Monitoring of Azure VPN Gateway - azure

We have a VPN Gateway in Azure with sku VpnGw1, so it should be able to handle 650 Mb/s.
We have one S2S connection and we've enabled P2S connectivity.
I would like to monitor the VPN Gateway so I know when we're getting close to the 650 Mb/s.
I assume that the 650 Mb/s is the bandwith consumed by both P2S and S2S. Or?
I've been looking at the metrics available but don't really understand what they tell me.
I've found these metrics that should be of intrest: Tunnel Bandwidth, Gateway S2S Bandwidth and Gateway P2S Bandwidth.
I've seen this site but I don't think it really explains the differences enough:
https://learn.microsoft.com/en-us/azure/vpn-gateway/monitor-vpn-gateway
These are the values I get when I look at the three metrics. It doesn't make sense to me.
Can someone explain to me?

Azure VPN Gateway with sku VpnGw1 has Throughput Benchmark 650 Mb/s.
P2S and S2S both consume 650 Mb/s bandwidth of Azure VPN Gateway.
Throughput Benchmark is metric calculated by Azure. It is obtained by running iperf3 between VNets in the same region, with minimum duration of 120 seconds and up to 32 flows.
Metrics that are available in Azure Monitor for monitoring Azure VPN gateways have different display names:
AverageBandwidth -> Gateway S2S Bandwidth
P2SBandwidth -> Gateway P2S Bandwidth
TunnelAverageBandwidth -> Tunnel Bandwidth
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/azure-monitor/essentials/metrics-supported.md
You can check real bandwidth of Azure VPN Gateway by running Iperf test from your location.
https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-validate-throughput-to-vnet#run-iperf-iperf3exe
Or by using Azure Throughput Analyzer Tool
https://www.microsoft.com/en-us/download/details.aspx?id=52038&from=https%3A%2F%2Fresearch.microsoft.com%2Fen-us%2Fdownloads%2F5c8189b9-53aa-4d6a-a086-013d927e15a7%2Fdefault.aspx
You can check latency from your location to Azure VPN Gateway by using link below
https://www.azurespeed.com/Azure/Latency
https://azure.microsoft.com/en-us/blog/new-azure-vpn-gateways-now-6x-faster/

Related

Azure S2S VPN Gateway connection 0 B data in

We set up a Azure site to site VPN connection to a Cisco ASA device, which in Azure shows 'connected' and some data out but no data in (0 B). The connection uses IPSec (IKEv2) which seems fine in Azure but shows no traffic on-prem. How is that possible?
Can I eliminate an issue with routing on Azure VNet? (we do have a custom route to direct traffic to VNet Gateway associated with both subnets: default + GatewaySubnet).
Pinging on-prem IP address from Azure VM in the VNet does increase data out, but still nothing is seen on-prem. May it be some NATing issue on-prem?
Any suggestion where to look? TIA.

Azure VM Bandwidth Limit

I have a virtual machine on Azure and I was wondering if there is a bandwidth limit for it.
By bandwidth limit I mean, a limit like 15GB of outbound and inbound data transfer.
I tried checking some forums about this but could not find a clear answer.
Yes, as your VM will be on shared infrastructure, there are bandwidth limits for your VM. And the bandwidth is metered on egress (outbound) only and not on the ingress (inbound).
Further the bandwidth depends on your VM Size. The below link gives the network bandwidth limit of Dav4 and Dasv4-series
https://learn.microsoft.com/en-us/azure/virtual-machines/dav4-dasv4-series
For more information on Virtual Machine network bandwidth,
refer this link https://learn.microsoft.com/en-us/azure/virtual-network/virtual-machine-network-throughput
Hope this helps

How to measure the network traffic in/out between two virtual networks in azure?

I have deployed two virtual network gateway associated two different virtual networks. I have connected them via two connections (say connect_1 and connect_2).
As soon as I did this, on the azure portal I can see some bytes of data getting in and out.(Data in:202.28 KiB, Data out:202.66 KiB)
How is this possible when i haven`t exchanged any data?
Also, if I exchange data, what will be the parameter to measure the bandwidth? Will it be tunnel_egress_bytes_transferred and tunnel_ingress_bytes_transferred?
For the current VPN gateway bandwidth in use, you could check the metric Gateway S2S Bandwidth for all connections associated with this gateway.
If you exchange data, you could check these dimension metrics with Tunnel prefix name for each of VNET to VNET connections in the Virtual network gateway panel. For example, select the metric TunnelAverageBandwidth with filtering ConnectionName or RemoteIP, you will see the specific tunnel bandwidth in bytes per second.
Additionally, if you just want to connect the two virtual networks in Azure, you could select VNet peering. It has simple operation and less cost.

Site to site Azure tunnel from on premises network to all vnets on Azure?

Is it possible to have Site to site Azure tunnel from on premises network to all vnets on Azure?
The short answer is yes, see our FAQ. The longer answer would involve understanding your requirements more. Depending on the "SKU" you pick for your VPN gateway in Azure, there is a limit to the number of tunnels. The largest SKU limits at 30 tunnels. If you need more than 30 S2S tunnels, you may want to look at Azure Virtual WAN.
Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. Virtual WAN lets you connect and configure branch devices to communicate with Azure.

Inbound/Outbound Traffic Logging Azure VPN Gateway

I have a IPSEC connection from On-PREM to Azure via VPN gateway. I want to monitor all traffic, aka src/dest, ports, and data that ever enters or leaves that VPN gateway. How would I accomplish this under Azure?
You could check out Azure Network Watcher. It will log the flows from your networks. It won't provide exact transfer amounts of traffic, but it will show traffic distribution and patterns.
Included in the Azure Network Watcher is also packet capture and if I remember right it also will show what ports the traffic is going over as well as source and destination IPs.
There are also some easily found Power-Bi templates that will read the logs and let you do some interactive digging.
https://learn.microsoft.com/en-us/azure/network-watcher/
Not at the moment - your only options are
To log traffic via NSGs for resources attached to VNETs
deploy a 3rd party VPN gateway with associated Route tables.
Logging is the biggest restraint I've run into with the native VPN GATEWAY.
Hopefully this will improve with time.

Resources