<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vpn Archives - Apostolidis Cloud Corner</title>
	<atom:link href="https://www.cloudcorner.gr/tag/vpn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cloudcorner.gr/tag/vpn/</link>
	<description>Remarks from a Cloud Architect encounters</description>
	<lastBuildDate>Thu, 10 Feb 2022 11:05:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.cloudcorner.gr/wp-content/uploads/2021/04/cropped-cloudcorner2-32x32.png</url>
	<title>vpn Archives - Apostolidis Cloud Corner</title>
	<link>https://www.cloudcorner.gr/tag/vpn/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Azure Routing Experiences &#124; Scenario 3</title>
		<link>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Sun, 06 Feb 2022 19:26:16 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[dns proxy]]></category>
		<category><![CDATA[peering]]></category>
		<category><![CDATA[private endpoints]]></category>
		<category><![CDATA[route tables]]></category>
		<category><![CDATA[routing]]></category>
		<category><![CDATA[udr]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet]]></category>
		<category><![CDATA[vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://20.113.141.97/?p=3859</guid>

					<description><![CDATA[<p>Designing the network routing, cloud &#38; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/">Azure Routing Experiences | Scenario 3</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Designing the network routing, cloud &amp; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got an idea, to start playing with some common scenarios and make some notes, in order to have it as a reference. I end up with three scenarios. Those scenarios are referring to internal network topology, without public access, and I focus more on the routing aspect, the DNS configuration &amp; inspection through Azure Firewall.</p>



<ul class="wp-block-list"><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838">Scenario 1: Hybrid connectivity with Azure VPN Gateway</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-2/" data-type="post" data-id="3846">Scenario 2: Hybrid connectivity with Azure VPN Gateway &amp; Traffic Inspection with Azure Firewall</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-3/" data-type="post" data-id="3859">Scenario 3: Hybrid Connectivity with Azure VPN Gateway, second level peered networks &amp; full traffic inspection with Azure Firewall</a></li></ul>



<p>At the previews posts, we covered the basics of routing traffic from/to on-premises, inspecting all traffic through Azure Firewall, and configuring the DNS for accessing the Private Endpoints. In this scenario, I am experimenting with connectivity between on-premises, the Hub &amp; Spoke networks and a second level peered network (a network that is peered behind the Spoke network). </p>



<p>Recap of Scenario 1 &amp; 2: We have a Hub network, two Spoke networks and an IPSec VPN connection with my on-premises network. We established routing all traffic through the Azure Firewall for inspection &amp; configured DNS for accessing the Private Endpoint from on-premises &amp; all Azure VNets.</p>



<p>In the third scenario, I am adding a new Spoke VNet, the &#8220;Azure 2&#8221; peered with my hub, and a third VNet, the &#8220;Azure 3&#8221; that is only peered with the &#8220;Azure 2&#8221; VNet. To enable connectivity between the &#8220;Azure 3&#8221; VNet and the rest of the networks, including the on-premises, we need a router at the &#8220;Azure 2&#8221; VNet. This can be an NVA or Azure Firewall. In my case, I added an Azure Firewall. The Azure Firewall of &#8220;Azure 2&#8221; VNet has the private IP: 192.168.200.64.</p>



<ul class="wp-block-list"><li>Azure 3 VNet, VM Subnet Route Table:<ul><li>10.0.0.0/16 NH 192.168.200.68</li><li>192.168.0.0/20 NH 192.168.200.68</li><li>192.168.4.0/24 NH 192.168.200.68</li><li>192.168.5.0/24 NH 192.168.200.68</li><li>192.168.200.0/28 NH 192.168.200.68</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure 2 VNet, AzureFirewallSubnet:<ul><li>10.0.0.0/0 NH Internet</li><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.0.0/20 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure 2 VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.200.68</li><li>192.168.4.0/24 NH 192.168.200.68</li><li>192.168.5.0/24 NH 192.168.200.68</li><li>192.168.0.0/20 NH 192.168.200.68</li><li>10.100.0.0/16 NH 192.168.200.64</li></ul></li></ul>



<ul class="wp-block-list"><li>Azure Hub VNet, AzureFirewallSubet:<ul><li>10.0.0.0/0 NH Internet</li><li>192.168.200.0/28 NH 192.168.200.68</li><li>10.100.0.0/16 NH 192.168.200.68</li></ul></li><li>Azure Hub VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li><li><strong>192.168.4.4/32 NH 192.168.2.4</strong></li><li>192.168.200.0/24 NH 192.168.2.4</li><li>10.100.0.0/16 NH 192.168.2.4</li></ul></li><li>Azure Hub VNet, GatewaySubnet:<ul><li>192.168.0.0/24 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.5.0/24 NH 192.168.2.4</li><li><strong>192.168.4.4/32 NH 192.168.2.4</strong></li><li>192.168.200.0/24 NH 192.168.2.4</li><li>10.100.0.0/16 NH 192.168.2.4</li></ul></li><li>Spoke 2 VNet, VM Subnet:<ul><li>10.0.0.0/16 NH 192.168.2.4</li><li>192.168.4.0/24 NH 192.168.2.4</li><li>192.168.0.0/24 NH 192.168.2.4</li><li>192.168.200.0/24 NH 192.168.2.4</li></ul></li></ul>



<h2 class="wp-block-heading" id="routing-example">Routing Example</h2>



<p>Let&#8217;s describe a packet&#8217;s journey. The On-premises Server X (10.0.2.10) makes sends a packet to 10.100.0.4. 1st hop the packet goes to the default gateway, reaching the on-premises VPN device, in our case the RRAS. The RRAS has a custom route for 10.100.0.0/16 and forwards the packet to the VPN interface. The packet reaches the Azure VPN Gateway The Azure VPN Gateway has a custom route for 10.100.0.0/16 and forwards the packet to the HUB Azure Firewall, 192.168.2.4. The HUB Azure Firewall has a custom route for 10.100.0.0/16 and forwards the packet to the &#8220;Azure 2&#8221; Azure Firewall, 192.168.200.68. The &#8220;Azure 2&#8221; Azure Firewall does not have a custom route, but it has a route for 10.100.0.0/16 that is automatically populated by the VNet peering. The Azure FIrewall knows to forward the packet through the VNet peering and reaches the destination.</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/image.png"><img fetchpriority="high" decoding="async" width="1024" height="322" src="/wp-content/uploads/2022/02/image-1024x322.png" alt="" class="wp-image-3879" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-1024x322.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-300x94.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-768x241.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-1536x483.png 1536w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image.png 1654w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can find more commends and tests in the below diagram with the whole solution.</p>



<p>Diagram: (<a rel="noreferrer noopener" href="https://1drv.ms/u/s!AvpafHi49lqjgpstm9ojqEwNV80lKQ?e=60SmlZ" target="_blank">Click here to download a high-resolution SVG image</a>)</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio.png"><img decoding="async" width="1024" height="763" src="/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1024x763.png" alt="" class="wp-image-3860" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1024x763.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-300x224.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-768x572.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio-1536x1144.png 1536w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-AzFW-3rPT-BTP.drawio.png 1663w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>References:<br><a href="/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1 – Apostolidis Cloud Corner</a><br><a href="/microsoft/azure-routing-experiences-scenario-2/">Azure Routing Experiences | Scenario 2 – Apostolidis Cloud Corner</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall">Use Azure Firewall to inspect traffic destined to a private endpoint – Azure Private Link | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns">Azure Private Endpoint DNS configuration | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links">What is a virtual network link subresource of Azure DNS private zones | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/firewall/dns-details">Azure Firewall DNS Proxy details | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table">Create, change, or delete an Azure route table | Microsoft Docs</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div></div><div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:&#112;&#114;o&#120;&#105;m&#097;&#103;&#114;&#064;&#104;&#111;&#116;mail&#046;co&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div></div></div><p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%203" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%203" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-3%2F&#038;title=Azure%20Routing%20Experiences%20%7C%20Scenario%203" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/" data-a2a-title="Azure Routing Experiences | Scenario 3"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/">Azure Routing Experiences | Scenario 3</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-3/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Routing Experiences &#124; Scenario 2</title>
		<link>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Sun, 06 Feb 2022 19:13:24 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure firewall dns proxy]]></category>
		<category><![CDATA[private endpoints]]></category>
		<category><![CDATA[route tables routing udr]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[vnet vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://20.113.141.97/?p=3846</guid>

					<description><![CDATA[<p>Designing the network routing, cloud &#38; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/">Azure Routing Experiences | Scenario 2</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Designing the network routing, cloud &amp; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got an idea, to start playing with some common scenarios and make some notes, in order to have it as a reference. I end up with three scenarios. Those scenarios are referring to internal network topology, without public access, and I focus more on the routing aspect, the DNS configuration &amp; inspection through Azure Firewall.</p>



<ul class="wp-block-list"><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838">Scenario 1: Hybrid connectivity with Azure VPN Gateway</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-2/" data-type="post" data-id="3846">Scenario 2: Hybrid connectivity with Azure VPN Gateway &amp; Traffic Inspection with Azure Firewall</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-3/" data-type="post" data-id="3859">Scenario 3: Hybrid Connectivity with Azure VPN Gateway, second level peered networks &amp; full traffic inspection with Azure Firewall</a></li></ul>



<p>This scenario shares the same topology as <a href="/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1</a> with some changes in order to route all traffic through the Azure Firewall. This will allow us to have full control &amp; inspection of all traffic from/to on-premises and all Azure traffic from/to all VNets. To achieve this we need some Route Table configuration. </p>



