Skip to content

Commit ba603d3

Browse files
committed
updated title metadata
1 parent d39d242 commit ba603d3

9 files changed

+284
-284
lines changed

articles/network-watcher/view-relative-latencies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: View relative latencies to Azure regions from specific locations | Microsoft Docs
2+
title: View relative latencies to Azure regions from specific locations
33
description: Learn how to view relative latencies across Internet providers to Azure regions from specific locations.
44
services: network-watcher
55
documentationcenter: ''
@@ -20,7 +20,7 @@ ms.custom:
2020
> [!WARNING]
2121
> This feature is currently in preview and still being tested for stability.
2222
23-
In this tutorial, learn how to use the Azure [Network Watcher](network-watcher-monitoring-overview.md) service to help you decide what Azure region to deploy your application or service in, based on your user demographic. Additionally, you can use it to help evaluate service providers connections to Azure.
23+
In this tutorial, learn how to use the Azure [Network Watcher](network-watcher-monitoring-overview.md) service to help you decide what Azure region to deploy your application or service in, based on your user demographic. Additionally, you can use it to help evaluate service providers' connections to Azure.
2424

2525

2626
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
@@ -41,7 +41,7 @@ New-AzNetworkWatcher -Name NetworkWatcher_eastus -ResourceGroupName NetworkWatch
4141

4242
## Compare relative network latencies to a single Azure region from a specific location
4343

44-
Evaluate service providers, or troubleshoot a user reporting an issue such as the site was slow, from a specific location to the azure region where a service is deployed. For example, the following command returns the average relative Internet service provider latencies between the state of Washington in the United States and the West US 2 Azure region between December 13-15, 2017:
44+
Evaluate service providers, or troubleshoot a user reporting an issue such as "the site was slow," from a specific location to the azure region where a service is deployed. For example, the following command returns the average relative Internet service provider latencies between the state of Washington in the United States and the West US 2 Azure region between December 13-15, 2017:
4545

