Azure Stack Hub ruggedized network introduction

Network design overview

Physical Network design

The Azure Stack Hub ruggedized solution requires a resilient and highly available physical infrastructure to support its operation and services. Uplinks from ToR to Border switches are limited to SFP+ or SFP28 media and 1 GB, 10 GB, or 25-GB speeds. Check with your original equipment manufacturer (OEM) hardware vendor for availability.

The following diagram presents our recommended design for Azure Stack Hub ruggedized.

Azure Stack Hub ruggedized physical network

Logical network design

A logical network design represents an abstraction of a physical network infrastructure. They're used to organize and simplify network assignments for hosts, virtual machines (VMs), and services. As part of logical network creation, network sites are created to define the:

  • virtual local area networks (VLANs)
  • IP subnets
  • IP subnet/VLAN pairs

All of which are associated with the logical network in each physical location.

The following table shows the logical networks and associated IPv4 subnet ranges that you must plan for:

Logical Network Description Size
Public Virtual IP (VIP) Azure Stack Hub ruggedized uses a total of 31 addresses from this network. Eight public IP addresses are used for a small set of Azure Stack Hub ruggedized services and the rest are used by tenant VMs. If you plan to use App Service and the SQL resource providers, 7 more addresses are used. The remaining 15 IPs are reserved for future Azure services. /26 (62 hosts)-
/22 (1022 hosts)

Recommended = /24 (254 hosts)
Switch infrastructure Point-to-point IP addresses for routing purposes, dedicated switch management interfaces, and loopback addresses assigned to the switch. /26
Infrastructure Used for Azure Stack Hub ruggedized internal components to communicate. /24
Private Used for the storage network, private VIPs, Infrastructure containers, and other internal functions. /20
Baseboard Management Controller (BMC) Used to communicate with the baseboard management controllers on the physical hosts. /26

Network Infrastructure

The network infrastructure for Azure Stack Hub ruggedized consists of several logical networks that are configured on the switches. The following diagram shows these logical networks and how they integrate with the top-of-rack (TOR), baseboard management controller, and border (customer network) switches.

Azure Stack Hub ruggedized logical network diagram:

Azure Stack Hub ruggedized logical network

BMC network

This network is dedicated to connecting all the baseboard management controllers (also known as BMC or service processors) to the management network. Examples include: iDRAC, iLO, iBMC, and so on. Only one BMC account is used to communicate with any BMC node. If present, the Hardware Lifecycle Host (HLH) is located on this network and may provide OEM-specific software for hardware maintenance or monitoring.

The HLH also hosts the Deployment VM (DVM). The DVM is used during Azure Stack Hub ruggedized deployment and is removed when deployment completes. The DVM requires Internet access in connected deployment scenarios to test, validate, and access multiple components. These components can be inside and outside of your corporate network (for example: NTP, DNS, and Azure). For more information about connectivity requirements, see the NAT section in Azure Stack Hub ruggedized firewall integration.

Private network

The /20 (4096 host IPs) network is private to the Azure Stack Hub ruggedized region. It doesn't expand beyond the border switch devices of the Azure Stack Hub ruggedized region. This network is divided into multiple subnets, for example:

  • Storage network: A /25 (128 IPs) network used to support the use of Spaces Direct and Server Message Block (SMB) storage traffic and VM live migration.
  • Internal virtual IP network: A /25 network dedicated to internal-only VIPs for the software load balancer.
  • Container network: A /23 (512 IPs) network dedicated to internal-only traffic between containers running infrastructure services

The size for the Private Network is /20 (4096 IPs) of private IP space. This network is private to the Azure Stack Hub ruggedized system. It doesn't route beyond the border switch devices of the Azure Stack Hub ruggedized system, and can be reused on multiple Azure Stack Hub ruggedized systems. While the network is private to Azure Stack Hub ruggedized, it must not overlap with other networks in the datacenter. For guidance on Private IP space, we recommend following the RFC 1918.

The /20 Private IP space is divided into multiple networks, that enable the Azure Stack Hub ruggedized system infrastructure to run on containers in future releases. Refer to the 1910 release notes for details. This new Private IP space enables ongoing efforts to reduce the required routable IP space before deployment.

