Skip to content

Commit 911c019

Browse files
Merge pull request #233793 from duongau/movepeering
ExpressRoute - moving to Microsoft Peering - adding table and retirement note
2 parents e7179df + 46caf18 commit 911c019

File tree

1 file changed

+28
-15
lines changed

1 file changed

+28
-15
lines changed

articles/expressroute/how-to-move-peering.md

Lines changed: 28 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,35 @@ services: expressroute
55
author: duongau
66
ms.service: expressroute
77
ms.topic: how-to
8-
ms.date: 04/28/2021
8+
ms.date: 04/07/2023
99
ms.author: duau
10-
1110
---
1211

1312
# Move a public peering to Microsoft peering
1413

1514
This article helps you move a public peering configuration to Microsoft peering with no downtime. ExpressRoute supports using Microsoft peering with route filters for Azure PaaS services, such as Azure storage and Azure SQL Database. You now need only one routing domain to access Microsoft PaaS and SaaS services. You can use route filters to selectively advertise the PaaS service prefixes for Azure regions you want to consume.
1615

17-
Azure public peering has 1 NAT IP address associated to each BGP session. Microsoft peering allows you to configure your own NAT allocations, as well as use route filters for selective prefix advertisements. Public Peering is a unidirectional service using which Connectivity is always initiated from your WAN to Microsoft Azure services. Microsoft Azure services will not be able to initiate connections into your network through this routing domain.
16+
> [!IMPORTANT]
17+
> Public peering for ExpressRoute is being retired on **March 31, 2024**. For more information, see [**retirement notice**](https://azure.microsoft.com/updates/retirement-notice-migrate-from-public-peering-by-march-31-2024/).
18+
19+
Azure public peering has one NAT IP address associated to each BGP session. Microsoft peering allows you to configure your own NAT allocations, and use route filters for selective prefix advertisements. Public Peering is a unidirectional service using which Connectivity is always initiated from your WAN to Microsoft Azure services. Microsoft Azure services can't initiate connections into your network through this routing domain.
20+
21+
## Peering comparison
22+
23+
| Aspect | Public peering | Microsoft peering |
24+
| --- | --- | --- |
25+
| Number of NAT IP addresses | 1 (not scalable) | Per scale*** |
26+
| Call initiation direction | Unidirectional: on-premises to Microsoft | Bidirectional |
27+
| Prefix advertisement | Nonselectable | Advertisement of Microsoft prefixes controlled by route filters |
28+
| Support | No new public peering deployments. Public peering will be retired on March 31, 2024. | Fully supported |
29+
30+
*** BYOIP: you can scale the number of NAT IP addresses assigned depending on your call volume. To get NAT IP addresses, work with your service provider.
1831

19-
Once public peering is enabled, you can connect to all Azure services. We do not allow you to selectively pick services for which we advertise routes to. While Microsoft peering is a bi-directional connectivity where connection can be initiated from Microsoft Azure service along with your WAN. For more information about routing domains and peering, see [ExpressRoute circuits and routing domains](expressroute-circuit-peerings.md).
32+
Once public peering is enabled, you can connect to all Azure services. We don't allow you to selectively pick services for which we advertise routes to. While Microsoft peering is a bi-directional connectivity where connection can be initiated from Microsoft Azure service along with your WAN. For more information about routing domains and peering, see [ExpressRoute circuits and routing domains](expressroute-circuit-peerings.md).
2033

2134
## <a name="before"></a>Before you begin
2235

23-
To connect to Microsoft peering, you need to set up and manage NAT. Your connectivity provider may set up and manage the NAT as a managed service. If you are planning to access the Azure PaaS and Azure SaaS services on Microsoft peering, it's important to size the NAT IP pool correctly. For more information about NAT for ExpressRoute, see the [NAT requirements for Microsoft peering](expressroute-nat.md#nat-requirements-for-microsoft-peering). When you connect to Microsoft through Azure ExpressRoute(Microsoft peering), you have multiple links to Microsoft. One link is your existing Internet connection, and the other is via ExpressRoute. Some traffic to Microsoft might go through the Internet but come back via ExpressRoute, or vice versa.
36+
To connect to Microsoft peering, you need to set up and manage NAT. Your connectivity provider may set up and manage the NAT as a managed service. If you're planning to access the Azure PaaS and Azure SaaS services on Microsoft peering, it's important to size the NAT IP pool correctly. For more information about NAT for ExpressRoute, see the [NAT requirements for Microsoft peering](expressroute-nat.md#nat-requirements-for-microsoft-peering). When you connect to Microsoft through Azure ExpressRoute(Microsoft peering), you have multiple links to Microsoft. One link is your existing Internet connection, and the other is via ExpressRoute. Some traffic to Microsoft might go through the Internet but come back via ExpressRoute, or vice versa.
2437

2538
![Bidirectional connectivity](./media/how-to-move-peering/bidirectional-connectivity.jpg)
2639