4646
```powershell
4747
Get-AzNetworkWatcherReachabilityReport `

articles/networking/connectivty-interoperability-configuration.md

Lines changed: 91 additions & 91 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Interoperability in Azure back-end connectivity features: Configuration details | Microsoft Docs'
2+
title: 'Interoperability in Azure: Configuration details'
33
description: This article describes configuration details for the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
44
documentationcenter: na
55
services: networking
@@ -14,7 +14,7 @@ ms.author: rambala
1414

1515
---
1616

17-
# Interoperability in Azure back-end connectivity features: Test configuration details
17+
# Interoperability in Azure: Test configuration details
1818

1919
This article describes the configuration details of the [test setup][Setup]. The test setup helps you analyze how Azure networking services interoperate at the control plane level and data plane level.
2020

@@ -50,100 +50,100 @@ The following figure shows the connection configuration between the ExpressRoute
5050

5151
The following list shows the primary CE router configuration for ExpressRoute private peering connectivity. (Cisco ASR1000 routers are used as CE routers in the test setup.) When site-to-site VPN and ExpressRoute circuits are configured in parallel to connect an on-premises network to Azure, Azure prioritizes the ExpressRoute circuit by default. To avoid asymmetrical routing, the on-premises network also should prioritize ExpressRoute connectivity over site-to-site VPN connectivity. The following configuration establishes prioritization by using the BGP **local-preference** attribute:
5252

53-
interface TenGigabitEthernet0/0/0.300
54-
description Customer 30 private peering to Azure
55-
encapsulation dot1Q 30 second-dot1q 300
56-
ip vrf forwarding 30
57-
ip address 192.168.30.17 255.255.255.252
58-
!
59-
interface TenGigabitEthernet1/0/0.30
60-
description Customer 30 to south bound LAN switch
61-
encapsulation dot1Q 30
62-
ip vrf forwarding 30
63-
ip address 192.168.30.0 255.255.255.254
64-
ip ospf network point-to-point
65-
!
66-
router ospf 30 vrf 30
67-
router-id 10.2.30.253
68-
redistribute bgp 65021 subnets route-map BGP2OSPF
69-
network 192.168.30.0 0.0.0.1 area 0.0.0.0
70-
default-information originate always
71-
default-metric 10
72-
!
73-
router bgp 65021
74-
!
75-
address-family ipv4 vrf 30
76-
network 10.2.30.0 mask 255.255.255.128
77-
neighbor 192.168.30.18 remote-as 12076
78-
neighbor 192.168.30.18 activate
79-
neighbor 192.168.30.18 next-hop-self
80-
neighbor 192.168.30.18 soft-reconfiguration inbound
81-
neighbor 192.168.30.18 route-map prefer-ER-over-VPN in
82-
neighbor 192.168.30.18 prefix-list Cust30_to_Private out
83-
exit-address-family
84-
!
85-
route-map prefer-ER-over-VPN permit 10
86-
set local-preference 200
87-
!
88-
ip prefix-list Cust30_to_Private seq 10 permit 10.2.30.0/25
89-
!
53+
interface TenGigabitEthernet0/0/0.300
54+
description Customer 30 private peering to Azure
55+
encapsulation dot1Q 30 second-dot1q 300
56+
ip vrf forwarding 30
57+
ip address 192.168.30.17 255.255.255.252
58+
!
59+
interface TenGigabitEthernet1/0/0.30
60+
description Customer 30 to south bound LAN switch
61+
encapsulation dot1Q 30
62+
ip vrf forwarding 30
63+
ip address 192.168.30.0 255.255.255.254
64+
ip ospf network point-to-point
65+
!
66+
router ospf 30 vrf 30
67+
router-id 10.2.30.253
68+
redistribute bgp 65021 subnets route-map BGP2OSPF
69+
network 192.168.30.0 0.0.0.1 area 0.0.0.0
70+
default-information originate always
71+
default-metric 10
72+
!
73+
router bgp 65021
74+
!
75+
address-family ipv4 vrf 30
76+
network 10.2.30.0 mask 255.255.255.128
77+
neighbor 192.168.30.18 remote-as 12076
78+
neighbor 192.168.30.18 activate
79+
neighbor 192.168.30.18 next-hop-self
80+
neighbor 192.168.30.18 soft-reconfiguration inbound
81+
neighbor 192.168.30.18 route-map prefer-ER-over-VPN in
82+
neighbor 192.168.30.18 prefix-list Cust30_to_Private out
83+
exit-address-family
84+
!
85+
route-map prefer-ER-over-VPN permit 10
86+
set local-preference 200
87+
!
88+
ip prefix-list Cust30_to_Private seq 10 permit 10.2.30.0/25
89+
!
9090

9191
### Site-to-site VPN configuration details
9292

9393
The following list shows the primary CE router configuration for site-to-site VPN connectivity:
9494

95-
crypto ikev2 proposal Cust30-azure-proposal
96-
encryption aes-cbc-256 aes-cbc-128 3des
97-
integrity sha1
98-
group 2
99-
!
100-
crypto ikev2 policy Cust30-azure-policy
101-
match address local 66.198.12.106
102-
proposal Cust30-azure-proposal
103-
!
104-
crypto ikev2 keyring Cust30-azure-keyring
105-
peer azure
106-
address 52.168.162.84
107-
pre-shared-key local IamSecure123
108-
pre-shared-key remote IamSecure123
109-
!
110-
crypto ikev2 profile Cust30-azure-profile
111-
match identity remote address 52.168.162.84 255.255.255.255
112-
identity local address 66.198.12.106
113-
authentication local pre-share
114-
authentication remote pre-share
115-
keyring local Cust30-azure-keyring
116-
!
117-
crypto ipsec transform-set Cust30-azure-ipsec-proposal-set esp-aes 256 esp-sha-hmac
118-
mode tunnel
119-
!
120-
crypto ipsec profile Cust30-azure-ipsec-profile
121-
set transform-set Cust30-azure-ipsec-proposal-set
122-
