<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virtual network gateway Archives - Apostolidis Cloud Corner</title>
	<atom:link href="https://www.cloudcorner.gr/tag/virtual-network-gateway/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cloudcorner.gr/tag/virtual-network-gateway/</link>
	<description>Remarks from a Cloud Architect encounters</description>
	<lastBuildDate>Mon, 07 Feb 2022 07:20:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.cloudcorner.gr/wp-content/uploads/2021/04/cropped-cloudcorner2-32x32.png</url>
	<title>virtual network gateway Archives - Apostolidis Cloud Corner</title>
	<link>https://www.cloudcorner.gr/tag/virtual-network-gateway/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Azure Routing Experiences &#124; Scenario 3</title>
		<link>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Sun, 06 Feb 2022 19:26:16 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[dns proxy]]></category>
		<category><![CDATA[peering]]></category>
		<category><![CDATA[private endpoints]]></category>
		<category><![CDATA[route tables]]></category>
		<category><![CDATA[routing]]></category>
		<category><![CDATA[udr]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet]]></category>
		<category><![CDATA[vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://20.113.141.97/?p=3859</guid>

					<description><![CDATA[<p>Designing the network routing, cloud &#38; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/">Azure Routing Experiences | Scenario 3</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Designing the network routing, cloud &amp; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got an idea, to start playing with some common scenarios and make some notes, in order to have it as a reference. I end up with three scenarios. Those scenarios are referring to internal network topology, without public access, and I focus more on the routing aspect, the DNS configuration &amp; inspection through Azure Firewall.</p>



<ul class="wp-block-list"><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838">Scenario 1: Hybrid connectivity with Azure VPN Gateway</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-2/" data-type="post" data-id="3846">Scenario 2: Hybrid connectivity with Azure VPN Gateway &amp; Traffic Inspection with Azure Firewall</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-3/" data-type="post" data-id="3859">Scenario 3: Hybrid Connectivity with Azure VPN Gateway, second level peered networks &amp; full traffic inspection with Azure Firewall</a></li></ul>



<p>At the previews posts, we covered the basics of routing traffic from/to on-premises, inspecting all traffic through Azure Firewall, and configuring the DNS for accessing the Private Endpoints. In this scenario, I am experimenting with connectivity between on-premises, the Hub &amp; Spoke networks and a second level peered network (a network that is peered behind the Spoke network). </p>



<p>Recap of Scenario 1 &amp; 2: We have a Hub network, two Spoke networks and an IPSec VPN connection with my on-premises network. We established routing all traffic through the Azure Firewall for inspection &amp; configured DNS for accessing the Private Endpoint from on-premises &amp; all Azure VNets.</p>



<p>In the third scenario, I am adding a new Spoke VNet, the &#8220;Azure 2&#8221; peered with my hub, and a third VNet, the &#8220;Azure 3&#8221; that is only peered with the &#8220;Azure 2&#8221; VNet. To enable connectivity between the &#8220;Azure 3&#8221; VNet and the rest of the networks, including the on-premises, we need a router at the &#8220;Azure 2&#8221; VNet. This can be an NVA or Azure Firewall. In my case, I added an Azure Firewall. The Azure Firewall of &#8220;Azure 2&#8221; VNet has the private IP: 192.168.200.64.</p>



<ul class="wp-block-list"><li>Azure 3 VNet, VM Subnet Route Table:<ul><li>10.0.0.0/16 NH 192.168.200.68</li><li>192.168.0.0/20 NH 192.168.200.68</li><li>192.168.4.0/24 NH 192.168.200.68</li><li>192.168.5.0/24 NH 192.168.200.68</li><li>192.168.200.0/28 NH 192.168.200.68</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure 2 VNet, AzureFirewallSubnet:<ul><li>10.0.0.0/0 NH Internet</li><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.0.0/20 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure 2 VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.200.68</li><li>192.168.4.0/24 NH 192.168.200.68</li><li>192.168.5.0/24 NH 192.168.200.68</li><li>192.168.0.0/20 NH 192.168.200.68</li><li>10.100.0.0/16 NH 192.168.200.64</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure Hub VNet, AzureFirewallSubet:<ul><li>10.0.0.0/0 NH Internet</li><li>192.168.200.0/28 NH 192.168.200.68</li><li>10.100.0.0/16 NH 192.168.200.68</li></ul></li><li>Azure Hub VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li><li><strong>192.168.4.4/32 NH 192.168.2.4</strong></li><li>192.168.200.0/24 NH 192.168.2.4</li><li>10.100.0.0/16 NH 192.168.2.4</li></ul></li><li>Azure Hub VNet, GatewaySubnet:<ul><li>192.168.0.0/24 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li><li><strong>192.168.4.4/32 NH 192.168.2.4</strong></li><li>192.168.200.0/24 NH 192.168.2.4</li><li>10.100.0.0/16 NH 192.168.2.4</li></ul></li><li>Spoke 2 VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.0.0/24 NH 192.168.2.4</li><li>192.168.200.0/24 NH 192.168.2.4</li></ul></li></ul>



