Skip to content

Commit 1ddda42

Browse files
authored
Merge pull request #312329 from asudbring/tsk556121-sfi-bastion
SFI Bastion security update - Route Server BGP peering tutorial
2 parents ba01801 + 6292270 commit 1ddda42

1 file changed

Lines changed: 53 additions & 46 deletions

File tree

articles/route-server/peer-route-server-with-virtual-appliance.md

Lines changed: 53 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,22 @@ author: duongau
55
ms.author: duau
66
ms.service: azure-route-server
77
ms.topic: tutorial
8-
ms.date: 09/17/2025
8+
ms.date: 03/03/2026
99
ms.custom: sfi-image-nochange
1010

1111
---
1212

1313
# Tutorial: Configure BGP peering between Azure Route Server and network virtual appliance (NVA)
1414

15-
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Windows Server network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
15+
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Linux-based network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
1616

1717
By the end of this tutorial, you have a working Azure Route Server environment that demonstrates automatic route exchange between Azure's software-defined network and a network virtual appliance.
1818

1919
In this tutorial, you learn how to:
2020

2121
> [!div class="checklist"]
2222
> * Deploy an Azure Route Server in a virtual network
23-
> * Create and configure a Windows Server virtual machine as an NVA
23+
> * Create and configure a Linux virtual machine as an NVA
2424
> * Configure BGP routing on the network virtual appliance
2525
> * Establish BGP peering between Route Server and the NVA
2626
> * Verify route learning and propagation
@@ -82,11 +82,11 @@ In this section, you create an Azure Route Server that establishes BGP peering w
8282
8383
## Create a network virtual appliance (NVA)
8484

85-
In this section, you create a Windows Server virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
85+
In this section, you create a Linux virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
8686

8787
### Create a virtual machine
8888

89-
Create a Windows Server VM in the virtual network you created earlier to act as a network virtual appliance.
89+
Create a Linux VM in the virtual network you created earlier to act as a network virtual appliance.
9090

9191
1. In the search box at the top of the portal, enter **virtual machine**, and select **Virtual machines** from the search results.
9292

@@ -104,12 +104,13 @@ Create a Windows Server VM in the virtual network you created earlier to act as
104104
| Region | Select **(US) East US**. |
105105
| Availability options | Select **No infrastructure required**. |
106106
| Security type | Select a security type. This tutorial uses **Standard**. |
107-
| Image | Select a **Windows Server** image. This tutorial uses **Windows Server 2022 Datacenter: Azure Edition - x64 Gen2** image. |
107+
| Image | Select **Ubuntu Server 24.04 LTS - x64 Gen2**. |
108108
| Size | Choose a size or leave the default setting. |
109109
| **Administrator account** | |
110+
| Authentication type | Select **SSH public key**. |
110111
| Username | Enter a username. |
111-
| Password | Enter a password. |
112-
| Confirm password | Reenter the password. |
112+
| SSH public key source | Select **Generate new key pair**. |
113+
| Key pair name | Enter **myNVA-key**. |
113114

114115
1. Select the **Networking** tab or **Next: Disks >** then **Next: Networking >**.
115116

@@ -119,53 +120,59 @@ Create a Windows Server VM in the virtual network you created earlier to act as
119120
| -------- | ----- |
120121
| Virtual network | Select **myVirtualNetwork**. |
121122
| Subnet | Select **mySubnet (10.0.0.0/24)**. |
122-
| Public IP | Leave as default. |
123-
| NIC network security group | Select **Basic**. |
124-
| Public inbound ports | Select **Allow selected ports**. |
125-
| Select inbound ports | Select **RDP (3389)**. |
126-
127-
> [!CAUTION]
128-
> Leaving the RDP port open to the internet isn't recommended. Restrict access to the RDP port to a specific IP address or range of IP addresses. For production environments, it's recommended to block internet access to the RDP port and use [Azure Bastion](../bastion/bastion-overview.md?toc=/azure/route-server/toc.json) to securely connect to your virtual machine from the Azure portal.
123+
| Public IP | Select **None**. |
124+
| NIC network security group | Select **Advanced**. |
125+
| Configure network security group | Select **Create new**.</br> In **Name** enter **nsg-nva**.</br> Select **OK**. |
129126

