|
1 | 1 | ---
|
2 |
| -title: 'Interoperability in Azure : Control plane analysis' |
| 2 | +title: Interoperability in Azure - Control plane analysis |
3 | 3 | description: This article provides the control plane analysis of the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
|
4 |
| -documentationcenter: na |
5 |
| -services: networking |
6 |
| -author: rambk |
7 |
| -manager: tracsman |
| 4 | +author: asudbring |
8 | 5 | ms.service: virtual-network
|
9 | 6 | ms.topic: article
|
10 |
| -ms.workload: infrastructure-services |
11 |
| -ms.date: 10/18/2018 |
12 |
| -ms.author: rambala |
| 7 | +ms.date: 03/24/2023 |
| 8 | +ms.author: allensu |
13 | 9 | ms.custom: ignite-fall-2021
|
14 | 10 | ---
|
15 | 11 |
|
16 |
| -# Interoperability in Azure : Control plane analysis |
| 12 | +# Interoperability in Azure - Control plane analysis |
17 | 13 |
|
18 |
| -This article describes the control plane analysis of the [test setup][Setup]. You can also review the [test setup configuration][Configuration] and the [data plane analysis][Data-Analysis] of the test setup. |
| 14 | +This article describes the control plane analysis of the [test setup](./connectivty-interoperability-preface.md). You can also review the [test setup configuration](./connectivty-interoperability-configuration.md) and the [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup. |
19 | 15 |
|
20 | 16 | Control plane analysis essentially examines routes that are exchanged between networks within a topology. Control plane analysis can help you understand how different networks view the topology.
|
21 | 17 |
|
22 |
| -## Hub and spoke VNet perspective |
| 18 | +## Hub and spoke virtual network perspective |
23 | 19 |
|
24 |
| -The following figure illustrates the network from the perspective of a hub virtual network (VNet) and a spoke VNet (highlighted in blue). The figure also shows the autonomous system number (ASN) of different networks and routes that are exchanged between different networks: |
| 20 | +The following figure illustrates the network from the perspective of a hub virtual network and a spoke virtual network (highlighted in blue). The figure also shows the autonomous system number (ASN) of different networks and routes that are exchanged between different networks: |
25 | 21 |
|
26 |
| -![1][1] |
| 22 | +:::image type="content" source="./media/backend-interoperability/hubview.png" alt-text="Diagram of hub and spoke virtual network perspective of the topology."::: |
27 | 23 |
|
28 |
| -The ASN of the VNet's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise Edge Routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the VNet's ExpressRoute gateway ASN for the VNet's prefixes. |
| 24 | +The ASN of the virtual network's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise edge routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the virtual network's ExpressRoute gateway ASN for the VNet's prefixes. |
29 | 25 |
|
30 | 26 | The following figure shows a sample ExpressRoute route table:
|
31 | 27 |
|
32 |
| -![5][5] |
| 28 | +:::image type="content" source="./media/backend-interoperability/exr1-routetable.png" alt-text="Diagram of ExpressRoute 1 route table."::: |
33 | 29 |
|
34 | 30 | Within Azure, the ASN is significant only from a peering perspective. By default, the ASN of both the ExpressRoute gateway and the VPN gateway in Azure VPN Gateway is **65515**.