<h2 class="wp-block-heading" id="routing-example">Routing Example</h2>



<p>Let&#8217;s describe a packet&#8217;s journey. The On-premises Server X (10.0.2.10) makes sends a packet to 10.100.0.4. 1st hop the packet goes to the default gateway, reaching the on-premises VPN device, in our case the RRAS. The RRAS has a custom route for 10.100.0.0/16 and forwards the packet to the VPN interface. The packet reaches the Azure VPN Gateway The Azure VPN Gateway has a custom route for 10.100.0.0/16 and forwards the packet to the HUB Azure Firewall, 192.168.2.4. The HUB Azure Firewall has a custom route for 10.100.0.0/16 and forwards the packet to the &#8220;Azure 2&#8221; Azure Firewall, 192.168.200.68. The &#8220;Azure 2&#8221; Azure Firewall does not have a custom route, but it has a route for 10.100.0.0/16 that is automatically populated by the VNet peering. The Azure FIrewall knows to forward the packet through the VNet peering and reaches the destination.</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/image.png"><img fetchpriority="high" decoding="async" width="1024" height="322" src="/wp-content/uploads/2022/02/image-1024x322.png" alt="" class="wp-image-3879" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-1024x322.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-300x94.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-768x241.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-1536x483.png 1536w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image.png 1654w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can find more commends and tests in the below diagram with the whole solution.</p>



<p>Diagram: (<a rel="noreferrer noopener" href="https://1drv.ms/u/s!AvpafHi49lqjgpstm9ojqEwNV80lKQ?e=60SmlZ" target="_blank">Click here to download a high-resolution SVG image</a>)</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio.png"><img decoding="async" width="1024" height="763" src="/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1024x763.png" alt="" class="wp-image-3860" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1024x763.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-300x224.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-768x572.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1536x1144.png 1536w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio.png 1663w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>References:<br><a href="/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1 – Apostolidis Cloud Corner</a><br><a href="/microsoft/azure-routing-experiences-scenario-2/">Azure Routing Experiences | Scenario 2 – Apostolidis Cloud Corner</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall">Use Azure Firewall to inspect traffic destined to a private endpoint – Azure Private Link | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns">Azure Private Endpoint DNS configuration | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links">What is a virtual network link subresource of Azure DNS private zones | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/firewall/dns-details">Azure Firewall DNS Proxy details | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table">Create, change, or delete an Azure route table | Microsoft Docs</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div></div><div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:&#112;r&#111;xi&#109;a&#103;r&#064;h&#111;&#116;m&#097;&#105;l.c&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div></div></div><p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%203" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%203" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&#038;title=Azure%20Routing%20Experiences%20%7C%20Scenario%203" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/" data-a2a-title="Azure Routing Experiences | Scenario 3"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/">Azure Routing Experiences | Scenario 3</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Create an Ultra High Available on-prem  Azure VPN Connection</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Mon, 22 Oct 2018 09:00:47 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[high available vpn]]></category>
		<category><![CDATA[site-to-site]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2165</guid>

					<description><![CDATA[<p>Create an Ultra High Available on-prem &#60;-&#62; Azure VPN Connection At this post we will see how to make a high</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</h1>
<p style="text-align: justify;">At this post we will see how to make a high available connection between our on-premises network and Azure. This way we will have an Active-Active Dual-Redundancy VPN Connection.</p>