<p>At first, to control the traffic from the on-premises network, we need to add a Route Table to the GatewaySubnet to route all traffic through the Azure Firewall. 192.168.0.0/24, 192.168.4.0/24 &amp; 192.168.5.0/24 Next Hop: 192.168.2.4. Now if we try to access the Storage Account, we will realize that we are still going directly from the VPN Gateway to the Storage account, (10.0.1.4 -&gt; AzureGW -&gt; 192.168.4.4). This happens because the Private Endpoint services populate a /32 route to the VNet and all peered VNets. The effective routes of the VPN Gateway now have our custom 192.168.4.0/24 -&gt; 192.168.2.4 route but they also have the 192.168.4.4/32 -&gt; Virtual Network route that is created by the Private Endpoint Service. Since it is a more specific route, it takes priority. The only way to bypass this in a hybrid scenario like this is to create a<a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall#scenario-2-hub-and-spoke-architecture---shared-virtual-network-for-private-endpoints-and-virtual-machines" target="_blank"> /32 route</a> &#8220;192.168.4.4/32 Next Hop 192.168.2.4&#8221;. You can check more scenarios <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall" target="_blank">here</a>. Now the GatewaySubnet Route Table is:<br>192.168.0.0/24 Next Hop 192.168.2.4<br>192.168.4.0/24 Next Hop 192.168.2.4<br>192.168.5.0/24 Next Hop 192.168.2.4<br>192.168.4.4/32 Next Hop 192.168.2.4</p>



<p>After this Route Table is applied to the GatewaySubnet, we can inspect the traffic coming from on-premises through the Azure Firewall logs. The /32 Route for the Private Endpoint must be applied to all Route Tables that are on VNets that are directly peered with the Private Endpoint VNet. I also added the /32 route to the VMSubnet. <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall#scenario-1-hub-and-spoke-architecture---dedicated-virtual-network-for-private-endpoints" target="_blank">The Spoke2 subnet does NOT need to have the /32 route</a>, since it is not directly peered with the Private Endpoint VNet. To access the Private Endpoint we added the /32 route to all Hub VNets, the GatewaySubnet, and the VMs subnet. The /32 route is not needed only services at the Spoke2 subnet, that is not directly peered with the Spoke1 subnet that has the Private Endpoint. And this is why the /32 route is created together with the Private Endpoint and it is populated to all peered subnets.</p>



<p>About the DNS configuration, as discussed in Scenario 1, to access Azure PaaS services, like the Storage, the Azure SQL, the Web App, we need to use the URI, since they don&#8217;t listen to the IP. Since we have Azure Firewall at the configuration, and I have enabled the Azure Firewall DNS Proxy feature to use it as a Conditional Forwarder for the on-premises DNS, we can also use it for the Azure estate. I changed the DNS of the Spoke2 VNet to the Azure Firewall, 192.168.2.4 to be able to resolve the Storage account&#8217;s Private IP. Linking all Private DNS zones to Azure Firewall&#8217;s VNet, usually the Hub VNet, we can use Azure Firewall as our DNS server to all VNets.</p>



<h2 class="wp-block-heading" id="dns-routing-example">DNS &amp; Routing example</h2>



<p><strong>DNS</strong>: The on-premises Server X, 10.0.2.10, makes a request to https://azappsa.blob.core.windows.net. At first, it asks the DNS to resolve the URL to an IP. The DNS has a conditional forwarder about blob.core.windows.net, and asks the Azure Firewall, 192.168.2.4. Azure Firewall has a linked Private DNS zone that has a host record for azappsa.blob.core.windows.net and it resolves to 192.168.4.4. This information routes back to Server X. Now Server X knows that the IP address of azappsa.blob.core.windows.net is 192.168.4.4. </p>



<p><strong>Routing</strong>: To go to 192.168.4.4 first it asks its Default Gateway, in our case the RRAS. The RRAS has a custom route for 192.168.0.0/16 and forwards the packet to the VPN interface. The packet reaches the Azure VPN Gateway. The Azure VPN Gateway has a custom route for 192.168.4.4/32 and sends the packet to the Azure Firewall, 192.168.2.4. The Azure Firewall does not have a custom route, but it has a route that is automatically populated by the VNet peering with address 192.168.4.4/32. The Azure Firewall knows to forward the packet through the VNet peering and reaches the destination.</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/image-3.png"><img loading="lazy" decoding="async" width="1024" height="450" src="/wp-content/uploads/2022/02/image-3-1024x450.png" alt="" class="wp-image-3886" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-3-1024x450.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-3-300x132.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-3-768x338.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-3.png 1057w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can find more commends and test at the diagram below:</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio.png"><img loading="lazy" decoding="async" width="698" height="1024" src="/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio-698x1024.png" alt="" class="wp-image-3851" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio-698x1024.png 698w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio-205x300.png 205w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio-768x1126.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-Azure-Firewall-Inspection-2.drawio.png 828w" sizes="auto, (max-width: 698px) 100vw, 698px" /></a></figure>



<p>References:<br><a href="/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1 – Apostolidis Cloud Corner</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall">Use Azure Firewall to inspect traffic destined to a private endpoint &#8211; Azure Private Link | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns">Azure Private Endpoint DNS configuration | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links">What is a virtual network link subresource of Azure DNS private zones | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/firewall/dns-details">Azure Firewall DNS Proxy details | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table">Create, change, or delete an Azure route table | Microsoft Docs</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div></div><div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;&#111;xi&#109;a&#103;r&#064;ho&#116;m&#097;&#105;&#108;&#046;&#099;&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div></div></div><p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-2%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%202" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-2%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%202" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-2%2F&#038;title=Azure%20Routing%20Experiences%20%7C%20Scenario%202" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/" data-a2a-title="Azure Routing Experiences | Scenario 2"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/">Azure Routing Experiences | Scenario 2</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-2/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Routing Experiences &#124; Scenario 1</title>
		<link>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Sun, 06 Feb 2022 18:41:14 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure firewall]]></category>
		<category><![CDATA[dns proxy]]></category>
		<category><![CDATA[peering]]></category>
		<category><![CDATA[private endpoints]]></category>
		<category><![CDATA[route tables]]></category>
		<category><![CDATA[routing]]></category>
		<category><![CDATA[udr]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[vnet]]></category>
		<category><![CDATA[vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://20.113.141.97/?p=3838</guid>

					<description><![CDATA[<p>Designing the network routing, cloud &#38; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Designing the network routing, cloud &amp; hybrid, on a Hyperscaler like Microsoft Azure can get a real pain. I got an idea, to start playing with some common scenarios and make some notes, in order to have it as a reference. I end up with three scenarios. Those scenarios are referring to internal network topology, without public access, and I focus more on the routing aspect, the DNS configuration &amp; inspection through Azure Firewall.</p>



<ul class="wp-block-list"><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838">Scenario 1: Hybrid connectivity with Azure VPN Gateway</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-2/" data-type="post" data-id="3846">Scenario 2: Hybrid connectivity with Azure VPN Gateway &amp; Traffic Inspection with Azure Firewall</a></li><li><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-1/" data-type="post" data-id="3838"></a><a href="/microsoft/azure-routing-experiences-scenario-3/" data-type="post" data-id="3859">Scenario 3: Hybrid Connectivity with Azure VPN Gateway, second level peered networks &amp; full traffic inspection with Azure Firewall</a></li></ul>



<h2 class="wp-block-heading" id="scenario-1-hybrid-connectivity-through-azure-vpn-gateway">Scenario 1: Hybrid connectivity through Azure VPN gateway</h2>



<p>At the start, I created the on-premises network, using a RRAS (Windows Server 2019 with Routing &amp; Remote Access) to act as the router/VPN device and a Server with DNS service. The Azure estate has three VNets, in a hub &amp; spoke topology. One HUB and two Spokes, connected with the HUB with VNet peering. There is no peering between the spokes. My Azure HUB network has three subnets, one has a VPN Gateway, the second has a VM, and the third has an Azure Firewall. In this first scenario, the Azure Firewall acts only as a DNS Proxy. It is not included in routing.</p>



<ul class="wp-block-list"><li>On-premises network: 10.0.0.0/16</li><li>HUB VNet Address Space: 192.168.0.0/22</li><li>HUB GatewaySubnet: 192.168.1.0/24</li><li>HUB VMSubnet: 192.168.0.0/24</li><li>HUB Firewall Subnet: 192.168.2.0/24</li><li>Spoke1 (storage account): 192.168.4.0/24</li><li>Spoke2 (VM): 192.168.5.0/24</li></ul>



<p>The first spoke has a Private Link to my storage account. The second spoke has a VM.. Azure VPN Gateway knows all routes of its VNet, the peered VNets &amp; the routes propagated from the VPN connection. From on-premises, we can reach all resources using the VPN connection interface ( in RRAS I added a custom route &#8220;192.168.0.0 255.255.0.0 interface:AzureGW&#8221;)</p>



<p>From the VM of the HUB VNet (192.168.0.4), in order to be able to reach the on-premises network, we need a custom route, since the on-premises network is not populated to the VNet. I created a <a href="https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table" target="_blank" rel="noreferrer noopener">Route Table</a>, with route &#8220;10.0.0.0/16 Next Hop: Virtual Network Gateway&#8221; attached to the VM Subnet. </p>



<p>To access the <a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns" data-type="URL" data-id="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns" target="_blank" rel="noreferrer noopener">Private Endpoint of the Storage account we need some more resources &amp; configuration</a>. The storage account, as all PaaS services (like Web App &amp; Azure SQL) responds only to URI and not to IP. Since we have connected a Private Endpoint to the Storage Account, the Public Access is blocked. So, in order to connect to the storage account, we need the aprostore.file.core.windows.net to translate to the private IP of the storage account, the 192.168.4.4. The proper way to achieve this is by using DNS. </p>



<p>First, we need to create a Private DNS zone and <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links" target="_blank">link </a>it to the HUB VNET. For accessing blob storage we need a <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns#azure-services-dns-zone-configuration" target="_blank">Private DNS zone with the name</a> privatelink.blob.core.windows.net, for the file we need privatelink.file.core.windows.net. <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns#azure-services-dns-zone-configuration" target="_blank">More services here</a>. Then add the Storage Account Private Endpoint record to the Private DNS Zone. Now there is an A record azappsa with IP 192.168.4.4. Now, all Azure resources at the linked VNet, the HUB, are able to resolve the DNS records of the Private DNS Zone. We cannot resolve the records of the Azure Private DNS Zone from on-premises. To do so, we need a DNS server on Azure, to use as a conditional forwarder. This can be a Windows or Linux VM with DNS services or in my case, the Azure FIrewall with the <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/azure/firewall/dns-details" target="_blank">DNS proxy</a> enabled (I will use the whole functionality of the firewall to my next scenarios). I enabled the DNS Proxy on Azure, using default Azure DNS, and I added a conditional forwarding at the on-premises DNS &#8220;blob.core.windows.net -&gt; 192.168.2.4&#8221; and &#8220;file.core.windows.net -&gt; 192.168.2.44&#8221;. Now, I can successfully resolve the private IP of the storage account using its name, and be able to connect to it to both blob and to files with SMB access.</p>



