I’m back online this week. Last week, my main router/firewall finally gave up the ghost after being a good stable device for the last few years. I’m not sure if it had anything to do with the storm we had a couple of weeks ago. The storm, also known as a 'derecho’, brought us winds up to 190 km per hour or 118 miles per hour for my US friends.
Setting up the Site to Site VPN to my Azure virtual network allows me to securely transfer data, provides me with the opportunity to implement a Private Link for my Azure Arc Enabled server connection to Azure, and many other advantages I’ll be writing about soon.
Here’s the process.
Step 1 - Set up the Azure Virtual Network Gateway
Having a Virtual Network Gateway setup in your environment can bring many possibilities to the table. You can create multiple connection configurations.
For connection diagrams and corresponding links to configuration steps, see VPN Gateway design.
The Dream Machine Pro, may not be on the known compatible VPN devices list, but it was very straightforward to set it up. To set it up, I navigated to the “teleport & VPN section in the settings menu
I configured my device by providing the Azure Virtual Network Gateway a name, the Pre-Shared Key, the public IP address, and finally the remote address space I want to route over this connection. In my case 10.0.0.0/24 (the subnet I have my servers on in Azure)
The Advance Section makes the configuration simple since it has in the “Manual Mode” an option for “Azure dynamic routing” the equivalent to Route based gateway, and “Azure static routing” the equivalent to Policy based gateway,
Since I am using the Route based approach, I selected the appropriate option and filled out the rest with the proper info as per the documentation.
Step 4 – Bringing all the pieces together and finalizing the connection.
The final step is to create a site-to-site VPN connection between my virtual network gateway and my newly defined and configured on-premises VPN device. Again full step-by-step instructions can be found here.
That’s it. I’m connected!! I’m now ready to leverage this secure connection for a whole lot of management goodness.