<p style="text-align: justify;">The idea behind this is that we have a router/firewall cluster,connected with two ISPs and we want to also have a VPN connection with Azure using both ISPs actively. I call this an end-to-end high available connectivity between our on-premises infrastructure and Azure. Actually the active-active dual redundant connections needs to have two different on-premises VPN devices, but we can accomplish almost the same functionality with one device and two different interfaces with two different ISPs.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2170 size-full" style="font-size: 1.0625rem;" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1.jpg" alt="VPN Connectionv" width="704" height="308" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1.jpg 704w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1-300x131.jpg 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1-600x263.jpg 600w" sizes="auto, (max-width: 704px) 100vw, 704px" /></p>
<p style="text-align: justify;">The requirement for this topology, except the router/firewall cluster and the two ISPs is that the Azure VPN Gateway must be Standard or HighPerformance SKU. The Basic SKU does not support Active-Active mode.</p>
<p style="text-align: justify;">As you can see at the above diagram, the Active-Active VPN Gateway created two Active VPN Nodes. The connection of each node to each on-premises network interface in a mesh topology. All network traffic is distributed through all the connections. In order to accomplish this connectivity we need to also enable BGP to both on-premises device and Azure VPN Gateway with different ASN.</p>
<h2 style="text-align: justify;">Lets lab it:</h2>
<p style="text-align: justify;">Create a Virtual Network Gateway, VPN, Route Based and SKU VpnGw1 or larger</p>
<p style="text-align: justify;">Enable active-active mode, this will create two nodes, and give the names of the two Public IPs.</p>
<p style="text-align: justify;">Check the Configure BGB ASN and change the default ASN, I used 65510</p>
<p style="text-align: justify;">wait a lot&#8230; more than the typical 45 minutes, a lot more&#8230;</p>
<p id="OszBBli" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2177 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2.png" alt="VPN Connection" width="529" height="856" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2.png 529w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2-185x300.png 185w" sizes="auto, (max-width: 529px) 100vw, 529px" /></p>
<p id="wpShlpu" style="text-align: justify;">When the gateway is created you will see that the public ip address is called &#8220;First public IP address&#8221;. If you click the &#8220;see more&#8221; link you will see the second IP too.</p>
<p id="GrftlaG" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2175 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0.png" alt="VPN Connection" width="1011" height="355" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0.png 1011w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-300x105.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-768x270.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-600x211.png 600w" sizes="auto, (max-width: 1011px) 100vw, 1011px" /></p>
<p style="text-align: justify;">You can see both IP form the Properties page too.</p>
<p id="qdnpICx" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2178 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc.png" alt="VPN Connection" width="521" height="499" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc.png 521w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc-300x287.png 300w" sizes="auto, (max-width: 521px) 100vw, 521px" /></p>
<p style="text-align: justify;">Second we need to create two Local network Gateways, to represent the two interfaces of our on-premises device. Both must be created with the same ASN. This ASM must be different than the Gateways&#8217; and this ASN must be configured at the configuration of the local devices VPN connection.</p>
<p id="EOHeVpw" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2179 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a4e112829.png" alt="VPN Connection" width="807" height="505" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829.png 807w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-300x188.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-768x481.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-600x375.png 600w" sizes="auto, (max-width: 807px) 100vw, 807px" />]</p>
<p style="text-align: justify;">Now, create the connection</p>
<p id="ptblbOY" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2180 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46.png" alt="VPN Connection" width="1229" height="386" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46.png 1229w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-300x94.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-768x241.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-1024x322.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-600x188.png 600w" sizes="auto, (max-width: 1229px) 100vw, 1229px" /></p>