<p>From the VM of the Spoke2 VNet (192.168.5.4), in order to be able to reach the on-premises network, we need a custom route, since the on-premises network is not populated to the VNet. I created a Route Table, with route &#8220;10.0.0.0/16 Next Hop: Virtual Network Gateway&#8221; attached to the VM Subnet. I added a second route &#8220;192.168.4.0/24 Next Hop: Virtual Network Gateway&#8221; &amp; changed the VNet DNS to 192.168.2.4 (the Azure Firewall) to be able to access the Spoke1 VNet for storage access.</p>



<h2 class="wp-block-heading" id="dns-routing-example">DNS &amp; Routing example</h2>



<p><strong>DNS</strong>: The on-premises Server X, 10.0.2.10, makes a request to https://azappsa.blob.core.windows.net. At first, it asks the DNS to resolve the URL to an IP. The DNS has a conditional forwarder about blob.core.windows.net, and asks the Azure Firewall, 192.168.2.4. Azure Firewall has a linked Private DNS zone that has a host record for azappsa.blob.core.windows.net and it resolves to 192.168.4.4. This information routes back to Server X. Now Server X knows that the IP address of azappsa.blob.core.windows.net is 192.168.4.4. </p>



<p><strong>Routing</strong>: To go to 192.168.4.4 first it asks its Default Gateway, in our case the RRAS. The RRAS has a custom route for 192.168.0.0/16 and forwards the packet to the VPN interface. The packet reaches the Azure VPN Gateway. The Azure VPN Gateway has a custom route for 192.168.0.0/24 BUT it also has a route for 192.168.4.4/32 that is automatically populated by the VNet peering. The /32 route is more specific than the /24 route, so the VPN Gateway forwards the packet directly to the Private Endpoint, bypassing the Azure Firewall. (At the <a href="/microsoft/azure-routing-experiences-scenario-2/">Azure Routing Experiences | Scenario 2</a> we will see how we will force the traffic through the Azure Firewall.</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/image-4.png"><img loading="lazy" decoding="async" width="1024" height="465" src="/wp-content/uploads/2022/02/image-4-1024x465.png" alt="" class="wp-image-3889" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-4-1024x465.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-4-300x136.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-4-768x348.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/image-4.png 1080w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Please find below the whole solution diagram, I tried to make it as analytic as possible, without messing with too many lines. Also, I have some notes and tests below.</p>



<figure class="wp-block-image size-large"><a href="/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio.png"><img loading="lazy" decoding="async" width="800" height="1024" src="/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio-800x1024.png" alt="" class="wp-image-3841" srcset="https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio-800x1024.png 800w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio-234x300.png 234w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio-768x983.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2022/02/Azure-Hybrid-Network-VPN-GW-Only.drawio.png 825w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a></figure>



<p>References:<br><a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns">Azure Private Endpoint DNS configuration | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links">What is a virtual network link subresource of Azure DNS private zones | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/firewall/dns-details">Azure Firewall DNS Proxy details | Microsoft Docs</a><br><a href="https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table">Create, change, or delete an Azure route table | Microsoft Docs</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div></div><div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;&#111;&#120;ima&#103;&#114;&#064;h&#111;t&#109;&#097;&#105;l&#046;c&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div></div></div><p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-1%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%201" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-1%2F&amp;linkname=Azure%20Routing%20Experiences%20%7C%20Scenario%201" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure-routing-experiences-scenario-1%2F&#038;title=Azure%20Routing%20Experiences%20%7C%20Scenario%201" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/" data-a2a-title="Azure Routing Experiences | Scenario 1"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/">Azure Routing Experiences | Scenario 1</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure-routing-experiences-scenario-1/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Client VPN with Azure AD auth &#038; MFA &#124; Step by step guide</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 21:16:37 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure active directory]]></category>
		<category><![CDATA[azure ad]]></category>
		<category><![CDATA[conditional access]]></category>
		<category><![CDATA[mfa]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[openvpn]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[ssl vpn]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn gateway]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=3514</guid>

