Skip to content

Commit 9e648a2

Browse files
Merge pull request #232048 from asudbring/vnet-old-review
Review of control plan networking article and fixes for acrolinx and standards fixes and review
2 parents ac198b2 + 1fa7bf2 commit 9e648a2

File tree

1 file changed

+34
-59
lines changed

1 file changed

+34
-59
lines changed
Lines changed: 34 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -1,113 +1,88 @@
11
---
2-
title: 'Interoperability in Azure : Control plane analysis'
2+
title: Interoperability in Azure - Control plane analysis
33
description: This article provides the control plane analysis of the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
4-
documentationcenter: na
5-
services: networking
6-
author: rambk
7-
manager: tracsman
4+
author: asudbring
85
ms.service: virtual-network
96
ms.topic: article
10-
ms.workload: infrastructure-services
11-
ms.date: 10/18/2018
12-
ms.author: rambala
7+
ms.date: 03/24/2023
8+
ms.author: allensu
139
ms.custom: ignite-fall-2021
1410
---
1511

16-
# Interoperability in Azure : Control plane analysis
12+
# Interoperability in Azure - Control plane analysis
1713

18-
This article describes the control plane analysis of the [test setup][Setup]. You can also review the [test setup configuration][Configuration] and the [data plane analysis][Data-Analysis] of the test setup.
14+
This article describes the control plane analysis of the [test setup](./connectivty-interoperability-preface.md). You can also review the [test setup configuration](./connectivty-interoperability-configuration.md) and the [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup.
1915

2016
Control plane analysis essentially examines routes that are exchanged between networks within a topology. Control plane analysis can help you understand how different networks view the topology.
2117

22-
## Hub and spoke VNet perspective
18+
## Hub and spoke virtual network perspective
2319

24-
The following figure illustrates the network from the perspective of a hub virtual network (VNet) and a spoke VNet (highlighted in blue). The figure also shows the autonomous system number (ASN) of different networks and routes that are exchanged between different networks:
20+
The following figure illustrates the network from the perspective of a hub virtual network and a spoke virtual network (highlighted in blue). The figure also shows the autonomous system number (ASN) of different networks and routes that are exchanged between different networks:
2521

26-
![1][1]
22+
:::image type="content" source="./media/backend-interoperability/hubview.png" alt-text="Diagram of hub and spoke virtual network perspective of the topology.":::
2723

28-
The ASN of the VNet's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise Edge Routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the VNet's ExpressRoute gateway ASN for the VNet's prefixes.
24+
The ASN of the virtual network's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise edge routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the virtual network's ExpressRoute gateway ASN for the VNet's prefixes.
2925

3026
The following figure shows a sample ExpressRoute route table:
3127

32-
![5][5]
28+
:::image type="content" source="./media/backend-interoperability/exr1-routetable.png" alt-text="Diagram of ExpressRoute 1 route table.":::
3329

3430
Within Azure, the ASN is significant only from a peering perspective. By default, the ASN of both the ExpressRoute gateway and the VPN gateway in Azure VPN Gateway is **65515**.
3531

36-
## On-premises Location 1 and the remote VNet perspective via ExpressRoute 1
32+
## On-premises Location 1 and the remote virtual network perspective via ExpressRoute 1
3733

38-
Both on-premises Location 1 and the remote VNet are connected to the hub VNet via ExpressRoute 1. They share the same perspective of the topology, as shown in the following diagram:
34+
Both on-premises Location 1 and the remote virtual network are connected to the hub virtual network via ExpressRoute 1. They share the same perspective of the topology, as shown in the following diagram:
3935

40-
![2][2]
36+
:::image type="content" source="./media/backend-interoperability/loc1exrview.png" alt-text="Diagram of location 1 and remote virtual network perspective of the topology via ExpressRoute 1.":::
4137

42-
## On-premises Location 1 and the branch VNet perspective via a site-to-site VPN
38+
## On-premises Location 1 and the branch virtual network perspective via a site-to-site VPN
4339

44-
Both on-premises Location 1 and the branch VNet are connected to a hub VNet's VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram:
40+
Both on-premises Location 1 and the branch virtual network are connected to a hub virtual network's VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram:
4541

46-
![3][3]
42+
:::image type="content" source="./media/backend-interoperability/loc1vpnview.png" alt-text="Diagram of location 1 and branch virtual network perspective of the topology via a site-to-site VPN.":::
4743

4844
## On-premises Location 2 perspective
4945

50-
On-premises Location 2 is connected to a hub VNet via private peering of ExpressRoute 2:
46+
On-premises Location 2 is connected to a hub virtual network via private peering of ExpressRoute 2:
5147

52-
![4][4]
48+
:::image type="content" source="./media/backend-interoperability/loc2view.png" alt-text="Diagram of location 2 perspective of the topology.":::
5349

5450
## ExpressRoute and site-to-site VPN connectivity in tandem
5551

5652
### Site-to-site VPN over ExpressRoute
5753

58-
You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure VNets. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering][S2S-Over-ExR].
54+
You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure Virtual Networks. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering](../expressroute/site-to-site-vpn-over-microsoft-peering.md).
5955

6056
The primary limitation of configuring a site-to-site VPN that uses Microsoft peering is throughput. Throughput over the IPsec tunnel is limited by the VPN gateway capacity. The VPN gateway throughput is lower than ExpressRoute throughput. In this scenario, using the IPsec tunnel for highly secure traffic and using private peering for all other traffic helps optimize the ExpressRoute bandwidth utilization.
6157