<p style="text-align: justify;">And remember to enable BGP at the Connection&#8217;s Configuration</p>
<p id="EjsMsCT" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2181 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd.png" alt="VPN Connection" width="591" height="370" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd.png 591w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd-300x188.png 300w" sizes="auto, (max-width: 591px) 100vw, 591px" /></p>
<p style="text-align: justify;">As soon as the local device is configured both connections became connected.</p>
<p id="keTsbLI" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2183 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e.png" alt="VPN Connection" width="1258" height="420" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e.png 1258w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-300x100.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-768x256.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-1024x342.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-600x200.png 600w" sizes="auto, (max-width: 1258px) 100vw, 1258px" /></p>
<p style="text-align: justify;">From powershell we can see both local IPs of the two nodes of the Azure VPN Gateway,</p>
<p id="pZQnWld" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2186 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740.png" alt="VPN Connection" width="632" height="406" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740.png 632w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740-300x193.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740-600x385.png 600w" sizes="auto, (max-width: 632px) 100vw, 632px" /></p>
<h2>Test and Troubleshooting</h2>
<p style="text-align: justify;">Currently the only way to see the connections between the Azure Gateway Nodes and the local devices interfaces is the below powershell command</p>
<p style="text-align: justify;">Get-AzureRmVirtualNetworkGatewayBGpPeerStatus -VirtualNetworkGatewayName &#8220;gatewayname&#8221; -ResourceGroup &#8220;resourcegroupname&#8221;</p>
<p id="DXIZKqI" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2190 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d.png" alt="VPN Connection" width="1444" height="419" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d.png 1444w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-300x87.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-768x223.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-1024x297.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-600x174.png 600w" sizes="auto, (max-width: 1444px) 100vw, 1444px" /></p>
<p style="text-align: justify;">Every time you run this command you get answer from one of the two nodes at random. At the above screenshot, first is one node and second is the other.</p>
<p style="text-align: justify;">The first node&#8217;s peer, 192.168.xx.9 shows that is connect<strong>ed</strong> to the 10.xx.xx.2 local network&#8217;s peer and connect<strong>ing</strong> at the second peer 10.xx.xx.1</p>
<p style="text-align: justify;">The second node&#8217;s peer, 192.168.xx.8 shows that is connect<strong>ed</strong> to the 10.xx.xx.1 local network&#8217;s peer and connect<strong>ing</strong> at the second peer 10.xx.xx.2</p>
<p id="LgtabOH" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2191 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2ad172e960.png" alt="VPN Connection" width="609" height="410" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960.png 609w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-300x202.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-600x404.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-120x80.png 120w" sizes="auto, (max-width: 609px) 100vw, 609px" /></p>
<p style="text-align: justify;">The test I performed was to unplug one interface from the local device. The azure gateway&#8217;s first node State was both Connecting and the second node was the same, connecting to .2 and connected to .1.  At this test I did lost a single ping.</p>
<p style="text-align: justify;">After that I plugged the cable back, waited less than a minute and unplugged the second cable. Now the first node shows still disconnected but the first node connected to the .2 local IP and connecting to .1. With this test I lost only one ping. Also I realized that it is random which node&#8217;s private IP will connect with the local device&#8217;s private IP. Both Azure Gateway&#8217;s IPs 192.168.x.8 &amp; 9 can connect with the local device&#8217;s IP 10.x.x.1 &amp; 2 and this is the magic of the Active-Active Dual Redundancy VPN connection.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:&#112;&#114;o&#120;i&#109;ag&#114;&#064;ho&#116;&#109;&#097;&#105;l&#046;c&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&amp;linkname=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&amp;linkname=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&#038;title=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/" data-a2a-title="Create an Ultra High Available on-prem  Azure VPN Connection"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Connect two or more Azure Virtual Networks using one VPN Gateway</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 18 Sep 2018 18:52:52 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[network transit]]></category>