					<description><![CDATA[<p>Azure Client VPN using Azure AD &#38; MFA Azure Virtual Network Gateway provides the ability to connect to your Azure</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/">Azure Client VPN with Azure AD auth &#038; MFA | Step by step guide</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Azure Client VPN using Azure AD &amp; MFA</h1>
<p>Azure Virtual Network Gateway provides the ability to connect to your Azure Virtual Network with Azure Client VPN (SSL) connections using your Azure AD or hybrid identity, with Multi Factor Authentication (MFA) and your Conditional Access policies.</p>
<p>We can have an Enterprise grade SSL VPN, with Active Directory authentication and Single Sign on (SSO) from your corporate laptops and apply all your conditional access policies, like MFA, Compliance devices, trused locations, etc.</p>
<h2>How to create the VPN Gateway</h2>
<p>Go to your Virtual Network&#8217;s subnets and create a Gateway subnet by clicking the &#8220;+ Gateway subnet&#8221;<img loading="lazy" decoding="async" width="891" height="536" class="alignnone size-full wp-image-3515 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6a426d77ae.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a426d77ae.png 891w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a426d77ae-300x180.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a426d77ae-768x462.png 768w" sizes="auto, (max-width: 891px) 100vw, 891px" /></p>
<p>Create a Virtual network gateway, by searching for the &#8220;Virtual network gateways&#8221; service and press Add.</p>
<p id="XbDmhqE"><img loading="lazy" decoding="async" width="492" height="336" class="alignnone size-full wp-image-3516 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6a4931a565.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a4931a565.png 492w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a4931a565-300x205.png 300w" sizes="auto, (max-width: 492px) 100vw, 492px" /></p>
<p>Select &#8220;VPN&#8221;, &#8220;Route-based&#8221; and at the SKU select any size except the Basic. Basic SKU does not support Azure AD authentication.</p>
<p id="qvgewrJ"><img loading="lazy" decoding="async" width="948" height="504" class="alignnone size-full wp-image-3517 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6a50482005.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a50482005.png 948w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a50482005-300x159.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a50482005-768x408.png 768w" sizes="auto, (max-width: 948px) 100vw, 948px" /></p>
<p>Create a Public IP and leave all other settings default and create the Gateway.</p>
<p id="UXfLamy"><img loading="lazy" decoding="async" width="935" height="408" class="alignnone size-full wp-image-3519 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6a85e07a51.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a85e07a51.png 935w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a85e07a51-300x131.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6a85e07a51-768x335.png 768w" sizes="auto, (max-width: 935px) 100vw, 935px" /></p>
<p>After about 20 minutes the VPN Gateway is ready. In the meantime we will prepare the Azure AD and give concern to use the Azure AD with the Azure client VPN. Using a <strong>Global Admin</strong> account, go to the &#8220;Azure Active Directory&#8221; and copy the &#8220;Tenant ID&#8221; from the Overview blade, and keep it on a notepad.</p>
<p id="gHUHJqv"><img loading="lazy" decoding="async" width="1081" height="603" class="alignnone size-full wp-image-3521 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5.png 1081w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5-300x167.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5-1024x571.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5-768x428.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b05cd34f5-360x200.png 360w" sizes="auto, (max-width: 1081px) 100vw, 1081px" /></p>
<p>Then copy the url and paste the below url to your browser&#8217;s address bar. You need to log in with a <strong>Global Admin</strong> <strong>non guest non Microsoft</strong> account.</p>
<p><a href="https://login.microsoftonline.com/common/oauth2/authorize?client_id=41b23e61-6c1e-4545-b367-cd054e0ed4b4&amp;response_type=code&amp;redirect_uri=https://portal.azure.com&amp;nonce=1234&amp;prompt=admin_consent">https://login.microsoftonline.com/common/oauth2/authorize?client_id=41b23e61-6c1e-4545-b367-cd054e0ed4b4&amp;response_type=code&amp;redirect_uri=https://portal.azure.com&amp;nonce=1234&amp;prompt=admin_consent</a></p>
<p>With a guest or Microsoft account, even if it is Global Admin, you will be propted to login with an admin account, meaning a member work account.</p>
<p id="kAAExqq"><img loading="lazy" decoding="async" width="643" height="608" class="alignnone size-full wp-image-3524 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b4475597c.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b4475597c.png 643w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b4475597c-300x284.png 300w" sizes="auto, (max-width: 643px) 100vw, 643px" /></p>
<p>Once you login with a member work Global Admin account, you can accept the permissions to create the Azure VPN application</p>
<p id="fGSMgKv"><img loading="lazy" decoding="async" width="596" height="679" class="alignnone size-full wp-image-3525 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b48355abd.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b48355abd.png 596w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b48355abd-263x300.png 263w" sizes="auto, (max-width: 596px) 100vw, 596px" /></p>
<p>You can navigate to the Azure Active Directory / Enterprise Application and view / manage the Azure AD application.</p>
<p id="tOfnbRl"><img loading="lazy" decoding="async" width="950" height="541" class="alignnone size-full wp-image-3526 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b4b4bf3bd.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b4b4bf3bd.png 950w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b4b4bf3bd-300x171.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b4b4bf3bd-768x437.png 768w" sizes="auto, (max-width: 950px) 100vw, 950px" /></p>
<p>Open the Azure VPN enterprise application and copy the &#8220;Application ID&#8221; to a notepad.</p>
<p id="LhEUXqE"><img loading="lazy" decoding="async" width="730" height="460" class="alignnone size-full wp-image-3527 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b715717d7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b715717d7.png 730w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b715717d7-300x189.png 300w" sizes="auto, (max-width: 730px) 100vw, 730px" /></p>
<p>Go to the VPN Gateway, select the &#8220;Point to site configuration&#8221; and click the &#8220;Configure now&#8221;</p>
<p id="cDHYpor"><img loading="lazy" decoding="async" width="752" height="562" class="alignnone size-full wp-image-3520 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6af1243349.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6af1243349.png 752w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6af1243349-300x224.png 300w" sizes="auto, (max-width: 752px) 100vw, 752px" /></p>
<p>Add the Address Pool that you want the VPN clients to have, for Tunnel type select &#8220;OpenVPN (SSL) as it is the only type that supports Azure AD authentication.</p>
<p>Then use the details that you have copied to the notepad, the Tenant ID and the Application ID, and add them to the required fields and press save.</p>
<ul>
<li>Tenant: https://login.microsoftonline.com/paste-your-tenant-id-here</li>
<li>Audience: paste-the-azure-vpn-application-id-here</li>
<li>Issuer: https://sts.windows.net/paste-your-tenant-id-here/</li>
</ul>
<p id="vbJwJxG"><img loading="lazy" decoding="async" width="630" height="623" class="alignnone size-full wp-image-3531 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b96e0f4ab.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b96e0f4ab.png 630w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b96e0f4ab-300x297.png 300w" sizes="auto, (max-width: 630px) 100vw, 630px" /></p>
<h2>How to Download the VPN Client and Connect to the Gateway</h2>
<p>Download the VPN client, using the button.</p>
<p id="rGhrhkI"><img loading="lazy" decoding="async" width="543" height="140" class="alignnone size-full wp-image-3532 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6b9dbea812.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b9dbea812.png 543w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6b9dbea812-300x77.png 300w" sizes="auto, (max-width: 543px) 100vw, 543px" /></p>
<p>Extrack the downloadded zip file</p>
<p id="qhhgLTL"><img loading="lazy" decoding="async" width="319" height="131" class="alignnone size-full wp-image-3533 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6ba4ac8144.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6ba4ac8144.png 319w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6ba4ac8144-300x123.png 300w" sizes="auto, (max-width: 319px) 100vw, 319px" /></p>
<p>And at the AzureVPN folder you will find the configuration xml.</p>
<p id="KcgzbGt"><img loading="lazy" decoding="async" width="505" height="228" class="alignnone size-full wp-image-3534 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bab24518b.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bab24518b.png 505w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bab24518b-300x135.png 300w" sizes="auto, (max-width: 505px) 100vw, 505px" /></p>
<p>Open the Microsoft Store and get the Azure VPN Client</p>
<p id="YqtvuLo"><img loading="lazy" decoding="async" width="954" height="668" class="alignnone size-full wp-image-3535 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bb49de438.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bb49de438.png 954w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bb49de438-300x210.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bb49de438-768x538.png 768w" sizes="auto, (max-width: 954px) 100vw, 954px" /></p>
<p>Open the Azure VPN Client and at the lower left corner, press the + and Import the xml configuration file</p>
<p id="QDTOiQv"><img loading="lazy" decoding="async" width="1268" height="997" class="alignnone size-full wp-image-3536 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bc065436b.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc065436b.png 1268w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc065436b-300x236.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc065436b-1024x805.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc065436b-768x604.png 768w" sizes="auto, (max-width: 1268px) 100vw, 1268px" /></p>
<p>accept all the settings and press save</p>
<p id="lbuQpHb"><img loading="lazy" decoding="async" width="536" height="887" class="alignnone size-full wp-image-3537 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bc2cbe829.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc2cbe829.png 536w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc2cbe829-181x300.png 181w" sizes="auto, (max-width: 536px) 100vw, 536px" /></p>
<p>The Azure VPN connection will appear at the Azure VPN client and also at the Windows 10 network connections, like any other VPN</p>
<p>Azure VPN Client:</p>
<p id="jqPwQBD"><img loading="lazy" decoding="async" width="542" height="308" class="alignnone size-full wp-image-3538 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bc402e108.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc402e108.png 542w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc402e108-300x170.png 300w" sizes="auto, (max-width: 542px) 100vw, 542px" /></p>
<p>Windows 10 Network Connections:</p>
<p id="kJAsVUF"><img loading="lazy" decoding="async" width="438" height="714" class="alignnone size-full wp-image-3539 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bc7fb9a2f.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc7fb9a2f.png 438w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bc7fb9a2f-184x300.png 184w" sizes="auto, (max-width: 438px) 100vw, 438px" /></p>
<p>Once you press connect, it will prompt you to connect using the account(s) that you are already using at your Windows 10 machine, or use a different account</p>
<p id="eJISWQM"><img loading="lazy" decoding="async" width="552" height="620" class="alignnone size-full wp-image-3540 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bcd312f28.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bcd312f28.png 552w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bcd312f28-267x300.png 267w" sizes="auto, (max-width: 552px) 100vw, 552px" /></p>
<p>You will be prompted for MFA or any other conditional access policy you have applied, and the you will be connected.</p>
<p id="esSTiap"><img loading="lazy" decoding="async" width="1277" height="512" class="alignnone size-full wp-image-3541 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed6bd8c30d69.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bd8c30d69.png 1277w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bd8c30d69-300x120.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bd8c30d69-1024x411.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed6bd8c30d69-768x308.png 768w" sizes="auto, (max-width: 1277px) 100vw, 1277px" /></p>
<h2>Conditional Access &amp; Multi-Factor Authentication (MFA)</h2>
<p>You can add Conditional Access to the Azure client VPN connection. Go to Azure Active Directory / Security / Conditional Access and create a new Policy.</p>
<p>Select the &#8220;Azure VPN&#8221; at the &#8220;Cloud apps or actions&#8221; section</p>
<p><img loading="lazy" decoding="async" width="865" height="842" class="alignnone size-full wp-image-3547 " style="font-size: 1.0625rem;" src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed735787be01.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735787be01.png 865w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735787be01-300x292.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735787be01-768x748.png 768w" sizes="auto, (max-width: 865px) 100vw, 865px" /></p>
<p id="csTztEz"><img loading="lazy" decoding="async" width="895" height="431" class="alignnone size-full wp-image-3548 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed735abe7b3b.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735abe7b3b.png 895w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735abe7b3b-300x144.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735abe7b3b-768x370.png 768w" sizes="auto, (max-width: 895px) 100vw, 895px" /></p>
<p>At the Access Controls / Grand section, you can require multi-factor authentication, or AD Joined device, or compliant device, or all of that</p>
<p id="HUUcMBC"><img loading="lazy" decoding="async" width="706" height="650" class="alignnone size-full wp-image-3549 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed735cd68190.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735cd68190.png 706w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed735cd68190-300x276.png 300w" sizes="auto, (max-width: 706px) 100vw, 706px" /></p>
<p>At the &#8220;Conditions&#8221; section you can controll the location that the policy will apply. Lets say, you can apply the MFA requirement at &#8220;Any location&#8221; and exclude the &#8220;Trusted locations&#8221;, in order to not require MFA when the device is at a trusted location, like your company&#8217;s network.</p>
<p id="qhmCyyd"><img loading="lazy" decoding="async" width="1027" height="498" class="alignnone size-full wp-image-3550 " src="https://www.e-apostolidis.gr/wp-content/uploads/2020/06/img_5ed73635a0fc0.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed73635a0fc0.png 1027w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed73635a0fc0-300x145.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed73635a0fc0-1024x497.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2020/06/img_5ed73635a0fc0-768x372.png 768w" sizes="auto, (max-width: 1027px) 100vw, 1027px" /></p>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;o&#120;im&#097;&#103;r&#064;h&#111;tma&#105;l&#046;co&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide%2F&amp;linkname=Azure%20Client%20VPN%20with%20Azure%20AD%20auth%20%26%20MFA%20%7C%20Step%20by%20step%20guide" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide%2F&amp;linkname=Azure%20Client%20VPN%20with%20Azure%20AD%20auth%20%26%20MFA%20%7C%20Step%20by%20step%20guide" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide%2F&#038;title=Azure%20Client%20VPN%20with%20Azure%20AD%20auth%20%26%20MFA%20%7C%20Step%20by%20step%20guide" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/" data-a2a-title="Azure Client VPN with Azure AD auth &amp; MFA | Step by step guide"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/">Azure Client VPN with Azure AD auth &#038; MFA | Step by step guide</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-client-vpn-with-azure-ad-auth-mfa-step-by-step-guide/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Private Link &#124; Private connection to Azure PaaS</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 21:36:51 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure private link]]></category>
		<category><![CDATA[lan]]></category>
		<category><![CDATA[local access]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[paas]]></category>
		<category><![CDATA[private connection]]></category>
		<category><![CDATA[private endpoint]]></category>
		<category><![CDATA[private link]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sql]]></category>
		<category><![CDATA[sql database]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[storage]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2823</guid>

