You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/virtual-wan-configure-automation-providers.md
+24-15Lines changed: 24 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: cherylmc
6
6
7
7
ms.service: virtual-wan
8
8
ms.topic: conceptual
9
-
ms.date: 09/30/2019
9
+
ms.date: 10/03/2019
10
10
ms.author: cherylmc
11
11
#Customer intent: As a Virtual WAN software-defined connectivity provider, I want to set up a provisioning environment.
12
12
---
@@ -20,15 +20,24 @@ A branch device (a customer on-premises VPN device or SDWAN CPE) typically uses
20
20
## <aname ="before"></a>Before you begin automating
21
21
22
22
* Verify that your device supports IPsec IKEv1/IKEv2. See [default policies](#default).
23
-
*See the [REST APIs](https://docs.microsoft.com/rest/api/azure/) that you will use to automate connectivity to Azure Virtual WAN.
23
+
*View the [REST APIs](#additional) that you use to automate connectivity to Azure Virtual WAN.
24
24
* Test out the portal experience of Azure Virtual WAN.
25
25
* Then, decide which part of the connectivity steps you would like to automate. At a minimum, we recommend automating:
26
26
27
27
* Access Control
28
28
* Upload of branch device information into Azure Virtual WAN
29
29
* Downloading Azure configuration and setting up connectivity from branch device into Azure Virtual WAN
30
30
31
-
* Understand the expected customer experience in conjunction with Azure Virtual WAN.
31
+
### <aname ="additional"></a>Additional information
32
+
33
+
*[REST API](https://docs.microsoft.com/rest/api/virtualwan/virtualhubs) to automate Virtual Hub creation
34
+
*[REST API](https://docs.microsoft.com/rest/api/virtualwan/vpngateways) to automate Azure VPN gateway for Virtual WAN
35
+
*[REST API](https://docs.microsoft.com/rest/api/virtualwan/vpnconnections) to connect a VPNSite to an Azure VPN Hub
36
+
*[Default IPsec policies](#default)
37
+
38
+
## <aname ="ae"></a>Customer experience
39
+
40
+
Understand the expected customer experience in conjunction with Azure Virtual WAN.
32
41
33
42
1. Typically, a virtual WAN user will start the process by creating a Virtual WAN resource.
34
43
2. The user will set up a service principal-based resource group access for the on-premises system (your branch controller or VPN device provisioning software) to write branch info into Azure Virtual WAN.
@@ -38,8 +47,7 @@ A branch device (a customer on-premises VPN device or SDWAN CPE) typically uses
38
47
6. At the end of this step in your solution, the user will have a seamless site-to-site connection between the branch device and virtual hub. You can also set up additional connections across other hubs. Each connection is an active-active tunnel. Your customer may choose to use a different ISP for each of the links for the tunnel.
39
48
7. Consider providing troubleshooting and monitoring capabilities in the CPE management interface. Typical scenarios include "Customer not able to access Azure resources due to a CPE issue", "Show IPsec parameters at the CPE side" etc.
@@ -52,19 +60,18 @@ Customers must be able to set up appropriate access control for Virtual WAN in t
52
60
53
61
### <aname="branch"></a>Upload branch device information
54
62
55
-
Design the user-experience to upload branch (on-premises site) information to Azure. [REST APIs](https://docs.microsoft.com/rest/api/virtualwan/vpnsites) for VPNSite can be used to create the site information in Virtual WAN. You can provide all branch SDWAN/VPN devices or select device customizations as appropriate.
56
-
63
+
You should design the user experience to upload branch (on-premises site) information to Azure. You can use [REST APIs](https://docs.microsoft.com/rest/api/virtualwan/vpnsites) for VPNSite to create the site information in Virtual WAN. You can provide all branch SDWAN/VPN devices or select device customizations as appropriate.
57
64
58
65
### <aname="device"></a>Device configuration download and connectivity
59
66
60
-
This step involves downloading Azure configuration and setting up connectivity from the branch device into Azure Virtual WAN. In this step, a customer that is not using a provider would manually download the Azure configuration and apply it to their on-premises SDWAN/VPN device. As a provider, you should automate this step. The device controller can call 'GetVpnConfiguration' REST API to download the Azure configuration, which will typically look similar to the following file.
67
+
This step involves downloading Azure configuration and setting up connectivity from the branch device into Azure Virtual WAN. In this step, a customer that is not using a provider would manually download the Azure configuration and apply it to their on-premises SDWAN/VPN device. As a provider, you should automate this step. View the download [REST APIs](https://docs.microsoft.com/rest/api/virtualwan/vpnsitesconfiguration/download) for additional information. The device controller can call 'GetVpnConfiguration' REST API to download the Azure configuration.
61
68
62
69
**Configuration notes**
63
70
64
71
* If Azure VNets are attached to the virtual hub, they will appear as ConnectedSubnets.
65
72
* VPN connectivity uses route-based configuration and supports both IKEv1, and IKEv2 protocols.
The device configuration file contains the settings to use when configuring your on-premises VPN device. When you view this file, notice the following information:
70
77
@@ -89,7 +96,7 @@ The device configuration file contains the settings to use when configuring your
89
96
```
90
97
* **Vpngateway connection configuration details** such as BGP, pre-shared key etc. The PSK is the pre-shared key that is automatically generated for you. You can always edit the connection in the Overview page for a custom PSK.
91
98
92
-
#### Example device configuration file
99
+
**Example device configuration file**
93
100
94
101
```
95
102
{
@@ -194,11 +201,7 @@ The device configuration file contains the settings to use when configuring your
194
201
}
195
202
```
196
203
197
-
## <a name="default"></a>Default policies for IPsec connectivity
### Does everything need to match between the virtual hub vpngateway policy and my on-premises SDWAN/VPN device or SD-WAN configuration?
204
+
## <a name="default"></a>Connectivity details
202
205
203
206
Your on-premises SDWAN/VPN device or SD-WAN configuration must match or contain the following algorithms and parameters, which you specify in the Azure IPsec/IKE policy.
204
207
@@ -209,6 +212,12 @@ Your on-premises SDWAN/VPN device or SD-WAN configuration must match or contain
209
212
* IPsec integrity algorithm
210
213
* PFS Group
211
214
215
+
### <a name="default"></a>Default policies for IPsec connectivity
216
+
217
+
When working with Default policies, Azure can act as both initiator and responder during an IPsec tunnel setup. There is no support for Azure as a responder only.
0 commit comments