You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/route-server/peer-route-server-with-virtual-appliance.md
+45-72Lines changed: 45 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,23 +5,22 @@ author: duongau
5
5
ms.author: duau
6
6
ms.service: azure-route-server
7
7
ms.topic: tutorial
8
-
ms.date: 07/11/2025
8
+
ms.date: 03/03/2026
9
9
ms.custom: sfi-image-nochange
10
10
11
11
---
12
12
13
13
# Tutorial: Configure BGP peering between Azure Route Server and network virtual appliance (NVA)
14
14
15
-
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Windows Server network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
15
+
This tutorial shows you how to deploy Azure Route Server and configure BGP peering with a Linux-based network virtual appliance (NVA). You learn the complete process from deployment through route verification, providing hands-on experience with dynamic routing in Azure virtual networks.
16
16
17
17
By the end of this tutorial, you have a working Azure Route Server environment that demonstrates automatic route exchange between Azure's software-defined network and a network virtual appliance.
18
18
19
19
In this tutorial, you learn how to:
20
20
21
21
> [!div class="checklist"]
22
22
> * Deploy an Azure Route Server in a virtual network
23
-
> * Create and configure a Windows Server virtual machine as an NVA
24
-
> * Deploy Azure Bastion for secure VM access
23
+
> * Create and configure a Linux virtual machine as an NVA
25
24
> * Configure BGP routing on the network virtual appliance
26
25
> * Establish BGP peering between Route Server and the NVA
27
26
> * Verify route learning and propagation
@@ -83,11 +82,11 @@ In this section, you create an Azure Route Server that establishes BGP peering w
83
82
84
83
## Create a network virtual appliance (NVA)
85
84
86
-
In this section, you create a Windows Server virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
85
+
In this section, you create a Linux virtual machine that functions as a network virtual appliance and establish BGP communication with the Route Server.
87
86
88
87
### Create a virtual machine
89
88
90
-
Create a Windows Server VM in the virtual network you created earlier to act as a network virtual appliance.
89
+
Create a Linux VM in the virtual network you created earlier to act as a network virtual appliance.
91
90
92
91
1. In the search box at the top of the portal, enter **virtual machine**, and select **Virtual machines** from the search results.
93
92
@@ -105,12 +104,13 @@ Create a Windows Server VM in the virtual network you created earlier to act as
| Size | Choose a size or leave the default setting. |
110
109
|**Administrator account**||
110
+
| Authentication type | Select **SSH public key**. |
111
111
| Username | Enter a username. |
112
-
|Password | Enter a password. |
113
-
|Confirm password | Reenter the password. |
112
+
|SSH public key source | Select **Generate new key pair**. |
113
+
|Key pair name | Enter **myNVA-key**. |
114
114
115
115
1. Select the **Networking** tab or **Next: Disks >** then **Next: Networking >**.
116
116
@@ -126,80 +126,53 @@ Create a Windows Server VM in the virtual network you created earlier to act as
126
126
127
127
1. Select **Review + create** and then **Create** after validation passes.
128
128
129
-
### Deploy Azure Bastion
130
-
131
-
Azure Bastion uses your browser to connect to VMs in your virtual network over Secure Shell (SSH) or Remote Desktop Protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](../bastion/bastion-overview.md?toc=/azure/route-server/toc.json).
> The network security group rules block inbound SSH access from the internet. To run commands on the virtual machine, use the **Run command** feature in the Azure portal or deploy Azure Bastion. For more information about Azure Bastion, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
157
131
158
132
### Configure BGP on the virtual machine
159
133
160
-
In this section, you configure BGP settings on the VM so it can function as an NVA and exchange routes with the Route Server.
134
+
In this section, you install FRRouting (FRR) on the VM and configure BGP so it can function as an NVA and exchange routes with the Route Server.
161
135
162
136
> [!IMPORTANT]
163
-
> The Routing and Remote Access Service (RRAS) isn't supported in Azure for production use. However, in this tutorial, it's used to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace. For more information, see [Remote access overview](/windows-server/remote/remote-access/remote-access).
137
+
> FRRouting is used in this tutorial to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace.
138
+
164
139
1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines** in the search results.
165
140
166
141
1. Select **myNVA**.
167
142
168
-
1. Select **Connect** then **Connect via Bastion** in the **Overview** section.
169
-
170
-
1. In the **Bastion** connection page, enter or select the following information:
0 commit comments