You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/basic-public-ip-migrate-howto.md
+42-17Lines changed: 42 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,10 @@ ms.author: cherylmc
12
12
13
13
# How to migrate a Basic SKU public IP address to Standard SKU for VPN Gateway
14
14
15
-
This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5 for active-passive gateways (not active-active). For more information about Basic SKU migration, see [About migrating a Basic SKU public IP address to Standard SKU for VPN Gateway](basic-public-ip-migrate-about.md).
15
+
This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5. For more information about Basic SKU migration, see [About migrating a Basic SKU public IP address to Standard SKU for VPN Gateway](basic-public-ip-migrate-about.md).
16
16
17
17
> [!IMPORTANT]
18
-
> Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues).
18
+
> Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues). <br> For Active-Active Gateways this is in Preview.
19
19
20
20
During the public IP address SKU migration process, your Basic SKU public IP address resource is migrated to a Standard SKU public IP address resource. The IP address assigned to your gateway doesn't change.
### Point-to-Site VPN Gateways using legacy DNS limitation
143
+
### Guided migration for Point-to-Site VPN Gateways using legacy DNS (cloudapp.net)
144
144
145
-
Point-to-Site VPN Gateways that were originally deployed using legacy cloudapp.NET DNS infrastructure have specific limitations that prevent them from using the standard migration process described in this article. This section helps you identify if your gateway has this limitation and provides guidance on next steps.
145
+
Some Point-to-Site (P2S) VPN Gateways were originally deployed using legacy cloudapp.net DNS. These gateways cannot use the standard public IP migration process.
146
+
Azure now provides a guided migration experience in the Azure portal that enables eligible legacy DNS P2S gateways to migrate from a Basic SKU public IP address to a Standard SKU, without requiring customers to manually reconfigure DNS or Point-to-Site settings.
146
147
147
-
### Impact and timeline
148
-
149
-
VPN Gateways with legacy cloudapp.NET DNS configurations cannot be migrated using the current migration tools. These gateways require a specialized migration approach that is currently under development.
150
-
151
-
A guided migration experience for legacy DNS gateways is planned for release, with the timeline to be announced by the end of February 2026. Until this specialized migration becomes available, these gateways will continue to function normally but cannot be upgraded to Standard SKU public IP addresses.
152
-
153
-
### Important considerations
154
-
155
-
> [!IMPORTANT]
156
-
> If your gateway uses legacy DNS, follow these critical guidelines:
157
-
> -**Do NOT** remove your existing Point-to-Site configuration to attempt this migration.
158
-
> -**Do NOT** add new Point-to-Site configurations to existing gateways without Point-to-Site until the legacy DNS migration capability is released.
159
-
> - Continue using your current gateway configuration until the specialized migration tools become available.
160
148
161
149
### Check if your gateway uses legacy DNS
162
150
@@ -191,10 +179,47 @@ Follow these steps to determine if your VPN Gateway uses legacy cloudapp.NET DNS
191
179
192
180
For the latest updates on legacy DNS gateway migration availability, see the [VPN Gateway - What's New](whats-new.md) article.
193
181
182
+
## Migration
183
+
184
+
Follow these migration steps if your VPN Gateway uses legacy cloudapp.NET DNS
185
+
186
+
1. Prepare for migration: The preparation steps are the same as those in [How to migrate Basic SKU public IP address to Standard](basic-public-ip-migrate-howto.md?tabs=portal).
187
+
188
+
1. After the preparation step completes successfully, select Download VPN Client to download the updated VPN client profile (ZIP). Then, use the downloaded profile to reconnect and validate Point-to-Site (P2S) connectivity.
189
+
190
+
1. After that, the Migrate and Commit steps are the same as mentioned in [How to migrate Basic SKU public IP address to Standard](basic-public-ip-migrate-howto.md?tabs=portal)
191
+
192
+
194
193
## Known Issues continuation
195
194
196
195
* For VpnGw1 CSES to Virtual Machine Scale Sets migration, we are seeing higher CPU utilization due to .NET core optimization. This is a known issue and we recommend to either wait for 10 minutes after prepare stage or upgrade to a higher gateway SKU during the migration process.
197
196
197
+
## What is the known Traffic selector behavior during Active-Active VPN Gateway migration?
198
+
199
+
When migrating an Active Active Azure VPN Gateway that has BGP enabled, IPsec tunnels may go down after migration if Narrow Traffic Selectors are both configured.
200
+
This behavior can cause site to site connectivity loss immediately after migration.
201
+
202
+
* Which configurations are impacted?
203
+
204
+
This behavior applies only to the following scenario: <br>
205
+
• Active Active VPN Gateway <br>
206
+
• BGP enabled <br>
207
+
• Narrow (custom) traffic selectors on Azure or on the on prem device
208
+
209
+
* Which configurations are not impacted?
210
+
211
+
This behavior does not apply to: <br>
212
+
• Gateways that accept or negotiate wildcard (0.0.0.0/0) traffic selectors <br>
213
+
• Gateways without BGP enabled
214
+
215
+
* How can customers avoid this issue before migration?
216
+
217
+
To avoid connectivity loss during migration, customers who use Narrow Traffic Selectors should: <br>
218
+
• Change traffic selectors to wildcard (0.0.0.0/0) on the on premises VPN device before initiating migration, or <br>
219
+
• Ensure the on premises device can accept wildcard traffic selectors during IPsec negotiation <br>
220
+
Making this change prior to migration allows tunnels to renegotiate successfully after the gateway upgrade.
0 commit comments