		<category><![CDATA[peering]]></category>
		<category><![CDATA[remote gateway]]></category>
		<category><![CDATA[transit]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2067</guid>

					<description><![CDATA[<p>Connect two or more Azure Virtual Networks using one VPN Gateway Peering is a feature that allows to connect two</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/">Connect two or more Azure Virtual Networks using one VPN Gateway</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Connect two or more Azure Virtual Networks using one VPN Gateway</h1>
<p style="text-align: justify;">Peering is a feature that allows to connect two or more virtual networks and act as one bigger network. At this post we will see how we can connect two Azure Virtual Networks, using peering and access the whole network using one VPN Gateway. We can connect Virtual Networks despite if they are in the same Subscription or not.</p>
<p style="text-align: justify;">I have created a diagram to help understand the topology.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2158 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/vnet-transit-fm.jpg" alt="peering" width="708" height="437" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm.jpg 708w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm-300x185.jpg 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm-600x370.jpg 600w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<ul style="text-align: justify;">
<li>We have a Virtual Network with Site-2-Site VPN wto On Premises. It can also have Point-2-Site connection configured. The VNET A.</li>
<li>We have another Virtual Network at the Same Subscription that we want to connect each other. The VNET B.</li>
<li>Also we can have a third Virtual Network at a different subscription. The VNET C.</li>
</ul>
<p style="text-align: justify;">In sort we need those peerings with the specific settings:</p>
<ul style="text-align: justify;">
<li>At the VNETA Peering VNETA to VNETB with &#8220;Allow Gateway transit&#8221;</li>
<li>At the VNETA Peering VNETA to VNET</li>
<li>At the VNETB Peering VNETB to VNETA with &#8220;Use Remote Gateway&#8221;</li>
<li>At the VNETB Peering VNETB to VNETC</li>
<li>At the VNETC Peering VNETC to VNETA with &#8220;Use Remote Gateway&#8221;</li>
<li>At the VNETC Peering VNETC to VNETB</li>
</ul>
<p style="text-align: justify;">In order to be able to connect all those networks and also access them using the VPN Connection there are four requirements:</p>
<ul style="text-align: justify;">
<li>The account that will be used to create the peering must have the &#8220;Network Contributor&#8221; Role.</li>
<li>The Address Space must be different on each other and not overlap.</li>
<li>All other Virtual Networks, except the one that has the VPN Connection must NOT have a VPN Gateway deployed.</li>
<li>Of course at the local VPN device (router) we need to add the address spaces of all the Virtual Networks that we need to access.</li>
</ul>
<h2 style="text-align: justify;">Lets lab it:</h2>
<ul style="text-align: justify;">
<li>HQ 192.168.0.0/16 &#8211;&gt; The on-premises network</li>
<li>VNET A 10.1.0.0/16 &#8211;&gt; The Virtual Network that has the VPN Gateway (At my lab is named &#8220;devvn&#8221;)</li>
<li>VNET B 10.229.128.0/24 &#8211;&gt; THe virtual network at a different subscription of the Gateway (At my lab is named &#8220;Network prtg-rsg-vnet&#8221;)</li>
<li>VNET C 172.16.1.0/24 &#8211;&gt; The virtual network at the same subscription as the Gateway Network (At my lab is named &#8220;provsevnet)</li>
</ul>
<p style="text-align: justify;">The on-premises network is connected with Site-to-site (IPsec) VPN to the VNETA</p>
<p id="iraoRYQ" style="text-align: justify;"><img loading="lazy" decoding="async" width="836" height="87" class="alignnone size-full wp-image-2141 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7.png 836w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-300x31.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-768x80.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-600x62.png 600w" sizes="auto, (max-width: 836px) 100vw, 836px" /></p>
<p id="uOBzNNi" style="text-align: justify;">Now we need to connect VNETA and VNETB using Vnet Peering. in order to have a Peering connection we need to create a connection from VNETA to VNETB and one from VNETB to VNETA.</p>
<p style="text-align: justify;">Open the VNETA Virtual Network, go to the Peerings setting and press +ADD</p>
