Skip to content

Commit 6a879e3

Browse files
committed
edit pass: vpn-gateway-vpn-faq
1 parent a153a23 commit 6a879e3

11 files changed

+61
-65
lines changed

articles/vpn-gateway/vpn-gateway-vpn-faq.md

Lines changed: 29 additions & 29 deletions
Large diffs are not rendered by default.

includes/vpn-gateway-configure-vpn-device-rm-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ The following links provide more configuration information:
2020

2121
- For links to device configuration settings, see [Validated VPN devices](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#devicetable). We provide the device configuration links on a best-effort basis, but it's always best to check with your device manufacturer for the latest configuration information.
2222

23-
The list shows the versions that we tested. If your OS isn't on the list, it's still possible that the version is compatible. Check with your device manufacturer to verify that the OS version for your VPN device is compatible.
23+
The list shows the versions that we tested. If the OS version for your VPN device isn't on the list, it still might be compatible. Check with your device manufacturer.
2424

2525
- For basic information about VPN device configuration, see [Overview of partner VPN device configurations](../articles/vpn-gateway/vpn-gateway-3rdparty-device-config-overview.md).
2626

2727
- For information about editing device configuration samples, see [Editing samples](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#editing).
2828

2929
- For cryptographic requirements, see [About cryptographic requirements and Azure VPN gateways](../articles/vpn-gateway/vpn-gateway-about-compliance-crypto.md).
3030

31-
- For information about parameter information that you need to complete your configuration, see [Default IPsec/IKE parameters](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#ipsec). The information includes IKE version, Diffie-Hellman (DH) group, authentication method, encryption and hashing algorithms, security association (SA) lifetime, Perfect Forward Secrecy (PFS), and Dead Peer Detection (DPD).
31+
- For information about parameters that you need to complete your configuration, see [Default IPsec/IKE parameters](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#ipsec). The information includes IKE version, Diffie-Hellman (DH) group, authentication method, encryption and hashing algorithms, security association (SA) lifetime, perfect forward secrecy (PFS), and Dead Peer Detection (DPD).
3232

3333
- For IPsec/IKE policy configuration steps, see [Configure custom IPsec/IKE connection policies for S2S VPN and VNet-to-VNet](../articles/vpn-gateway/vpn-gateway-ipsecikepolicy-rm-powershell.md).
3434

includes/vpn-gateway-customer-controlled-gateway-maintenance-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Yes.
4646

4747
### Which gateway SKUs can I configure to use customer-controlled maintenance?
4848

49-
All gateway SKUs (except the Basic SKU for VPN Gateway) can be configured to use customer-controlled maintenance.
49+
All the Azure VPN Gateway SKUs (except the Basic SKU) can be configured to use customer-controlled maintenance.
5050

5151
### How long does it take for a maintenance configuration policy to become effective after it's assigned to the gateway resource?
5252

includes/vpn-gateway-deprecate-sku-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: vpn-gateway
66
ms.topic: include
77
---
88

9-
### Can I create a new gateway by using the Standard or High Performance SKU after the deprecation date of November 30, 2023?
9+
### Can I create a new gateway by using the Standard or High Performance SKU after the deprecation announcement on November 30, 2023?
1010

1111
No. As of December 1, 2023, you can't create gateways by using the Standard or High Performance SKU. You can create gateways by using VpnGw1 and VpnGw2 for the same price as the Standard and High Performance SKUs, listed respectively on the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/).
1212

@@ -32,7 +32,7 @@ You can't migrate gateways from a deprecated SKU to an AZ SKU. However, all gate
3232
* Standard to VpnGw1AZ
3333
* High Performance to VpnGw2AZ
3434

35-
After your gateways are automatically migrated and upgraded to the AZ SKUs, you can then resize within that SKU family if necessary. For AZ SKU pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/). For throughput information by SKU, see [About gateway SKUs](https://go.microsoft.com/fwlink/?linkid=2256302).
35+
After your gateways are automatically migrated and upgraded to the AZ SKUs, you can resize within that SKU family if necessary. For AZ SKU pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/vpn-gateway/). For throughput information by SKU, see [About gateway SKUs](https://go.microsoft.com/fwlink/?linkid=2256302).
3636

3737
### Will there be any pricing difference for my gateways after migration?
3838

includes/vpn-gateway-faq-bgp-include.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Azure VPN Gateway supports up to 4,000 prefixes. The BGP session is dropped if t
8484

8585
### Can I advertise the default route (0.0.0.0/0) to VPN gateways?
8686

87-
Yes. Keep in mind that advertising the default route forces all VNet egress traffic toward your on-premises site. It also prevents the virtual network VMs from accepting public communication from the internet directly, such as RDP or SSH from the internet to the VMs.
87+
Yes. Keep in mind that advertising the default route forces all VNet egress traffic toward your on-premises site. It also prevents the virtual network VMs from accepting public communication from the internet directly, such as Remote Desktop Protocol (RDP) or Secure Shell (SSH) from the internet to the VMs.
8888