					<description><![CDATA[<p>Azure Private Link &#124; Private connection to Azure PaaS &#160; Azure Private Link is a new service, currently in Preview,</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/">Azure Private Link | Private connection to Azure PaaS</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Azure Private Link | Private connection to Azure PaaS</h1>
<p>&nbsp;</p>
<p>Azure Private Link is a new service, currently in Preview, that provides private connectivity from a virtual network or an on-premises network with Site-2-Site VPN to Azure platform as a service (PaaS) Microsoft services. Azure Private Link makes the networking a lot more simple improving the security and eliminating the need for public access.</p>
<p id="nAIxogs"><img loading="lazy" decoding="async" width="838" height="369" class="alignnone size-full wp-image-2844 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d8145c21e8f8.png" alt="" /></p>
<p>&nbsp;</p>
<p><span style="font-size: 12px;">image from: <a href="https://azure.microsoft.com/en-us/services/private-link/">https://azure.microsoft.com/en-us/services/private-link/</a></span></p>
<p>Azure Private Link is a Service mapped to Azure Virtual Networks through a private endpoint. This means that all traffic is routed internally, using private IPs and connectivity, eliminating the exposure to threats. Using Private Link helps an organization to meed the compliance standards.</p>
<p>Azure Private Link is a Global service. It does not have regional restrictions. You can connect privately services from all the Azure Regions around the globe.</p>
<h2>Lets Lab It!</h2>
<p>Let&#8217;s see in practice how we can connect from an Azure VM and from our on-premises computer using VPN to an Azure SQL Database using private IPs. For the Lab I already have a Virtual Machine running Windows Server 2019 and an Azure SQL Database. The SQL Database is not connected to any networks.</p>
<p>Open the Azure Portal, press New and search for &#8220;Private Link&#8221;, select it and press &#8220;Create&#8221;</p>
<p id="wWRgRfz"><img loading="lazy" decoding="async" width="1146" height="418" class="alignnone size-full wp-image-2824 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d812bccdb08c.png" alt="" /></p>
<p>A nice &#8220;Getting started page&#8221; will open. Click the &#8220;Build a private connection to a service&#8221;</p>
<p id="YGbIKKC"><img loading="lazy" decoding="async" width="1253" height="769" class="alignnone size-full wp-image-2825 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d812c222bb50.png" alt="" /></p>
<p id="hySxSQb"><img loading="lazy" decoding="async" width="1151" height="172" class="alignnone size-full wp-image-2826 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d812c2e18651.png" alt="" /></p>
<p>The &#8220;Create a private endpoint&#8221; wizard will open. Select a name for the Private Link and a Region and press Next to go to the second step.</p>
<p><code></code></p>
<p id="vCwjsPb"><img loading="lazy" decoding="async" width="847" height="487" class="alignnone size-full wp-image-2832 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d8130185f27f.png" alt="" /></p>
<p>At the second step, select to connect to the azure resource in my directory, and select the subscription where the Azure SQL Database resides. Then select the SQL Server.</p>
<p id="qmxqrJF"><img loading="lazy" decoding="async" width="842" height="466" class="alignnone size-full wp-image-2833 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d81303297eff.png" alt="" /></p>
<p>At the third step, select the VIrtual Network that the Private Link will be created. I selected the network where my Virtual Machine resides. If you don&#8217;t have your own DNS server select Yes to create an Azure private DNS zone.</p>
<p id="nfoqivE"><img loading="lazy" decoding="async" width="854" height="588" class="alignnone size-full wp-image-2835 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d813077e1d38.png" alt="" /></p>
<p>At the final step, review the settings and create the Private Link</p>
<p id="lHsjjBi"><img loading="lazy" decoding="async" width="695" height="772" class="alignnone size-full wp-image-2836 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d81309adc037.png" alt="" /></p>
<p>After the resource creation, you can check the DNS for the Azure SQL Server Private IP Address!</p>
<p id="cSPyGGM"><img loading="lazy" decoding="async" width="925" height="302" class="alignnone size-full wp-image-2837 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d81317ff3814.png" alt="" /></p>
<p>And at the SQL Server, at the &#8220;Private endpoint connections&#8221; section you will see the new Private Link.</p>
<p id="YnyPGra"><img loading="lazy" decoding="async" width="1389" height="645" class="alignnone size-full wp-image-2839 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d8132886dbdc.png" alt="" /></p>
<p>Open a Remote Desktop Connection to the Azure VM, and run a nslookup for the SQL Server name. In my case the command is:</p>
<p>PS C:\&gt; nslookup plsqlsrv.database.windows.net<br />
Server: UnKnown<br />
Address: 168.63.129.16</p>
<p>Non-authoritative answer:<br />
Name: plsqlsrv.privatelink.database.windows.net<br />
Address: 10.0.2.5<br />
Aliases: plsqlsrv.database.windows.net</p>
<p id="zdWsPaP"><img loading="lazy" decoding="async" width="394" height="201" class="alignnone size-full wp-image-2838 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d8131e47f882.png" alt="" /></p>
<p>And it returned the Private IP address of the SQL Server.</p>
<p>From my computer, i tried to connect to the Azure SQL Server, using the name plsqlsrv.database.windows.net and the connection failed since my Public IP Address is not allowed to access the server.</p>
<p id="YMuBmUq"><img loading="lazy" decoding="async" width="564" height="437" class="alignnone size-full wp-image-2840 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d813f72173a6.png" alt="" /></p>
<p>From the Azure VM I managed to connect successfully and of course internally!</p>
<p id="nVbBsVv"><img loading="lazy" decoding="async" width="602" height="462" class="alignnone size-full wp-image-2841 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d813fab7a6a1.png" alt="" /></p>
<p>After that, I added a Virtual Network Gateway to the Network and created a Point to Site VPN connection from my local computer to Azure. You can check my guide on how to do this: <a href="https://www.e-apostolidis.gr/microsoft/azure-start-point-point-to-site-vpn/" target="_blank" rel="noopener noreferrer">https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-point-to-site-vpn/</a></p>
<p>In order to connect to the Azure SQL you need to either use a local DNS server to map the SQl Server name to the Azure SQL IP or add an entry to the local host file for testing.</p>
<p id="VbhUQVD"><img loading="lazy" decoding="async" width="411" height="73" class="alignnone size-full wp-image-2849 " src="https://www.e-apostolidis.gr/wp-content/uploads/2019/09/img_5d8150b51c2d2.png" alt="" /></p>
<h2>Conclusion</h2>
<p>Azure Private Link is in Preview and currently supports Azure SQL Database and Storage accounts. Additional services coming in preview in next 3-6 months:</p>
<ul>
<li>· Cosmos DB</li>
<li>· App Service Vnet Integration + App Service Environment</li>
<li>· Azure Kubernetes Service</li>
<li>· Azure Key Vault</li>
<li>· PostgreSQL</li>
<li>· MySQL</li>
<li>· Maria DB</li>
</ul>
<p>&nbsp;</p>
<p>Source:</p>
<p><a href="https://azure.microsoft.com/en-us/services/private-link/">https://azure.microsoft.com/en-us/services/private-link/</a></p>
<p><a href="https://azure.microsoft.com/en-au/blog/announcing-azure-private-link/">https://azure.microsoft.com/en-au/blog/announcing-azure-private-link/</a></p>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:pr&#111;x&#105;&#109;&#097;gr&#064;hot&#109;&#097;&#105;l.co&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-private-link-private-connection-to-azure-paas%2F&amp;linkname=Azure%20Private%20Link%20%7C%20Private%20connection%20to%20Azure%20PaaS" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-private-link-private-connection-to-azure-paas%2F&amp;linkname=Azure%20Private%20Link%20%7C%20Private%20connection%20to%20Azure%20PaaS" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-private-link-private-connection-to-azure-paas%2F&#038;title=Azure%20Private%20Link%20%7C%20Private%20connection%20to%20Azure%20PaaS" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/" data-a2a-title="Azure Private Link | Private connection to Azure PaaS"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/">Azure Private Link | Private connection to Azure PaaS</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-private-link-private-connection-to-azure-paas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Azure ExpressRoute adds Satellite connectivity</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Sun, 15 Sep 2019 20:58:22 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[express route]]></category>
		<category><![CDATA[expressroute]]></category>
		<category><![CDATA[inovation]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[microsoft azure]]></category>
		<category><![CDATA[satellite]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2813</guid>

					<description><![CDATA[<p>ExpressRoute is a Microsoft Azure service that provides a private connection between an organization&#8217;s on-premises infrastructure and Microsoft Cloud services,</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/">Azure ExpressRoute adds Satellite connectivity</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">ExpressRoute is a Microsoft Azure service that provides a private connection between an organization&#8217;s on-premises infrastructure and Microsoft Cloud services, such as Microsoft Azure, Office 365, and Dynamics 365.</p>
<p style="text-align: justify;">Microsoft Azure ExpressRoute was general available back on 2014. To connect to Azure ExpressRoute you need a direct line with an ExpressRoute provider. Now Microsoft announced that Microsoft cloud services can be accessed with Azure ExpressRoute using satellite connectivity, breaking the direct line barriers, making it feasible to connect your data center directly to Microsoft Azure from all around the globe!</p>
<p style="text-align: justify;"><img decoding="async" src="https://azurecomcdn.azureedge.net/mediahandler/acomblog/media/Default/blog/6fc8736b-b6e9-4959-8692-c602e9d931e4.png" alt="Infographic of High level architecture of ExpressRoute and satellite integration" /></p>
<p><span style="font-size: 10px;">image from <a href="https://azure.microsoft.com/en-us/blog/satellite-connectivity-expands-reach-of-azure-expressroute-across-the-globe/">https://azure.microsoft.com/en-us/blog/satellite-connectivity-expands-reach-of-azure-expressroute-across-the-globe/</a></span></p>
<p id="JXlaLtf" style="text-align: justify;">Azure ExpressRoute Satellite connectivity is currently provided by three Microsoft partners, Intelsat, SES, and Viasat. Microsoft expands its already large connectivity, adding Satellite connectivity options at the  54 Regions worldwide making <a href="https://azure.microsoft.com/en-us/global-infrastructure/global-network/">Microsoft’s global network</a> one of the largest in the world.</p>
<p style="text-align: justify;">Source:</p>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-us/azure/expressroute/expressroute-introduction">https://docs.microsoft.com/en-us/azure/expressroute/expressroute-introduction</a></p>
<p style="text-align: justify;"><a href="https://azure.microsoft.com/en-us/blog/satellite-connectivity-expands-reach-of-azure-expressroute-across-the-globe/">https://azure.microsoft.com/en-us/blog/satellite-connectivity-expands-reach-of-azure-expressroute-across-the-globe/</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:pr&#111;&#120;im&#097;&#103;r&#064;&#104;otm&#097;&#105;l.c&#111;&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-expressroute-adds-satellite-connectivity%2F&amp;linkname=Azure%20ExpressRoute%20adds%20Satellite%20connectivity" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-expressroute-adds-satellite-connectivity%2F&amp;linkname=Azure%20ExpressRoute%20adds%20Satellite%20connectivity" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-expressroute-adds-satellite-connectivity%2F&#038;title=Azure%20ExpressRoute%20adds%20Satellite%20connectivity" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/" data-a2a-title="Azure ExpressRoute adds Satellite connectivity"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/">Azure ExpressRoute adds Satellite connectivity</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-expressroute-adds-satellite-connectivity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Create an Ultra High Available on-prem  Azure VPN Connection</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Mon, 22 Oct 2018 09:00:47 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[high available vpn]]></category>
		<category><![CDATA[site-to-site]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2165</guid>

