You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/tcp-tls-proxy-overview.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: mbender-ms
6
6
ms.service: azure-application-gateway
7
7
ms.topic: concept-article
8
-
ms.date: 05/21/2025
8
+
ms.date: 10/14/2025
9
9
ms.author: mbender
10
10
# Customer intent: As a network architect, I want to implement TCP/TLS proxy capabilities on an application gateway, so that I can efficiently manage both HTTP and non-HTTP workloads while ensuring secure connections to backend servers.
11
11
---
@@ -33,6 +33,21 @@ Process flow:
33
33
|[**Azure Load Balancer**](../load-balancer/load-balancer-overview.md)| A pass-through load balancer where a client directly establishes a connection with a backend server selected by the Load Balancer's distribution algorithm. |
34
34
|**Azure Application Gateway**| Terminating load balancer where a client directly establishes a connection with Application Gateway and a separate connection is initiated with a backend server selected by Application Gateway's distribution algorithm. |
35
35
36
+
#### Azure Application Gateway (TLS/TCP proxy)
37
+
-**Type** – Layer-4 terminating proxy.
38
+
-**Protocols** – Supports TCP or TLS protocols.
39
+
-**Versatility** – Use a single endpoint (frontend IP) to serve HTTP and non-HTTP workloads.
40
+
-**Scaling** – Configure autoscaling (up to 125 instances) to serve your TCP and TLS traffic.
41
+
-**Security through TLS termination** – Simplify security with centralized TLS termination and certificate management ensuring consistent compliance across all applications, including non-HTTP workloads. Seamlessly integrates with Azure Key Vault for secure certificate management.
42
+
-**Backend types** – Flexibly connect your applications to backends anywhere; within the same Virtual Network, across peered VNets, through remote FQDNs or IPs, or even via hybrid connectivity to your on-premises servers.
43
+
44
+
#### Azure Load Balancer
45
+
-**Type** – Layer-4 pass-through network device.
46
+
-**Protocols** – Supports TCP or UDP protocols.
47
+
-**Performance** – Provides low latency and high throughput. Built for millions of simultaneous connections with microsecond-level latency.
48
+
-**Scaling** – Handles long-lived connections and scales up to millions of flows for all TCP and UDP applications.
49
+
-**Inbound and outbound** – Azure Load Balancer delivers complete traffic control with both inbound and outbound capabilities. Seamlessly connect external clients to your applications, while enabling your backend instances to securely reach the internet and other services.
50
+
-**Direct server return** - For the return traffic, the backend instance sends the response packet directly back to the client's IP address, reducing latency and improving performance.
Copy file name to clipboardExpand all lines: articles/virtual-wan/about-virtual-hub-routing.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,6 +96,10 @@ Route tables now have features for association and propagation. A pre-existing r
96
96
97
97
Virtual hub **Reset** is available only in the Azure portal. Resetting provides you with a way to bring any failed resources such as route tables, hub router, or the virtual hub resource itself back to its rightful provisioning state. Consider resetting the hub before contacting Microsoft for support. This operation doesn't reset any of the gateways in a virtual hub.
98
98
99
+
## <aname="reset"></a>Router reset
100
+
101
+
If your Virtual Hub Router enters a failed state, you may be unable to update routes, even though network connectivity might still work. In this scenario, use the **Reset router** option in the vHub settings to restore normal operation. This process typically takes less than 10 minutes and rarely disrupts network traffic. Use this option if the Hub status is in a succeeded state while the routing status is in a failed state.
Copy file name to clipboardExpand all lines: articles/virtual-wan/nat-rules-vpn-gateway.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ The following diagram shows the projected result:
99
99
For instance, if the on-premises BGP IP address is 10.30.0.133 and there is an **Ingress NAT Rule** that translates 10.30.0.0/24 to 172.30.0.0/24, the VPN site's **Link Connection BGP Address** must be configured to be the translated address (172.30.0.133).
100
100
* In Dynamic NAT, on-premises BGP peer IP can't be part of the pre-NAT address range (**Internal Mapping**) as IP and port translations aren't fixed. If there is a need to translate the on-premises BGP peering IP, please create a separate **Static NAT Rule** that translates BGP Peering IP address only.
101
101
102
-
For instance, if the on-premises network has an address space of 10.0.0.0/24 with an on-premises BGP peer IP of 10.0.0.1 and there is an **Ingress Dynamic NAT Rule** to translate 10.0.0.0/24 to 192.198.0.0/32, a separate **Ingress Static NAT Rule** translating 10.0.0.1/32 to 192.168.0.02/32 is required and the corresponding VPN site's **Link Connection BGP address** must be updated to the NAT-translated address (part of the External Mapping).