8989
### Can I advertise the exact prefixes as my virtual network prefixes?
9090

@@ -102,13 +102,13 @@ Yes, you can mix both BGP and non-BGP connections for the same Azure VPN gateway
102102

103103
### Does Azure VPN Gateway support BGP transit routing?
104104

105-
Yes. BGP transit routing is supported, with the exception that Azure VPN gateways don't advertise default routes to other BGP peers. To enable transit routing across multiple VPN gateways, you must enable BGP on all intermediate connections between virtual networks. For more information, see [About BGP and VPN Gateway](../articles/vpn-gateway/vpn-gateway-bgp-overview.md).
105+
Yes. BGP transit routing is supported, with the exception that VPN gateways don't advertise default routes to other BGP peers. To enable transit routing across multiple VPN gateways, you must enable BGP on all intermediate connections between virtual networks. For more information, see [About BGP and VPN Gateway](../articles/vpn-gateway/vpn-gateway-bgp-overview.md).
106106

107107
### Can I have more than one tunnel between a VPN gateway and my on-premises network?
108108

109109
Yes, you can establish more than one site-to-site VPN tunnel between a VPN gateway and your on-premises network. All these tunnels are counted against the total number of tunnels for your Azure VPN gateways, and you must enable BGP on both tunnels.
110110

111-
For example, if you have two redundant tunnels between your Azure VPN gateway and one of your on-premises networks, they consume two tunnels out of the total quota for your VPN gateway.
111+
For example, if you have two redundant tunnels between your VPN gateway and one of your on-premises networks, they consume two tunnels out of the total quota for your VPN gateway.
112112

113113
### Can I have multiple tunnels between two Azure virtual networks with BGP?
114114

@@ -126,12 +126,12 @@ For example, if the Azure VPN peer IP is 10.12.255.30, you add a host route for
126126

127127
### Does the virtual network gateway support BFD for S2S connections with BGP?
128128

129-
No. Bidirectional Forwarding Detection (BFD) is a protocol that you can use with BGP to detect neighbor downtime more quickly than you can by using standard BGP *keepalive* intervals. BFD uses subsecond timers designed to work in LAN environments, but not across the public internet or WAN connections.
129+
No. Bidirectional Forwarding Detection (BFD) is a protocol that you can use with BGP to detect neighbor downtime more quickly than you can by using standard BGP keepalive intervals. BFD uses subsecond timers designed to work in LAN environments, but not across the public internet or WAN connections.
130130

131131
For connections over the public internet, having certain packets delayed or even dropped isn't unusual, so introducing these aggressive timers can add instability. This instability might cause BGP to dampen routes.
132132

133133
As an alternative, you can configure your on-premises device with timers lower than the default 60-second keepalive interval or lower than the 180-second hold timer. This configuration results in a quicker convergence time. However, timers below the default 60-second keepalive interval or below the default 180-second hold timer aren't reliable. We recommend that you keep timers at or above the default values.
134134

135135
### Do VPN gateways initiate BGP peering sessions or connections?
136136

137-
VPN gateways initiate BGP peering sessions to the on-premises BGP peer IP addresses specified in the local network gateway resources by using the private IP addresses on the VPN gateways. This process is irrespective of whether the on-premises BGP IP addresses are in the APIPA range or are regular private IP addresses. If your on-premises VPN devices use APIPA addresses as BGP IP, you need to configure your BGP speaker to initiate the connections.
137+
VPN gateways initiate BGP peering sessions to the on-premises BGP peer IP addresses specified in the local network gateway resources by using the private IP addresses on the VPN gateways. This process is irrespective of whether the on-premises BGP IP addresses are in the APIPA range or are regular private IP addresses. If your on-premises VPN devices use APIPA addresses as the BGP IP, you need to configure your BGP speaker to initiate the connections.

includes/vpn-gateway-faq-ipsecikepolicy-include.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@
55
ms.date: 10/18/2023
66
ms.author: cherylmc
77
---
8-
### Is a custom IPsec or IKE policy supported on all Azure VPN Gateway SKUs?
8+
### Is a custom IPsec/IKE policy supported on all Azure VPN Gateway SKUs?
99

10-
A custom IPsec or IKE policy is supported on all Azure VPN Gateway SKUs except the Basic SKU.
10+
A custom IPsec/IKE policy is supported on all Azure VPN Gateway SKUs except the Basic SKU.
1111

1212
### How many policies can I specify on a connection?
1313

@@ -35,23 +35,23 @@ The following table lists the corresponding Diffie-Hellman groups that the custo
3535

