You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/route-server/peer-route-server-with-virtual-appliance.md
+53-46Lines changed: 53 additions & 46 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,22 +5,22 @@ author: duongau
5
5
ms.author: duau
6
6
ms.service: azure-route-server
7
7
ms.topic: tutorial
8
-
ms.date: 09/17/2025
8
+
ms.date: 03/03/2026
9
9
ms.custom: sfi-image-nochange
10
10
11
11
---
12
12
13
13
# Tutorial: Configure BGP peering between Azure Route Server and network virtual appliance (NVA)
14
14
15
-
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Windows Server network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
15
+
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Linux-based network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
16
16
17
17
By the end of this tutorial, you have a working Azure Route Server environment that demonstrates automatic route exchange between Azure's software-defined network and a network virtual appliance.
18
18
19
19
In this tutorial, you learn how to:
20
20
21
21
> [!div class="checklist"]
22
22
> * Deploy an Azure Route Server in a virtual network
23
-
> * Create and configure a Windows Server virtual machine as an NVA
23
+
> * Create and configure a Linux virtual machine as an NVA
24
24
> * Configure BGP routing on the network virtual appliance
25
25
> * Establish BGP peering between Route Server and the NVA
26
26
> * Verify route learning and propagation
@@ -82,11 +82,11 @@ In this section, you create an Azure Route Server that establishes BGP peering w
82
82
83
83
## Create a network virtual appliance (NVA)
84
84
85
-
In this section, you create a Windows Server virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
85
+
In this section, you create a Linux virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
86
86
87
87
### Create a virtual machine
88
88
89
-
Create a Windows Server VM in the virtual network you created earlier to act as a network virtual appliance.
89
+
Create a Linux VM in the virtual network you created earlier to act as a network virtual appliance.
90
90
91
91
1. In the search box at the top of the portal, enter **virtual machine**, and select **Virtual machines** from the search results.
92
92
@@ -104,12 +104,13 @@ Create a Windows Server VM in the virtual network you created earlier to act as
| NIC network security group | Select **Basic**. |
124
-
| Public inbound ports | Select **Allow selected ports**. |
125
-
| Select inbound ports | Select **RDP (3389)**. |
126
-
127
-
> [!CAUTION]
128
-
> Leaving the RDP port open to the internet isn't recommended. Restrict access to the RDP port to a specific IP address or range of IP addresses. For production environments, it's recommended to block internet access to the RDP port and use [Azure Bastion](../bastion/bastion-overview.md?toc=/azure/route-server/toc.json) to securely connect to your virtual machine from the Azure portal.
123
+
| Public IP | Select **None**. |
124
+
| NIC network security group | Select **Advanced**. |
125
+
| Configure network security group | Select **Create new**.</br> In **Name** enter **nsg-nva**.</br> Select **OK**. |
129
126
130
127
1. Select **Review + create** and then **Create** after validation passes.
131
128
129
+
> [!NOTE]
130
+
> The network security group rules block inbound SSH access from the internet. To run commands on the virtual machine, use the **Run command** feature in the Azure portal or deploy Azure Bastion. For more information about Azure Bastion, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
131
+
132
132
### Configure BGP on the virtual machine
133
133
134
-
In this section, you configure BGP settings on the VM so it can function as an NVA and exchange routes with the Route Server.
134
+
In this section, you install FRRouting (FRR) on the VM and configure BGP so it can function as an NVA and exchange routes with the Route Server.
135
135
136
136
> [!IMPORTANT]
137
-
> The Routing and Remote Access Service (RRAS) isn't supported in Azure for production use. However, in this tutorial, it's used to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace. For more information, see [Remote access overview](/windows-server/remote/remote-access/remote-access).
138
-
1. Go to **myNVA** virtual machine and select **Connect**.
139
-
140
-
1. On the **Connect** page, select **Download RDP file** under **Native RDP**.
141
-
142
-
1. Open the downloaded file.
143
-
144
-
1. Select **Connect** and then enter the username and password that you created in the previous steps. Accept the certificate if prompted.
> FRRouting is used in this tutorial to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace.
138
+
139
+
1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines** in the search results.
140
+
141
+
1. Select **myNVA**.
142
+
143
+
1. In **Operations**, select **Run command** then **RunShellScript**.
144
+
145
+
1. Enter the following script in the **Run Command Script** window, then select **Run**:
0 commit comments