Azure Stack Hub ruggedized infrastructure network

The /24 network is dedicated to internal Azure Stack Hub ruggedized components, to communicate and exchange data among themselves. This subnet can be routable externally of the Azure Stack Hub ruggedized solution to your datacenter. We don't recommend using Public or Internet routable IP addresses on this subnet. This network is advertised to the Border, but most of its IPs are protected by Access Control Lists (ACLs). The IPs allowed for access are within a small range, equivalent in size to a /27 network. The IPs host services like the privileged end point (PEP) and Azure Stack Hub ruggedized Backup.

Public VIP network

The Public VIP Network is assigned to the network controller in Azure Stack Hub ruggedized. It's not a logical network on the switch. The SLB uses the pool of addresses and assigns /32 networks for tenant workloads. On the switch routing table, these /32 IPs are advertised as an available route via Border Gateway Protocol (BGP). This network contains public addresses that are externally accessible. The Azure Stack Hub ruggedized infrastructure reserves the first 31 addresses from this Public VIP Network, while the remainder is used by tenant VMs. The network size on this subnet can range from a minimum of /26 (64 hosts) to a maximum of /22 (1022 hosts). We recommend you plan for a /24 network.

Switch infrastructure network

The /26 network is the subnet that contains the routable point-to-point IP /30 (two host IPs) subnets and the loopbacks. These are dedicated /32 subnets for in-band switch management and BGP router ID. This range of IP addresses must be routable outside the Azure Stack Hub ruggedized solution to your datacenter. The IP addresses may be private or public.

Switch management network

The /29 (six host IPs) network is dedicated to connecting the management ports of the switches. This network allows out-of-band access for deployment, management, and troubleshooting. It's calculated from the switch infrastructure network mentioned above.

DNS design overview

To access Azure Stack Hub ruggedized endpoints (portaladminportalmanagement, adminmanagement) from outside Azure Stack Hub ruggedized, you must integrate the Azure Stack Hub ruggedized DNS services with the DNS servers that host the DNS zones you want to use in Azure Stack Hub ruggedized.

Azure Stack Hub ruggedized DNS namespace

You're required to provide some important information related to DNS when you deploy Azure Stack Hub ruggedized.

Field Description Example
Region The geographic location of your Azure Stack Hub ruggedized deployment. east
External Domain Name The name of the zone you want to use for your Azure Stack Hub ruggedized deployment. cloud.fabrikam.com
Internal Domain Name The name of the internal zone that's used for infrastructure services in Azure Stack Hub ruggedized. It's Directory Service-integrated and private (not reachable from outside the Azure Stack Hub ruggedized deployment). azurestack.local
DNS Forwarders DNS servers that are used to forward DNS queries, DNS zones, and records that are hosted outside Azure Stack Hub ruggedized, either on the corporate intranet or public Internet. You can edit the DNS Forwarder value with the Set-AzSDnsForwarder cmdlet after deployment.
Naming Prefix (Optional) The naming prefix you want your Azure Stack Hub ruggedized infrastructure role instance machine names to have. If not provided, the default is "azs". azs

The fully qualified domain name (FQDN) of your Azure Stack Hub ruggedized deployment and endpoints is the combination of the Region parameter and the External Domain Name parameter. Using the values from the examples in the previous table, the FQDN for this Azure Stack Hub ruggedized deployment would be: east.cloud.fabrikam.com

As such, examples of some of the endpoints for this deployment would look like the following URLs:

  • https://portal.east.cloud.fabrikam.com
  • https://adminportal.east.cloud.fabrikam.com

To use this example DNS namespace for an Azure Stack Hub ruggedized deployment, the following conditions are required:

  • The zone fabrikam.com is registered with a domain registrar, internal corporate DNS server, or both. Registration depends on your name resolution requirements.
  • The child domain cloud.fabrikam.com exists under the zone fabrikam.com.
  • The DNS servers that host the zones fabrikam.com and cloud.fabrikam.com can be reached from the Azure Stack Hub ruggedized deployment.