6258
### Site-to-site VPN as a secure failover path for ExpressRoute
6359

6460
ExpressRoute serves as a redundant circuit pair to ensure high availability. You can configure geo-redundant ExpressRoute connectivity in different Azure regions. Also, as demonstrated in our test setup, within an Azure region, you can use a site-to-site VPN to create a failover path for your ExpressRoute connectivity. When the same prefixes are advertised over both ExpressRoute and a site-to-site VPN, Azure prioritizes ExpressRoute. To avoid asymmetrical routing between ExpressRoute and the site-to-site VPN, on-premises network configuration should also reciprocate by using ExpressRoute connectivity before it uses site-to-site VPN connectivity.
6561

66-
For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence][ExR-S2S-CoEx].
62+
For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence](../expressroute/expressroute-howto-coexist-resource-manager.md).
6763

68-
## Extend back-end connectivity to spoke VNets and branch locations
64+
## Extend back-end connectivity to spoke virtual networks and branch locations
6965

70-
### Spoke VNet connectivity by using VNet peering
66+
### Spoke virtual network connectivity by using virtual network peering
7167

72-
Hub and spoke VNet architecture is widely used. The hub is a VNet in Azure that acts as a central point of connectivity between your spoke VNets and to your on-premises network. The spokes are VNets that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure][Hub-n-Spoke].
68+
Hub and spoke virtual network architecture is widely used. The hub is a virtual network in Azure that acts as a central point of connectivity between your spoke virtual networks and to your on-premises network. The spokes are virtual networks that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke).
7369

74-
In VNet peering within a region, spoke VNets can use hub VNet gateways (both VPN and ExpressRoute gateways) to communicate with remote networks.
70+
In virtual network peering within a region, spoke virtual networks can use hub virtual network gateways (both VPN and ExpressRoute gateways) to communicate with remote networks.
7571

76-
### Branch VNet connectivity by using site-to-site VPN
72+
### Branch virtual network connectivity by using site-to-site VPN
7773

78-
You might want branch VNets, which are in different regions, and on-premises networks to communicate with each other via a hub VNet. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub.
74+
You might want branch virtual networks, which are in different regions, and on-premises networks to communicate with each other via a hub virtual network. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub.
7975

80-
For more information, see [What is VPN Gateway?][VPN] and [Deploy a highly available NVA][Deploy-NVA].
76+
For more information, see [What is VPN Gateway?](../vpn-gateway/vpn-gateway-about-vpngateways.md) and [Deploy a highly available NVA](/azure/architecture/reference-architectures/dmz/nva-ha).
8177

8278
## Next steps
8379

84-
Learn about [data plane analysis][Data-Analysis] of the test setup and Azure network monitoring feature views.
80+
Learn about [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup and Azure network monitoring feature views.
81+
82+
See the [ExpressRoute FAQ](../expressroute/expressroute-faqs.md) to:
8583

86-
See the [ExpressRoute FAQ][ExR-FAQ] to:
8784
- Learn how many ExpressRoute circuits you can connect to an ExpressRoute gateway.
85+
8886
- Learn how many ExpressRoute gateways you can connect to an ExpressRoute circuit.
89-
- Learn about other scale limits of ExpressRoute.
90-
91-
92-
<!--Image References-->
93-
[1]: ./media/backend-interoperability/hubview.png "Hub and spoke VNet perspective of the topology"
94-
[2]: ./media/backend-interoperability/loc1exrview.png "Location 1 and remote VNet perspective of the topology via ExpressRoute 1"
95-
[3]: ./media/backend-interoperability/loc1vpnview.png "Location 1 and branch VNet perspective of the topology via a site-to-site VPN"
96-
[4]: ./media/backend-interoperability/loc2view.png "Location 2 perspective of the topology"
97-
[5]: ./media/backend-interoperability/exr1-routetable.png "ExpressRoute 1 route table"
98-
99-
<!--Link References-->
100-
[Setup]: ./connectivty-interoperability-preface.md
101-
[Configuration]: ./connectivty-interoperability-configuration.md
102-
[ExpressRoute]: ../expressroute/expressroute-introduction.md
103-
[VPN]: ../vpn-gateway/vpn-gateway-about-vpngateways.md
104-
[VNet]: ../virtual-network/tutorial-connect-virtual-networks-portal.md
105-
[Configuration]: ./connectivty-interoperability-configuration.md
106-
[Control-Analysis]:
107-
[Data-Analysis]: ./connectivty-interoperability-data-plane.md
108-
[ExR-FAQ]: ../expressroute/expressroute-faqs.md
109-
[S2S-Over-ExR]: ../expressroute/site-to-site-vpn-over-microsoft-peering.md
110-
[ExR-S2S-CoEx]: ../expressroute/expressroute-howto-coexist-resource-manager.md
111-
[Hub-n-Spoke]: /azure/architecture/reference-architectures/hybrid-networking/hub-spoke
112-
[Deploy-NVA]: /azure/architecture/reference-architectures/dmz/nva-ha
113-
[VNet-Config]: ../virtual-network/virtual-network-manage-peering.md
87+
88+
- Learn about other scale limits of ExpressRoute.

0 commit comments

Comments
 (0)