Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
S2S VPN using Azure vWAN
Search
Phil Huang
October 24, 2022
Technology
0
51
S2S VPN using Azure vWAN
Use FortiGate 60E as on-premise VPN device
Phil Huang
October 24, 2022
Tweet
Share
More Decks by Phil Huang
See All by Phil Huang
20250307 雲端原生:引領數位轉型與永續的雙贏之道
pichuang
0
6
When Windows Meets Kubernetes…
pichuang
0
360
20241217-Azure Red Hat OpenShift 於 Azure TaiwanNorth 上之雲原生異地備援架構設計
pichuang
0
40
20241112 Real AVS Migration Experience Sharing
pichuang
0
39
Active/Passive HA FortiGate Pair with External and Internal Azure Load Balancer
pichuang
0
64
20240814-採用 Azure VMware Solution 啟動你的 Azure 雲端服務
pichuang
0
65
20240612 如果是勇者欣美爾的話, 他會怎麼做?
pichuang
0
20
20240425 Play and Discuss the game “K8S LAN Party”
pichuang
0
150
20231210 Azure Kubernetes Services 永續性軟體工程設計方針
pichuang
1
150
Other Decks in Technology
See All in Technology
入門 PEAK Threat Hunting @SECCON
odorusatoshi
0
180
OPENLOGI Company Profile
hr01
0
60k
LayerXにおけるAI活用事例とその裏側(2025年2月) バクラクの目指す “業務の自動運転” の例 / layerx-ai-deim2025
yuya4
4
830
フォーイット_エンジニア向け会社紹介資料_Forit_Company_Profile.pdf
forit_tech
1
1.7k
ABWG2024採択者が語るエンジニアとしての自分自身の見つけ方〜発信して、つながって、世界を広げていく〜
maimyyym
1
230
開発者体験を定量的に把握する手法と活用事例
ham0215
0
140
職位にかかわらず全員がリーダーシップを発揮するチーム作り / Building a team where everyone can demonstrate leadership, regardless of position
madoxten
19
9.6k
遷移の高速化 ヤフートップの試行錯誤
narirou
6
2k
アジリティを高めるテストマネジメント #QiitaQualityForward
makky_tyuyan
1
400
QAエンジニアが スクラムマスターをすると いいなぁと思った話
____rina____
0
160
サイト信頼性エンジニアリングとAmazon Web Services / SRE and AWS
ymotongpoo
7
1.9k
Ruby on Railsで持続可能な開発を行うために取り組んでいること
am1157154
3
170
Featured
See All Featured
No one is an island. Learnings from fostering a developers community.
thoeni
21
3.2k
Making the Leap to Tech Lead
cromwellryan
133
9.1k
Building Adaptive Systems
keathley
40
2.4k
Building a Scalable Design System with Sketch
lauravandoore
461
33k
StorybookのUI Testing Handbookを読んだ
zakiyama
28
5.5k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
47
5.2k
Navigating Team Friction
lara
183
15k
Art, The Web, and Tiny UX
lynnandtonic
298
20k
Gamification - CAS2011
davidbonilla
80
5.2k
Scaling GitHub
holman
459
140k
4 Signs Your Business is Dying
shpigford
183
22k
Stop Working from a Prison Cell
hatefulcrawdad
268
20k
Transcript
S2S VPN using Azure vWAN Phil Huang <phil.huang@microsoft.com> Sr. Cloud
Solution Architect 2022/10/24 Use FortiGate 60E as on-premise VPN device
What is the gap?
雲地混合網路決策樹 (1/2) 預設路由走不 走 Internet? 地端上雲/ 用雲/ 混合雲 線路備援 選擇?