To resolve DNS names for Azure Stack Hub ruggedized endpoints and instances from outside Azure Stack Hub ruggedized, you must integrate the DNS servers. Including servers that host the external DNS zone for Azure Stack Hub ruggedized, with the DNS servers that host the parent zone you want to use.

DNS name labels

Azure Stack Hub ruggedized supports adding a DNS name label to a public IP address to allow name resolution for public IP addresses. DNS labels are a convenient way for users to reach apps and services hosted in Azure Stack Hub ruggedized by name. The DNS name label uses a slightly different namespace than the infrastructure endpoints. Following the previous example namespace, the namespace for DNS name labels would be: *.east.cloudapp.cloud.fabrikam.com.

If a tenant specifies Myapp in the DNS name field of a public IP address resource, it creates an A record for myapp in the zone east.cloudapp.cloud.fabrikam.com on the Azure Stack Hub ruggedized external DNS server. The resulting fully qualified domain name would be: myapp.east.cloudapp.cloud.fabrikam.com.

If you want to leverage this functionality and use this namespace, you must integrate the DNS servers. Including servers that host the external DNS zone for Azure Stack Hub ruggedized, and the DNS servers that host the parent zone you want to use as well. This namespace is different than the one used for the Azure Stack Hub ruggedized service endpoints, so you must create an additional delegation or conditional forwarding rule.

For more information about how the DNS Name label works, see "Using DNS" in Azure Stack Hub ruggedized.

Resolution and delegation

There are two types of DNS servers:

  • An authoritative DNS server hosts DNS zones. It answers DNS queries for records in those zones only.
  • A recursive DNS server doesn't host DNS zones. It answers all DNS queries by calling authoritative DNS servers to gather the data it needs.

Azure Stack Hub ruggedized includes both authoritative and recursive DNS servers. The recursive servers are used to resolve names of everything except the internal private zone, and the external public DNS zone for the Azure Stack Hub ruggedized deployment.

Resolving external DNS names from Azure Stack Hub ruggedized

To resolve DNS names for endpoints outside Azure Stack Hub ruggedized (for example: www.bing.com), you must provide DNS servers for Azure Stack Hub ruggedized to forward DNS requests, for which Azure Stack Hub ruggedized isn't authoritative. DNS servers that Azure Stack Hub ruggedized forwards requests to are required in the Deployment Worksheet (in the DNS Forwarder field). Provide at least two servers in this field for fault tolerance. Without these values, Azure Stack Hub ruggedized deployment fails. You can edit the DNS Forwarder values with the Set-AzSDnsForwarder cmdlet after deployment.

Firewall design overview

It's recommended that you use a firewall device to help secure Azure Stack Hub ruggedized. Firewalls can help defend against things like distributed denial-of-service (DDOS) attacks, intrusion detection, and content inspection. However, they can also become a throughput bottleneck for Azure storage services like blobs, tables, and queues.

If a disconnected deployment mode is used, you must publish the AD FS endpoint. For more information, see the datacenter integration identity article.

The Azure Resource Manager (administrator), administrator portal, and Key Vault (administrator) endpoints don't necessarily require external publishing. For example, as a service provider, you could limit the attack surface by only administering Azure Stack Hub ruggedized from inside your network, and not from the Internet.

For enterprise organizations, the external network can be the existing corporate network. In this scenario, you must publish endpoints to operate Azure Stack Hub ruggedized from the corporate network.

Network Address Translation

Network Address Translation (NAT) is the recommended method to allow the deployment virtual machine (DVM) to access external resources during deployment. Also for the Emergency Recovery Console (ERCS) VMs or privileged endpoint (PEP) during registration and troubleshooting.

NAT can also be an alternative to Public IP addresses on the external network or public VIPs. However, it's not recommended to do so because it limits the tenant user experience and increases complexity. One option would be a one to one NAT that still requires one public IP per user IP on the pool. Another option is a many to one NAT that requires a NAT rule per user VIP for all ports a user might use.

Some of the downsides of using NAT for Public VIP are:

  • Overhead when managing firewall rules, as users control their own endpoints and publishing rules in the software-defined networking (SDN) stack. Users must contact the Azure Stack Hub ruggedized operator to get their VIPs published, and to update the port list.
  • While NAT usage limits the user experience, it gives full control to the operator over publishing requests.
  • For hybrid cloud scenarios with Azure, consider that Azure doesn't support setting up a VPN tunnel to an endpoint using NAT.

