Site-to-Site VPN connections over ExpressRoute private peering - Azure VPN Gateway (2024)

  • Article

You can configure a Site-to-Site VPN to a virtual network gateway over an ExpressRoute private peering using an RFC 1918 IP address. This configuration provides the following benefits:

  • Traffic over private peering is encrypted.

  • Point-to-site users connecting to a virtual network gateway can use ExpressRoute (via the Site-to-Site tunnel) to access on-premises resources.

  • It's possible to deploy Site-to-Site VPN connections over ExpressRoute private peering at the same time as Site-to-Site VPN connections via the Internet on the same VPN gateway.

This feature is only available for standard-IP based gateways.

Prerequisites

To complete this configuration, verify that you meet the following prerequisites:

  • You have a functioning ExpressRoute circuit that is linked to the virtual network where the VPN gateway is (or will be) created.

  • You can reach resources over RFC1918 (private) IP in the virtual network over the ExpressRoute circuit.

Routing

Figure 1 shows an example of VPN connectivity over ExpressRoute private peering. In this example, you see a network within the on-premises network that is connected to the Azure hub VPN gateway over ExpressRoute private peering. An important aspect of this configuration is the routing between the on-premises networks and Azure over both the ExpressRoute and VPN paths.

Figure 1

Site-to-Site VPN connections over ExpressRoute private peering - Azure VPN Gateway (1)

Establishing connectivity is straightforward:

  1. Establish ExpressRoute connectivity with an ExpressRoute circuit and private peering.

  2. Establish the VPN connectivity using the steps in this article.

Traffic from on-premises networks to Azure

For traffic from on-premises networks to Azure, the Azure prefixes are advertised via both the ExpressRoute private peering BGP, and the VPN BGP if BGP is configured on your VPN gateway. The result is two network routes (paths) toward Azure from the on-premises networks:

• One network route over the IPsec-protected path.

• One network route directly over ExpressRoute without IPsec protection.

To apply encryption to the communication, you must make sure that for the VPN-connected network in Figure 1, Azure routes via the on-premises VPN gateway are preferred over the direct ExpressRoute path.

Traffic from Azure to on-premises networks

The same requirement applies to the traffic from Azure to on-premises networks. To ensure that the IPsec path is preferred over the direct ExpressRoute path (without IPsec), you have two options:

Advertise more specific prefixes on the VPN BGP session for the VPN-connected network. You can advertise a larger range that encompasses the VPN-connected network over ExpressRoute private peering, then more specific ranges in the VPN BGP session. For example, advertise 10.0.0.0/16 over ExpressRoute, and 10.0.1.0/24 over VPN.

Advertise disjoint prefixes for VPN and ExpressRoute. If the VPN-connected network ranges are disjoint from other ExpressRoute connected networks, you can advertise the prefixes in the VPN and ExpressRoute BGP sessions respectively. For example, advertise 10.0.0.0/24 over ExpressRoute, and 10.0.1.0/24 over VPN.

In both of these examples, Azure will send traffic to 10.0.1.0/24 over the VPN connection rather than directly over ExpressRoute without VPN protection.

Warning

If you advertise the same prefixes over both ExpressRoute and VPN connections, Azure will use the ExpressRoute path directly without VPN protection.

Portal steps

  1. Configure a Site-to-Site connection. For steps, see the Site-to-site configuration article. Be sure to pick a gateway with a Standard Public IP.

  2. Enable Private IPs on the gateway. Select Configuration, then set Gateway Private IPs to Enabled. Select Save to save your changes.

  3. On the Overview page, select See More to view the private IP address. Write down this information to use later in the configuration steps. If you have an active-active mode VPN gateway, you'll see two private IP addresses.

  4. To enable Use Azure Private IP Address on the connection, go to the Configuration page. Set Use Azure Private IP Address to Enabled, then select Save.

  5. Use the private IP address that you wrote down in step 3 as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.

    Note

    Configuring BGP on your VPN gateway is not required to achieve a VPN connection over ExpressRoute private peering.

PowerShell steps

  1. Configure a Site-to-Site connection. For steps, see the Configure a Site-to-Site VPN article. Be sure to pick a gateway with a Standard Public IP.