102
+
For instance, if the on-premises network has an address space of 10.0.0.0/24 with an on-premises BGP peer IP of 10.0.0.1 and there is an **Ingress Dynamic NAT Rule** to translate 10.0.0.0/24 to 192.198.0.0/24, a separate **Ingress Static NAT Rule** translating 10.0.0.1/32 to 192.168.0.1/32 is required and the corresponding VPN site's **Link Connection BGP address** must be updated to the NAT-translated address (part of the External Mapping).
103
103
104
104
### Ingress SNAT (VPN site with statically configured routes)
Copy file name to clipboardExpand all lines: articles/vpn-gateway/basic-public-ip-migrate-howto.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ This article helps you migrate a Basic SKU public IP address to a Standard SKU f
20
20
21
21
During the public IP address SKU migration process, your Basic SKU public IP address resource is migrated to a Standard SKU public IP address resource. The IP address assigned to your gateway doesn't change.
22
22
23
-
Additionally, if your VPN Gateway gateway SKU is VpnGw 1-5, your gateway SKU is migrated to a VPN Gateway AZ SKU (VpnGw 1-5 AZ). For more information, see [About VPN Gateway SKU consolidation and migration](gateway-sku-consolidation.md).
23
+
Additionally, if your VPN Gateway gateway SKU is VpnGw 1-5, your gateway SKU might be migrated to a VPN Gateway AZ SKU (VpnGw 1-5 AZ). For more information, see [About VPN Gateway SKU consolidation and migration](gateway-sku-consolidation.md).
24
24
25
25
> [!NOTE]
26
26
> Migration functionality is rolling out to regions. If you don't see the **Migrate** tab in the Azure portal, it means that the migration process isn't available yet in your region. For more information, see the [VPN Gateway - What's New](whats-new.md#upcoming-projected-changes) article.
Copy file name to clipboardExpand all lines: articles/vpn-gateway/packet-capture.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,10 +29,12 @@ The following examples of JSON and a JSON schema provide explanations of each pr
29
29
- You can't run multiple gateway-wide packet captures at the same time.
30
30
- You can't run multiple packet captures on a single connection at the same time. You can run multiple packet captures on different connections at the same time.
31
31
- A maximum of five packet captures can be run in parallel per gateway. These packet captures can be a combination of gateway-wide packet captures and per-connection packet captures.
32
-
- The unit for MaxPacketBufferSize is bytes and MaxFileSize is megabytes
32
+
- The unit for MaxPacketBufferSize is bytes.
33
+
- The unit for MaxFileSize is megabytes.
33
34
34
35
> [!NOTE]
35
36
> Set the **CaptureSingleDirectionTrafficOnly** option to **false** if you want to capture both inner and outer packets.
37
+
> When analyzing pcap files containing packets that got truncated due to the **MaxPacketBufferSize** setting, this may result in unexpected warnings like "TCP Previous segment not captured" and "TCP ACKed unseen segment".
Copy file name to clipboardExpand all lines: articles/vpn-gateway/vpn-gateway-vpn-faq.md
+19-9Lines changed: 19 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get answers to frequently asked questions about VPN Gateway connect
4
4
author: cherylmc
5
5
ms.service: azure-vpn-gateway
6
6
ms.topic: concept-article
7
-
ms.date: 05/09/2025
7
+
ms.date: 09/09/2025
8
8
ms.author: cherylmc
9
9
# Customer intent: As a network administrator, I want to understand the configuration options and limitations of Azure VPN Gateway, so that I can effectively manage cross-premises connections and optimize my organization’s hybrid network architecture.
10
10
---
@@ -155,6 +155,10 @@ We're taking action to ensure the continued operation of deployed VPN gateways t
155
155
156
156
However, Basic SKU public IP addresses are being phased out. Going forward, when you create a VPN gateway, you must use the Standard SKU public IP address. You can find details on the retirement of Basic SKU public IP addresses in the [Azure Updates announcement](https://azure.microsoft.com/updates/upgrade-to-standard-sku-public-ip-addresses-in-azure-by-30-september-2025-basic-sku-will-be-retired).
157
157
158
+
> [!NOTE]
159
+
> The timeline for the VPN Gateway using Azure Basic IP is subject to frequent updates.
160
+
> For the latest migration timeline, please see [this page](/azure/vpn-gateway/whats-new#upcoming-projected-changes).