SSL interception

It's currently recommended to disable any SSL interception (for example decryption offloading) on all Azure Stack Hub ruggedized traffic. If it's supported in future updates, guidance will be provided about how to enable SSL interception for Azure Stack Hub ruggedized.

Edge deployment firewall scenario

In an edge deployment, Azure Stack Hub ruggedized is deployed directly behind the edge router or the firewall. In these scenarios, it's supported for the firewall to be above the border (Scenario 1) where it supports both active-active and active-passive firewall configurations. It can also act as the border device (Scenario 2), where it only supports active-active firewall configuration. Scenario 2 relies on equal-cost multi-path (ECMP) with either BGP or static routing for failover.

Public routable IP addresses are specified for the public VIP pool from the external network, at deployment time. For security purposes, public routable IPs aren't recommended on any other network in an edge scenario. This scenario enables a user to experience the full self-controlled cloud experience as in a public cloud like Azure.

Azure Stack Hub ruggedized edge firewall scenario

Enterprise intranet or perimeter network firewall scenario

In an enterprise intranet or perimeter deployment, Azure Stack Hub ruggedized is deployed on a multi-zoned firewall, or in between the edge firewall and the internal corporate network firewall. Its traffic is then distributed between the secure, perimeter network (or DMZ), and unsecure zones as described below:

  • Secure zone: The internal network that uses internal or corporate routable IP addresses. The secure network can be divided. It can have Internet outbound access through the Firewall NAT. It's normally accessible from inside your datacenter via the internal network. All Azure Stack Hub ruggedized networks should reside in the secure zone, except for the external network's public VIP pool.
  • Perimeter zone. The perimeter network is where external or Internet-facing apps like Web servers are typically deployed. It's normally monitored by a firewall to avoid attacks like DDoS and intrusion (hacking) while still allowing specified inbound traffic from the Internet. Only the external network public VIP pool of Azure Stack Hub ruggedized should reside in the DMZ zone.
  • Unsecure zone. The external network, the Internet. Deploying Azure Stack Hub ruggedized in the unsecure zone isn't recommended.

Perimeter network firewall scenario

VPN design overview

Although VPN is a user concept, there are some important considerations that a solution owner and operator need to know.

Before you can send network traffic between your Azure virtual network and your on-premises site, you must create a virtual network (VPN) gateway for your virtual network.

A VPN gateway is a type of virtual network gateway that sends encrypted traffic across a public connection. You can use VPN gateways to send traffic securely between a virtual network in Azure Stack Hub ruggedized and a virtual network in Azure. You can also send traffic securely between a virtual network and another network that is connected to a VPN device.

When you create a virtual network gateway, you specify the gateway type that you want to create. Azure Stack Hub ruggedized supports one type of virtual network gateway: the Vpn type.

Each virtual network can have two virtual network gateways, but only one of each type. Depending on the settings that you choose, you can create multiple connections to a single VPN gateway. An example of this kind of setup is a multi-site connection configuration.

Before you create and configure VPN gateways for Azure Stack Hub ruggedized, review the considerations for Azure Stack Hub ruggedized networking. You learn how configurations for Azure Stack Hub ruggedized differ from Azure.

In Azure, the bandwidth throughput for the VPN gateway SKU you choose must be divided across all connections that are connected to the gateway. In Azure Stack Hub ruggedized however, the bandwidth value for the VPN gateway SKU is applied to each connection resource that is connected to the gateway. For example:

  • In Azure, the basic VPN gateway SKU can accommodate approximately 100 Mbps of aggregate throughput. If you create two connections to that VPN gateway, and one connection is using 50 Mbps of bandwidth, then 50 Mbps is available to the other connection.
  • In Azure Stack Hub ruggedized, each connection to the basic VPN gateway SKU is allocated 100 Mbps of throughput.

