Skip to content

Commit a567748

Browse files
Merge pull request #297745 from cherylmc/vwan-hub-route
freshness update
2 parents cf08e84 + 7b2f3b3 commit a567748

File tree

3 files changed

+18
-17
lines changed

3 files changed

+18
-17
lines changed

articles/virtual-wan/how-to-routing-policies.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ There are two types of Routing Policies: Internet Traffic and Private Traffic Ro
2727

2828
In other words, when a Private Traffic Routing Policy is configured on the Virtual WAN Hub, all branch-to-branch, branch-to-virtual network, virtual network-to-branch, and inter-hub traffic is sent via Azure Firewall, Network Virtual Appliance, or SaaS solution deployed in the Virtual WAN Hub.
2929

30-
## Use Cases
30+
## Use cases
3131

3232
The following section describes two common scenarios where Routing Policies are applied to Secured Virtual WAN hubs.
3333

@@ -84,7 +84,7 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
8484
| Hub 2 VNets | →| Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS|
8585
| Hub 2 Branches | →| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS| Hub 2 AzFW, NVA, or SaaS | Hub 2 AzFW, NVA, or SaaS|
8686

87-
## <a name="knownlimitations"></a> Known Limitations
87+
## <a name="knownlimitations"></a>Known limitations
8888

8989
* The following table describes the availability of routing intent in different Azure environments.
9090
* Routing intent isn't available in Microsoft Azure operated by 21 Vianet.
@@ -106,7 +106,7 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
106106
* Network Virtual Appliances (NVAs) can only be specified as the next hop resource for routing intent if they're Next-Generation Firewall or dual-role Next-Generation Firewall and SD-WAN NVAs. Currently, **checkpoint**, **fortinet-ngfw**, **fortinet-ngfw-and-sdwan** and **cisco-tdv-vwan-nva** are the only NVAs eligible to be configured to be the next hop for routing intent. If you attempt to specify another NVA, Routing Intent creation fails. You can check the type of the NVA by navigating to your Virtual Hub -> Network Virtual Appliances and then looking at the **Vendor** field. [**Palo Alto Networks Cloud NGFW**](how-to-palo-alto-cloud-ngfw.md) is also supported as the next hop for Routing Intent, but is considered a next hop of type **SaaS solution**.
107107
* Routing Intent users who want to connect multiple ExpressRoute circuits to Virtual WAN and want to send traffic between them via a security solution deployed in the hub can enable open up a support case to enable this use case. Reference [enabling connectivity across ExpressRoute circuits](#expressroute) for more information.
108108

109-
### Virtual Network Address Space Limits
109+
### <a name="address-limits"></a>Virtual Network address space limits
110110

111111
> [!NOTE]
112112
> The maximum number of Virtual Network address spaces that you can connect to a single Virtual WAN hub is adjustable. Open an Azure support case to request a limit increase. The limits are applicable at the Virtual WAN hub level. If you have multiple Virtual WAN hubs that require a limit increase, request a limit increase for all Virtual WAN hubs in your Virtual WAN deployment.
@@ -409,14 +409,14 @@ The following steps describe how to configure routing intent and routing policie
409409

410410
:::image type="content" source="./media/routing-policies/configure-intents.png"alt-text="Screenshot showing how to configure routing policies."lightbox="./media/routing-policies/configure-intents.png":::
411411

412-
7. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks advertising non-IANA RFC1918 Prefixes, select **Private Traffic Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**.
412+
1. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks advertising non-IANA RFC1918 Prefixes, select **Private Traffic Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**.
413413

414414
:::image type="content" source="./media/routing-policies/private-prefixes.png"alt-text="Screenshot showing how to edit private traffic prefixes."lightbox="./media/routing-policies/private-prefixes.png":::
415415

416-
8. Select **Inter-hub** to be **Enabled**. Enabling this option ensures your Routing Policies are applied to the Routing Intent of this Virtual WAN Hub.
417-
9. Select **Save**.
418-
10. Repeat steps 2-8 for other Secured Virtual WAN hubs that you want to configure Routing policies for.
419-
11. At this point, you're ready to send test traffic. Make sure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
416+
1. Select **Inter-hub** to be **Enabled**. Enabling this option ensures your Routing Policies are applied to the Routing Intent of this Virtual WAN Hub.
417+
1. Select **Save**.
418+
1. Repeat steps 2-8 for other Secured Virtual WAN hubs that you want to configure Routing policies for.
419+
1. At this point, you're ready to send test traffic. Make sure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
420420

421421
### <a name="nva"></a> Configure routing intent and policies through Virtual WAN portal
422422

@@ -427,25 +427,25 @@ The following steps describe how to configure routing intent and routing policie
427427

428428
:::image type="content" source="./media/routing-policies/routing-policies-vwan-ui.png"alt-text="Screenshot showing how to navigate to routing policies."lightbox="./media/routing-policies/routing-policies-vwan-ui.png":::
429429

