Skip to content

Commit bda8ada

Browse files
committed
Update for GA, still need to update links
1 parent 13e794e commit bda8ada

File tree

1 file changed

+29
-27
lines changed

1 file changed

+29
-27
lines changed

articles/vpn-gateway/site-to-site-high-bandwidth-tunnel.md

Lines changed: 29 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -3,27 +3,34 @@ title: 'Site-to-Site High Bandwidth tunnels in the Azure portal'
33
description: In this article, you learn how to create a VPN Gateway site-to-site IPsec with High Bandwidth tunnels to establish connection between your on-premises network and a virtual network through the ExpressRoute private peering.
44
titleSuffix: Azure VPN Gateway
55
author: fabferri
6-
ms.author: fabferri
6+
ms.author: jonor
77
ms.service: azure-vpn-gateway
88
ms.topic: tutorial
9-
ms.date: 06/02/2025
9+
ms.date: 07/14/2025
1010

1111
#customer intent: As a network engineer, I want to create a site-to-site VPN connection between my on-premises location and my Azure virtual network with High Bandwidth tunnels with transit through ExpressRoute private peering.
1212
---
1313

14-
# Create a Site-to-Site High Bandwidth tunnels in the Azure portal (Preview)
15-
The Azure VPN Gateway High Bandwidth tunnels introduce significant improvements, enabling high-performance IPsec connections between the on-premises network and the Azure VNet. These High Bandwidth tunnels are established between a VPN device on-premises and the Azure VPN Gateway deployed in the Azure VNet, transiting through an ExpressRoute private peering. Utilizing private IP address networks on-premises, these tunnels create a secure overlay network between the on-premises infrastructure and the Azure VNet.
14+
# Create a Site-to-Site High Bandwidth tunnels in the Azure portal
15+
The Azure VPN Gateway High Bandwidth tunnels feature, a part of the Advanaced Connectivity set of features, introduces significant improvements in tunnel throughput, enabling high-performance IPsec connections between the on-premises network and the Azure VNet. These High Bandwidth tunnels are established between a VPN device on-premises and the Azure VPN Gateway deployed in the Azure VNet, transiting through an ExpressRoute private peering. Utilizing private IP address networks on-premises, these tunnels create a secure overlay network between the on-premises infrastructure and the Azure VNet.
1616

17-
The High Bandwidth tunnels meet customer security compliance requirements by providing end-to-end encryption, effectively overcoming encryption bottlenecks. It allows for the establishment of four tunnels between the Azure VPN Gateway and the on-premises VPN device. The High Bandwidth tunnels allow to create two Connections with two IPsec tunnels for each Connection. Each IPsec tunnel can deliver a throughput of 5Gbps, achieving a total encrypted aggregate throughput of 20Gbps. The network diagram clarifies the configuration:
17+
The High Bandwidth tunnels meet customer security compliance requirements by providing end-to-end encryption, effectively overcoming encryption bottlenecks. It allows for the establishment of four tunnels between the Azure VPN Gateway and the on-premises VPN device. The High Bandwidth tunnels allows the creation of two Connections with two IPsec tunnels for each Connection. Each IPsec tunnel can deliver a throughput of 5Gbps, achieving a total encrypted aggregate throughput of 20Gbps. The network diagram clarifies the configuration:
1818

1919
![1]
2020

2121
## Prerequisites
22-
To deploy the site-to-site High Bandwidth tunnels, your Azure subscription needs to be enabled. To enable this feature, please send an email to [email address]. <br>
23-
The VPN High Bandwidth tunnels require the presence of FastPath in ExpressRoute Connection. Currently FastPath is supported only in ExpressRoute Direct Port Pair. Therefore, the ExpressRoute circuit required to be deployed on ExpressRoute Direct port pair for the correct setting of the solution.
22+
The VPN High Bandwidth tunnels require the presence of FastPath in an ExpressRoute Connection. Currently FastPath is supported only in ExpressRoute Direct Port Pair. Therefore, the ExpressRoute circuit required to be deployed on ExpressRoute Direct port pair for the correct setting of the solution.
2423