161
+
158
162
### How is my VPN tunnel authenticated?
159
163
160
164
Azure VPN Gateway uses preshared key (PSK) authentication. We generate a PSK when we create the VPN tunnel. You can change the automatically generated PSK to your own by using the Set Pre-Shared Key REST API or PowerShell cmdlet.
@@ -211,7 +215,7 @@ See the following articles:
211
215
212
216
The Standard and High Performance SKUs will be deprecated on September 30, 2025. You can view the announcement on the [Azure Updates site](https://go.microsoft.com/fwlink/?linkid=2255127). The product team will make a migration path available for these SKUs by November 30, 2024. For more information, see the [VPN Gateway legacy SKUs](vpn-gateway-about-skus-legacy.md#sku-deprecation) article.
213
217
214
-
*At this time, there's no action that you need to take.*
218
+
For the latest migration timeline, please see [Upcoming projected changes](/azure/vpn-gateway/whats-new#upcoming-projected-changes).
@@ -226,14 +230,20 @@ The expected customer impact includes new [pricing](https://azure.microsoft.com/
226
230
227
231
### What is the anticipated timeline for the migration?
228
232
229
-
These timelines may be subject to change. Please revisit this for the most updated timeline. Here's the anticipated timeline for the migration tool availability.
233
+
Here is the anticipated timeline for the migration tool availability and Basic SKU Public IP deprecation.
| Aug 4, 2025 | Migration tooling for Basic SKU Public IP to Standard SKU becomes available (Public Preview) for **Active-Passive VPN Gateways** in Public Cloud. |
238
+
| Sep 2025 (tentative GA) | Temporary GA timeline for Public and Sovereign Cloud support. |
239
+
| End of Sep 2025 (tentative GA)| Migration tooling GA for **Active-Active VPN Gateways** (Basic → Standard SKU Public IP). |
240
+
| Oct 2025 (planned) | Automated capability becomes available to remove the Basic public IP from **Basic SKU Gateways**. Existing IP addresses remain unchanged and connectivity is not interrupted. |
241
+
| Aug 4, 2025 – End of Jan 2026 | Customer-controlled migrations can be initiated after tool availability (approx. 6 months window). |
242
+
| End of Jan 2026 | Overall migration timeline for all VPN Gateways with Basic IP is extended until this date. |
243
+
| Feb 2026 | Basic SKU Public IP addresses are fully deprecated. |
Copy file name to clipboardExpand all lines: includes/bastion-native-connect-tunnel.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Steps:
21
21
22
22
1. Sign in to your Azure account using `az login`. If you have more than one subscription, you can view them using `az account list` and select the subscription containing your Bastion resource using `az account set --subscription "<subscription ID>"`.
23
23
24
-
1. Open the tunnel to your target VM.
24
+
1. Open the tunnel to your target VM. Without root privileges use local port 1024 or above as ports below that are privileged ports only accessible by root.
25
25
26
26
```azurecli
27
27
az network bastion tunnel --name "<BastionName>" --resource-group "<ResourceGroupName>" --target-resource-id "<VMResourceId or VMSSInstanceResourceId>" --resource-port "<TargetVMPort>" --port "<LocalMachinePort>"
Copy file name to clipboardExpand all lines: includes/vpn-gateway-p2s-clientcert-include.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ You can generate client certificates by using the following methods:
14
14
15
15
***Enterprise certificate:**
16
16
17
-
* If you're using an enterprise certificate solution, generate a client certificate with the common name value format *name\@yourdomain.com*. Use this format instead of the *domain name\username* format.
17
+
* If you're using an enterprise certificate solution, generate a client certificate with the common name value format *name\@contoso.com*. Use this format instead of the *domain name\username* format.
18
18
19
19
* Make sure the client certificate is based on a user certificate template that has *Client Authentication* listed as the first item in the user list. Check the certificate by double-clicking it and viewing **Enhanced Key Usage** in the **Details** tab.
20
20
@@ -28,4 +28,4 @@ You can generate client certificates by using the following methods:
28
28
29
29
*[MakeCert instructions](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-makecert.md): Use MakeCert if you don't have access to a Windows 10 or later computer for generating certificates. Although MakeCert is deprecated, you can still use it to generate certificates. You can install the generated certificates on any supported P2S client.
30
30
31
-
* Linux: See [strongSwan](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-linux.md) or [OpenSSL](../articles/vpn-gateway/point-to-site-certificates-linux-openssl.md) instructions.
31
+
* Linux: See [strongSwan](../articles/vpn-gateway/vpn-gateway-certificates-point-to-site-linux.md) or [OpenSSL](../articles/vpn-gateway/point-to-site-certificates-linux-openssl.md) instructions.
0 commit comments