130127
1. Select **Review + create** and then **Create** after validation passes.
131128

129+
> [!NOTE]
130+
> The network security group rules block inbound SSH access from the internet. To run commands on the virtual machine, use the **Run command** feature in the Azure portal or deploy Azure Bastion. For more information about Azure Bastion, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
131+
132132
### Configure BGP on the virtual machine
133133

134-
In this section, you configure BGP settings on the VM so it can function as an NVA and exchange routes with the Route Server.
134+
In this section, you install FRRouting (FRR) on the VM and configure BGP so it can function as an NVA and exchange routes with the Route Server.
135135

136136
> [!IMPORTANT]
137-
> The Routing and Remote Access Service (RRAS) isn't supported in Azure for production use. However, in this tutorial, it's used to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace. For more information, see [Remote access overview](/windows-server/remote/remote-access/remote-access).
138-
1. Go to **myNVA** virtual machine and select **Connect**.
139-
140-
1. On the **Connect** page, select **Download RDP file** under **Native RDP**.
141-
142-
1. Open the downloaded file.
143-
144-
1. Select **Connect** and then enter the username and password that you created in the previous steps. Accept the certificate if prompted.
145-
146-
1. Run PowerShell as an administrator.
147-
148-
1. In PowerShell, execute the following cmdlets:
149-
150-
```powershell
151-
# Install required Windows features.
152-
Install-WindowsFeature RemoteAccess
153-
Install-WindowsFeature RSAT-RemoteAccess-PowerShell
154-
Install-WindowsFeature Routing
155-
Install-RemoteAccess -VpnType RoutingOnly
156-
157-
# Configure BGP & Router ID on the Windows Server
158-
Add-BgpRouter -BgpIdentifier 10.0.0.4 -LocalASN 65001
159-
160-
# Configure Azure Route Server as a BGP Peer.
161-
Add-BgpPeer -LocalIPAddress 10.0.0.4 -PeerIPAddress 10.0.1.4 -PeerASN 65515 -Name RS_IP1
162-
Add-BgpPeer -LocalIPAddress 10.0.0.4 -PeerIPAddress 10.0.1.5 -PeerASN 65515 -Name RS_IP2
163-
164-
# Originate and announce BGP routes.
165-
Add-BgpCustomRoute -network 172.16.1.0/24
166-
Add-BgpCustomRoute -network 172.16.2.0/24
137+
> FRRouting is used in this tutorial to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace.
138+
139+
1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines** in the search results.
140+
141+
1. Select **myNVA**.
142+
143+
1. In **Operations**, select **Run command** then **RunShellScript**.
144+
145+
1. Enter the following script in the **Run Command Script** window, then select **Run**:
146+
147+
```bash
148+
#!/bin/bash
149+
# Install FRRouting
150+
sudo apt-get update && sudo apt-get install -y frr
151+
152+
# Enable BGP daemon
153+
sudo sed -i 's/bgpd=no/bgpd=yes/' /etc/frr/daemons
154+
155+
# Write BGP configuration
156+
sudo tee /etc/frr/frr.conf > /dev/null << 'EOF'
157+
frr version 8.1
158+
frr defaults traditional
159+
hostname myNVA
160+
router bgp 65001
161+
bgp router-id 10.0.0.4
162+
neighbor 10.0.1.4 remote-as 65515
163+
neighbor 10.0.1.5 remote-as 65515
164+
address-family ipv4 unicast
165+
network 172.16.1.0/24
166+
network 172.16.2.0/24
167+
exit-address-family
168+
EOF
169+
170+
# Restart FRR to apply configuration
171+
sudo systemctl restart frr
167172
```
168173
174+
1. Wait for the script to complete. The output confirms the FRR installation and BGP configuration.
175+
169176
## Configure Route Server peering
170177
171178
Now that you have configured BGP on the virtual machine, you need to add the NVA as a BGP peer in the Route Server configuration.

0 commit comments

Comments
 (0)