  2. Set the flag to use the private IP on the gateway using the following PowerShell commands:

    $Gateway = Get-AzVirtualNetworkGateway -Name <name of gateway> -ResourceGroup <name of resource group>Set-AzVirtualNetworkGateway -VirtualNetworkGateway $Gateway -EnablePrivateIpAddress $true

    You should see a public and a private IP address. Write down the IP address under the “TunnelIpAddresses” section of the output. You'll use this information in a later step.

  3. Set the connection to use the private IP address by using the following PowerShell command:

    $Connection = get-AzVirtualNetworkGatewayConnection -Name <name of the connection> -ResourceGroupName <name of resource group>Set-AzVirtualNetworkGatewayConnection --VirtualNetworkGatewayConnection $Connection -UseLocalAzureIpAddress $true
  4. From your firewall, ping the private IP that you wrote down in step 2. It should be reachable over the ExpressRoute private peering.

  5. Use this private IP as the remote IP on your on-premises firewall to establish the Site-to-Site tunnel over the ExpressRoute private peering.

Next steps

For more information about VPN Gateway, see What is VPN Gateway?

Site-to-Site VPN connections over ExpressRoute private peering - Azure VPN Gateway (2024)

FAQs

What is the difference between ExpressRoute and site-to-site VPN Azure? ›

Ans.) Azure ExpressRoute establishes a dedicated, private connection between your on-premises infrastructure and Azure, whereas Azure VPN Gateway establishes a virtual private network (VPN) between your on-premises infrastructure and Azure using a public internet connection.

When deploying both an ExpressRoute and a site-to-site Virtual Private Network VPN for backup what type of gateway s must you deploy? ›

You must use a route-based VPN gateway. You also can use a route-based VPN gateway with a VPN connection configured for 'policy-based traffic selectors' as described in Connect to multiple policy-based VPN devices.

What is Azure ExpressRoute private peering? ›

Azure private peering

You can set up bi-directional connectivity between your core network and Azure virtual networks (VNets). This peering lets you connect to virtual machines and cloud services directly on their private IP addresses. You can connect more than one virtual network to the private peering domain.

What is the difference between VPN gateway and site-to-site? ›

A site-to-site (S2S) VPN gateway connection is a connection over IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. Site-to-site connections can be used for cross-premises and hybrid configurations. A site-to-site connection requires a VPN device located on-premises that has a public IP address assigned to it.

What are the two connections for Azure ExpressRoute? ›

Each ExpressRoute circuit consists of two connections to two Microsoft Enterprise edge routers (MSEEs) at an ExpressRoute Location from the connectivity provider or your network edge. Microsoft requires dual BGP connections from the connectivity provider or your network edge – one to each MSEE.

Does ExpressRoute require a VPN gateway? ›

Site-to-Site, Point-to-Site, and VNet-to-VNet connections all use a VPN gateway. ExpressRoute - To send network traffic on a private connection, you use the gateway type 'ExpressRoute'. This type of gateway is also referred to as an ExpressRoute gateway and is used when configuring ExpressRoute.

Can I deploy two VPN gateways in same virtual network? ›

2 answers. You can only have 1 Virtual Network Gateway per Virtual Network - however, you can peer the virtual networks, to communicate across them with gateway transit, or have multiple S2S VPNs across the same gateway. Depending on your use case - make sure you take a look at Azure Virtual WAN.

Which are the three modes that a site-to-site VPN supports? ›

Main Mode - Used when VPN Sites have permanent/Static public IP address. Aggressive Mode - Used when One Site has permanent/static public IP and the other site has a dynamic/temporary public IP address. Hub and Spoke - Setting up VPNs when two or more remote sites (Spokes) want to connect to central site (Hub).

What is the difference between site-to-site VPN and VPC peering? ›

While a VPN encrypts data sent over the internet, VPC peering uses the Amazon network to send information between VPCs. A quick and easy way to connect VPCs is through VPC peering. The data is sent securely via the AWS network without the need for any specialized hardware or software.

