Skip to content

Commit 74745fc

Browse files
committed
Fix Acrolinx issues
1 parent 5485dcb commit 74745fc

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/vpn-gateway/site-to-site-high-bandwidth-tunnel.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 07/14/2025
1212
---
1313

1414
# Create a Site-to-Site High Bandwidth tunnels in the Azure portal
15-
The Azure VPN Gateway High Bandwidth tunnels feature, a part of the Advanced Connectivity set of features, introduces significant improvements in tunnel throughput, enabling high-performance IPsec connections between the on-premises network and the Azure VNet. These High Bandwidth tunnels are established between a VPN device on-premises and the Azure VPN Gateway deployed in the Azure VNet, transiting through an ExpressRoute private peering. Utilizing private IP address networks on-premises, these tunnels create a secure overlay network between the on-premises infrastructure and the Azure VNet.
15+
The Azure VPN Gateway High Bandwidth tunnels feature, a part of the Advanced Connectivity set of features, introduces significant improvements in tunnel throughput, enabling high-performance IPsec connections between the on-premises network and the Azure virtual network. These High Bandwidth tunnels are established between a VPN device on-premises and the Azure VPN Gateway deployed in the Azure virtual network, transiting through an ExpressRoute private peering. Utilizing private IP address networks on-premises, these tunnels create a secure overlay network between the on-premises infrastructure and the Azure virtual network.
1616

1717
The High Bandwidth tunnels meet customer security compliance requirements by providing end-to-end encryption, effectively overcoming encryption bottlenecks. It allows for the establishment of four tunnels between the Azure VPN Gateway and the on-premises VPN device. The High Bandwidth tunnels allow for the creation of two Connections with two IPsec tunnels for each Connection. Each IPsec tunnel can deliver a throughput of 5 Gbps, achieving a total encrypted aggregate throughput of 20 Gbps. The network diagram clarifies the configuration:
1818

@@ -21,7 +21,7 @@ The High Bandwidth tunnels meet customer security compliance requirements by pro
2121
## Prerequisites
2222
The VPN High Bandwidth tunnels require the presence of FastPath in an ExpressRoute Connection. Currently FastPath is supported only in ExpressRoute Direct Port Pair. Therefore, the ExpressRoute circuit required to be deployed on ExpressRoute Direct port pair for the correct setting of the solution.
2323

24-
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a Virtual Network (VNet). The Azure VNet is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26
24+
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a virtual network. The Azure virtual network is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26
2525

2626
The full list of required objects are:
2727
- ExpressRoute Direct Port
@@ -63,14 +63,14 @@ $connection.EnablePrivateLinkFastPath = $true
6363
Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connection
6464
```
6565

66-
At this stage of deployment, the Azure VNet is connected to the on-premises networks, and ExpressRoute is properly configured to support High Bandwidth tunnels.
66+
At this stage of deployment, the Azure virtual network is connected to the on-premises networks, and ExpressRoute is properly configured to support High Bandwidth tunnels.
6767

6868
## <a name="on-premises network"></a>Advertisement of the on-premises network to the ExpressRoute circuit
69-
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN devices must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers. If other on-prem networks are advertised to ExpressRoute, this runs the risk of "leaking" these routes to the VNet, which could bypass the VPN Gateway and traffic could go directly to the ExpressRoute gateway, bypassing encryption. So it's important to only advertise the VPN Device tunnel IPs over ExpressRoute.
69+
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN devices must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers. If other on-premises networks are advertised to ExpressRoute, this runs the risk of "leaking" these routes to the virtual network, which could bypass the VPN Gateway and traffic could go directly to the ExpressRoute gateway, bypassing encryption. So it's important to only advertise the VPN Device tunnel IPs over ExpressRoute.
7070

71-
The routes between the VPN Device and the VPN Gateway should contain the detailed on-prem networks, routing can be via static routes or Border Gateway Protocol (BGP). By keeping your on-prem networks in this routing "channel" you'll ensure Azure traffic to on-prem is encrypted before entering the ExpressRoute data path, traveling inside the VPN tunnel.
71+
The routes between the VPN Device and the VPN Gateway should contain the detailed on-premises networks. Routing can be via either static routes or Border Gateway Protocol (BGP). By keeping your on-premises networks in this routing "channel" you ensure Azure traffic to on-premises is encrypted before entering the ExpressRoute data path, traveling inside the VPN tunnel.
7272

73-
If you do add routes to ExpressRoute that you wish to encrypt, a UDR will be needed on the VNets pointing to the VPN Gateway as the next hop to ensure that traffic is put into the encrypted tunnel before transiting ExpressRoute.
73+
If you do add routes to ExpressRoute BGP that you wish to encrypt, they will leak around the VPN Gateway and NOT be encrypted. To prevent this a UDR can be used on the virtual networks sending traffic to point to the VPN Gateway as the next hop to ensure that traffic is put into the encrypted tunnel before transiting ExpressRoute.
7474

7575
## <a name="VNetGateway"></a>Create a VPN gateway High Bandwidth tunnel
7676
In this step, you create a virtual network gateway (VPN gateway) High Bandwidth tunnels for your virtual network. The High Bandwidth tunnel is supported only on VpnGw5AZ SKU.
@@ -135,7 +135,7 @@ Create two local network gateways by using the following values:
135135

136136
![8]
137137

138-
After the deployment of the two Local Network Gateways you're ready to proceed with VPN Connections.
138+
After the deployment of the two Local Network Gateways, you're ready to proceed with VPN Connections.
139139

140140
## <a name="CreateConnection"></a>Create VPN Connections
141141
The VPN High Bandwidth Gateway supports a maximum of two VPN Connections.
@@ -169,7 +169,7 @@ Create two Connections by using the following values:
169169
> [!NOTE]
170170
> Only after the deployment of two VPN Connections, through the Azure portal you can discover the private IP addresses assigned to the VPN Gateway instances.
171171
172-
In Azure portal select the Azure VPN Gateway and then **Settings** and **Connections**
172+
In Azure portal, select the Azure VPN Gateway and then **Settings** and **Connections**
173173

174174
![15]
175175

@@ -192,7 +192,7 @@ When you configure your VPN device, you need the following values:
192192
* **Shared key**: This shared key is the same one that you specify when you create your site-to-site VPN connection. In our examples, we use a simple shared key. We recommend that you generate a more complex key to use.
193193
* **private IP addresses of tunnels in VPN Gateway**: each VPN gateway instance has two tunnel IPs. The High Bandwidth tunnels expect to have four IPsec tunnels. In some VPN devices, the configuration can be implemented through Virtual Tunnel Interfaces (VTIs). Each private IP address on the outbound interface of the on-premises VPN device can be associated with up to two virtual tunnel interfaces.
194194

195-
* **IP address space assigned to the Azure VNet**
195+
* **IP address space assigned to the Azure virtual network**
196196

197197
![17]
198198

@@ -234,7 +234,7 @@ static routing:
234234

235235
### <a name="configure-connect"></a>Configure custom encryption algorithms (optional)
236236

237-
In each VPN Connection you can define a custom IKEv2 and IPsec policy to match the encryption requirements. For more information, see [Configure custom IPsec/IKE connection policies](ipsec-ike-policy-howto.md).
237+
In each VPN Connection, you can define a custom IKEv2 and IPsec policy to match the encryption requirements. For more information, see [Configure custom IPsec/IKE connection policies](ipsec-ike-policy-howto.md).
238238

239239
[!INCLUDE [Configure additional connection settings with screenshot](../../includes/vpn-gateway-connection-settings-portal-include.md)]
240240

0 commit comments

Comments
 (0)