25-
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a Virtual Network (VNet). In the article the Azure VNet is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26 <br>
24+
This article assumes the presence in the Azure subscription of an ExpressRoute circuit configured on Direct port pair with private peering, along with a Virtual Network (VNet). In the article the Azure VNet is created with address space 10.1.0.0./16 and Gateway subnet 10.1.0.0/26
2625

26+
The full list of required objects are:
27+
- ExpressRoute Direct Port
28+
- ExpressRoute Circuit
29+
- ExpressRoute Virtual Network Gateway
30+
- Connection between the ExpressRoute circuit and the virtual network gateway WITH fastpath enabled.
31+
- VPN Gateway of sku type VpnGw5AZ with Advanaced Connectivity enabled
32+
- VPN Local Network Gateway
33+
- User Defined Route (UDR) to push ER traffic to the VPN Gateway
2734

2835
## <a name="VNetGateway"></a>Create an ExpressRoute Gateway
2936
The ExpressRoute Gateway can be only deployed in the GatewaySubnet. The ExpressRoute Gateway needs to be deployed with one of the following SKUs:
@@ -59,17 +66,16 @@ Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connecti
5966
At this stage of deployment, the Azure VNet is connected to the on-premises networks, and ExpressRoute is properly configured to support High Bandwidth tunnels.
6067

6168
## <a name="on-premises network"></a>Advertisement of the on-premises network to the ExpressRoute circuit
62-
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN device must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers.
63-
The customer has two configuration options:
64-
- Advertise to the MSEE routers a major on-premises private network that includes the IPs of the VPN devices. In this case, to ensure traffic from Azure to on-premises flows through the VPN Gateway, a User Defined Route (UDR) must be configured in the Azure subnets with next-hop the Virtual Network Gateway. Without a UDR, Azure traffic will bypass the VPN Gateway and traverse the ExpressRoute circuit directly not encrypted, but not through the intended VPN path.
65-
- Advertise to the MSEE routers only the on-premises VPN device IPs. The edge routers advertise only the specific private IPs assigned to the on-premises VPN device. This ensures that all traffic between Azure and on-premises is routed through the site-to-site VPN tunnel. In this case, the UDRs in the Azure subnets are not required.
69+
IPsec tunnels are established via transit through ExpressRoute private peering. To enable these tunnels, the private IP addresses of the on-premises VPN devices must be advertised from the customer’s edge routers to the Microsoft Enterprise Edge (MSEE) routers. If other on-prem networks are advertised to ExpressRoute, this runs the risk of "leaking" these routes to the VNet which could bypass the VPN Gateway and traffic could go directly to the ExpressRoute gateway, bypassing encryption. So it's important to only advertise the VPN Device tunnel IPs over ExpressRoute.
6670

71+
The routes between the VPN Device and the VPN Gateway should contain the detailed on-prem networks, this can be via static routes or BGP, but keep your on-prem networks in this routeing "channel" to ensure Azure traffic to on-prem is encrypted before entering the ExpressRoute data path (insdide the VPN tunnel).
6772

73+
If you do add routes to ExpressRoute that you wish to encrypt, a UDR will be needed on the VNets pointing to the VPN Gateway as the next hop to ensure that traffic is put into the encrypted tunnel before transiting ExpressRoute.
6874

69-
## <a name="VNetGateway"></a>Create a VPN gateway High Bandwidth tunnel (preview)
75+
## <a name="VNetGateway"></a>Create a VPN gateway High Bandwidth tunnel
7076
In this step, you create a virtual network gateway (VPN gateway) High Bandwidth tunnels for your virtual network. The High Bandwidth tunnel is supported only on VpnGw5AZ SKU.
71-
To create a High Bandwidth VPN Gateway via the Azure portal, use the following link: https://aka.ms/highBandwidthVpnGateway <br>
72-
Once in the Azure portal:
77+
78+
In the Azure portal:
7379
1. Search for "Virtual network gateway" in the top search bar.
7480
1. Select Create and configure the VPN gateway using the specified values for High Bandwidth setup.
7581

@@ -106,7 +112,7 @@ In a High Bandwidth VPN Gateway setup, traffic is routed through the private IP
106112

107113
The local network gateway is an Azure resource that represents your on-premises site for routing purposes. You assign it a name for Azure to reference, specify the IP address of your on-premises VPN device, and define the IP address prefixes that should be routed through the VPN gateway to that device. These prefixes correspond to your on-premises network.
108114

109-
If your VPN device has two IP addresses you want to connect to, you must create a separate local network gateway for each one. <br>
115+
If your VPN device has two IP addresses you want to connect to, you must create a separate local network gateway for each one.
110116
You can create the Local Network Gateways only when you know the IP addresses assigned to the outbound interfaces of the on-premises VPN device.
111117

112118
![6]
@@ -133,20 +139,20 @@ After the deployment of the two Local Network Gateways you are ready to proceed
133139

134140
## <a name="CreateConnection"></a>Create VPN Connections
135141
The VPN High Bandwidth Gateway supports a maximum of two VPN Connections.
136-
A single VPN Connection can establish two tunnels with your on-premises VPN device. <br>
142+
A single VPN Connection can establish two tunnels with your on-premises VPN device.
137143
Create two Connections by using the following values:
138144

139145
* **Connection type**: Site-to-site
140146
* **Name**: vpnConn1
141147
* **Virtual network gateway**: vpnHB
142148
* **Local network gateway name**: vpnConn1
143-
* **Shared key**: For this example, you use **abc123**. But you can use whatever is compatible with your VPN hardware. The important thing is that the values match on both sides of the connection.
149+
* **Shared key**: For this example, **abc123** is used as an exampole. But you can use whatever is compatible with your VPN hardware. The important thing is that the values match on both sides of the connection.
144150

145151
* **Connection type**: Site-to-site
146152
* **Name**: vpnConn2
147153
* **Virtual network gateway**: vpnHB
148154
* **Local network gateway name**: vpnConn2
149-
* **Shared Key (PSK)**: For this example, you use **abc123**.
155+
* **Shared Key (PSK)**: **abc123**.
150156

151157
![9]
152158

@@ -169,15 +175,13 @@ In Azure portal select the Azure VPN Gateway and then **Settings** and **Connect
169175

170176
The Connection view displays the tunnel IP addresses associated with the VPN Gateway instance and their corresponding peers—represented by Local Network Gateways. In our High Bandwidth VPN Gateway setup, the tunnel IPs are mapped as follows:
171177

172-
tunnel IP: 10.1.6 peered with Local Network Gateway vpnLocalGw1
173-
tunnel IP: 10.1.8 peered with Local Network Gateway vpnLocalGw1
174-
tunnel IP: 10.1.7 peered with Local Network Gateway vpnLocalGw2
175-
tunnel IP: 10.1.9 peered with Local Network Gateway vpnLocalGw2
178+
* tunnel IP: 10.1.6 peered with Local Network Gateway vpnLocalGw1
179+
* tunnel IP: 10.1.8 peered with Local Network Gateway vpnLocalGw1
180+
* tunnel IP: 10.1.7 peered with Local Network Gateway vpnLocalGw2
181+
* tunnel IP: 10.1.9 peered with Local Network Gateway vpnLocalGw2
176182

177183
This mapping reflects how each tunnel IP is paired with a specific local network gateway to establish site-to-site VPN connections.
178184

179-
180-
181185
## <a name="VPNDevice"></a>Configure your VPN device on-premises
182186
Configuring the on-premises VPN device is the final step. The information gathered up to this point is sufficient to complete the device configuration.
183187

@@ -238,8 +242,6 @@ In each VPN Connection you can define a custom IKEv2 and IPsec policy to match t
238242

239243
[!INCLUDE [Verify the connection](../../includes/vpn-gateway-verify-connection-portal-include.md)]
240244

241-
242-
243245
### <a name="additional"></a>More configuration considerations
244246

245247
You can customize site-to-site configurations in various ways. For more information, see the following articles:

0 commit comments

Comments
 (0)