Skip to content

Commit 722da83

Browse files
Merge pull request #256617 from cherylmc/bgp
freshness
2 parents 2cd77a4 + 97144bb commit 722da83

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/virtual-wan/scenario-bgp-peering-hub.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about BGP peering with an Azure Virtual WAN virtual hub.
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: conceptual
8-
ms.date: 09/06/2022
8+
ms.date: 10/30/2023
99
ms.author: cherylmc
1010

1111
---
@@ -32,7 +32,7 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
3232

3333
* You can't peer a virtual hub router with Azure Route Server provisioned in a virtual network.
3434
* The virtual hub router only supports 16-bit (2 bytes) ASN.
35-
* The virtual network connection that has the NVA BGP connection endpoint must always be associated and propagating to defaultRouteTable. Custom route tables are not supported at this time.
35+
* The virtual network connection that has the NVA BGP connection endpoint must always be associated and propagating to defaultRouteTable. Custom route tables aren't supported at this time.
3636
* The virtual hub router supports transit connectivity between virtual networks connected to virtual hubs. This has nothing to do with this feature for BGP peering capability as Virtual WAN already supports transit connectivity. Examples:
3737
* VNET1: NVA1 connected to Virtual Hub 1 -> (transit connectivity) -> VNET2: NVA2 connected to Virtual Hub 1.
3838
* VNET1: NVA1 connected to Virtual Hub 1 -> (transit connectivity) -> VNET2: NVA2 connected to Virtual Hub 2.
@@ -48,13 +48,13 @@ The virtual hub router now also exposes the ability to peer with it, thereby exc
4848
| Resource | Limit |
4949
|---|---|
5050
| Number of routes each BGP peer can advertise to the virtual hub.| The hub can only accept a maximum number of 10,000 routes (total) from its connected resources. For example, if a virtual hub has a total of 6000 routes from the connected virtual networks, branches, virtual hubs etc., then when a new BGP peering is configured with an NVA, the NVA can only advertise up to 4000 routes. |
51-
* Routes from NVA in a virtual network that are more specific than the virtual network address space, when advertised to the virtual hub through BGP are not propagated further to on-premises.
51+
* Routes from NVA in a virtual network that are more specific than the virtual network address space, when advertised to the virtual hub through BGP aren't propagated further to on-premises.
5252
* Currently we only support 4,000 routes from the NVA to the virtual hub.
53-
* Traffic destined for addresses in the virtual network directly connected to the virtual hub cannot be configured to route through the NVA using BGP peering between the hub and NVA. This is because the virtual hub automatically learns about system routes associated with addresses in the spoke virtual network when the spoke virtual network connection is created. These automatically learned system routes are preferred over routes learned by the hub through BGP.
54-
* BGP peering between an NVA in a spoke VNet and a secured virtual hub (hub with an integrated security solution) is supported if Routing Intent **is** configured on the hub. BGP peering feature is not supported for secured virtual hubs where routing intent is **not** configured.
53+
* Traffic destined for addresses in the virtual network directly connected to the virtual hub can't be configured to route through the NVA using BGP peering between the hub and NVA. This is because the virtual hub automatically learns about system routes associated with addresses in the spoke virtual network when the spoke virtual network connection is created. These automatically learned system routes are preferred over routes learned by the hub through BGP.
54+
* BGP peering between an NVA in a spoke VNet and a secured virtual hub (hub with an integrated security solution) is supported if Routing Intent **is** configured on the hub. BGP peering feature isn't supported for secured virtual hubs where routing intent is **not** configured.
5555
* In order for the NVA to exchange routes with VPN and ER connected sites, branch to branch routing must be turned on.
5656

57-
* When configuring BGP peering with the hub, you will see two IP addresses. Peering with both these addresses is required. Not peering with both addresses can cause routing issues. The same routes must be advertised to both of these addresses. Advertising different routes will cause routing issues.
57+
* When configuring BGP peering with the hub, you'll see two IP addresses. Peering with both these addresses is required. Not peering with both addresses can cause routing issues. The same routes must be advertised to both of these addresses. Advertising different routes will cause routing issues.
5858

5959
* The next hop IP address on the routes being advertised from the NVA to the virtual HUB route server has to be the same as the IP address of the NVA, the IP address configured on the BGP peer. Having a different IP address advertised as next hop IS NOT supported on virtual WAN at the moment.
6060
## BGP peering scenarios
@@ -69,7 +69,7 @@ In this scenario, the virtual hub named "Hub 1" is connected to several virtual
6969

7070
### Configuration steps without BGP peering
7171

72-
The following steps are required when BGP peering is not used on the virtual hub:
72+
The following steps are required when BGP peering isn't used on the virtual hub:
7373

7474
Virtual hub configuration
7575

@@ -96,7 +96,7 @@ Virtual network configuration
9696

9797
#### Effective routes
9898

99-
The table below shows few entries from Hub 1's effective routes in the defaultRouteTable. Notice that the route for VNET5 (subnet 10.2.1.0/24) and this confirms VNET1 and VNET5 will be able to communicate with each other.
99+
The following table shows few entries from Hub 1's effective routes in the defaultRouteTable. Notice that the route for VNET5 (subnet 10.2.1.0/24) and this confirms VNET1 and VNET5 will be able to communicate with each other.
100100

101101
| Destination prefix | Next hop| Origin | ASN path|
102102
| --- | --- | --- | ---|
@@ -114,7 +114,7 @@ In this scenario, the on-premises site named "NVA Branch 1" has a VPN configured
114114

115115
### Configuration steps without BGP peering
116116

117-
The following steps are required when BGP peering is not used on the virtual hub:
117+
The following steps are required when BGP peering isn't used on the virtual hub:
118118

119119
Virtual hub configuration
120120

0 commit comments

Comments
 (0)