<p style="text-align: justify;">Select the VNETB and check the &#8220;Allow Gateway transit&#8221; to allow the peer virtual network to use your virtual network gateway</p>
<p id="AmjazEg" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2145 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01396ebca4.png" alt="peering" width="565" height="615" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01396ebca4.png 565w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01396ebca4-276x300.png 276w" sizes="auto, (max-width: 565px) 100vw, 565px" /></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2148 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d.png" alt="peering" width="910" height="79" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d.png 910w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-300x26.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-768x67.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-600x52.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-900x79.png 900w" sizes="auto, (max-width: 910px) 100vw, 910px" /></p>
<p style="text-align: justify;">Then go to the VNETB, go to the Peerings setting and click +ADD.</p>
<p style="text-align: justify;">Select the VNETA Virtual Network and check the &#8220;Use Remote Gateway&#8221;  to use the peer’s virtual network gateway. This way the VNETB will use the VNETA&#8217;s Gateway.</p>
<p id="tAEGptw" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2146 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02.png" alt="peering" width="560" height="626" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02.png 560w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02-268x300.png 268w" sizes="auto, (max-width: 560px) 100vw, 560px" /></p>
<p id="BufUOmn" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2149 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01616918ed.png" alt="peering" width="884" height="72" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed.png 884w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-300x24.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-768x63.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-600x49.png 600w" sizes="auto, (max-width: 884px) 100vw, 884px" /></p>
<p style="text-align: justify;">Now we can contact the VNETB network from our on-premises network</p>
<p style="text-align: justify;">a multi-ping screenshot:</p>
<ul style="text-align: justify;">
<li>From 10.229.128.5 (VNETB) to 192.168.0.4 (on-premises) &amp; the opposite</li>
<li>From 10..1.2.4 (VNETA) to 10.229.128.5 (VNETB)  &amp; to 192.168.0.4 (on-premises)</li>
</ul>
<p id="TrQhGES" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2153 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3.png" alt="peering" width="1107" height="667" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3.png 1107w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-300x181.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-768x463.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-1024x617.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-600x362.png 600w" sizes="auto, (max-width: 1107px) 100vw, 1107px" /></p>
<h2 style="text-align: justify;">The next step is to create a cross-subscription peering VNETA with VNETC</h2>
<p style="text-align: justify;">Open the VNETA and create a peering by selecting the VNETC from the other Subscription and check the &#8220;allow gateway transit&#8221;</p>
<p id="NLXiTdV" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2154 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0.png" alt="peering" width="563" height="624" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0.png 563w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0-271x300.png 271w" sizes="auto, (max-width: 563px) 100vw, 563px" /></p>
<p style="text-align: justify;">Then go to the VNETC and create a peer with the VNETA and check the &#8220;use remote gaeway&#8221;</p>
<p id="ZUKQdEP" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2155 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d.png" alt="peering" width="568" height="639" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d.png 568w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d-267x300.png 267w" sizes="auto, (max-width: 568px) 100vw, 568px" /></p>
<p id="LVQNJzA" style="text-align: justify;">With the two above connections we have connectivity between the on-premises network and the VNETC.</p>
<p style="text-align: justify;">The final step, to enable the connectivity between VNETB &amp; VNETC. To accomplish this just create one peer from the VNETB to VNETC and one from VNETC to VNETB.</p>
<p style="text-align: justify;">Ping inception:</p>
<p id="MjxrNNj" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2157 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba141476a112.png" alt="peering" width="1672" height="908" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112.png 1672w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-300x163.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-768x417.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-1024x556.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-600x326.png 600w" sizes="auto, (max-width: 1672px) 100vw, 1672px" /></p>
