboardExpand all lines: includes/vpn-gateway-faq-nat-include.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,13 +49,13 @@ No. A single source network address translation (SNAT) rule defines the translat
49
49
50
50
* An **IngressSNAT** rule defines the translation of the source IP addresses coming into the VPN gateway from the on-premises network. It also handles the translation of the destination IP addresses leaving from the virtual network to the same on-premises network.
51
51
52
-
* An **EgressSNAT** rule defines the translation of the VNet source IP addresses leaving the VPN gateway to on-premises networks. It also handles the translation of the destination IP addresses for packets coming into the virtual network via those connections with the **EgressSNAT** rule.
52
+
* An **EgressSNAT** rule defines the translation of the VNet source IP addresses leaving the VPN gateway to on-premises networks. It also handles the translation of the destination IP addresses for packets coming into the virtual network via the connections that have the **EgressSNAT** rule.
53
53
54
54
In either case, you don't need destination network address translation (DNAT) rules.
55
55
56
56
### What do I do if my VNet or local network gateway address space has two or more prefixes? Can I apply NAT to all of them or just a subset?
57
57
58
-
You need to create one NAT rule for each prefix, because each NAT rule can include only one address prefix for NAT. For example, if the local network gateway address space consists of 10.0.1.0/24 and 10.0.2.0/25, you can create two rules:
58
+
You need to create one NAT rule for each prefix, because each NAT rule can include only one address prefix for NAT. For example, if the address space for the local network gateway consists of 10.0.1.0/24 and 10.0.2.0/25, you can create two rules:
59
59
60
60
***IngressSNAT** rule 1: Map 10.0.1.0/24 to 100.0.1.0/24.
61
61
***IngressSNAT** rule 2: Map 10.0.2.0/25 to 100.0.2.0/25.
Copy file name to clipboardExpand all lines: includes/vpn-gateway-faq-p2s-all-include.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Azure supports three types of point-to-site VPN options:
34
34
35
35
***OpenVPN**: A SSL-based solution that can penetrate firewalls because most firewalls open the outbound TCP port that 443 SSL uses.
36
36
37
-
***IKEv2 VPN**: A standards-based IPsec VPN solution that uses outbound UDP ports 500 and 4500 and IP protocol number 50. Firewalls don't always open these ports, so there's a possibility that IKEv2 VPN can't traverse proxies and firewalls.
37
+
***IKEv2 VPN**: A standards-based IPsec VPN solution that uses outbound UDP ports 500 and 4500, along with IP protocol number 50. Firewalls don't always open these ports, so there's a possibility that IKEv2 VPN can't traverse proxies and firewalls.
38
38
39
39
### If I restart a client computer that I configured for point-to-site, will the VPN automatically reconnect?
40
40
@@ -58,7 +58,7 @@ Yes. Point-to-site client connections to a virtual network gateway deployed in a
58
58
59
59
### How much throughput can I expect through site-to-site or point-to-site connections?
60
60
61
-
It's difficult to maintain the exact throughput of the VPN tunnels. IPsec and SSTP are crypto-heavy VPN protocols. Throughput is also limited by the latency and bandwidth between your premises and the internet.
61
+
It's difficult to maintain the exact throughput of the VPN tunnels. IPsec and SSTP are crypto-heavy VPN protocols. The latency and bandwidth between your premises and the internet can also limit throughput.
62
62
63
63
For a VPN gateway with only IKEv2 point-to-site VPN connections, the total throughput that you can expect depends on the gateway SKU. For more information on throughput, see [Gateway SKUs](../articles/vpn-gateway/vpn-gateway-about-vpngateways.md#gwsku).
64
64
@@ -110,7 +110,7 @@ The traffic selector limit for OpenVPN is 1,000 routes.
110
110
111
111
When you configure both SSTP and IKEv2 in a mixed environment that consists of Windows and Mac devices, the Windows VPN client always tries the IKEv2 tunnel first. The client falls back to SSTP if the IKEv2 connection isn't successful. MacOS connects only via IKEv2.
112
112
113
-
When you have both SSTP and IKEv2 enabled on the gateway, the point-to-site address pool is statically split between the two, so clients that use different protocols are IP addresses from either subrange. The maximum number of SSTP clients is always 128, even if the address range is larger than /24. The result is a larger number of addresses available for IKEv2 clients. For smaller ranges, the pool is equally halved. Traffic selectors that the gateway uses might not include the point-to-site address range CIDR but include the two subrange CIDRs.
113
+
When you have both SSTP and IKEv2 enabled on the gateway, the point-to-site address pool is statically split between the two, so clients that use different protocols are IP addresses from either subrange. The maximum number of SSTP clients is always 128, even if the address range is larger than /24. The result is a larger number of addresses available for IKEv2 clients. For smaller ranges, the pool is equally halved. Traffic selectors that the gateway uses might not include the Classless Inter-Domain Routing (CIDR) block for the point-to-site address range but include the CIDR block for the two subranges.
114
114
115
115
### Which platforms does Azure support for P2S VPN?
116
116
@@ -122,18 +122,14 @@ Yes. If the gateway SKU that you're using supports RADIUS or IKEv2, you can enab
122
122
123
123
### <aname="removeconfig"></a>How do I remove the configuration of a P2S connection?
124
124
125
-
You can remove a P2S configuration by using the following Azure PowerShell or Azure CLI commands.
126
-
127
-
#### Azure PowerShell
125
+
You can remove a P2S configuration by using the following Azure PowerShell or Azure CLI commands:
0 commit comments