Azure VPN Gateway is primarily used for high-availability connectivity between on-premises and Azure cloud networks. When customers or organizations need to connect their on-premises network to their Azure network, the Azure VPN Gateway is the appropriate tool. Setting up this connectivity requires deploying an Azure VPN Gateway within the Azure environment and a compatible VPN gateway on the on-premises side. Azure supports various VPN gateway options from manufacturers like Fortinet and Cisco. Once both VPN gateways are in place - the Azure VPN Gateway (Azure VPN v3) and the on-premises VPN gateway - you can establish point-to-site or site-to-site connectivity. Point-to-site connectivity enables remote connections, particularly for employees working from home. In this scenario, there is no need for a VPN gateway at the on-premises location. Instead, you only need to configure the Azure VPN Gateway, generate a VPN profile, and distribute it to the relevant users. This allows remote users to connect securely to the Azure network from anywhere, as long as they have the VPN profile configured on their system.
Senior Infrastructure Engineer at a energy/utilities company with 1,001-5,000 employees
Real User
Top 20
2024-02-16T14:23:45Z
Feb 16, 2024
We use it for B2C. We use Azure VPN to connect on-prem networks to Azure. Doing just site-to-site. We use it on the infrastructure side, sort of VNet, Azure Firewall, Azure Load Balancer, and Azure Front Door. I've got a sort of peripheral understanding of Logic Apps. We do utilize them.
Learn what your peers think about Microsoft Azure VPN Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
The solution provides access to multiple applications and data. I use it for management, mainly to access platforms or as a bastion or management server. We are integrating the MFA into the VPN through Defender.
We are currently utilizing the solution in our organization to establish connectivity with our on-premise network to manage and monitor the traffic flow. However, we have plans to replace this solution with the XPLUS Routing System soon.
The solution is cloud-based on Azure and primarily used for VPN side-to-side connection. We don't care about the point set solution because we use another solution for that.
A VPN gateway is a specific type of virtual network gateway that is used to send encrypted traffic between an Azure virtual network and an on-premises location over the public Internet. You can also use a VPN gateway to send encrypted traffic between Azure virtual networks over the Microsoft network. Each virtual network can have only one VPN gateway. However, you can create multiple connections to the same VPN gateway. When you create multiple connections to the same VPN gateway, all VPN...
For our data source connections, we connect it to our on-premise data centers. Those connectivities are established by using Azure VPN Gateway.
I use the solution in my company to build IPsec tunnels on on-prem sites with Microsoft Azure's cloud services.
Azure VPN Gateway is primarily used for high-availability connectivity between on-premises and Azure cloud networks. When customers or organizations need to connect their on-premises network to their Azure network, the Azure VPN Gateway is the appropriate tool. Setting up this connectivity requires deploying an Azure VPN Gateway within the Azure environment and a compatible VPN gateway on the on-premises side. Azure supports various VPN gateway options from manufacturers like Fortinet and Cisco. Once both VPN gateways are in place - the Azure VPN Gateway (Azure VPN v3) and the on-premises VPN gateway - you can establish point-to-site or site-to-site connectivity. Point-to-site connectivity enables remote connections, particularly for employees working from home. In this scenario, there is no need for a VPN gateway at the on-premises location. Instead, you only need to configure the Azure VPN Gateway, generate a VPN profile, and distribute it to the relevant users. This allows remote users to connect securely to the Azure network from anywhere, as long as they have the VPN profile configured on their system.
The solution is used for site-to-site and point-to-site connectivity.
We use it for B2C. We use Azure VPN to connect on-prem networks to Azure. Doing just site-to-site. We use it on the infrastructure side, sort of VNet, Azure Firewall, Azure Load Balancer, and Azure Front Door. I've got a sort of peripheral understanding of Logic Apps. We do utilize them.
We use 365 accounts for Outlook and Azure. We use it for data protection.
The solution provides access to multiple applications and data. I use it for management, mainly to access platforms or as a bastion or management server. We are integrating the MFA into the VPN through Defender.
We use the solution to develop systems for financial institutions.
I use the solution to connect on-premises networks to remote servers. With its help, I can access CRM and ERP databases.
We are currently utilizing the solution in our organization to establish connectivity with our on-premise network to manage and monitor the traffic flow. However, we have plans to replace this solution with the XPLUS Routing System soon.
The solution is cloud-based on Azure and primarily used for VPN side-to-side connection. We don't care about the point set solution because we use another solution for that.
Microsoft Azure VPN Gateway is used to connect our data center to our cloud deployments, or at least some of them.
The solution can be deployed on the cloud and on-premise.
I am using Microsoft Azure VPN Gateway to connect to my client. We use it to securely connect to other systems.
We have servers in Azure, and we use it to connect the on-premises users to the cloud servers. It is a site-to-site VPN deployed on our premise.