connect non domain joined PC to a single Server in Azure - azure

I have an application that different clients will connect to on Azure. Each of my customers needs to connect to their Corresponding own Server ONLY in Azure from their local networks.
What kind of connection (P2S,S2S) can i create from each of my customers PC to connect ONLY with their Server in Azure?

According to your scenario, I think P2S is better for you.
Site-to-Site configurations are between your on-premises location and Azure. This means that you can connect from any of your computers
located on your premises to any virtual machine or role instance
within your virtual network, depending on how you choose to configure
routing. This type of connection relies on an IPsec VPN appliance
(hardware or soft appliance), which must be deployed at the edge of
your network. To create this type of connection, you must have the
required VPN hardware and an externally facing IPv4 address.
If my understanding is correct, your customers clients are not in one location, they have different private IP. Based on my knowledge, you could not use S2S VPN.
Point-to-Site configurations let you connect from a single computer
from anywhere to anything located in your virtual network.
P2S VPN does not require a VPN device. It is better for your scenario.
More information about difference between a Site-to-Site connection and Point-to-Site please refer to this link.

Related

Multiple Azure Local Network Gateways that aren't connected to eachother

I'd like to setup a VPN connection from my office towards Azure.
The Azure environment should also contain Local Network Gateways for every customer that we're working towards.
My first question is: Will my customers be able to reach eachothers networks if they are connected to the same Local Network Gateway? If Yes, will this be prevented by creating seperate Local Network Gateways for every customer?
The Local network gateway represents the public IP address of the local VPN device. If all customers are connected to the same VPN device. It's possible that they are connected.
There are Policy-based and route-based VPN devices in Azure. The document has clarified that the on-premises networks connecting through policy-based VPN devices with this mechanism can only connect to the Azure virtual network; they cannot transit to other on-premises networks or virtual networks via the same Azure VPN gateway. If you are using route-based VPN devices, you may configure firewall rules on the on-premise network to restrict the networking traffic from one on-premise network to another on-premise network.

VPN Gateway peering

I know Virtual network peering is a thing but just like that is VPN Gateway peering is a thing? if so then if a VPN Gateway(A) with AD AuthN(OpenVPN SSL tunnel type) and a VPN Gateway(B) with Azure certificate-based authN with SSTP(SSL) tunnel type, Can A and B be peered.
Questions based on above:
Do we have to do S2S peering setup between A and B with manual routing for each to access any resource from A to B and vice versa?
What is the limitation of this setup and advantages(if any)?
Will it be called a Hybrid solution?
If you have two VPN gateways in Azure, you could configure the VNet-to-VNet connections to connect Azure VNets to each other. You don't need manual routing. VNet-to-VNet supports connecting virtual networks. Connecting multiple Azure virtual networks together doesn't require a VPN device unless cross-premises connectivity is required.
When you connect a virtual network to another virtual network with a
VNet-to-VNet connection type (VNet2VNet), it's similar to creating a
Site-to-Site IPsec connection to an on-premises location. Both
connection types use a VPN gateway to provide a secure tunnel with
IPsec/IKE and function the same way when communicating. However, they
differ in the way the local network gateway is configured.
When you create a VNet-to-VNet connection, the local network gateway
address space is automatically created and populated. If you update
the address space for one VNet, the other VNet automatically routes to
the updated address space. It's typically faster and easier to create
a VNet-to-VNet connection than a Site-to-Site connection.
You could read the document for more details.