3636
For more information, refer to [RFC3526](https://tools.ietf.org/html/rfc3526) and [RFC5114](https://tools.ietf.org/html/rfc5114).
3737

38-
### Does the custom policy replace the default IPsec or IKE policy sets for VPN gateways?
38+
### Does the custom policy replace the default IPsec/IKE policy sets for VPN gateways?
3939

4040
Yes. After you specify a custom policy on a connection, Azure VPN Gateway uses only that policy on the connection, both as IKE initiator and IKE responder.
4141

42-
### If I remove a custom IPsec or IKE policy, does the connection become unprotected?
42+
### If I remove a custom IPsec/IKE policy, does the connection become unprotected?
4343

44-
No, IPsec or IKE still helps protect the connection. After you remove the custom policy from a connection, the VPN gateway reverts to the [default list of IPsec or IKE proposals](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#RouteBasedOffers) and restarts the IKE handshake with your on-premises VPN device.
44+
No, IPsec/IKE still helps protect the connection. After you remove the custom policy from a connection, the VPN gateway reverts to the [default list of IPsec/IKE proposals](../articles/vpn-gateway/vpn-gateway-about-vpn-devices.md#RouteBasedOffers) and restarts the IKE handshake with your on-premises VPN device.
4545

46-
### Would adding or updating an IPsec or IKE policy disrupt my VPN connection?
46+
### Would adding or updating an IPsec/IKE policy disrupt my VPN connection?
4747

4848
Yes. It could cause a small disruption (a few seconds) as the VPN gateway tears down the existing connection and restarts the IKE handshake to reestablish the IPsec tunnel with the new cryptographic algorithms and parameters. Ensure that your on-premises VPN device is also configured with the matching algorithms and key strengths to minimize the disruption.
4949

5050
### Can I use different policies on different connections?
5151

52-
Yes. A custom policy is applied on a per-connection basis. You can create and apply different IPsec or IKE policies on different connections.
52+
Yes. A custom policy is applied on a per-connection basis. You can create and apply different IPsec/IKE policies on different connections.
5353

54-
You can also choose to apply custom policies on a subset of connections. The remaining ones use the Azure default IPsec or IKE policy sets.
54+
You can also choose to apply custom policies on a subset of connections. The remaining ones use the Azure default IPsec/IKE policy sets.
5555

5656
### Can I use a custom policy on VNet-to-VNet connections?
5757

@@ -68,9 +68,9 @@ The default DPD timeout is 45 seconds on VPN gateways. You can specify a differe
6868
> [!NOTE]
6969
> Setting the timeout to shorter periods causes IKE to rekey more aggressively. The connection can then appear to be disconnected in some instances. This situation might not be desirable if your on-premises locations are farther away from the Azure region where the VPN gateway resides, or if the physical link condition could incur packet loss. We generally recommend that you set the timeout to *between 30 and 45* seconds.
7070
71-
### Does a custom IPsec or IKE policy work on ExpressRoute connections?
71+
### Does a custom IPsec/IKE policy work on ExpressRoute connections?
7272

73-
No. An IPsec or IKE policy works only on S2S VPN and VNet-to-VNet connections via the VPN gateways.
73+
No. An IPsec/IKE policy works only on S2S VPN and VNet-to-VNet connections via the VPN gateways.
7474

7575
### How do I create connections with the IKEv1 or IKEv2 protocol type?
7676

@@ -82,7 +82,7 @@ For information about SKU types and support for IKEv1 and IKEv2, see [Connect a
8282

8383
### Is transit between IKEv1 and IKEv2 connections allowed?
8484

85-
Yes. Transit between IKEv1 and IKEv2 connections is supported.
85+
Yes.
8686

8787
### Can I have IKEv1 site-to-site connections on the Basic SKU for the route-based VPN type?
8888

includes/vpn-gateway-faq-nat-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,13 +49,13 @@ No. A single source network address translation (SNAT) rule defines the translat
4949

5050
* An **IngressSNAT** rule defines the translation of the source IP addresses coming into the VPN gateway from the on-premises network. It also handles the translation of the destination IP addresses leaving from the virtual network to the same on-premises network.
5151

52-
* An **EgressSNAT** rule defines the translation of the VNet source IP addresses leaving the VPN gateway to on-premises networks. It also handles the translation of the destination IP addresses for packets coming into the virtual network via those connections with the **EgressSNAT** rule.
52+
* An **EgressSNAT** rule defines the translation of the VNet source IP addresses leaving the VPN gateway to on-premises networks. It also handles the translation of the destination IP addresses for packets coming into the virtual network via the connections that have the **EgressSNAT** rule.
5353

5454
In either case, you don't need destination network address translation (DNAT) rules.
5555

5656
### What do I do if my VNet or local network gateway address space has two or more prefixes? Can I apply NAT to all of them or just a subset?
5757