<p style="text-align: justify;">In order to have client VPN connectivity to the whole network, create a Point-2-Site VPN at the VNETA. You can follow this guide: <a href="https://www.e-apostolidis.gr/microsoft/azure-start-point-point-to-site-vpn/" target="_blank" rel="noopener">Azure Start Point | Point-to-Site VPN</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;&#111;xim&#097;&#103;r&#064;hot&#109;&#097;il&#046;&#099;&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&amp;linkname=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&amp;linkname=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&#038;title=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/" data-a2a-title="Connect two or more Azure Virtual Networks using one VPN Gateway"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/">Connect two or more Azure Virtual Networks using one VPN Gateway</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Start Point &#124; Point-to-Site VPN</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 12 Jun 2018 21:08:36 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure rm]]></category>
		<category><![CDATA[azure start point]]></category>
		<category><![CDATA[point-to-site]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=1914</guid>

					<description><![CDATA[<p>Azure Start Point &#124; Point-to-Site VPN In this post series we will go through some basic steps on how to</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/">Azure Start Point | Point-to-Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Azure Start Point | Point-to-Site VPN</h1>
<p>In this post series we will go through some basic steps on how to start with Microsoft Azure. At this post we will see how we can create Point-to-Site VPN connection with Azure.</p>
<p>If you don’t have an Azure Subscription, you can easily create a free trial by just going to <a href="https://azure.microsoft.com/en-us/free/" data-slimstat="5">https://azure.microsoft.com/en-us/free/</a></p>
<p>Create typical a VIrtual Network</p>
<p id="avTzoLL"><img loading="lazy" decoding="async" width="308" height="658" class="alignnone size-full wp-image-1908 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20228473455.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20228473455.png 308w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20228473455-140x300.png 140w" sizes="auto, (max-width: 308px) 100vw, 308px" /></p>
<p>In order to create Point-to-Site VPN connection it needs a Virtual Network Gateway. Go to the Virtual Network, Subnets and add a Gateway Subnet.</p>
<p id="kiLVuPr"><img loading="lazy" decoding="async" width="505" height="468" class="alignnone size-full wp-image-1910 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2024343b509.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2024343b509.png 505w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2024343b509-300x278.png 300w" sizes="auto, (max-width: 505px) 100vw, 505px" /></p>
<p>FInally we can add the Virtual Network Gateway. From the portal, create a Virtual Network Gateway resource and add it to the previously created Virtual Network.</p>
<p id="JUsPPae"><img loading="lazy" decoding="async" width="313" height="669" class="alignnone size-full wp-image-1911 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20263f8acee.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20263f8acee.png 313w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20263f8acee-140x300.png 140w" sizes="auto, (max-width: 313px) 100vw, 313px" /></p>
<p>The Virtual Network Gateway can take up to 45 minutes to be created.</p>
<p>Once the Virtual Network Gateway is created we need one more step. To configure Point-to-site. Open the Virtual Network Gateway and press configure.</p>
<p id="YPfWjDz"><img loading="lazy" decoding="async" width="599" height="475" class="alignnone size-full wp-image-1913 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b202dc90828b.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b202dc90828b.png 599w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b202dc90828b-300x238.png 300w" sizes="auto, (max-width: 599px) 100vw, 599px" /></p>
<p>We will need a root and a client self-signed certificate to complete the setup. Using a WIndows 10 or Windows Server 2016 machine we can make use of the New-SelfSignedCertificate cmdlet that makes the process easy. The whole process is described here: <a href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-certificates-point-to-site">https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-certificates-point-to-site</a></p>
<p>For the root certificate run the below PowerShell using ISE:</p>
<pre class="lang:ps decode:true ">$cert = New-SelfSignedCertificate -Type Custom -KeySpec Signature `
-Subject "CN=prodevrootcert" -KeyExportPolicy Exportable `
