Azure Documentation

Search Sign In

About VPN Gateway site-to-site VPNs

This document provides an overview of site-to-site (S2S) VPNs with Azure VPN Gateway. Site-to-site VPNs connect your on-premises network to your Azure virtual network.

What is a Site-to-Site VPN?

A site-to-site VPN creates an encrypted tunnel between your on-premises network and Azure over the public internet. This allows your on-premises resources and Azure resources to communicate securely as if they were on the same network. This is commonly used for:

How it Works

A site-to-site VPN requires the following components:

The VPN Gateway establishes an IPsec/IKE (IKEv1 or IKEv2) tunnel to your on-premises VPN device. Traffic flowing between your on-premises network and your Azure virtual network is encrypted and decrypted by the VPN Gateway and your on-premises VPN device.

Key Concepts

IPsec/IKE

Azure VPN Gateway supports IPsec/IKE protocols for establishing secure tunnels. This includes various encryption and authentication algorithms.

BGP (Border Gateway Protocol)

For more complex network topologies and dynamic routing, BGP can be used. It allows for route exchange between your on-premises network and Azure.

NAT (Network Address Translation) Traversal

NAT-T is supported, allowing the VPN tunnel to traverse NAT devices common in on-premises networks.

Supported Configurations

Getting Started

To set up a site-to-site VPN:

  1. Create an Azure Virtual Network.
  2. Create a Virtual Network Gateway (VPN Gateway) and configure it with a public IP address.
  3. Configure your on-premises VPN device with the correct IPsec/IKE parameters.
  4. Create a Local Network Gateway representing your on-premises network.
  5. Create a Connection resource in Azure to link your Virtual Network Gateway and Local Network Gateway.

For detailed step-by-step instructions, refer to the Azure VPN Gateway tutorial.

Best Practices

For further information and troubleshooting, visit the VPN Gateway FAQ.