You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/how-to-routing-policies.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ There are two types of Routing Policies: Internet Traffic and Private Traffic Ro
27
27
28
28
In other words, when a Private Traffic Routing Policy is configured on the Virtual WAN Hub, all branch-to-branch, branch-to-virtual network, virtual network-to-branch, and inter-hub traffic is sent via Azure Firewall, Network Virtual Appliance, or SaaS solution deployed in the Virtual WAN Hub.
29
29
30
-
## Use Cases
30
+
## Use cases
31
31
32
32
The following section describes two common scenarios where Routing Policies are applied to Secured Virtual WAN hubs.
33
33
@@ -84,7 +84,7 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
84
84
| Hub 2 VNets |→| Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS|
85
85
| Hub 2 Branches |→| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS|
* The following table describes the availability of routing intent in different Azure environments.
90
90
* Routing intent isn't available in Microsoft Azure operated by 21 Vianet.
@@ -106,7 +106,7 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
106
106
* Network Virtual Appliances (NVAs) can only be specified as the next hop resource for routing intent if they're Next-Generation Firewall or dual-role Next-Generation Firewall and SD-WAN NVAs. Currently, **checkpoint**, **fortinet-ngfw**, **fortinet-ngfw-and-sdwan** and **cisco-tdv-vwan-nva** are the only NVAs eligible to be configured to be the next hop for routing intent. If you attempt to specify another NVA, Routing Intent creation fails. You can check the type of the NVA by navigating to your Virtual Hub -> Network Virtual Appliances and then looking at the **Vendor** field. [**Palo Alto Networks Cloud NGFW**](how-to-palo-alto-cloud-ngfw.md) is also supported as the next hop for Routing Intent, but is considered a next hop of type **SaaS solution**.
107
107
* Routing Intent users who want to connect multiple ExpressRoute circuits to Virtual WAN and want to send traffic between them via a security solution deployed in the hub can enable open up a support case to enable this use case. Reference [enabling connectivity across ExpressRoute circuits](#expressroute) for more information.
108
108
109
-
### Virtual Network Address Space Limits
109
+
### <aname="address-limits"></a>Virtual Network address space limits
110
110
111
111
> [!NOTE]
112
112
> The maximum number of Virtual Network address spaces that you can connect to a single Virtual WAN hub is adjustable. Open an Azure support case to request a limit increase. The limits are applicable at the Virtual WAN hub level. If you have multiple Virtual WAN hubs that require a limit increase, request a limit increase for all Virtual WAN hubs in your Virtual WAN deployment.
@@ -409,14 +409,14 @@ The following steps describe how to configure routing intent and routing policie
409
409
410
410
:::image type="content" source="./media/routing-policies/configure-intents.png"alt-text="Screenshot showing how to configure routing policies."lightbox="./media/routing-policies/configure-intents.png":::
411
411
412
-
7. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks advertising non-IANA RFC1918 Prefixes, select **Private Traffic Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**.
412
+
1. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks advertising non-IANA RFC1918 Prefixes, select **Private Traffic Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**.
413
413
414
414
:::image type="content" source="./media/routing-policies/private-prefixes.png"alt-text="Screenshot showing how to edit private traffic prefixes."lightbox="./media/routing-policies/private-prefixes.png":::
415
415
416
-
8. Select **Inter-hub** to be **Enabled**. Enabling this option ensures your Routing Policies are applied to the Routing Intent of this Virtual WAN Hub.
417
-
9. Select **Save**.
418
-
10. Repeat steps 2-8 for other Secured Virtual WAN hubs that you want to configure Routing policies for.
419
-
11. At this point, you're ready to send test traffic. Make sure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
416
+
1. Select **Inter-hub** to be **Enabled**. Enabling this option ensures your Routing Policies are applied to the Routing Intent of this Virtual WAN Hub.
417
+
1. Select **Save**.
418
+
1. Repeat steps 2-8 for other Secured Virtual WAN hubs that you want to configure Routing policies for.
419
+
1. At this point, you're ready to send test traffic. Make sure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
420
420
421
421
### <a name="nva"></a> Configure routing intent and policies through Virtual WAN portal
422
422
@@ -427,25 +427,25 @@ The following steps describe how to configure routing intent and routing policie
427
427
428
428
:::image type="content" source="./media/routing-policies/routing-policies-vwan-ui.png"alt-text="Screenshot showing how to navigate to routing policies."lightbox="./media/routing-policies/routing-policies-vwan-ui.png":::
429
429
430
-
3. If you want to configure a Private Traffic Routing Policy (for branch and Virtual Network Traffic), select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solutions** under **Private Traffic**. Under **Next Hop Resource**, select the relevant next hop resource.
430
+
1. If you want to configure a Private Traffic Routing Policy (for branch and Virtual Network Traffic), select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solutions** under **Private Traffic**. Under **Next Hop Resource**, select the relevant next hop resource.