					<description><![CDATA[<p>Create an Ultra High Available on-prem &#60;-&#62; Azure VPN Connection At this post we will see how to make a high</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</h1>
<p style="text-align: justify;">At this post we will see how to make a high available connection between our on-premises network and Azure. This way we will have an Active-Active Dual-Redundancy VPN Connection.</p>
<p style="text-align: justify;">The idea behind this is that we have a router/firewall cluster,connected with two ISPs and we want to also have a VPN connection with Azure using both ISPs actively. I call this an end-to-end high available connectivity between our on-premises infrastructure and Azure. Actually the active-active dual redundant connections needs to have two different on-premises VPN devices, but we can accomplish almost the same functionality with one device and two different interfaces with two different ISPs.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2170 size-full" style="font-size: 1.0625rem;" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1.jpg" alt="VPN Connectionv" width="704" height="308" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1.jpg 704w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1-300x131.jpg 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/active-active-azure-vpn-1-600x263.jpg 600w" sizes="auto, (max-width: 704px) 100vw, 704px" /></p>
<p style="text-align: justify;">The requirement for this topology, except the router/firewall cluster and the two ISPs is that the Azure VPN Gateway must be Standard or HighPerformance SKU. The Basic SKU does not support Active-Active mode.</p>
<p style="text-align: justify;">As you can see at the above diagram, the Active-Active VPN Gateway created two Active VPN Nodes. The connection of each node to each on-premises network interface in a mesh topology. All network traffic is distributed through all the connections. In order to accomplish this connectivity we need to also enable BGP to both on-premises device and Azure VPN Gateway with different ASN.</p>
<h2 style="text-align: justify;">Lets lab it:</h2>
<p style="text-align: justify;">Create a Virtual Network Gateway, VPN, Route Based and SKU VpnGw1 or larger</p>
<p style="text-align: justify;">Enable active-active mode, this will create two nodes, and give the names of the two Public IPs.</p>
<p style="text-align: justify;">Check the Configure BGB ASN and change the default ASN, I used 65510</p>
<p style="text-align: justify;">wait a lot&#8230; more than the typical 45 minutes, a lot more&#8230;</p>
<p id="OszBBli" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2177 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2.png" alt="VPN Connection" width="529" height="856" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2.png 529w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a3bf078d2-185x300.png 185w" sizes="auto, (max-width: 529px) 100vw, 529px" /></p>
<p id="wpShlpu" style="text-align: justify;">When the gateway is created you will see that the public ip address is called &#8220;First public IP address&#8221;. If you click the &#8220;see more&#8221; link you will see the second IP too.</p>
<p id="GrftlaG" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2175 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0.png" alt="VPN Connection" width="1011" height="355" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0.png 1011w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-300x105.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-768x270.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a1260c0d0-600x211.png 600w" sizes="auto, (max-width: 1011px) 100vw, 1011px" /></p>
<p style="text-align: justify;">You can see both IP form the Properties page too.</p>
<p id="qdnpICx" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2178 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc.png" alt="VPN Connection" width="521" height="499" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc.png 521w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4757d5bc-300x287.png 300w" sizes="auto, (max-width: 521px) 100vw, 521px" /></p>
<p style="text-align: justify;">Second we need to create two Local network Gateways, to represent the two interfaces of our on-premises device. Both must be created with the same ASN. This ASM must be different than the Gateways&#8217; and this ASN must be configured at the configuration of the local devices VPN connection.</p>
<p id="EOHeVpw" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2179 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a4e112829.png" alt="VPN Connection" width="807" height="505" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829.png 807w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-300x188.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-768x481.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a4e112829-600x375.png 600w" sizes="auto, (max-width: 807px) 100vw, 807px" />]</p>
<p style="text-align: justify;">Now, create the connection</p>
<p id="ptblbOY" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2180 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46.png" alt="VPN Connection" width="1229" height="386" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46.png 1229w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-300x94.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-768x241.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-1024x322.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a6ac7bd46-600x188.png 600w" sizes="auto, (max-width: 1229px) 100vw, 1229px" /></p>
<p style="text-align: justify;">And remember to enable BGP at the Connection&#8217;s Configuration</p>
<p id="EjsMsCT" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2181 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd.png" alt="VPN Connection" width="591" height="370" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd.png 591w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a73d5c1fd-300x188.png 300w" sizes="auto, (max-width: 591px) 100vw, 591px" /></p>
<p style="text-align: justify;">As soon as the local device is configured both connections became connected.</p>
<p id="keTsbLI" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2183 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e.png" alt="VPN Connection" width="1258" height="420" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e.png 1258w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-300x100.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-768x256.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-1024x342.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a7da5be9e-600x200.png 600w" sizes="auto, (max-width: 1258px) 100vw, 1258px" /></p>
<p style="text-align: justify;">From powershell we can see both local IPs of the two nodes of the Azure VPN Gateway,</p>
<p id="pZQnWld" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2186 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740.png" alt="VPN Connection" width="632" height="406" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740.png 632w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740-300x193.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2a90fd9740-600x385.png 600w" sizes="auto, (max-width: 632px) 100vw, 632px" /></p>
<h2>Test and Troubleshooting</h2>
<p style="text-align: justify;">Currently the only way to see the connections between the Azure Gateway Nodes and the local devices interfaces is the below powershell command</p>
<p style="text-align: justify;">Get-AzureRmVirtualNetworkGatewayBGpPeerStatus -VirtualNetworkGatewayName &#8220;gatewayname&#8221; -ResourceGroup &#8220;resourcegroupname&#8221;</p>
<p id="DXIZKqI" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2190 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d.png" alt="VPN Connection" width="1444" height="419" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d.png 1444w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-300x87.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-768x223.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-1024x297.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2abf4ecf6d-600x174.png 600w" sizes="auto, (max-width: 1444px) 100vw, 1444px" /></p>
<p style="text-align: justify;">Every time you run this command you get answer from one of the two nodes at random. At the above screenshot, first is one node and second is the other.</p>
<p style="text-align: justify;">The first node&#8217;s peer, 192.168.xx.9 shows that is connect<strong>ed</strong> to the 10.xx.xx.2 local network&#8217;s peer and connect<strong>ing</strong> at the second peer 10.xx.xx.1</p>
<p style="text-align: justify;">The second node&#8217;s peer, 192.168.xx.8 shows that is connect<strong>ed</strong> to the 10.xx.xx.1 local network&#8217;s peer and connect<strong>ing</strong> at the second peer 10.xx.xx.2</p>
<p id="LgtabOH" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2191 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba2ad172e960.png" alt="VPN Connection" width="609" height="410" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960.png 609w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-300x202.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-600x404.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba2ad172e960-120x80.png 120w" sizes="auto, (max-width: 609px) 100vw, 609px" /></p>
<p style="text-align: justify;">The test I performed was to unplug one interface from the local device. The azure gateway&#8217;s first node State was both Connecting and the second node was the same, connecting to .2 and connected to .1.  At this test I did lost a single ping.</p>
<p style="text-align: justify;">After that I plugged the cable back, waited less than a minute and unplugged the second cable. Now the first node shows still disconnected but the first node connected to the .2 local IP and connecting to .1. With this test I lost only one ping. Also I realized that it is random which node&#8217;s private IP will connect with the local device&#8217;s private IP. Both Azure Gateway&#8217;s IPs 192.168.x.8 &amp; 9 can connect with the local device&#8217;s IP 10.x.x.1 &amp; 2 and this is the magic of the Active-Active Dual Redundancy VPN connection.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;&#111;&#120;i&#109;a&#103;&#114;&#064;&#104;ot&#109;ai&#108;&#046;co&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&amp;linkname=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&amp;linkname=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fcreate-an-ultra-high-available-on-prem-azure-vpn-connection%2F&#038;title=Create%20an%20Ultra%20High%20Available%20on-prem%20%20Azure%20VPN%20Connection" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/" data-a2a-title="Create an Ultra High Available on-prem  Azure VPN Connection"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/">Create an Ultra High Available on-prem &lt;-&gt; Azure VPN Connection</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/create-an-ultra-high-available-on-prem-azure-vpn-connection/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Connect two or more Azure Virtual Networks using one VPN Gateway</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/#comments</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 18 Sep 2018 18:52:52 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[network transit]]></category>
		<category><![CDATA[peering]]></category>
		<category><![CDATA[remote gateway]]></category>
		<category><![CDATA[transit]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vnet peering]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2067</guid>

