Skip to content

Commit d3b5940

Browse files
authored
Merge pull request #206456 from cherylmc/multiauth
update screenshots
2 parents 1e38049 + 8599b2f commit d3b5940

File tree

6 files changed

+10
-12
lines changed

6 files changed

+10
-12
lines changed

articles/vpn-gateway/howto-point-to-site-multi-auth.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ author: cherylmc
77

88
ms.service: vpn-gateway
99
ms.topic: how-to
10-
ms.date: 07/21/2021
10+
ms.date: 07/29/2022
1111
ms.author: cherylmc
1212

1313
---
14-
# Configure a Point-to-Site VPN connection to a VNet using multiple authentication types: Azure portal
14+
# Configure a point-to-site VPN connection to a VNet using multiple authentication types: Azure portal
1515

16-
This article helps you securely connect individual clients running Windows, Linux, or macOS to an Azure VNet. Point-to-Site VPN connections are useful when you want to connect to your VNet from a remote location, such when you are telecommuting from home or a conference. You can also use P2S instead of a Site-to-Site VPN when you have only a few clients that need to connect to a VNet. Point-to-Site connections do not require a VPN device or a public-facing IP address. P2S creates the VPN connection over either SSTP (Secure Socket Tunneling Protocol), or IKEv2. For more information about Point-to-Site VPN, see [About Point-to-Site VPN](point-to-site-about.md).
16+
This article helps you securely connect individual clients running Windows, Linux, or macOS to an Azure VNet. point-to-site VPN connections are useful when you want to connect to your VNet from a remote location, such when you are telecommuting from home or a conference. You can also use P2S instead of a Site-to-Site VPN when you have only a few clients that need to connect to a VNet. Point-to-site connections do not require a VPN device or a public-facing IP address. P2S creates the VPN connection over either SSTP (Secure Socket Tunneling Protocol), or IKEv2. For more information about point-to-site VPN, see [About point-to-site VPN](point-to-site-about.md).
1717

1818
:::image type="content" source="./media/vpn-gateway-howto-point-to-site-resource-manager-portal/point-to-site-diagram.png" alt-text="Connect from a computer to an Azure VNet - point-to-site connection diagram":::
1919

@@ -43,15 +43,15 @@ You can use the following values to create a test environment, or refer to these
4343
* **VPN type:** Route-based
4444
* **Public IP address name:** VNet1GWpip
4545
* **Connection type:** Point-to-site
46-
* **Client address pool:** 172.16.201.0/24<br>VPN clients that connect to the VNet using this Point-to-Site connection receive an IP address from the client address pool.
46+
* **Client address pool:** 172.16.201.0/24<br>VPN clients that connect to the VNet using this point-to-site connection receive an IP address from the client address pool.
4747

4848
## <a name="createvnet"></a>Create a virtual network
4949

5050
Before beginning, verify that you have an Azure subscription. If you don't already have an Azure subscription, you can activate your [MSDN subscriber benefits](https://azure.microsoft.com/pricing/member-offers/msdn-benefits-details) or sign up for a [free account](https://azure.microsoft.com/pricing/free-trial).
5151

5252
[!INCLUDE [About cross-premises addresses](../../includes/vpn-gateway-cross-premises.md)]
5353

54-
[!INCLUDE [Basic Point-to-Site VNet](../../includes/vpn-gateway-basic-vnet-rm-portal-include.md)]
54+
[!INCLUDE [Basic point-to-site VNet](../../includes/vpn-gateway-basic-vnet-rm-portal-include.md)]
5555

5656
## <a name="creategw"></a>Virtual network gateway
5757

@@ -72,22 +72,22 @@ You can see the deployment status on the Overview page for your gateway. A gatew
7272

7373
## <a name="addresspool"></a>Client address pool
7474

75-
The client address pool is a range of private IP addresses that you specify. The clients that connect over a Point-to-Site VPN dynamically receive an IP address from this range. Use a private IP address range that does not overlap with the on-premises location that you connect from, or the VNet that you want to connect to. If you configure multiple protocols and SSTP is one of the protocols, then the configured address pool is split between the configured protocols equally.
75+
The client address pool is a range of private IP addresses that you specify. The clients that connect over a point-to-site VPN dynamically receive an IP address from this range. Use a private IP address range that does not overlap with the on-premises location that you connect from, or the VNet that you want to connect to. If you configure multiple protocols and SSTP is one of the protocols, then the configured address pool is split between the configured protocols equally.
7676

7777
1. Once the virtual network gateway has been created, navigate to the **Settings** section of the virtual network gateway page. In **Settings**, select **Point-to-site configuration**. Select **Configure now** to open the configuration page.
7878

7979
:::image type="content" source="./media/vpn-gateway-howto-point-to-site-resource-manager-portal/configure-now.png" alt-text="Screenshot of point-to-site configuration page." lightbox="./media/vpn-gateway-howto-point-to-site-resource-manager-portal/configure-now.png":::
8080
1. On the **Point-to-site configuration** page, you can configure a variety of settings. In the **Address pool** box, add the private IP address range that you want to use. VPN clients dynamically receive an IP address from the range that you specify. The minimum subnet mask is 29 bit for active/passive and 28 bit for active/active configuration.
8181

82-
:::image type="content" source="./media/howto-point-to-site-multi-auth/address.jpg" alt-text="Screenshot of address pool.":::
82+
:::image type="content" source="./media/howto-point-to-site-multi-auth/address-pool.png" alt-text="Screenshot of client address pool.":::
8383

8484
1. Continue to the next section to configure authentication and tunnel types.
8585

8686
## <a name="type"></a>Authentication and tunnel types
8787

8888
In this section, you configure authentication type and tunnel type. On the **Point-to-site configuration** page, if you don't see **Tunnel type** or **Authentication type**, your gateway is using the Basic SKU. The Basic SKU does not support IKEv2 or RADIUS authentication. If you want to use these settings, you need to delete and recreate the gateway using a different gateway SKU.
8989

90-
:::image type="content" source="./media/howto-point-to-site-multi-auth/multiauth.jpg" alt-text="Screenshot of authentication type.":::
90+
:::image type="content" source="./media/howto-point-to-site-multi-auth/authentication-types.png" alt-text="Screenshot of authentication types and tunnel type.":::
9191

9292
### <a name="tunneltype"></a>Tunnel type
9393

@@ -117,11 +117,9 @@ For instructions to generate and install VPN client configuration files, use the
117117

118118
[!INCLUDE [All client articles](../../includes/vpn-gateway-vpn-client-install-articles.md)]
119119

120-
## <a name="faq"></a>Point-to-Site FAQ
120+
## <a name="faq"></a>Point-to-site FAQ
121121

122-
This section contains FAQ information that pertains to Point-to-Site configurations. You can also view the [VPN Gateway FAQ](vpn-gateway-vpn-faq.md) for additional information about VPN Gateway.
123-
124-
[!INCLUDE [Point-to-Site FAQ](../../includes/vpn-gateway-faq-p2s-azurecert-include.md)]
122+
For point-to-site FAQ information, see the point-to-site sections of the [VPN Gateway FAQ](vpn-gateway-vpn-faq.md#P2S).
125123

126124
## Next steps
127125

95.2 KB
Loading
Binary file not shown.
245 KB
Loading
Binary file not shown.
65.1 KB
Loading

0 commit comments

Comments
 (0)