

Now, using custom IPsec/IKE policy, you can use a route-based VPN gateway and connect to multiple policy-based VPN/firewall devices. Previously, when working with policy-based VPNs, you were limited to using the policy-based VPN gateway Basic SKU and could only connect to 1 on-premises VPN/firewall device. VpnGw1, VpnGw2, VpnGw3, VpnGw1AZ, VpnGw2AZ, VpnGw3AZ They are built on different internal platforms, which result in different specifications: Category The following diagrams highlight the two models: Policy-based VPN exampleĬurrently, Azure supports both modes of VPN gateways: route-based VPN gateways and policy-based VPN gateways. It is typically built on router platforms where each IPsec tunnel is modeled as a network interface or VTI (virtual tunnel interface). Route-based VPN devices use any-to-any (wildcard) traffic selectors, and let routing/forwarding tables direct traffic to different IPsec tunnels.

IPsec tunnel encryption and decryption are added to the packet filtering and processing engine. It is typically built on firewall devices that perform packet filtering.