431
431
432
432
:::image type="content" source="./media/routing-policies/routing-policies-private-nva.png"alt-text="Screenshot showing how to configure NVA private routing policies."lightbox="./media/routing-policies/routing-policies-private-nva.png":::
433
433
434
-
4. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**. Make sure you add the same prefix to the Private Traffic prefix text box in all Virtual Hubs configured with Private Routing Policies to ensure the correct routes are advertised to all hubs.
434
+
1. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**. Make sure you add the same prefix to the Private Traffic prefix text box in all Virtual Hubs configured with Private Routing Policies to ensure the correct routes are advertised to all hubs.
435
435
436
436
:::image type="content" source="./media/routing-policies/private-prefixes-nva.png"alt-text="Screenshot showing how to configure additional private prefixes for NVA routing policies."lightbox="./media/routing-policies/private-prefixes-nva.png":::
437
437
438
-
5. If you want to configure an Internet Traffic Routing Policy, select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solution**. Under **Next Hop Resource**, select the relevant next hop resource.
438
+
1. If you want to configure an Internet Traffic Routing Policy, select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solution**. Under **Next Hop Resource**, select the relevant next hop resource.
439
439
440
440
:::image type="content" source="./media/routing-policies/public-routing-policy-nva.png"alt-text="Screenshot showing how to configure public routing policies for NVA."lightbox="./media/routing-policies/public-routing-policy-nva.png":::
441
441
442
-
6. To apply your routing intent and routing policies configuration, click **Save**.
442
+
1. To apply your routing intent and routing policies configuration, click **Save**.
443
443
444
444
:::image type="content" source="./media/routing-policies/save-nva.png"alt-text="Screenshot showing how to save routing policies configurations."lightbox="./media/routing-policies/save-nva.png":::
445
445
446
-
7. Repeat for all hubs you would like to configure routing policies for.
446
+
1. Repeat for all hubs you would like to configure routing policies for.
447
447
448
-
8. At this point, you're ready to send test traffic. Ensure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
448
+
1. At this point, you're ready to send test traffic. Ensure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
449
449
450
450
## Configure routing intent using a BICEP template
Copy file name to clipboardExpand all lines: articles/virtual-wan/virtual-wan-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -472,7 +472,7 @@ You can find more information on how to change the VNet address space [here](../
472
472
473
473
The maximum number of address spaces across all Virtual Networks directly connected to a single Virtual WAN hub is 400. This limit is applied individually to each Virtual WAN hub in a Virtual WAN deployment. Virtual Network address spaces connected to remote (other Virtual WAN hubs in the same Virtual WAN) hubs are not counted towards this limit.
474
474
475
-
This limit is adjustable. For more information on the limit, the procedure to request a limit increase and sample scripts to determine the number of address spaces across Virtual Networks connected to a Virtual WAN hub, see [routing intent virtual network address space limits](how-to-routing-policies.md#virtual-network-address-space-limits).
475
+
This limit is adjustable. For more information on the limit, the procedure to request a limit increase and sample scripts to determine the number of address spaces across Virtual Networks connected to a Virtual WAN hub, see [routing intent virtual network address space limits](how-to-routing-policies.md#address-limits).
476
476
477
477
## <aname="vwan-customer-controlled-maintenance"></a>Virtual WAN customer-controlled gateway maintenance
Copy file name to clipboardExpand all lines: includes/virtual-wan-limits.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
author: cherylmc
4
4
ms.service: azure-virtual-wan
5
5
ms.topic: include
6
-
ms.date: 05/20/2022
6
+
ms.date: 04/07/2025
7
7
ms.author: cherylmc
8
8
ms.custom: include file
9
9
---
@@ -16,7 +16,8 @@
16
16
| Aggregate throughput per Virtual WAN User VPN (Point-to-site) gateway | 200 Gbps |
17
17
| Aggregate throughput per Virtual WAN ExpressRoute gateway | 20 Gbps |
18
18
| ExpressRoute circuit connections per hub | 8 |
19
-
| VNet connections per hub | 500 minus total number of hubs in Virtual WAN |
19
+
| VNet connections per hub without Routing Intent enabled | 500 minus total number of hubs in Virtual WAN |
20
+
| Address spaces across all VNets directly connected to single hub with Routing Intent with private routing policies enabled| 400 per Virtual WAN hub - [adjustable](../articles/virtual-wan/how-to-routing-policies.md#address-limits)|
20
21
| Aggregate throughput per Virtual WAN hub router | 50 Gbps for VNet to VNet transit |
21
22
| VM workload across all VNets connected to a single Virtual WAN hub | 2000 (If you want to raise the limit or quota above the default limit, see [hub settings](../articles/virtual-wan/hub-settings.md)). |
22
23
| Total number of routes the hub can accept from its connected resources (virtual networks, branches, other virtual hubs, etc.) | 10,000 |
0 commit comments