Back

Multi-Site VPN: Connect Virtual Networks in Azure

A common concern brought up by clients interested in shifting to the cloud is the requirement of maintaining an onpremise presence They havent fini...

5 min read
Published on Jul 8, 2019
multi-site-vpn-virtual-networks-azure

A common concern brought up by clients interested in shifting to the cloud is the requirement of maintaining an on-premise presence. They haven’t finished on-boarding to the cloud and still need to retain a direct connection to their site. There is a way for a company to retain a presence after migrating to the cloud with Azure’s Virtual Network Gateway. The downside to this is it tends to get complicated quite quickly. Azure’s Virtual Networks Gateway provides users with two main options; Policy-based VPN and Route-based VPN.

Policy-based VPN is geared towards the house’s legacy side. If you have a single site, then it is pretty straightforward since a single site can support both solutions seamlessly. However, if you have multiple locations that all require access to the Azure virtual network, then it becomes complicated when using a policy-based VPN solution. A way to overcome this used to be through the use of Microsoft’s traffic selectors, but this is no longer an available option. With that solution no longer available, what else is there? At Agile IT, we’ve come up with a few solutions and scenarios that are highlighted below and in the video.

Policy-Based Virtual Networks

1. Single Connect

This is the traditional scenario where you have multiple corporate office locations, but only one has a data center. Therefore, corporate offices should only one have a direct connection to Azure. The main issue with a single connect scenario is if the single connection goes down, then you are locked out completely and are not able to access anything from the virtual network. Another issue is that it is impossible to share resources amongst the various site locations since they are not connected.

2. Single Connect/ Multi-Site

You might want to keep the single connect VPN but additionally connect the multiple corporate locations with each other. This can be done by connecting the multiple sites to the central location while maintaining a connection to Azure. Though this will solve the issue of resource sharing among site locations, it still has a similar issue to previous policy-based solution. Indeed, any problem with the central location’s connection to Azure will still lead to an outage that will be felt throughout the entire organization. Though this is not the best solution, it sometimes is the only one. Another major issue with this type of policy-based VPN connection is replication. This is because the virtual network cannot detect the site locations that are not connected to it; therefore, if replication is not configured correctly, it will become a problem.

3. Multi-Net/Multi-Site Pairing VPN

This scenario makes it possible for you to set up a site to site policy-based tunnel between multiple virtual networks in Azure. Then, you can further pair virtual networks with each other. This leads to a situation where you have independent connectivity among respective site locations and a corresponding virtual network in Azure, along with connectivity among the different virtual networks within Azure. While this solution is acceptable, it is quite complex. It allows you to work with multiple regions and still maintain the pairing. However, you will need to pair all locations in one availability set first then proceed to set up ‘sister’ networks. You should also note that the traffic being transmitted within the paired virtual networks in Azure is metered. A lot of companies that implement this are those that can support multiple policy-based VPN endpoints and are migrating their data centers to the cloud. Once they have their servers backed up on the cloud, they can then disengage one of the links, move the machines located within one of the virtual networks to another one to reduce complexity. Unfortunately, once a connection has been disengaged, there is rarely much effort to consolidate the virtual networks which we recommend not only to reduce complexity but overall cost as well. This is just one of the things that need to happen during migration. If you are migrating a VN, you need to size it correctly.

Route Based VPN

working on virtual networks Programmer brainstorming while working on computer codes in the office.

This is the preferred solution for the modern networking options coming out today. It allows for the latest technology. Further, a single gateway can support up to ten locations with minimal charges with the machines being located within one data center so the traffic is not metered. The main advantage of this solution is in the event one site malfunctions; not affected are the connected sites. Their connection to the virtual network still grants them access. All this done without introducing the complex nature of the policy based multi-net/multi-site pairing VPN.

You can deploy a custom VPN device in Azure to support policy-based VPN for multiple locations. Though it is typically a lot more complex to manage. Indeed, a VN running will increase your VN run costs, storage, CPU cycles, RAM, and include additional licensing. If you have multiple locations, we recommend implementing a route based VPN, unless the only option you have is policy-based VPN, then you can opt for the multi-site/multi-net pairing VPN.

Peering Networks for Windows Virtual Desktop

This is an offering we have in our incubation but is still available in public preview. The features are not available, but that is going to change when Microsoft officially releases it. However, that date has not been announced yet.

There is a detailed blog entry about it already, and once it is released, we will be doing a Tech Talk on it as well.

More on Tech Talks About Multiple Virtual Networks in Azure

Each week we feature a topic presented by an expert on the subject matter followed by a Q&A session where clients can engage with the expert directly. Click on the link to watch and learn more. Contact Agile IT to know more about network security.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

Master Microsoft & CIS Benchmark Best Practices to Secure Your Environment

Discover how to implement Microsoft & CIS Benchmark best practices to strengthen your business security and protect your environment from evolving threats with expert guidance.

Jan 28, 2025
7 min read
Screen Capture Protection in Windows 365

How to Enable Screen Capture Protection in Windows 365 for Enhanced Security

Learn how to enable and use screen capture protection in Windows 365 to secure sensitive information and prevent unauthorized captures, enhancing your organization's data security.

Jan 21, 2025
7 min read
Office 365 Collaboration Tools

Office 365 Collaboration Tools: Are They Right for Your Organization?

Explore how Office 365's collaboration tools can enhance your organization's productivity and security.

Jan 12, 2025
6 min read
NIST 800 171 vs NIST 800 53

NSA Cybersecurity Collaboration: No-Cost Services Available to DoD Contractors

Learn how NSA cybersecurity collaboration provides no-cost services to DoD contractors, helping enhance security and compliance with advanced cyber protections.

Jan 10, 2025
6 min read
When is a New CMMC Assessment Needed

Understanding When and Why You Need a New CMMC Assessment

Learn when to schedule a new CMMC assessment, what triggers reassessments, and how changes in scope, contracts, or compliance impact your certification process.

Jan 6, 2025
9 min read
How Does VDI Solve the CU./I and CMMC Conundrum?

How Does VDI Solve the CUI and CMMC Conundrum?

Explore how VDI for CUI helps businesses meet compliance requirements, ensuring secure data access while simplifying CMMC certification.

Dec 30, 2024
9 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation