Skip to content

Commit c979a67

Browse files
committed
update screenshots
1 parent ab6ea19 commit c979a67

File tree

3 files changed

+7
-9
lines changed

3 files changed

+7
-9
lines changed
-1.86 KB
Loading
Binary file not shown.

articles/vpn-gateway/site-to-site-vpn-private-peering.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure site-to-site VPN connections over ExpressRou
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 07/28/2023
8+
ms.date: 08/22/2024
99
ms.author: cherylmc
1010

1111
---
@@ -63,15 +63,12 @@ The same requirement applies to the traffic from Azure to on-premises networks.
6363

6464
In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN connection rather than directly over ExpressRoute without VPN protection.
6565

66-
>[!Warning]
67-
>If you advertise the same prefixes over both ExpressRoute and VPN connections, >Azure will use the ExpressRoute path directly without VPN protection.
68-
>
66+
> [!WARNING]
67+
> If you advertise the same prefixes over both ExpressRoute and VPN connections, >Azure will use the ExpressRoute path directly without VPN protection.
6968
7069
## <a name="portal"></a>Portal steps
7170

72-
1. Configure a Site-to-Site connection. For steps, see the [Site-to-site configuration](./tutorial-site-to-site-portal.md) article. Be sure to pick a gateway with a Standard Public IP.
73-
74-
:::image type="content" source="media/site-to-site-vpn-private-peering/gateway.png" alt-text="Gateway Private IPs":::
71+
1. Configure a Site-to-Site connection. For steps, see the [Site-to-site configuration](./tutorial-site-to-site-portal.md) article. Be sure to pick a gateway with a Standard Public IP.
7572
1. Enable Private IPs on the gateway. Select **Configuration**, then set **Gateway Private IPs** to **Enabled**. Select **Save** to save your changes.
7673
1. On the **Overview** page, select **See More** to view the private IP address. Write down this information to use later in the configuration steps.
7774

@@ -81,9 +78,8 @@ In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN c
8178
:::image type="content" source="media/site-to-site-vpn-private-peering/connection.png" alt-text="Gateway Private IPs - Enabled":::
8279
1. Use the private IP that you wrote down in step 3 as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.
8380

84-
>[!NOTE]
81+
> [!NOTE]
8582
> Configurig BGP on your VPN Gateway is not required to achieve a VPN connection over ExpressRoute private peering.
86-
>
8783
8884
## <a name="powershell"></a>PowerShell steps
8985

@@ -97,13 +93,15 @@ In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN c
9793
```
9894

9995
You should see a public and a private IP address. Write down the IP address under the “TunnelIpAddresses” section of the output. You'll use this information in a later step.
96+
10097
1. Set the connection to use the private IP address by using the following PowerShell command:
10198

10299
```azurepowershell-interactive
103100
$Connection = get-AzVirtualNetworkGatewayConnection -Name <name of the connection> -ResourceGroupName <name of resource group>
104101
105102
Set-AzVirtualNetworkGatewayConnection --VirtualNetworkGatewayConnection $Connection -UseLocalAzureIpAddress $true
106103
```
104+
107105
1. From your firewall, ping the private IP that you wrote down in step 2. It should be reachable over the ExpressRoute private peering.
108106
1. Use this private IP as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.
109107

0 commit comments

Comments
 (0)