cloud.nyquist.eu
  • Table of Contents
  • AWS
    • Building with AWS
  • Azure
    • ExpressRoute
    • VPNGw
    • Azure Monitor
    • Pillars of a great Azure architecture
    • Design for security in Azure
  • OCI
    • OCI 101
    • IAM 101 - Identity and Access Management
    • OCI Virtual Cloud Networks
    • OCI Connectivty
    • OCI Load Balancing
    • OCI Compute
    • OCI Storage
      • OCI Block Storage
      • OCI Object Storage
      • OCI File Storage
    • OCI Key Management
    • OCI Database Offerings
      • OCI DB
      • OCI Autonomous DB
    • OCI Docs & Tools
Powered by GitBook
On this page
  • VPN - up to 1.5Gbps per tunnerl
  • ExpressRoutes
  • ExpressRoute Direct
  • Virtual Network Gateway
  • ExpressRoute Circuit
  • ExpressRoute Connection
  • Peering

Was this helpful?

  1. Azure

ExpressRoute

Options to connect your on-prem to Azure Cloud

VPN - up to 1.5Gbps per tunnerl

ExpressRoutes

Usually a provider is used to access the ExpressRoute service

[Customer On-Prem] <--> [Service Provider] <--> [MSEE Router] <--> [Azure] (Private Peering)
                                                       |---------> [Other Microsoft Public Services] (Microsoft Peering)

MSEE = Microsoft Enterprise Edge (Physical router)

In a provider's colo: A - the side that wants to connect (customer) Z - the side where A wants to connect to (Microsoft)

[Customer On-Prem] <-802.1q-> [Service Provider] <-QinQ-> [MSEE Router] <--> [Azure]

QinQ is used between SP and MSEE 802.Q is used between SP and Customer

  • Available in 1, 2, 5, 10 Gbps (active/active. Potentially can get 20Gbps)

  • Doesn't support MACSEC?

ExpressRoute Direct

  • Still needs to happen in a colo

  • Supports MACSEC

  • Customer can chose between QinQ and 802.1q

  • Goes up to 100Gbps (active/active. Potentially can get to 200Gbps)

[Customer On-Prem] <- QinQ or 802.1q -> [MSEE Router] <--> [Azure]

You still need to define

Virtual Network Gateway

  • Virtual Gateway maintains BGP session with MSEE and exposes the internal virtual IP space to an external physical space

  • Traffic from MSEE to VNET goes through Gateway

  • Traffic from VNET to MSEE bypassess Gateway

FastPath

  • Traffic from MSEE to VNET also bypasses Gateway

  • Not all scenarios are supported. Unsupported scenarios will go through Gateway.

  • Gateway is still required because it maintains BGP sessions.

  • The gateway is created in a subnet of the VNET.

  • It gets assigned a Public IP used for peering.

ExpressRoute Circuit

  • Virtual Circuit identified by an S-Key (Service Key). It is linked to a Provider and a Peering location

ExpressRoute Connection

  • Links a Circuit to a Virtual Gateway. You can have multiple connections over the same circuit.

  • It has a routing Weight.

Peering

  • Keeps the BGP sessions running

  • You have to provide an ASN, a VLANID (customer 802.1Q VLAN) and 2 subnets (/30) to be used as primary and secondary Types:

  • Private - to access Customer Private resources in Azure

  • Public (not available anymore. Merged into Microsoft Peering) - to access Azure Public Services

  • Microsoft Peering - to access any Microsoft Public Services(like Office365) but now includes Azure Public Services.

PreviousBuilding with AWSNextVPNGw

Last updated 3 years ago

Was this helpful?