Тёмный
No video :(

Azure Hub and Spoke Virtual Network (VNet) with a VPN Gateway 

Travis Roberts
Подписаться 33 тыс.
Просмотров 23 тыс.
50% 1

Опубликовано:

 

22 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 26   
@gpltaylor
@gpltaylor Год назад
Amazing video. one of the best, shortest, for profession by profession videos... Most videos on this topic, insist on walking you over "what is a VNET". This get's to the point fast!
@Ciraltos
@Ciraltos Год назад
Glad you liked it!
@SOTOSKAWASAKI
@SOTOSKAWASAKI Год назад
Great video, I did not know one could use a VPN Gateway as a router. Having said that, regarding what you said about being complicated by the need to create a route table per vnet, if you are using a third party NVA in the Hub network, you can create only one route table with the default route pointing to NVA ip address. Then this could make things much simpler. Of course you need the proper configuration on the NVA itself.
@neeharikagv2812
@neeharikagv2812 Год назад
Thank you so much for this video. This was one question during my interview few days ago. Also I didn’t understand what exactly is ‘hop’ which makes sense now from this video. Thank you Sir..
@tendaimusonza9547
@tendaimusonza9547 Год назад
liked the video right from the first few seconds of introduction ,great
@tog7861
@tog7861 Год назад
Thank you so much for putting this together. I have been trying to figure out my vnet to s2s vnet routing for hours and could only find resources talking about azure vnet to vnet, but you talking about route table made it all click! Duh! Why didn't I think, "I wonder if there is a route table"
@smeyyappan
@smeyyappan Год назад
Awesome ! You make everything look so simple. That is Great !!! 🙂 Thank you May God bless you.
@joaquincotilla2747
@joaquincotilla2747 3 месяца назад
Great video, thanks. Now, the same video but a Azure Firewall, please.
@asitha106
@asitha106 Год назад
clear and complete, thank you!
@peacejon2019
@peacejon2019 Год назад
Great Videos man 🙌🙌🙌🙌🙌 continue doing the Lord's work.... Can you do something on Azure Landing Zone?
@abelcarvajalgil6705
@abelcarvajalgil6705 Год назад
great video, the explication is ease
@omega1962
@omega1962 11 дней назад
hi Travis, Excellent explanation. I have created a similar setup with 2 Spoke and 1 Hub networks in Azure. I have couple of queries, 1. I created RouteTable1 and assigned it to Spoke-1. Added a route to access Spoke-2 network via Hub VNET. Ideally, I should be able to ping the VM-2 from VM-1 since there is a route established from Spoke-1 and Spoke-2 network. But, I am unable to achieve. Unless I add RT-2 assigned to Spoke-2 VNET and add a route to access Spoke-1 VNET, then, I am able to access both VMs (ping each other). Why is it so? 2. After performing step (1), I went to Spoke-1 Peering (wtih Hub) and Disable the option "Allow 'vnet-1' to receive forwarded traffic from 'vnet-hub'". Ideally, this will stop traffic flow from Spoke-2 to Spoke-1 (VMs). But, I see the VM-2 is still able to reach to VM-1. Why? Thanks.
@bloknath6800
@bloknath6800 3 месяца назад
Great video. Is it possible to connect spoke1 to spoke2 without UDR or direct peering?
@bshwjt
@bshwjt 9 месяцев назад
Awesome & easy
@user-qh5it2kf6h
@user-qh5it2kf6h Год назад
Agradecer por el contenido!!!
@roneyr9522
@roneyr9522 5 месяцев назад
Hi Travis, I want to use a point-to-site vpn tunnel with vpn gateway to connect to four different azure subscriptions. What would be my best approach. Also I don't want these resources to share any data or connectivity with other subscriptions like dev and prod.
@kannanswaminathan8210
@kannanswaminathan8210 Год назад
Short and lot of details. Thanks a lot. I have an issue. I have hub and spoke model. i have a vm in hub and a vm in spoke. i use point to site. The issue is, i am able to RDP the vm on Hub but not able to control/RDP the vm on Spoke. Both the vnet's are peered. What could be the issue?
@user-wu7xh1fc2q
@user-wu7xh1fc2q 7 месяцев назад
Wouldn't this cause delay because the traffic goes from the virtual network to other virtual network through the hub each time ? And this would get worst with any additional virtual network added to the system?
@mradbilel7268
@mradbilel7268 Год назад
Thanks for the video , is there a difference between configuring the peering from the HUB ? otherwise why you choose to create the peering from Spoke to peering ?
@prasantchettri133
@prasantchettri133 Год назад
Are you using VPN gateway as cost effective example for VWAN over S2S or ER?
@stevenaudy9323
@stevenaudy9323 Год назад
Hi Travis, what about this scenario ? hub and spoke1 have own vnet gateway. how to set the route table ? i tried set it next hop to virtual network gateway, it's not connected.
@user-bb5rh4py1h
@user-bb5rh4py1h Год назад
Morning Travis! can I ask why you dont recommend this for production? in terms of using the Gateway for the transitive routing as I use a similar set up in my production environment thank in advance
@Ciraltos
@Ciraltos Год назад
Hub and spoke is the preferred way to connect multiple VNets. The caution is about using a VNet gateway as the router. VNet gateways are made to encrypt traffic and although they will work, Microsoft recommends against it. learn.microsoft.com/en-us/azure/architecture/networking/spoke-to-spoke-networking?WT.mc_id=AZ-MVP-5004159#pattern-2-spokes-communicating-over-a-network-appliance
@user-bb5rh4py1h
@user-bb5rh4py1h Год назад
@@Ciraltos Thanks for your responsem what about in a site to site context using the virtual network gateway transit setting in the VNETs peered to the HUB is that considered ok for production?
@fortu5443
@fortu5443 9 месяцев назад
what virtual machine are you using sir?
@markcuello5
@markcuello5 Год назад
HELP
Далее
Azure Networking Overview: Hub and Spoke in HINDI
12:15
Complete Overview of Azure Virtual Network Peering
9:56
Azure Virtual WAN: Hybrid Networking Game-Changer
8:58
How This New Battery is Changing the Game
12:07
Просмотров 209 тыс.
Google Pixel 9/Pro Review: Gimmick or Good?
24:05
Просмотров 2,6 млн
Create an Azure Site-to-Site (S2S) VPN Connection
30:39