Azure P2S client traffic to S2S network

My VNet won't allow me to connect to the s2s location via p2s connection.
I'm trying to connect the Azure VPN client on my machine and reach a site that is allowed in a network which I have a s2s connection to.
Here's the thing, I can't get traffic to flow from my pc running the VPN client, out to the target site.
Topology
PC > VPN Client > VNet via p2s > Remote network via s2s > FTP server
I'd like to be able to ping the FTP server from my machine.
Currently only devices in the VNet can ping.
I tried setting up BGP but it broke the connection, as I don't really know how things should be set.
I don't have access to the remote site or it's devices.
I have a Azure local network gateway which is configured as the s2s location.
I'm sorry if that doesn't make sense.
Edit: here is the picture of the network
BGP is the standard routing protocol which enables the Azure VPN Gateways and your on-premise VPN devices to exchange "routes" that will inform both gateways on the availability and reachability for those prefixes to go through the gateways or routers involved.
To configure the BGP, your on-premise device should also support BGP. Read
What address does Azure VPN gateway use for BGP Peer IP?
What are the requirements for the BGP Peer IP addresses on my VPN device?
What should I specify as my address prefixes for the Local Network Gateway when I use BGP?
Without BGP, If you add the point-to-site addresses after you create your site-to-site VPN connection, you need to update the routes manually. You need to manually add the routes to the remote network on your machine.
For more information, you could refer to configure and validate virtual network or VPN connections. Except the Ping tool, you prefer to use TCping tool, see the detailed steps.
Generally, you could troubleshoot the issue by searching the common issue and solution in the virtual network gateway---Diagnose and solve problems on Azure portal. It's recommended to new a support ticket to get your issue resolved quickly.
My solution to this as I can't enable BPG is to use a proxy server within the VNet.

Q: Azure S2S VNet VPN with failover

I'm trying to setup a VPN connection from a VLAN in Azure to on-premise. We have two different ISP's on-premise and I want to setup Azure with a VPN connecting to both so that if the primary ISP is down Azure will try to connect using the secondary.
The problem is that I can't add two gateways to a single VLAN, and the one gateway will not let me add two VPN connection with the same IP address range. I can understand that if I wanted both to be active, but I want one to be standby and only used if the first disconnects.
Is this even possible? Any pointers would be great?
I have been looking at https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-highlyavailable#a-name--activeactiveonpremamultiple-on-premises-vpn-devices but that only covers active-active setup which is not what I want.
I want both VNET resouces and on-premise resources to reach each other via the same IP addresses no matter if it's the primary or secondary VPN that's connected.
I know that Azure has fail over on it's side via a standby gateway, but I want fail over when on-premise is down, not Azure.
Update
I know that Azure has fail over on it's side via a standby gateway,
but I want fail over when on-premise is down, not Azure.
Unfortunately, there is not an auto solution for on-premise failover, you could manually perform, which is the same as If the on-premises gateway IP change need to update the same entry. You need to update the local network gateway (Including the On-premises gateway IP and private range ) on the Azure side and the ISP settings where VPN is connected on the on-premise side. Please expect some downtime, because IPSEC session of ISAKMP, PH1 and PH2 Will again take place.
Besides, If you have more than one ISP and need a redundant connection to the Azure. Azure now supports redundant Site to Site VPNs.
Support multiple tunnels between a VNet and an on-premises site with automatic failover based on BGP
You can establish multiple connections between your Azure VNet and
your on-premises VPN devices in the same location. This capability
provides multiple tunnels (paths) between the two networks in an
active-active configuration. If one of the tunnels is disconnected,
the corresponding routes will be withdrawn via BGP and the traffic
automatically shifts to the remaining tunnels.
The following diagram shows a simple example of this highly available setup:
NOTE
BGP is supported on Azure VpnGw1, VpnGw2, VpnGw3, Standard and HighPerformance VPN gateways. Basic SKU is NOT supported.
BGP is supported on Route-Based VPN gateways only.

Azure Site-to-Site network bypassing VPN tunnel

I have a couple of queries about Azure VNet to On-Premises Site-to-Site networking -
As per Azure, Site-to-Site connection between On-Premises and Azure VNet should have a VPN tunnel. For this to happen there should be a VPN supported device at On-Prem and also a VPN Gateway at VNet. Is my understanding correct ?
Secondly, if a custom device capable of VPN functionality is deployed at On-Prem as well as a VM in Azure VNet, can they establish a connection between them without default Azure provided Site-to-Site VPN tunnel ? Is it possible to establish a network in Site-to-Site without VPN tunnel like with just igw's(Internet Gateways in AWS Cloud)?
What is the significance of next hop being "Internet" in azure route table ?
Yes. This device should also have a real external ip address, not behind the NAT.
Yes, you could use, say, Sophos to create VPN without using Azure's default VPN.
Internet. Represents the default Internet gateway provided by the Azure Infrastructure. (https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-udr-overview/)

Resources