					<description><![CDATA[<p>Connect two or more Azure Virtual Networks using one VPN Gateway Peering is a feature that allows to connect two</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/">Connect two or more Azure Virtual Networks using one VPN Gateway</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Connect two or more Azure Virtual Networks using one VPN Gateway</h1>
<p style="text-align: justify;">Peering is a feature that allows to connect two or more virtual networks and act as one bigger network. At this post we will see how we can connect two Azure Virtual Networks, using peering and access the whole network using one VPN Gateway. We can connect Virtual Networks despite if they are in the same Subscription or not.</p>
<p style="text-align: justify;">I have created a diagram to help understand the topology.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2158 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/vnet-transit-fm.jpg" alt="peering" width="708" height="437" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm.jpg 708w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm-300x185.jpg 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/vnet-transit-fm-600x370.jpg 600w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<ul style="text-align: justify;">
<li>We have a Virtual Network with Site-2-Site VPN wto On Premises. It can also have Point-2-Site connection configured. The VNET A.</li>
<li>We have another Virtual Network at the Same Subscription that we want to connect each other. The VNET B.</li>
<li>Also we can have a third Virtual Network at a different subscription. The VNET C.</li>
</ul>
<p style="text-align: justify;">In sort we need those peerings with the specific settings:</p>
<ul style="text-align: justify;">
<li>At the VNETA Peering VNETA to VNETB with &#8220;Allow Gateway transit&#8221;</li>
<li>At the VNETA Peering VNETA to VNET</li>
<li>At the VNETB Peering VNETB to VNETA with &#8220;Use Remote Gateway&#8221;</li>
<li>At the VNETB Peering VNETB to VNETC</li>
<li>At the VNETC Peering VNETC to VNETA with &#8220;Use Remote Gateway&#8221;</li>
<li>At the VNETC Peering VNETC to VNETB</li>
</ul>
<p style="text-align: justify;">In order to be able to connect all those networks and also access them using the VPN Connection there are four requirements:</p>
<ul style="text-align: justify;">
<li>The account that will be used to create the peering must have the &#8220;Network Contributor&#8221; Role.</li>
<li>The Address Space must be different on each other and not overlap.</li>
<li>All other Virtual Networks, except the one that has the VPN Connection must NOT have a VPN Gateway deployed.</li>
<li>Of course at the local VPN device (router) we need to add the address spaces of all the Virtual Networks that we need to access.</li>
</ul>
<h2 style="text-align: justify;">Lets lab it:</h2>
<ul style="text-align: justify;">
<li>HQ 192.168.0.0/16 &#8211;&gt; The on-premises network</li>
<li>VNET A 10.1.0.0/16 &#8211;&gt; The Virtual Network that has the VPN Gateway (At my lab is named &#8220;devvn&#8221;)</li>
<li>VNET B 10.229.128.0/24 &#8211;&gt; THe virtual network at a different subscription of the Gateway (At my lab is named &#8220;Network prtg-rsg-vnet&#8221;)</li>
<li>VNET C 172.16.1.0/24 &#8211;&gt; The virtual network at the same subscription as the Gateway Network (At my lab is named &#8220;provsevnet)</li>
</ul>
<p style="text-align: justify;">The on-premises network is connected with Site-to-site (IPsec) VPN to the VNETA</p>
<p id="iraoRYQ" style="text-align: justify;"><img loading="lazy" decoding="async" width="836" height="87" class="alignnone size-full wp-image-2141 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7.png 836w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-300x31.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-768x80.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba00e31f37f7-600x62.png 600w" sizes="auto, (max-width: 836px) 100vw, 836px" /></p>
<p id="uOBzNNi" style="text-align: justify;">Now we need to connect VNETA and VNETB using Vnet Peering. in order to have a Peering connection we need to create a connection from VNETA to VNETB and one from VNETB to VNETA.</p>
<p style="text-align: justify;">Open the VNETA Virtual Network, go to the Peerings setting and press +ADD</p>
<p style="text-align: justify;">Select the VNETB and check the &#8220;Allow Gateway transit&#8221; to allow the peer virtual network to use your virtual network gateway</p>
<p id="AmjazEg" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2145 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01396ebca4.png" alt="peering" width="565" height="615" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01396ebca4.png 565w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01396ebca4-276x300.png 276w" sizes="auto, (max-width: 565px) 100vw, 565px" /></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2148 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d.png" alt="peering" width="910" height="79" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d.png 910w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-300x26.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-768x67.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-600x52.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01607c9f7d-900x79.png 900w" sizes="auto, (max-width: 910px) 100vw, 910px" /></p>
<p style="text-align: justify;">Then go to the VNETB, go to the Peerings setting and click +ADD.</p>
<p style="text-align: justify;">Select the VNETA Virtual Network and check the &#8220;Use Remote Gateway&#8221;  to use the peer’s virtual network gateway. This way the VNETB will use the VNETA&#8217;s Gateway.</p>
<p id="tAEGptw" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2146 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02.png" alt="peering" width="560" height="626" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02.png 560w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba014ddd4c02-268x300.png 268w" sizes="auto, (max-width: 560px) 100vw, 560px" /></p>
<p id="BufUOmn" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2149 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba01616918ed.png" alt="peering" width="884" height="72" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed.png 884w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-300x24.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-768x63.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba01616918ed-600x49.png 600w" sizes="auto, (max-width: 884px) 100vw, 884px" /></p>
<p style="text-align: justify;">Now we can contact the VNETB network from our on-premises network</p>
<p style="text-align: justify;">a multi-ping screenshot:</p>
<ul style="text-align: justify;">
<li>From 10.229.128.5 (VNETB) to 192.168.0.4 (on-premises) &amp; the opposite</li>
<li>From 10..1.2.4 (VNETA) to 10.229.128.5 (VNETB)  &amp; to 192.168.0.4 (on-premises)</li>
</ul>
<p id="TrQhGES" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2153 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3.png" alt="peering" width="1107" height="667" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3.png 1107w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-300x181.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-768x463.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-1024x617.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0dffdc50a3-600x362.png 600w" sizes="auto, (max-width: 1107px) 100vw, 1107px" /></p>
<h2 style="text-align: justify;">The next step is to create a cross-subscription peering VNETA with VNETC</h2>
<p style="text-align: justify;">Open the VNETA and create a peering by selecting the VNETC from the other Subscription and check the &#8220;allow gateway transit&#8221;</p>
<p id="NLXiTdV" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2154 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0.png" alt="peering" width="563" height="624" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0.png 563w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e2fb30dc0-271x300.png 271w" sizes="auto, (max-width: 563px) 100vw, 563px" /></p>
<p style="text-align: justify;">Then go to the VNETC and create a peer with the VNETA and check the &#8220;use remote gaeway&#8221;</p>
<p id="ZUKQdEP" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2155 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d.png" alt="peering" width="568" height="639" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d.png 568w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba0e36eeaa6d-267x300.png 267w" sizes="auto, (max-width: 568px) 100vw, 568px" /></p>
<p id="LVQNJzA" style="text-align: justify;">With the two above connections we have connectivity between the on-premises network and the VNETC.</p>
<p style="text-align: justify;">The final step, to enable the connectivity between VNETB &amp; VNETC. To accomplish this just create one peer from the VNETB to VNETC and one from VNETC to VNETB.</p>
<p style="text-align: justify;">Ping inception:</p>
<p id="MjxrNNj" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2157 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2018/09/img_5ba141476a112.png" alt="peering" width="1672" height="908" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112.png 1672w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-300x163.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-768x417.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-1024x556.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/09/img_5ba141476a112-600x326.png 600w" sizes="auto, (max-width: 1672px) 100vw, 1672px" /></p>
<p style="text-align: justify;">In order to have client VPN connectivity to the whole network, create a Point-2-Site VPN at the VNETA. You can follow this guide: <a href="https://www.e-apostolidis.gr/microsoft/azure-start-point-point-to-site-vpn/" target="_blank" rel="noopener">Azure Start Point | Point-to-Site VPN</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:&#112;&#114;&#111;&#120;&#105;ma&#103;r&#064;h&#111;&#116;m&#097;&#105;l.c&#111;&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&amp;linkname=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&amp;linkname=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fconnect-two-or-more-azure-virtual-networks-using-one-vpn-gateway%2F&#038;title=Connect%20two%20or%20more%20Azure%20Virtual%20Networks%20using%20one%20VPN%20Gateway" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/" data-a2a-title="Connect two or more Azure Virtual Networks using one VPN Gateway"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/">Connect two or more Azure Virtual Networks using one VPN Gateway</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/connect-two-or-more-azure-virtual-networks-using-one-vpn-gateway/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Start Point &#124; Point-to-Site VPN</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 12 Jun 2018 21:08:36 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure rm]]></category>
		<category><![CDATA[azure start point]]></category>
		<category><![CDATA[point-to-site]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[virtual network]]></category>
		<category><![CDATA[virtual network gateway]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=1914</guid>