|
35 | 31 |
|
36 |
| -## On-premises Location 1 and the remote VNet perspective via ExpressRoute 1 |
| 32 | +## On-premises Location 1 and the remote virtual network perspective via ExpressRoute 1 |
37 | 33 |
|
38 |
| -Both on-premises Location 1 and the remote VNet are connected to the hub VNet via ExpressRoute 1. They share the same perspective of the topology, as shown in the following diagram: |
| 34 | +Both on-premises Location 1 and the remote virtual network are connected to the hub virtual network via ExpressRoute 1. They share the same perspective of the topology, as shown in the following diagram: |
39 | 35 |
|
40 |
| -![2][2] |
| 36 | +:::image type="content" source="./media/backend-interoperability/loc1exrview.png" alt-text="Diagram of location 1 and remote virtual network perspective of the topology via ExpressRoute 1."::: |
41 | 37 |
|
42 |
| -## On-premises Location 1 and the branch VNet perspective via a site-to-site VPN |
| 38 | +## On-premises Location 1 and the branch virtual network perspective via a site-to-site VPN |
43 | 39 |
|
44 |
| -Both on-premises Location 1 and the branch VNet are connected to a hub VNet's VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram: |
| 40 | +Both on-premises Location 1 and the branch virtual network are connected to a hub virtual network's VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram: |
45 | 41 |
|
46 |
| -![3][3] |
| 42 | +:::image type="content" source="./media/backend-interoperability/loc1vpnview.png" alt-text="Diagram of location 1 and branch virtual network perspective of the topology via a site-to-site VPN."::: |
47 | 43 |
|
48 | 44 | ## On-premises Location 2 perspective
|
49 | 45 |
|
50 |
| -On-premises Location 2 is connected to a hub VNet via private peering of ExpressRoute 2: |
| 46 | +On-premises Location 2 is connected to a hub virtual network via private peering of ExpressRoute 2: |
51 | 47 |
|
52 |
| -![4][4] |
| 48 | +:::image type="content" source="./media/backend-interoperability/loc2view.png" alt-text="Diagram of location 2 perspective of the topology."::: |
53 | 49 |
|
54 | 50 | ## ExpressRoute and site-to-site VPN connectivity in tandem
|
55 | 51 |
|
56 | 52 | ### Site-to-site VPN over ExpressRoute
|
57 | 53 |
|
58 |
| -You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure VNets. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering][S2S-Over-ExR]. |
| 54 | +You can configure a site-to-site VPN by using ExpressRoute Microsoft peering to privately exchange data between your on-premises network and your Azure Virtual Networks. With this configuration, you can exchange data with confidentiality, authenticity, and integrity. The data exchange also is anti-replay. For more information about how to configure a site-to-site IPsec VPN in tunnel mode by using ExpressRoute Microsoft peering, see [Site-to-site VPN over ExpressRoute Microsoft peering](../expressroute/site-to-site-vpn-over-microsoft-peering.md). |
59 | 55 |
|
60 | 56 | The primary limitation of configuring a site-to-site VPN that uses Microsoft peering is throughput. Throughput over the IPsec tunnel is limited by the VPN gateway capacity. The VPN gateway throughput is lower than ExpressRoute throughput. In this scenario, using the IPsec tunnel for highly secure traffic and using private peering for all other traffic helps optimize the ExpressRoute bandwidth utilization.
|
61 | 57 |
|
62 | 58 | ### Site-to-site VPN as a secure failover path for ExpressRoute
|
63 | 59 |
|
64 | 60 | ExpressRoute serves as a redundant circuit pair to ensure high availability. You can configure geo-redundant ExpressRoute connectivity in different Azure regions. Also, as demonstrated in our test setup, within an Azure region, you can use a site-to-site VPN to create a failover path for your ExpressRoute connectivity. When the same prefixes are advertised over both ExpressRoute and a site-to-site VPN, Azure prioritizes ExpressRoute. To avoid asymmetrical routing between ExpressRoute and the site-to-site VPN, on-premises network configuration should also reciprocate by using ExpressRoute connectivity before it uses site-to-site VPN connectivity.
|
65 | 61 |
|
66 |
| -For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence][ExR-S2S-CoEx]. |
| 62 | +For more information about how to configure coexisting connections for ExpressRoute and a site-to-site VPN, see [ExpressRoute and site-to-site coexistence](../expressroute/expressroute-howto-coexist-resource-manager.md). |
67 | 63 |
|
68 |
| -## Extend back-end connectivity to spoke VNets and branch locations |
| 64 | +## Extend back-end connectivity to spoke virtual networks and branch locations |
69 | 65 |
|
70 |
| -### Spoke VNet connectivity by using VNet peering |
| 66 | +### Spoke virtual network connectivity by using virtual network peering |