VPN types

When you create the virtual network gateway for a VPN gateway configuration, you must specify a VPN type. The VPN type that you choose depends on the connection topology that you want to create. A VPN type can also depend on the hardware that you're using. S2S configurations require a VPN device. Some VPN devices only support a certain VPN type.

Important

Currently, Azure Stack Hub ruggedized only supports the route-based VPN type. If your device only supports policy-based VPNs, then connections to those devices from Azure Stack Hub ruggedized are not supported. In addition, Azure Stack Hub ruggedized does not support using policy-based traffic selectors for route-based gateways at this time, because custom IPSec/IKE policy configurations are not supported.

  • PolicyBased: Policy-based VPNs encrypt and direct packets through IPsec tunnels, based on IPsec policies. Policies are configured with the combinations of address prefixes between your on-premises network, and the Azure Stack Hub ruggedized VNet. The policy, or traffic selector, is usually an access list in the VPN device configuration. PolicyBased is supported in Azure, but not in Azure Stack Hub ruggedized.
  • RouteBased: Route-based VPNs use routes that are configured in the IP forwarding or routing table. The routes direct packets to their corresponding tunnel interfaces. The tunnel interfaces then encrypt or decrypt the packets in and out of the tunnels. The policy, or traffic selector, for RouteBased VPNs are configured as any-to-any (or use wild cards). By default, they can't be changed. The value for a RouteBased VPN type is RouteBased.

Configuring a VPN gateway

A VPN gateway connection relies on several resources that are configured with specific settings. Most of these resources can be configured separately, but in some cases they must be configured in a specific order.

Settings

The settings that you choose for each resource are critical for creating a successful connection.

This article helps you understand:

  • Gateway types, VPN types, and connection types.
  • Gateway subnets, local network gateways, and other resource settings that you might want to consider.

Connection topology diagrams

There are different configurations available for VPN gateway connections. Determine which configuration best fits your needs. In the following sections, you can view information and topology diagrams about the following VPN gateway connections:

  • Available deployment model
  • Available configuration tools
  • Links that take you directly to an article, if available

The diagrams and descriptions in the following sections can help you select a connection topology to match your requirements. The diagrams show the main baseline topologies, but it's possible to build more complex configurations using the diagrams as a guide.

Site-to-site and multi-site (IPsec/IKE VPN tunnel)

Site-to-site

site-to-site (S2S) VPN gateway connection is a connection over IPsec/IKE (IKEv2) VPN tunnel. This type of connection requires a VPN device that is located on-premises and is assigned a public IP address. This device can't be located behind a NAT. S2S connections can be used for cross-premises and hybrid configurations.

Multi-site

multi-site connection is a variation of the site-to-site connection. You create more than one VPN connection from your virtual network gateway, typically connecting to multiple on-premises sites. When working with multiple connections, you must use a route-based VPN type (known as a dynamic gateway when working with classic VNets). Because each virtual network can only have one VPN gateway, all connections through the gateway share the available bandwidth.

Gateway SKUs

When you create a virtual network gateway for Azure Stack Hub ruggedized, you specify the gateway SKU that you want to use. The following VPN gateway SKUs are supported:

  • Basic
  • Standard
  • High Performance

Selecting a higher gateway SKU allocates more CPUs and network bandwidth to the gateway. As a result, the gateway can support higher network throughput to the virtual network.

Azure Stack Hub ruggedized doesn't support the Ultra Performance gateway SKU, which is used exclusively with Express Route.

Consider the following when you select the SKU:

  • Azure Stack Hub ruggedized doesn't support policy-based gateways.
  • BGP isn't supported on the Basic SKU.
  • ExpressRoute-VPN gateway coexisting configurations aren't supported in Azure Stack Hub ruggedized.

Gateway availability

High availability scenarios can only be configured on the High-Performance Gateway connection SKU. Unlike Azure, which provides availability through both active/active and active/passive configurations, Azure Stack Hub ruggedized only supports the active/passive configuration.

Failover

There are three multi-tenant gateway infrastructure VMs in Azure Stack Hub ruggedized. Two of these VMs are in active mode, and the third is in redundant mode. Active VMs enable the creation of VPN connections on them, and the redundant VM only accepts VPN connections if a failover happens. If an active gateway VM becomes unavailable, the VPN connection fails over to the redundant VM after a short period (a few seconds) of connection loss.