@@ -29,24 +42,24 @@ To connect to Microsoft peering, you need to set up and manage NAT. Your connect
2942
3043
Refer to [Asymmetric routing with multiple network paths](./expressroute-asymmetric-routing.md) for caveats of asymmetric routing before configuring Microsoft peering.
3144

32-
* If you are using public peering and currently have IP Network rules for public IP addresses that are used to access [Azure Storage](../storage/common/storage-network-security.md) or [Azure SQL Database](/azure/azure-sql/database/vnet-service-endpoint-rule-overview), you need to make sure that the NAT IP pool configured with Microsoft peering is included in the list of public IP addresses for the Azure storage account or Azure SQL account.
33-
* Note that legacy Public peering makes use of Source Network Address Translation (SNAT) to a Microsoft-registered public IP, while Microsoft peering does not.
34-
* In order to move to Microsoft peering with no downtime, use the steps in this article in the order that they are presented.
45+
* If you're using public peering and currently have IP Network rules for public IP addresses that are used to access [Azure Storage](../storage/common/storage-network-security.md) or [Azure SQL Database](/azure/azure-sql/database/vnet-service-endpoint-rule-overview), you need to make sure that the NAT IP pool configured with Microsoft peering gets included in the list of public IP addresses for the Azure storage account or the Azure SQL account.
46+
* Legacy Public peering makes use of Source Network Address Translation (SNAT) to a Microsoft-registered public IP, while Microsoft peering doesn't.
47+
* In order to move to Microsoft peering with no downtime, use the steps in this article in the order that they're presented.
3548

3649
## <a name="create"></a>1. Create Microsoft peering
3750

38-
If Microsoft peering has not been created, use any of the following articles to create Microsoft peering. If your connectivity provider offers managed layer 3 services, you can ask the connectivity provider to enable Microsoft peering for your circuit.
51+
If Microsoft peering hasn't been created, use any of the following articles to create Microsoft peering. If your connectivity provider offers managed layer 3 services, you can ask the connectivity provider to enable Microsoft peering for your circuit.
3952

40-
If the layer 3 is managed by you the following information is required before you proceed:
53+
If you manage layer 3, the following information is required before you can proceed:
4154

42-
* A /30 subnet for the primary link. This must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR. From this subnet you will assign the first useable IP address to your router as Microsoft uses the second useable IP for its router.<br>
43-
* A /30 subnet for the secondary link. This must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR. From this subnet you will assign the first useable IP address to your router as Microsoft uses the second useable IP for its router.<br>
55+
* A /30 subnet for the primary link. The prefix must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR. From this subnet, you assign the first useable IP address to your router as Microsoft uses the second useable IP for its router.<br>
56+
* A /30 subnet for the secondary link. The prefix must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR. From this subnet, you assign the first useable IP address to your router as Microsoft uses the second useable IP for its router.<br>
4457
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.<br>
4558
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.<br>
4659
* Advertised prefixes: You must provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.<br>
4760
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
4861

49-
* **Optional** - Customer ASN: If you are advertising prefixes that are not registered to the peering AS number, you can specify the AS number to which they are registered.<br>
62+
* **Optional** - Customer ASN: If you're advertising prefixes not registered to a peering AS number, you can specify the registered AS number to which t registered.<br>
5063
* **Optional** - An MD5 hash if you choose to use one.
5164

5265
Detailed instructions to enable Microsoft peering can be found in the following articles:
@@ -65,7 +78,7 @@ Verify that the Microsoft peering is enabled and the advertised public prefixes
6578

6679
## <a name="routefilter"></a>3. Configure and attach a route filter to the circuit
6780

68-
By default, new Microsoft peering do not advertise any prefixes until a route filter is attached to the circuit. When you create a route filter rule, you can specify the list of service communities for Azure regions that you want to consume for Azure PaaS services. This provides you the flexibility to filter the routes as per your requirement, as shown in the following screenshot:
81+
By default, new Microsoft peering don't advertise any prefixes until a route filter is attached to the circuit. When you create a route filter rule, you can specify the list of service communities for Azure regions that you want to consume for Azure PaaS services. This feature provides you with the flexibility to filter the routes as per your requirement, as shown in the following screenshot:
6982

7083
![Merge public peering](./media/how-to-move-peering/routefilter.jpg)
7184

@@ -77,7 +90,7 @@ Configure route filters using any of the following articles:
7790

7891
## <a name="delete"></a>4. Delete the public peering
7992

80-
After verifying that the Microsoft peering is configured and the prefixes you wish to consume are correctly advertised on Microsoft peering, you can then delete the public peering. To delete the public peering, use any of the following articles:
93+
After verifying Microsoft peering is configured and the prefixes you want to use are correctly advertised through Microsoft peering, you can then delete the public peering. To delete public peering, you can use Azure PowerShell or Azure CLI. For more information, see the following articles:
8194

8295
* [Delete Azure public peering using Azure PowerShell](about-public-peering.md#powershell)
8396
* [Delete Azure public peering using CLI](about-public-peering.md#cli)

0 commit comments

Comments
 (0)