71 | 67 |
|
72 |
| -Hub and spoke VNet architecture is widely used. The hub is a VNet in Azure that acts as a central point of connectivity between your spoke VNets and to your on-premises network. The spokes are VNets that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure][Hub-n-Spoke]. |
| 68 | +Hub and spoke virtual network architecture is widely used. The hub is a virtual network in Azure that acts as a central point of connectivity between your spoke virtual networks and to your on-premises network. The spokes are virtual networks that peer with the hub, and which you can use to isolate workloads. Traffic flows between the on-premises datacenter and the hub through an ExpressRoute or VPN connection. For more information about the architecture, see [Implement a hub-spoke network topology in Azure](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke). |
73 | 69 |
|
74 |
| -In VNet peering within a region, spoke VNets can use hub VNet gateways (both VPN and ExpressRoute gateways) to communicate with remote networks. |
| 70 | +In virtual network peering within a region, spoke virtual networks can use hub virtual network gateways (both VPN and ExpressRoute gateways) to communicate with remote networks. |
75 | 71 |
|
76 |
| -### Branch VNet connectivity by using site-to-site VPN |
| 72 | +### Branch virtual network connectivity by using site-to-site VPN |
77 | 73 |
|
78 |
| -You might want branch VNets, which are in different regions, and on-premises networks to communicate with each other via a hub VNet. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub. |
| 74 | +You might want branch virtual networks, which are in different regions, and on-premises networks to communicate with each other via a hub virtual network. The native Azure solution for this configuration is site-to-site VPN connectivity by using a VPN. An alternative is to use a network virtual appliance (NVA) for routing in the hub. |
79 | 75 |
|
80 |
| -For more information, see [What is VPN Gateway?][VPN] and [Deploy a highly available NVA][Deploy-NVA]. |
| 76 | +For more information, see [What is VPN Gateway?](../vpn-gateway/vpn-gateway-about-vpngateways.md) and [Deploy a highly available NVA](/azure/architecture/reference-architectures/dmz/nva-ha). |
81 | 77 |
|
82 | 78 | ## Next steps
|
83 | 79 |
|
84 |
| -Learn about [data plane analysis][Data-Analysis] of the test setup and Azure network monitoring feature views. |
| 80 | +Learn about [data plane analysis](./connectivty-interoperability-data-plane.md) of the test setup and Azure network monitoring feature views. |
| 81 | + |
| 82 | +See the [ExpressRoute FAQ](../expressroute/expressroute-faqs.md) to: |
85 | 83 |
|
86 |
| -See the [ExpressRoute FAQ][ExR-FAQ] to: |
87 | 84 | - Learn how many ExpressRoute circuits you can connect to an ExpressRoute gateway.
|
| 85 | + |
88 | 86 | - Learn how many ExpressRoute gateways you can connect to an ExpressRoute circuit.
|
89 |
| -- Learn about other scale limits of ExpressRoute. |
90 |
| - |
91 |
| - |
92 |
| -<!--Image References--> |
93 |
| -[1]: ./media/backend-interoperability/hubview.png "Hub and spoke VNet perspective of the topology" |
94 |
| -[2]: ./media/backend-interoperability/loc1exrview.png "Location 1 and remote VNet perspective of the topology via ExpressRoute 1" |
95 |
| -[3]: ./media/backend-interoperability/loc1vpnview.png "Location 1 and branch VNet perspective of the topology via a site-to-site VPN" |
96 |
| -[4]: ./media/backend-interoperability/loc2view.png "Location 2 perspective of the topology" |
97 |
| -[5]: ./media/backend-interoperability/exr1-routetable.png "ExpressRoute 1 route table" |
98 |
| - |
99 |
| -<!--Link References--> |
100 |
| -[Setup]: ./connectivty-interoperability-preface.md |
101 |
| -[Configuration]: ./connectivty-interoperability-configuration.md |
102 |
| -[ExpressRoute]: ../expressroute/expressroute-introduction.md |
103 |
| -[VPN]: ../vpn-gateway/vpn-gateway-about-vpngateways.md |
104 |
| -[VNet]: ../virtual-network/tutorial-connect-virtual-networks-portal.md |
105 |
| -[Configuration]: ./connectivty-interoperability-configuration.md |
106 |
| -[Control-Analysis]: |
107 |
| -[Data-Analysis]: ./connectivty-interoperability-data-plane.md |
108 |
| -[ExR-FAQ]: ../expressroute/expressroute-faqs.md |
109 |
| -[S2S-Over-ExR]: ../expressroute/site-to-site-vpn-over-microsoft-peering.md |
110 |
| -[ExR-S2S-CoEx]: ../expressroute/expressroute-howto-coexist-resource-manager.md |
111 |
| -[Hub-n-Spoke]: /azure/architecture/reference-architectures/hybrid-networking/hub-spoke |
112 |
| -[Deploy-NVA]: /azure/architecture/reference-architectures/dmz/nva-ha |
113 |
| -[VNet-Config]: ../virtual-network/virtual-network-manage-peering.md |
| 87 | + |
| 88 | +- Learn about other scale limits of ExpressRoute. |
0 commit comments