Estimated aggregate throughput by SKU

The following table shows the gateway types and the estimated aggregate throughput by gateway SKU:

VPN Gateway throughput (1) VPN Gateway max IPsec tunnels (2)
Basic SKU (3) 100 Mbps 20
Standard SKU 100 Mbps 20
High-Performance SKU 200 Mbps 10

Table notes

(1) - VPN throughput isn't a guaranteed throughput for cross-premises connections across the Internet. It's the maximum possible throughput measurement.
(2) - Max tunnels is the total per Azure Stack Hub ruggedized deployment for all subscriptions.
(3) - BGP routing isn't supported for the Basic SKU.

Important

Only one site-to-site VPN connection can be created between two Azure Stack Hub ruggedized deployments. This is due to a limitation in the platform that only allows a single VPN connection to the same IP address. Because Azure Stack Hub ruggedized leverages the multi-tenant gateway, which uses a single public IP for all VPN gateways in the Azure Stack Hub ruggedized system, there can be only one VPN connection between two Azure Stack Hub ruggedized systems.

This limitation also applies to connecting more than one site-to-site VPN connection to any VPN gateway that uses a single IP address. Azure Stack Hub ruggedized does not allow more than one local network gateway resource to be created using the same IP address.**

IPsec/IKE parameters

When you set up a VPN connection in Azure Stack Hub ruggedized, you must configure the connection at both ends. If you're configuring a VPN connection between Azure Stack Hub ruggedized and a hardware device, that device might ask you for additional settings. For example, a switch or router that's acting as a VPN gateway.

Unlike Azure, which supports multiple offers as both an initiator and a responder, Azure Stack Hub ruggedized supports only one offer by default. If you need to use different IPSec/IKE settings to work with your VPN device, there are more settings available to you to configure your connection manually.

IKE Phase 1 (Main Mode) parameters

Property Value
IKE Version IKEv2
Diffie-Hellman Group ECP384
Authentication Method Pre-Shared Key
Encryption & Hashing Algorithms AES256, SHA384
SA Lifetime (Time) 28,800 seconds

IKE Phase 2 (Quick Mode) parameters

Property Value
IKE Version IKEv2
Encryption & Hashing Algorithms (Encryption) GCMAES256
Encryption & Hashing Algorithms (Authentication) GCMAES256
SA Lifetime (Time) 27,000 seconds
SA Lifetime (Kilobytes) 33,553,408
Perfect Forward Secrecy (PFS) ECP384
Dead Peer Detection Supported

Configure custom IPSec/IKE connection policies

The IPsec and IKE protocol standard supports a wide range of cryptographic algorithms in various combinations. To see which parameters are supported in Azure Stack Hub ruggedized to satisfy compliance or security requirements, see IPsec/IKE parameters.

This article provides instructions on how to create and configure an IPsec/IKE policy and apply to a new or existing connection.

Considerations

Note the following important considerations when using these policies:

  • The IPsec/IKE policy only works on the Standard and HighPerformance (route-based) gateway SKUs.
  • You can only specify one policy combination for a given connection.
  • You must specify all algorithms and parameters for both IKE (Main Mode) and IPsec (Quick Mode). Partial policy specification isn't allowed.
  • Consult with your VPN device vendor specifications to ensure the policy is supported on your on-premises VPN devices. Site-to-site connections can't be established if the policies are incompatible.

Workflow to create and set IPsec/IKE policy

This section outlines the workflow required to create and update the IPsec/IKE policy on a site-to-site VPN connection:

  1. Create a virtual network and a VPN gateway.
  2. Create a local network gateway for cross-premises connection.
  3. Create an IPsec/IKE policy with selected algorithms and parameters.
  4. Create an IPSec connection with the IPsec/IKE policy.
  5. Add/update/remove an IPsec/IKE policy for an existing connection.