set ikev2-profile Cust30-azure-profile
123-
!
124-
interface Loopback30
125-
ip address 66.198.12.106 255.255.255.255
126-
!
127-
interface Tunnel30
128-
ip vrf forwarding 30
129-
ip address 10.2.30.125 255.255.255.255
130-
tunnel source Loopback30
131-
tunnel mode ipsec ipv4
132-
tunnel destination 52.168.162.84
133-
tunnel protection ipsec profile Cust30-azure-ipsec-profile
134-
!
135-
router bgp 65021
136-
!
137-
address-family ipv4 vrf 30
138-
network 10.2.30.0 mask 255.255.255.128
139-
neighbor 10.10.30.254 remote-as 65515
140-
neighbor 10.10.30.254 ebgp-multihop 5
141-
neighbor 10.10.30.254 update-source Tunnel30
142-
neighbor 10.10.30.254 activate
143-
neighbor 10.10.30.254 soft-reconfiguration inbound
144-
exit-address-family
145-
!
146-
ip route vrf 30 10.10.30.254 255.255.255.255 Tunnel30
95+
crypto ikev2 proposal Cust30-azure-proposal
96+
encryption aes-cbc-256 aes-cbc-128 3des
97+
integrity sha1
98+
group 2
99+
!
100+
crypto ikev2 policy Cust30-azure-policy
101+
match address local 66.198.12.106
102+
proposal Cust30-azure-proposal
103+
!
104+
crypto ikev2 keyring Cust30-azure-keyring
105+
peer azure
106+
address 52.168.162.84
107+
pre-shared-key local IamSecure123
108+
pre-shared-key remote IamSecure123
109+
!
110+
crypto ikev2 profile Cust30-azure-profile
111+
match identity remote address 52.168.162.84 255.255.255.255
112+
identity local address 66.198.12.106
113+
authentication local pre-share
114+
authentication remote pre-share
115+
keyring local Cust30-azure-keyring
116+
!
117+
crypto ipsec transform-set Cust30-azure-ipsec-proposal-set esp-aes 256 esp-sha-hmac
118+
mode tunnel
119+
!
120+
crypto ipsec profile Cust30-azure-ipsec-profile
121+
set transform-set Cust30-azure-ipsec-proposal-set
122+
set ikev2-profile Cust30-azure-profile
123+
!
124+
interface Loopback30
125+
ip address 66.198.12.106 255.255.255.255
126+
!
127+
interface Tunnel30
128+
ip vrf forwarding 30
129+
ip address 10.2.30.125 255.255.255.255
130+
tunnel source Loopback30
131+
tunnel mode ipsec ipv4
132+
tunnel destination 52.168.162.84
133+
tunnel protection ipsec profile Cust30-azure-ipsec-profile
134+
!
135+
router bgp 65021
136+
!
137+
address-family ipv4 vrf 30
138+
network 10.2.30.0 mask 255.255.255.128
139+
neighbor 10.10.30.254 remote-as 65515
140+
neighbor 10.10.30.254 ebgp-multihop 5
141+
neighbor 10.10.30.254 update-source Tunnel30
142+
neighbor 10.10.30.254 activate
143+
neighbor 10.10.30.254 soft-reconfiguration inbound
144+
exit-address-family
145+
!
146+
ip route vrf 30 10.10.30.254 255.255.255.255 Tunnel30
147147

148148
## On-premises Location 2 connectivity by using ExpressRoute
149149

articles/networking/connectivty-interoperability-control-plane.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Interoperability in Azure back-end connectivity features: Control plane analysis | Microsoft Docs'
2+
title: 'Interoperability in Azure : Control plane analysis'
33
description: This article provides the control plane analysis of the test setup you can use to analyze interoperability between ExpressRoute, a site-to-site VPN, and virtual network peering in Azure.
44
documentationcenter: na
55
services: networking
@@ -14,7 +14,7 @@ ms.author: rambala
1414

1515
---
1616

17-
# Interoperability in Azure back-end connectivity features: Control plane analysis
17+
# Interoperability in Azure : Control plane analysis
1818

1919
This article describes the control plane analysis of the [test setup][Setup]. You can also review the [test setup configuration][Configuration] and the [data plane analysis][Data-Analysis] of the test setup.
2020

@@ -26,7 +26,7 @@ The following figure illustrates the network from the perspective of a hub virtu
2626

2727
![1][1]
2828

29-
The ASN of the VNet's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise Edge Routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the VNets ExpressRoute gateway ASN for the VNets prefixes.
29+
The ASN of the VNet's Azure ExpressRoute gateway is different from the ASN of Microsoft Enterprise Edge Routers (MSEEs). An ExpressRoute gateway uses a private ASN (a value of **65515**) and MSEEs use public ASN (a value of **12076**) globally. When you configure ExpressRoute peering, because MSEE is the peer, you use **12076** as the peer ASN. On the Azure side, MSEE establishes eBGP peering with the ExpressRoute gateway. The dual eBGP peering that the MSEE establishes for each ExpressRoute peering is transparent at the control plane level. Therefore, when you view an ExpressRoute route table, you see the VNet's ExpressRoute gateway ASN for the VNet's prefixes.
3030

3131
The following figure shows a sample ExpressRoute route table:
3232

@@ -42,7 +42,7 @@ Both on-premises Location 1 and the remote VNet are connected to the hub VNet vi
4242

4343
## On-premises Location 1 and the branch VNet perspective via a site-to-site VPN
4444

45-
Both on-premises Location 1 and the branch VNet are connected to a hub VNets VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram:
45+
Both on-premises Location 1 and the branch VNet are connected to a hub VNet's VPN gateway via a site-to-site VPN connection. They share the same perspective of the topology, as shown in the following diagram:
4646

4747
![3][3]
4848

0 commit comments

Comments
 (0)