58-
You need to create one NAT rule for each prefix, because each NAT rule can include only one address prefix for NAT. For example, if the local network gateway address space consists of 10.0.1.0/24 and 10.0.2.0/25, you can create two rules:
58+
You need to create one NAT rule for each prefix, because each NAT rule can include only one address prefix for NAT. For example, if the address space for the local network gateway consists of 10.0.1.0/24 and 10.0.2.0/25, you can create two rules:
5959

6060
* **IngressSNAT** rule 1: Map 10.0.1.0/24 to 100.0.1.0/24.
6161
* **IngressSNAT** rule 2: Map 10.0.2.0/25 to 100.0.2.0/25.

includes/vpn-gateway-faq-p2s-all-include.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Azure supports three types of point-to-site VPN options:
3434

3535
* **OpenVPN**: A SSL-based solution that can penetrate firewalls because most firewalls open the outbound TCP port that 443 SSL uses.
3636

37-
* **IKEv2 VPN**: A standards-based IPsec VPN solution that uses outbound UDP ports 500 and 4500 and IP protocol number 50. Firewalls don't always open these ports, so there's a possibility that IKEv2 VPN can't traverse proxies and firewalls.
37+
* **IKEv2 VPN**: A standards-based IPsec VPN solution that uses outbound UDP ports 500 and 4500, along with IP protocol number 50. Firewalls don't always open these ports, so there's a possibility that IKEv2 VPN can't traverse proxies and firewalls.
3838

3939
### If I restart a client computer that I configured for point-to-site, will the VPN automatically reconnect?
4040

@@ -58,7 +58,7 @@ Yes. Point-to-site client connections to a virtual network gateway deployed in a
5858

5959
### How much throughput can I expect through site-to-site or point-to-site connections?
6060

61-
It's difficult to maintain the exact throughput of the VPN tunnels. IPsec and SSTP are crypto-heavy VPN protocols. Throughput is also limited by the latency and bandwidth between your premises and the internet.
61+
It's difficult to maintain the exact throughput of the VPN tunnels. IPsec and SSTP are crypto-heavy VPN protocols. The latency and bandwidth between your premises and the internet can also limit throughput.
6262

6363
For a VPN gateway with only IKEv2 point-to-site VPN connections, the total throughput that you can expect depends on the gateway SKU. For more information on throughput, see [Gateway SKUs](../articles/vpn-gateway/vpn-gateway-about-vpngateways.md#gwsku).
6464

@@ -110,7 +110,7 @@ The traffic selector limit for OpenVPN is 1,000 routes.
110110

111111
When you configure both SSTP and IKEv2 in a mixed environment that consists of Windows and Mac devices, the Windows VPN client always tries the IKEv2 tunnel first. The client falls back to SSTP if the IKEv2 connection isn't successful. MacOS connects only via IKEv2.
112112

113-
When you have both SSTP and IKEv2 enabled on the gateway, the point-to-site address pool is statically split between the two, so clients that use different protocols are IP addresses from either subrange. The maximum number of SSTP clients is always 128, even if the address range is larger than /24. The result is a larger number of addresses available for IKEv2 clients. For smaller ranges, the pool is equally halved. Traffic selectors that the gateway uses might not include the point-to-site address range CIDR but include the two subrange CIDRs.
113+
When you have both SSTP and IKEv2 enabled on the gateway, the point-to-site address pool is statically split between the two, so clients that use different protocols are IP addresses from either subrange. The maximum number of SSTP clients is always 128, even if the address range is larger than /24. The result is a larger number of addresses available for IKEv2 clients. For smaller ranges, the pool is equally halved. Traffic selectors that the gateway uses might not include the Classless Inter-Domain Routing (CIDR) block for the point-to-site address range but include the CIDR block for the two subranges.
114114

115115
### Which platforms does Azure support for P2S VPN?
116116

@@ -122,18 +122,14 @@ Yes. If the gateway SKU that you're using supports RADIUS or IKEv2, you can enab
122122

123123
### <a name="removeconfig"></a>How do I remove the configuration of a P2S connection?
124124

125-
You can remove a P2S configuration by using the following Azure PowerShell or Azure CLI commands.
126-
127-
#### Azure PowerShell
125+
You can remove a P2S configuration by using the following Azure PowerShell or Azure CLI commands:
128126

129127
```azurepowershell-interactive
130128
$gw=Get-AzVirtualNetworkGateway -name <gateway-name>`
131129
$gw.VPNClientConfiguration = $null`
132130
Set-AzVirtualNetworkGateway -VirtualNetworkGateway $gw`
133131
```
134132

135-
#### Azure CLI
136-
137133
```azurecli-interactive
138134
az network vnet-gateway update --name <gateway-name> --resource-group <resource-group name> --remove "vpnClientConfiguration"
139135
```

0 commit comments

Comments
 (0)