You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/point-to-site-entra-gateway.md
+3-12Lines changed: 3 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.custom: linux-related-content
8
8
ms.topic: how-to
9
-
ms.date: 08/06/2024
9
+
ms.date: 11/04/2024
10
10
ms.author: cherylmc
11
11
# Customer intent: As an VPN Gateway administrator, I want to configure point-to-site to allow Microsoft Entra ID authentication using the Microsoft-registered Azure VPN Client APP ID.
12
12
---
@@ -52,16 +52,7 @@ This article assumes the following prerequisites:
52
52
53
53
## <aname="addresspool"></a>Add the VPN client address pool
54
54
55
-
The client address pool is a range of private IP addresses that you specify. The clients that connect over a point-to-site VPN dynamically receive an IP address from this range. Use a private IP address range that doesn't overlap with the on-premises location that you connect from, or the VNet that you want to connect to. If you configure multiple protocols and SSTP is one of the protocols, then the configured address pool is split between the configured protocols equally.
56
-
57
-
1. In the Azure portal, go to your VPN gateway.
58
-
1. On the page for your gateway, in the left pane, select **Point-to-site configuration**.
59
-
1. Click **Configure now** to open the configuration page.
1. On the **Point-to-site configuration** page, in the **Address pool** box, add the private IP address range that you want to use. VPN clients dynamically receive an IP address from the range that you specify. The minimum subnet mask is 29 bit for active/passive and 28 bit for active/active configuration.
64
-
1. Continue to the next section to configure more settings.
55
+
[!INCLUDE [Configure a client address pool](../../includes/vpn-gateway-client-address-pool.md)]
65
56
66
57
## <aname="configure-vpn"></a>Configure tunnel type and authentication
67
58
@@ -72,7 +63,7 @@ The client address pool is a range of private IP addresses that you specify. The
72
63
73
64
1. Configure tunnel type and authentication values.
74
65
75
-
:::image type="content" source="./media/point-to-site-entra-gateway/values.png" alt-text="Screenshot showing settings for Tunnel type, Authentication type, and Microsoft Entra ID settings." lightbox="./media/point-to-site-entra-gateway/values.png":::
66
+
:::image type="content" source="./media/point-to-site-entra-gateway/values.png" alt-text="Screenshot showing settings for Tunnel type, Authentication type, and Microsoft Entra ID settings." lightbox="./media/point-to-site-entra-gateway/values.png":::
The client address pool is a range of private IP addresses that you specify. The clients that connect over a point-to-site VPN dynamically receive an IP address from this range. Use a private IP address range that doesn't overlap with the on-premises location that you connect from, or the VNet that you want to connect to. If you configure multiple protocols and SSTP is one of the protocols, then the configured address pool is split between the configured protocols equally.
10
+
11
+
1. In the Azure portal, go to your VPN gateway.
12
+
1. On the page for your gateway, in the left pane, select **Point-to-site configuration**.
13
+
1. Click **Configure now** to open the configuration page.
1. On the **Point-to-site configuration** page, in the **Address pool** box, add the private IP address range that you want to use. VPN clients dynamically receive an IP address from the range that you specify. The minimum subnet mask is 29 bit for active/passive and 28 bit for active/active configuration.
18
+
1. Continue to the next section to configure more settings.
0 commit comments