Skip to content

Commit fc6e9c1

Browse files
Merge pull request #312508 from raboilla/patch-47
Revise migration guide for Basic SKU to Standard SKU to include LegacyDNS and A-A
2 parents 37832c7 + 3f22d1d commit fc6e9c1

1 file changed

Lines changed: 42 additions & 17 deletions

File tree

articles/vpn-gateway/basic-public-ip-migrate-howto.md

Lines changed: 42 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ ms.author: cherylmc
1212

1313
# How to migrate a Basic SKU public IP address to Standard SKU for VPN Gateway
1414

15-
This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5 for active-passive gateways (not active-active). For more information about Basic SKU migration, see [About migrating a Basic SKU public IP address to Standard SKU for VPN Gateway](basic-public-ip-migrate-about.md).
15+
This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5. For more information about Basic SKU migration, see [About migrating a Basic SKU public IP address to Standard SKU for VPN Gateway](basic-public-ip-migrate-about.md).
1616

1717
> [!IMPORTANT]
18-
> Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues).
18+
> Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues). <br> For Active-Active Gateways this is in Preview.
1919
2020
During the public IP address SKU migration process, your Basic SKU public IP address resource is migrated to a Standard SKU public IP address resource. The IP address assigned to your gateway doesn't change.
2121

@@ -140,23 +140,11 @@ Invoke-AzVirtualNetworkGatewayAbortMigration -InputObject $gateway
140140

141141
## Known Issues
142142

143-
### Point-to-Site VPN Gateways using legacy DNS limitation
143+
### Guided migration for Point-to-Site VPN Gateways using legacy DNS (cloudapp.net)
144144

145-
Point-to-Site VPN Gateways that were originally deployed using legacy cloudapp.NET DNS infrastructure have specific limitations that prevent them from using the standard migration process described in this article. This section helps you identify if your gateway has this limitation and provides guidance on next steps.
145+
Some Point-to-Site (P2S) VPN Gateways were originally deployed using legacy cloudapp.net DNS. These gateways cannot use the standard public IP migration process.
146+
Azure now provides a guided migration experience in the Azure portal that enables eligible legacy DNS P2S gateways to migrate from a Basic SKU public IP address to a Standard SKU, without requiring customers to manually reconfigure DNS or Point-to-Site settings.
146147

147-
### Impact and timeline
148-
149-
VPN Gateways with legacy cloudapp.NET DNS configurations cannot be migrated using the current migration tools. These gateways require a specialized migration approach that is currently under development.
150-
151-
A guided migration experience for legacy DNS gateways is planned for release, with the timeline to be announced by the end of February 2026. Until this specialized migration becomes available, these gateways will continue to function normally but cannot be upgraded to Standard SKU public IP addresses.
152-
153-
### Important considerations
154-
155-
> [!IMPORTANT]
156-
> If your gateway uses legacy DNS, follow these critical guidelines:
157-
> - **Do NOT** remove your existing Point-to-Site configuration to attempt this migration.
158-
> - **Do NOT** add new Point-to-Site configurations to existing gateways without Point-to-Site until the legacy DNS migration capability is released.
159-
> - Continue using your current gateway configuration until the specialized migration tools become available.
160148

161149
### Check if your gateway uses legacy DNS
162150

@@ -191,10 +179,47 @@ Follow these steps to determine if your VPN Gateway uses legacy cloudapp.NET DNS
191179

192180
For the latest updates on legacy DNS gateway migration availability, see the [VPN Gateway - What's New](whats-new.md) article.
193181

182+
## Migration
183+
184+
Follow these migration steps if your VPN Gateway uses legacy cloudapp.NET DNS
185+
186+
1. Prepare for migration: The preparation steps are the same as those in [How to migrate Basic SKU public IP address to Standard](basic-public-ip-migrate-howto.md?tabs=portal).
187+
188+
1. After the preparation step completes successfully, select Download VPN Client to download the updated VPN client profile (ZIP). Then, use the downloaded profile to reconnect and validate Point-to-Site (P2S) connectivity.
189+
190+
1. After that, the Migrate and Commit steps are the same as mentioned in [How to migrate Basic SKU public IP address to Standard](basic-public-ip-migrate-howto.md?tabs=portal)
191+
192+
194193
## Known Issues continuation
195194

196195
* For VpnGw1 CSES to Virtual Machine Scale Sets migration, we are seeing higher CPU utilization due to .NET core optimization. This is a known issue and we recommend to either wait for 10 minutes after prepare stage or upgrade to a higher gateway SKU during the migration process.
197196

197+
## What is the known Traffic selector behavior during Active-Active VPN Gateway migration?
198+
199+
When migrating an Active Active Azure VPN Gateway that has BGP enabled, IPsec tunnels may go down after migration if Narrow Traffic Selectors are both configured.
200+
This behavior can cause site to site connectivity loss immediately after migration.
201+
202+
* Which configurations are impacted?
203+
204+
This behavior applies only to the following scenario: <br>
205+
• Active Active VPN Gateway <br>
206+
• BGP enabled <br>
207+
• Narrow (custom) traffic selectors on Azure or on the on prem device
208+
209+
* Which configurations are not impacted?
210+
211+
This behavior does not apply to: <br>
212+
• Gateways that accept or negotiate wildcard (0.0.0.0/0) traffic selectors <br>
213+
• Gateways without BGP enabled
214+
215+
* How can customers avoid this issue before migration?
216+
217+
To avoid connectivity loss during migration, customers who use Narrow Traffic Selectors should: <br>
218+
• Change traffic selectors to wildcard (0.0.0.0/0) on the on premises VPN device before initiating migration, or <br>
219+
• Ensure the on premises device can accept wildcard traffic selectors during IPsec negotiation <br>
220+
Making this change prior to migration allows tunnels to renegotiate successfully after the gateway upgrade.
221+
222+
198223

199224
## Next steps
200225

0 commit comments

Comments
 (0)