主備線路 路由方式? Express Route S2S VPN Express Route S2S VPN
雲地混合網路決策樹 (2/2) 主備線路 路由方式 雲地 DNS 選擇? Finish Azure Private
DNS Resolver DNS Forwarder VM DNS Master / Slave Azure VPN Gateway Azure vWAN Azure Route Server
Topology Overview
Ref: FortiGate 60E ASN: 65533 BGP IP: 168.254.99.100 wan1 Public
IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 Azure vWAN Name: wan-eastus Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 vnet-spoke-eastus 10.11.0.0/16
Initial Step 0
0 Initial Setup FortiGate 60E ASN: 65533 BGP IP: 168.254.99.100
wan1 Public IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 vnet-spoke-eastus 10.11.0.0/16
Create Azure vWAN Step 1
1 Create Azure vWAN FortiGate 60E ASN: 65533 BGP IP:
168.254.99.100 wan1 Public IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 Azure vWAN Name: wan-eastus vnet-spoke-eastus 10.11.0.0/16
Create vWAN - Azure vWAN vHub: 實際上提供連線能力的服務
Create Azure vWAN vHub Step 2
2 Create Azure vHub FortiGate 60E ASN: 65533 BGP IP:
168.254.99.100 wan1 Public IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 Azure vWAN Name: wan-eastus Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 vnet-spoke-eastus 10.11.0.0/16
Complete Create vHub Azure vWAN Name: wan-eastus Name: vhub-eastus Private
address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 • vHub 內全部 IP 為自動配置,無須手動設定
Create vHub with S2S VPN
Get the VPN Gateway configuration (1/2) 自動配置 IP
Get the VPN Gateway configuration (2/2) Azure vWAN Name: wan-eastus
Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13
Create Azure vHub S2S VPN Site (1/2) • 需準備地端 VPN
資訊才能 填寫 • 支援常見 VPN 設備如以下 但不限於 • FortiGate 5.6+ • Cisco ASR 15.2+ • Cisco ASA 8.4+ • JunOS 12.x • ... Ref: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-devices#devicetable 地端設備廠商,可任意取名
Create Azure vHub S2S VPN Site (2/2) 連線名稱,可任意取名 連線速路,單位為 Mbps
Ref: https://learn.microsoft.com/en-us/azure/virtual-wan/virtual-wan-site-to-site-portal#site 實體線路提供商,可任意取名 地端 VPN 連線對外 IP 建立 S2S VPN 後,地端使用的 BGP IP 建立 S2S VPN 後,地端使用的 BGP ASN • 需準備地端 VPN 資訊才能填寫 • 一站可建立多個 Link
Edit VPN Connection (1/2)
Edit VPN Connection (2/2) 建立 S2S VPN 連線所需的 PSK 密鑰
如果是在 ExpressRoute 中,建立 S2S VPN 才使用 如果 VPN Device 有特殊加密選項則可以 勾選 Custom 進行細節設定 若採用 static route 則不需要使用此選項
Create VPN Tunnel Step 3
3 Create S2S VPN Connections Ref: FortiGate 60E ASN: 65533
BGP IP: 168.254.99.100 wan1 Public IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 Azure vWAN Name: wan-eastus Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 vnet-spoke-eastus 10.11.0.0/16
Create IPsec Tunnel (1/2) VPN GW Instance 0 Public IP:
y.y.y.y y.y.y.y Ref: https://docs.fortinet.com/document/fortigate/6.4.8/administration-guide/255100/ipsec-vpn-to-azure-with-virtual-network-gateway
Create IPsec Tunnel (2/2) Ref: https://docs.fortinet.com/document/fortigate/6.4.8/administration-guide/255100/ipsec-vpn-to-azure-with-virtual-network-gateway y.y.y.y
Create IPsec Tunnel (3/3) Ref: https://docs.fortinet.com/document/fortigate/6.4.8/administration-guide/255100/ipsec-vpn-to-azure-with-virtual-network-gateway
Check Connectivity Status from Azure View
Check Connectivity Status from VPN Device View y.y.y.y z.z.z.z
驗證 BGP IP 路由可達
確認路由表
Ref: FortiGate 60E ASN: 65533 BGP IP: 168.254.99.100 wan1 Public
IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.1/24 Azure vWAN Name: wan-eastus Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.68 vnet-spoke-eastus 10.11.0.0/16 4 vNet Peering
VNet Peering
Ref: FortiGate 60E ASN: 65533 BGP IP: 168.254.99.100 wan1 Public
IP: x.x.x.x internal1 192.168.100.254/24 Surface 192.168.100.6/24 Azure vWAN Name: wan-eastus Name: vhub-eastus Private address space: 10.10.0.0/24 ASN: 65515 VPN GW Instance 0 Public IP: y.y.y.y Private IP: 10.10.0.4 BGP IP: 10.10.0.12 VPN GW Instance 1 Public IP: z.z.z.z Private IP: 10.10.0.5 BGP IP: 10.10.0.13 BGP Peers 1 IP: 10.10.0.68 BGP Peers 2 IP: 10.10.0.69 vnet-spoke-eastus 10.11.0.0/16
Invent with purpose.