-HashAlgorithm sha256 -KeyLength 2048 `
-CertStoreLocation "Cert:\CurrentUser\My" -KeyUsageProperty Sign -KeyUsage CertSign</pre>
<p>For the client certificate run the below PowerShell using ISE:</p>
<pre class="lang:ps decode:true">New-SelfSignedCertificate -Type Custom -DnsName ProDevChildCert -KeySpec Signature `
-Subject "CN=ProDevChildCert" -KeyExportPolicy Exportable `
-HashAlgorithm sha256 -KeyLength 2048 `
-CertStoreLocation "Cert:\CurrentUser\My" `
-Signer $cert -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")</pre>
<p>Export the root certificate in cer format using MMC, open the Certificates snap-in and select &#8220;current user&#8221;. Find the root certificate under Personal &#8211;&gt; Certificates and right click &#8211;&gt; All Tasks export</p>
<p id="PSEWgMk"><img loading="lazy" decoding="async" width="679" height="458" class="alignnone size-full wp-image-1919 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91.png 679w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-300x202.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-600x405.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-120x80.png 120w" sizes="auto, (max-width: 679px) 100vw, 679px" /></p>
<p>Select to &#8220;not export the private key&#8221; and use Base64 encoded.</p>
<p id="bVAgGyk"><img loading="lazy" decoding="async" width="457" height="193" class="alignnone size-full wp-image-1920 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b203288e15e1.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b203288e15e1.png 457w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b203288e15e1-300x127.png 300w" sizes="auto, (max-width: 457px) 100vw, 457px" /></p>
<p>Now you have the prodevrootcert.cer</p>
<p>After that, export the client certificate by selecting &#8220;export the private key&#8221; , select the &#8220;include all certificates in the certification path&#8221; and the &#8220;enable certificate privacy&#8221;. Add a password and export it to pfx file.</p>
<p id="mVaxzmv"><img loading="lazy" decoding="async" width="259" height="111" class="alignnone size-full wp-image-1921 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2032f2672e2.png" alt="" /></p>
<p>Now you have the prodevchildcert.pfx. This pfx file must be installed to all the client computers that will use this Point-to-Site connection.</p>
<p>Now lets go back to the Point-to-Site configuration page. Add an address pool that the VPN clients will use. This subnet must be different from the Virtual Network address space.</p>
<p id="MDRVWDz"><img loading="lazy" decoding="async" width="905" height="365" class="alignnone size-full wp-image-1922 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2033859cca7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7.png 905w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-300x121.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-768x310.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-600x242.png 600w" sizes="auto, (max-width: 905px) 100vw, 905px" /></p>
<p>Then open the root certificate, the cer file, using notepad, copy the text between the Begin and End marks.</p>
<p id="YXTWkeA"><img loading="lazy" decoding="async" width="647" height="440" class="alignnone size-full wp-image-1923 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7.png 647w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7-300x204.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7-600x408.png 600w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>Paste the certificate text to the &#8220;Root certificated&#8221; &#8211;&gt; Public certificate data&#8221; field and add a name to the &#8220;Name&#8221; field.</p>
<p id="YKByLUE"><img loading="lazy" decoding="async" width="1398" height="169" class="alignnone size-full wp-image-1924 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20342cd032a.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a.png 1398w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-300x36.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-768x93.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-1024x124.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-600x73.png 600w" sizes="auto, (max-width: 1398px) 100vw, 1398px" /></p>
<p>Press Save and the &#8220;Download VPN Client&#8221; button will be enabled and we can download the VPN client.</p>
<p>In order to establish the VPN connection we need to install the VPN Client and the Client &#8220;pfx&#8221; certificate to the workstation.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:proxim&#097;gr&#064;ho&#116;mai&#108;.&#099;&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&amp;linkname=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&amp;linkname=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&#038;title=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/" data-a2a-title="Azure Start Point | Point-to-Site VPN"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/">Azure Start Point | Point-to-Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