					<description><![CDATA[<p>Azure Start Point &#124; Point-to-Site VPN In this post series we will go through some basic steps on how to</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/">Azure Start Point | Point-to-Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Azure Start Point | Point-to-Site VPN</h1>
<p>In this post series we will go through some basic steps on how to start with Microsoft Azure. At this post we will see how we can create Point-to-Site VPN connection with Azure.</p>
<p>If you don’t have an Azure Subscription, you can easily create a free trial by just going to <a href="https://azure.microsoft.com/en-us/free/" data-slimstat="5">https://azure.microsoft.com/en-us/free/</a></p>
<p>Create typical a VIrtual Network</p>
<p id="avTzoLL"><img loading="lazy" decoding="async" width="308" height="658" class="alignnone size-full wp-image-1908 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20228473455.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20228473455.png 308w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20228473455-140x300.png 140w" sizes="auto, (max-width: 308px) 100vw, 308px" /></p>
<p>In order to create Point-to-Site VPN connection it needs a Virtual Network Gateway. Go to the Virtual Network, Subnets and add a Gateway Subnet.</p>
<p id="kiLVuPr"><img loading="lazy" decoding="async" width="505" height="468" class="alignnone size-full wp-image-1910 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2024343b509.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2024343b509.png 505w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2024343b509-300x278.png 300w" sizes="auto, (max-width: 505px) 100vw, 505px" /></p>
<p>FInally we can add the Virtual Network Gateway. From the portal, create a Virtual Network Gateway resource and add it to the previously created Virtual Network.</p>
<p id="JUsPPae"><img loading="lazy" decoding="async" width="313" height="669" class="alignnone size-full wp-image-1911 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20263f8acee.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20263f8acee.png 313w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20263f8acee-140x300.png 140w" sizes="auto, (max-width: 313px) 100vw, 313px" /></p>
<p>The Virtual Network Gateway can take up to 45 minutes to be created.</p>
<p>Once the Virtual Network Gateway is created we need one more step. To configure Point-to-site. Open the Virtual Network Gateway and press configure.</p>
<p id="YPfWjDz"><img loading="lazy" decoding="async" width="599" height="475" class="alignnone size-full wp-image-1913 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b202dc90828b.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b202dc90828b.png 599w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b202dc90828b-300x238.png 300w" sizes="auto, (max-width: 599px) 100vw, 599px" /></p>
<p>We will need a root and a client self-signed certificate to complete the setup. Using a WIndows 10 or Windows Server 2016 machine we can make use of the New-SelfSignedCertificate cmdlet that makes the process easy. The whole process is described here: <a href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-certificates-point-to-site">https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-certificates-point-to-site</a></p>
<p>For the root certificate run the below PowerShell using ISE:</p>
<pre class="lang:ps decode:true ">$cert = New-SelfSignedCertificate -Type Custom -KeySpec Signature `
-Subject "CN=prodevrootcert" -KeyExportPolicy Exportable `
-HashAlgorithm sha256 -KeyLength 2048 `
-CertStoreLocation "Cert:\CurrentUser\My" -KeyUsageProperty Sign -KeyUsage CertSign</pre>
<p>For the client certificate run the below PowerShell using ISE:</p>
<pre class="lang:ps decode:true">New-SelfSignedCertificate -Type Custom -DnsName ProDevChildCert -KeySpec Signature `
-Subject "CN=ProDevChildCert" -KeyExportPolicy Exportable `
-HashAlgorithm sha256 -KeyLength 2048 `
-CertStoreLocation "Cert:\CurrentUser\My" `
-Signer $cert -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")</pre>
<p>Export the root certificate in cer format using MMC, open the Certificates snap-in and select &#8220;current user&#8221;. Find the root certificate under Personal &#8211;&gt; Certificates and right click &#8211;&gt; All Tasks export</p>
<p id="PSEWgMk"><img loading="lazy" decoding="async" width="679" height="458" class="alignnone size-full wp-image-1919 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91.png 679w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-300x202.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-600x405.png 600w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2031ed7aa91-120x80.png 120w" sizes="auto, (max-width: 679px) 100vw, 679px" /></p>
<p>Select to &#8220;not export the private key&#8221; and use Base64 encoded.</p>
<p id="bVAgGyk"><img loading="lazy" decoding="async" width="457" height="193" class="alignnone size-full wp-image-1920 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b203288e15e1.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b203288e15e1.png 457w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b203288e15e1-300x127.png 300w" sizes="auto, (max-width: 457px) 100vw, 457px" /></p>
<p>Now you have the prodevrootcert.cer</p>
<p>After that, export the client certificate by selecting &#8220;export the private key&#8221; , select the &#8220;include all certificates in the certification path&#8221; and the &#8220;enable certificate privacy&#8221;. Add a password and export it to pfx file.</p>
<p id="mVaxzmv"><img loading="lazy" decoding="async" width="259" height="111" class="alignnone size-full wp-image-1921 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2032f2672e2.png" alt="" /></p>
<p>Now you have the prodevchildcert.pfx. This pfx file must be installed to all the client computers that will use this Point-to-Site connection.</p>
<p>Now lets go back to the Point-to-Site configuration page. Add an address pool that the VPN clients will use. This subnet must be different from the Virtual Network address space.</p>
<p id="MDRVWDz"><img loading="lazy" decoding="async" width="905" height="365" class="alignnone size-full wp-image-1922 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2033859cca7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7.png 905w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-300x121.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-768x310.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033859cca7-600x242.png 600w" sizes="auto, (max-width: 905px) 100vw, 905px" /></p>
<p>Then open the root certificate, the cer file, using notepad, copy the text between the Begin and End marks.</p>
<p id="YXTWkeA"><img loading="lazy" decoding="async" width="647" height="440" class="alignnone size-full wp-image-1923 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7.png 647w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7-300x204.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b2033f7e32a7-600x408.png 600w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>Paste the certificate text to the &#8220;Root certificated&#8221; &#8211;&gt; Public certificate data&#8221; field and add a name to the &#8220;Name&#8221; field.</p>
<p id="YKByLUE"><img loading="lazy" decoding="async" width="1398" height="169" class="alignnone size-full wp-image-1924 " src="https://www.e-apostolidis.gr/wp-content/uploads/2018/06/img_5b20342cd032a.png" alt="" srcset="https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a.png 1398w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-300x36.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-768x93.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-1024x124.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2018/06/img_5b20342cd032a-600x73.png 600w" sizes="auto, (max-width: 1398px) 100vw, 1398px" /></p>
<p>Press Save and the &#8220;Download VPN Client&#8221; button will be enabled and we can download the VPN client.</p>
<p>In order to establish the VPN connection we need to install the VPN Client and the Client &#8220;pfx&#8221; certificate to the workstation.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:pr&#111;&#120;&#105;magr&#064;h&#111;tma&#105;&#108;&#046;&#099;&#111;&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&amp;linkname=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&amp;linkname=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-start-point-point-to-site-vpn%2F&#038;title=Azure%20Start%20Point%20%7C%20Point-to-Site%20VPN" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/" data-a2a-title="Azure Start Point | Point-to-Site VPN"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/">Azure Start Point | Point-to-Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-start-point-point-to-site-vpn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AzureRm &#124; Create Site to Site VPN</title>
		<link>https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 08 Dec 2015 22:49:38 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.e-apostolidis.gr/?p=961</guid>

					<description><![CDATA[<p>AzureRm &#124; Create Site to Site VPN This post is part of a general idea, to create an end-to-end high available</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/">AzureRm | Create Site to Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><strong>AzureRm | Create Site to Site VPN</strong></h1>
<p>This post is part of a general idea, to create an end-to-end high available application infrastructure solution in Azure using internal load balancer with the new AzureRm commands and Azure PowerShell v.1.0 preview.</p>
<p>We will create a Gateway, request a Public IP and establish a Site to Site VPN. At the time I am writting this post there is no option to create the VPN ising the Portal, the only way is using PowerShell. Also there is no option to download the configuration  for the local firewall/router, like the classic deployment.</p>
<p>The AzureRm commands are installed directly from the PowerShell using the Install-Module AzureRM &amp; Install-AzureRM commands.</p>
<p>So lets start:</p>
<pre class="lang:ps decode:true">#Login
Login-AzureRmAccount

#Create Gateway for VPN

# add the local (office) public ip and local networks
$resourcegroupName ="RMDemoRG"
$locationName ="West Europe"
$vnetName = "NRPVnet"
New-AzureRmLocalNetworkGateway -Name localsite -ResourceGroupName $resourcegroupName -Location $locationName -GatewayIpAddress "XXX.XXX.XXX.XXX" -AddressPrefix @('10.0.0.0/24','192.168.0.0/24')

# Create the Gateway Subnet
$vnet = Get-AzureRmVirtualNetwork -ResourceGroupName $resourcegroupName -Name $vnetName 
Add-AzureRmVirtualNetworkSubnetConfig -Name 'GatewaySubnet' -AddressPrefix 172.16.0.0/16 -VirtualNetwork $vnet
Set-AzureRmVirtualNetwork -VirtualNetwork $vnet

# create gateway and request azure public ip
$gwpip= New-AzureRmPublicIpAddress -Name RMDemoPIP -ResourceGroupName $resourcegroupName -Location $locationName -AllocationMethod Dynamic
$vnet = Get-AzureRmVirtualNetwork -Name $vnetName -ResourceGroupName $resourcegroupName
$GWsubnet = Get-AzureRmVirtualNetworkSubnetConfig -Name 'GatewaySubnet' -VirtualNetwork $vnet
$gwipconfig = New-AzureRmVirtualNetworkGatewayIpConfig -Name gwipconfig1 -SubnetId $GWsubnet.Id -PublicIpAddressId $gwpip.Id
New-AzureRmVirtualNetworkGateway `
            -Name RMDemoGW `
            -ResourceGroupName $resourcegroupName `
            -Location $locationName `
            -IpConfigurations $gwipconfig `
            -GatewayType Vpn `
            -VpnType PolicyBased #PolicyBased For Static &amp; RouteBased for Dynamic VPN

# Get the Public IP
Get-AzureRmPublicIpAddress -Name RMDemoPIP -ResourceGroupName $resourcegroupName

# Establish the VPN connection
$gateway1 = Get-AzureRmVirtualNetworkGateway -Name RMDemoGW -ResourceGroupName $resourcegroupName
$local = Get-AzureRmLocalNetworkGateway -Name LocalSite -ResourceGroupName $resourcegroupName
New-AzureRmVirtualNetworkGatewayConnection `
            -Name localtovpn `
            -ResourceGroupName $resourcegroupName `
            -Location $locationName `
            -VirtualNetworkGateway1 $gateway1 `
            -LocalNetworkGateway2 $local `
            -ConnectionType IPsec `
            -RoutingWeight 10 `
            -SharedKey 'ABCDEFG1234567890'

#check the VPN status
Get-AzureRMVirtualNetworkGatewayConnection -Name localtovpn -ResourceGroupName $resourcegroupName -Debug
</pre>
<p>Finally, since there is no way to download the configuration script at this time, the sample configurations can be found here: <a href="https://github.com/Azure/Azure-vpn-config-samples" target="_blank">https://github.com/Azure/Azure-vpn-config-samples</a></p>
<p>After the creation of the VPN, that can be done only using PowerShell, we can use the portal to view the status and the settings</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;ox&#105;m&#097;g&#114;&#064;ho&#116;&#109;&#097;i&#108;.&#099;&#111;&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazurerm-create-site-to-site-vpn%2F&amp;linkname=AzureRm%20%7C%20Create%20Site%20to%20Site%20VPN" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazurerm-create-site-to-site-vpn%2F&amp;linkname=AzureRm%20%7C%20Create%20Site%20to%20Site%20VPN" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazurerm-create-site-to-site-vpn%2F&#038;title=AzureRm%20%7C%20Create%20Site%20to%20Site%20VPN" data-a2a-url="https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/" data-a2a-title="AzureRm | Create Site to Site VPN"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/">AzureRm | Create Site to Site VPN</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azurerm-create-site-to-site-vpn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
