I use Microsoft Azure VPN Gateway to connect the remote site via the local network to the front-end site or any other cloud or network.
What I like best about Microsoft Azure VPN Gateway is that it's a managed VPN, so it's one of the most powerful VPNs I've ever found. You can run the solution within thirty to forty-five minutes, and then, once data is configured, you can easily configure multiple tenants.
Microsoft Azure VPN Gateway also provides point-to-site VPNs configurable within a few minutes. The solution also offers multiple encryption methods for you to utilize.
Connectivity could be improved in Microsoft Azure VPN Gateway because it's not as stable, particularly when connecting a device tunnel. It's a good practice to connect up to twenty-five device tunnels to the solution, but that requires more stability, and the tunnels should remain connected whenever you're logged into your machine.
I've been using Microsoft Azure VPN Gateway for two years.
Microsoft Azure VPN Gateway is a stable product.
Microsoft Azure VPN Gateway is scalable, and I'd give it a nine out of ten in terms of its scalability because there's always room for improvement.
I contacted the technical support for Microsoft Azure VPN Gateway. Still, it wasn't good because my company faced many issues and device troubles, but the support team couldn't resolve the problems. Two months passed, yet the issues remained unsolved. For this reason, I'd give Microsoft Azure VPN Gateway support two out of ten.
The initial setup for Microsoft Azure VPN Gateway was pretty easy. I'd rate its setup a nine on a scale of one to ten.
Configuring and deploying Microsoft Azure VPN Gateway took about thirty to forty-five minutes. After that, you can configure different tunnels and run the solution. For the initial setup, it's thirty to forty-five minutes.
I've been using Microsoft Azure solutions, such as Microsoft Azure VPN Gateway, including storage and networking solutions.
I'm using generation 1 (G1) of Microsoft Azure VPN Gateway.
I deployed the solution for an organization with three hundred to four hundred users.
Anyone who wants the Azure environment connected to an on-premise or remote user's machine should go for the VPN, the managed native VPN of Azure because the setup is pretty straightforward. You can configure that within half an hour, and the communication will be on the local network.
I'd tell anyone planning to use Microsoft Azure VPN Gateway for the first time that it has multiple advanced features and public IP addresses, so I recommend you go through the entire fields required. If anyone commits a single mistake for any of the IP addresses or subnet level, the communication could break, which means having to wait for hours up to a day to rectify that issue. Anyone starting to use Microsoft Azure VPN Gateway should know what IP addresses should be utilized there, for example, the CIDR block for the addresses space. If you're going for advanced Microsoft Azure VPN Gateway features, for example, the BGP, you should also know the correct information you need to fill in each block.
My Microsoft Azure VPN Gateway rating is nine out of ten because it's a managed VPN that allows you to utilize multiple point-to-site connections. You can utilize Azure AD as well for authenticating point-to-site users. Microsoft Azure VPN Gateway is easy to use, so even a non-technical person can easily understand and configure the solution.
I'm a customer of Microsoft.