What is the difference between peering and VPN in Azure? ›

VPN and VNet Peering are essential tools for connecting and securing networks in Azure. While VPN provides a secure and encrypted connection ideal for communications over the public internet, VNet Peering offers fast and direct connections between virtual networks within Azure.

What is the best scenario for using Azure ExpressRoute? ›

ExpressRoute provides a fast and reliable connection to Azure with bandwidths up to 100 Gbps, which makes it an excellent and cost-effective option for scenarios like periodic data migration, replication for business continuity, disaster recovery, and other high-availability strategies.

How does private peering work? ›

Private peering is when two networks agree to exchange their traffic directly via a dedicated IP connection. Private peering is often preferred when a massive amount of network traffic needs to be exchanged.

What are the two types of site to site VPN? ›

The two types of VPNs with site-to-site configurations are intranet-based (for connecting remote locations within the same organization) and extranet-based (for connecting with external partners).

What is an example of a VPN gateway? ›

For example, OpenVPN Access Server is a marketplace solution for a VPN gateway. After you activate the appliance, you deploy a host VM for the gateway that allows transit to VMware Engine networks.

What is the difference between a site-to-site VPN and a remote access VPN? ›

A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other.

What is the difference between a site to site VPN and a remote access VPN? ›

A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other.

Why would you use an Azure ExpressRoute? ›

Use Azure ExpressRoute to create private connections between Azure datacenters and infrastructure on premises or in a colocation environment. ExpressRoute connections don't route through the public internet, and they offer more reliability, faster speed, and lower latency than typical internet connections.

What is the difference between VPN tunnel and site to site VPN? ›

Site to site VPN does not need setup on each client. Remote access VPN may or may not needed setup on each client. Site to site VPN does not require every user to initiate the VPN tunnel setup. Remote access VPN require every remote access user to initiate the VPN tunnel setup.

What is the difference between Azure Direct Connect and ExpressRoute? ›

AWS Direct Connect offers flexibility in terms of the number of virtual interfaces and private or public VIFs, while ExpressRoute offers private and Microsoft peering. Quotas and Limits.

Top Articles
What Is a PEM File?
How to Activate Ghost Mode in Coin Master - Hide a Village
Culver's Flavor Of The Day Wilson Nc
Teenbeautyfitness
Mylaheychart Login
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Atrium Shift Select
How to Watch Braves vs. Dodgers: TV Channel & Live Stream - September 15
Encore Atlanta Cheer Competition
Syracuse Jr High Home Page
Hillside Funeral Home Washington Nc Obituaries
Socket Exception Dunkin
Used Drum Kits Ebay
Jellyfin Ps5
Craigslist In Visalia California
Stardew Expanded Wiki
Outlet For The Thames Crossword
Long Island Jobs Craigslist
Kirksey's Mortuary - Birmingham - Alabama - Funeral Homes | Tribute Archive
Boscov's Bus Trips
Lisas Stamp Studio
Pearson Correlation Coefficient
Naval Academy Baseball Roster
All Obituaries | Verkuilen-Van Deurzen Family Funeral Home | Little Chute WI funeral home and cremation
TeamNet | Agilio Software
Ltg Speech Copy Paste
Stockton (California) – Travel guide at Wikivoyage
Jt Closeout World Rushville Indiana
Khatrimmaza
Gideon Nicole Riddley Read Online Free
Great Clips On Alameda
Pillowtalk Podcast Interview Turns Into 3Some
Evil Dead Rise (2023) | Film, Trailer, Kritik
Craiglist Hollywood
11 Best Hotels in Cologne (Köln), Germany in 2024 - My Germany Vacation
Kb Home The Overlook At Medio Creek
Academic Notice and Subject to Dismissal
White County
Mauston O'reilly's
9:00 A.m. Cdt
Caphras Calculator
Jimmy John's Near Me Open
Lightfoot 247
Runescape Death Guard
How to Do a Photoshoot in BitLife - Playbite
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
Pulpo Yonke Houston Tx
Duffield Regional Jail Mugshots 2023
Www.card-Data.com/Comerica Prepaid Balance
Heisenberg Breaking Bad Wiki
Emmi-Sellers
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 6616

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.