430-
3. If you want to configure a Private Traffic Routing Policy (for branch and Virtual Network Traffic), select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solutions** under **Private Traffic**. Under **Next Hop Resource**, select the relevant next hop resource.
430+
1. If you want to configure a Private Traffic Routing Policy (for branch and Virtual Network Traffic), select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solutions** under **Private Traffic**. Under **Next Hop Resource**, select the relevant next hop resource.
431431

432432
:::image type="content" source="./media/routing-policies/routing-policies-private-nva.png"alt-text="Screenshot showing how to configure NVA private routing policies."lightbox="./media/routing-policies/routing-policies-private-nva.png":::
433433

434-
4. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**. Make sure you add the same prefix to the Private Traffic prefix text box in all Virtual Hubs configured with Private Routing Policies to ensure the correct routes are advertised to all hubs.
434+
1. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**. Make sure you add the same prefix to the Private Traffic prefix text box in all Virtual Hubs configured with Private Routing Policies to ensure the correct routes are advertised to all hubs.
435435

436436
:::image type="content" source="./media/routing-policies/private-prefixes-nva.png"alt-text="Screenshot showing how to configure additional private prefixes for NVA routing policies."lightbox="./media/routing-policies/private-prefixes-nva.png":::
437437

438-
5. If you want to configure an Internet Traffic Routing Policy, select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solution**. Under **Next Hop Resource**, select the relevant next hop resource.
438+
1. If you want to configure an Internet Traffic Routing Policy, select **Azure Firewall**, **Network Virtual Appliance** or **SaaS solution**. Under **Next Hop Resource**, select the relevant next hop resource.
439439

440440
:::image type="content" source="./media/routing-policies/public-routing-policy-nva.png"alt-text="Screenshot showing how to configure public routing policies for NVA."lightbox="./media/routing-policies/public-routing-policy-nva.png":::
441441

442-
6. To apply your routing intent and routing policies configuration, click **Save**.
442+
1. To apply your routing intent and routing policies configuration, click **Save**.
443443

444444
:::image type="content" source="./media/routing-policies/save-nva.png"alt-text="Screenshot showing how to save routing policies configurations."lightbox="./media/routing-policies/save-nva.png":::
445445

446-
7. Repeat for all hubs you would like to configure routing policies for.
446+
1. Repeat for all hubs you would like to configure routing policies for.
447447

448-
8. At this point, you're ready to send test traffic. Ensure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
448+
1. At this point, you're ready to send test traffic. Ensure your Firewall Policies are configured appropriately to allow/deny traffic based on your desired security configurations.
449449

450450
## Configure routing intent using a BICEP template
451451

articles/virtual-wan/virtual-wan-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -472,7 +472,7 @@ You can find more information on how to change the VNet address space [here](../
472472

473473
The maximum number of address spaces across all Virtual Networks directly connected to a single Virtual WAN hub is 400. This limit is applied individually to each Virtual WAN hub in a Virtual WAN deployment. Virtual Network address spaces connected to remote (other Virtual WAN hubs in the same Virtual WAN) hubs are not counted towards this limit.
474474

475-
This limit is adjustable. For more information on the limit, the procedure to request a limit increase and sample scripts to determine the number of address spaces across Virtual Networks connected to a Virtual WAN hub, see [routing intent virtual network address space limits](how-to-routing-policies.md#virtual-network-address-space-limits).
475+
This limit is adjustable. For more information on the limit, the procedure to request a limit increase and sample scripts to determine the number of address spaces across Virtual Networks connected to a Virtual WAN hub, see [routing intent virtual network address space limits](how-to-routing-policies.md#address-limits).
476476

477477
## <a name="vwan-customer-controlled-maintenance"></a>Virtual WAN customer-controlled gateway maintenance
478478

includes/virtual-wan-limits.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
author: cherylmc
44
ms.service: azure-virtual-wan
55
ms.topic: include
6-
ms.date: 05/20/2022
6+
ms.date: 04/07/2025
77
ms.author: cherylmc
88
ms.custom: include file
99
---
@@ -16,7 +16,8 @@
1616
| Aggregate throughput per Virtual WAN User VPN (Point-to-site) gateway | 200 Gbps |
1717
| Aggregate throughput per Virtual WAN ExpressRoute gateway | 20 Gbps |
1818
| ExpressRoute circuit connections per hub | 8 |
19-
| VNet connections per hub | 500 minus total number of hubs in Virtual WAN |
19+
| VNet connections per hub without Routing Intent enabled | 500 minus total number of hubs in Virtual WAN |
20+
| Address spaces across all VNets directly connected to single hub with Routing Intent with private routing policies enabled| 400 per Virtual WAN hub - [adjustable](../articles/virtual-wan/how-to-routing-policies.md#address-limits)|
2021
| Aggregate throughput per Virtual WAN hub router | 50 Gbps for VNet to VNet transit |
2122
| VM workload across all VNets connected to a single Virtual WAN hub | 2000 (If you want to raise the limit or quota above the default limit, see [hub settings](../articles/virtual-wan/hub-settings.md)). |
2223
| Total number of routes the hub can accept from its connected resources (virtual networks, branches, other virtual hubs, etc.) | 10,000 |

0 commit comments

Comments
 (0)