Supported cryptographic algorithms and key strengths

The following table lists the supported cryptographic algorithms and key strengths configurable by Azure Stack Hub ruggedized customers:

IPsec/IKEv2 Options
IKEv2 Encryption AES256, AES192, AES128, DES3, DES
IKEv2 Integrity SHA384, SHA256, SHA1, MD5
DH Group ECP384, ECP256, DHGroup14, DHGroup2048, DHGroup2, DHGroup1, None
IPsec Encryption GCMAES256, GCMAES192, GCMAES128, AES256, AES192, AES128, DES3, DES, None
IPsec Integrity GCMASE256, GCMAES192, GCMAES128, SHA256, SHA1, MD5
PFS Group PFS24, ECP384, ECP256, PFS2048, PFS2, PFS1, None
QM SA Lifetime (Optional: default values are used if not specified)
Seconds (integer; min. 300/default 27,000 seconds)
KBytes (integer; min. 1024/default 102,400,000 KBytes)
Traffic Selector Policy-based Traffic Selectors aren't supported in Azure Stack Hub ruggedized.

Your on-premises VPN device configuration must match or contain the following algorithms and parameters that you specify on the Azure IPsec/IKE policy:

  • IKE encryption algorithm (Main Mode / Phase 1).
  • IKE integrity algorithm (Main Mode / Phase 1).
  • DH Group (Main Mode / Phase 1).
  • IPsec encryption algorithm (Quick Mode / Phase 2).
  • IPsec integrity algorithm (Quick Mode / Phase 2).
  • PFS Group (Quick Mode / Phase 2).
  • The SA lifetimes are local specifications only, they don't need to match.

If GCMAES is used as for IPsec Encryption algorithm, you must select the same GCMAES algorithm and key length for IPsec integrity. For example: using GCMAES128 for both.

In the preceding table:

  • IKEv2 corresponds to Main Mode or Phase 1.
  • IPsec corresponds to Quick Mode or Phase 2.
  • DH Group specifies the Diffie-Hellmen Group used in Main Mode or Phase 1.
  • PFS Group specifies the Diffie-Hellmen Group used in Quick Mode or Phase 2.
  • IKEv2 Main Mode SA lifetime is fixed at 28,800 seconds on the Azure Stack Hub ruggedized VPN gateways.

The following table lists the corresponding Diffie-Hellman Groups supported by the custom policy:

Diffie-Hellman Group DHGroup PFSGroup Key length
1 DHGroup1 PFS1 768-bit MODP
2 DHGroup2 PFS2 1024-bit MODP
14 DHGroup14 PFS2048 2048-bit MODP
DHGroup2048
19 ECP256 ECP256 256-bit ECP
20 ECP384 ECP384 384-bit ECP
24 DHGroup24 PFS24 2048-bit MODP

Connect Azure Stack Hub ruggedized to Azure using Azure ExpressRoute

Overview, assumptions, and prerequisites

Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud. You use a private connection supplied by a connectivity provider. ExpressRoute isn't a VPN connection over the public Internet.

For more information about Azure ExpressRoute, see the ExpressRoute overview.

Assumptions

This article assumes that:

  • You have a working knowledge of Azure.
  • You have a basic understanding of Azure Stack Hub ruggedized.
  • You have a basic understanding of networking.

Prerequisites

To connect Azure Stack Hub ruggedized and Azure using ExpressRoute, you must meet the following requirements:

  • A provisioned ExpressRoute circuit through a connectivity provider.
  • An Azure subscription to create an ExpressRoute circuit and VNets in Azure.
  • A router that supports:
    • site-to-site VPN connections between its LAN interface and Azure Stack Hub ruggedized multi-tenant gateway.
    • creating multiple VRFs (Virtual Routing and Forwarding) if there's more than one tenant in your Azure Stack Hub ruggedized deployment.
  • A router that has:
    • A WAN port connected to the ExpressRoute circuit.
    • A LAN port connected to the Azure Stack Hub ruggedized multi-tenant gateway.

ExpressRoute network architecture

The following figure shows the Azure Stack Hub ruggedized and Azure environments after you finish setting up ExpressRoute using the examples in this article:

ExpressRoute network architecture

The following figure shows how multiple tenants connect from the Azure Stack Hub ruggedized infrastructure through the ExpressRoute router to Azure:

ExpressRoute network architecture multi-tenant