SecureTransport 5.4 on Azure Installation Guide Save PDF Selected topic Selected topic and subtopics All content Configure a Point-to-Site connection to your VNet A Point-to-Site (P2S) configuration allows you to create a secure connection from a client computer to your virtual network. So, you need a P2S SSTP tunnel for a client to connect to your VM. On the Azure portal, open your newly created VM and follow the process as defined in the detailed documentation as provided by Microsoft. First-timers must go through all steps as defined in the Microsoft documentation: Create a virtual network. Specify address space and subnets. Add a gateway subnet. Specify a DNS server (optional). Create a virtual network gateway. Generate certificates: Obtain the .cer file for the root certificate: generate a network-side certificate and paste the public part in the Gateway >P2S configuration.Generate a client certificate. Add the client address pool. Upload the root certificate .cer Install the VPN client configuration package. Download the client configuration package: for example, VPN client (e.g. x64).Install the client configuration package. Install the client certificate - generate a client certificate for secure connection to VPN. Connect to Azure - verify that you can connect to your VM using its private IP address. Verify your connection. Related Links
Configure a Point-to-Site connection to your VNet A Point-to-Site (P2S) configuration allows you to create a secure connection from a client computer to your virtual network. So, you need a P2S SSTP tunnel for a client to connect to your VM. On the Azure portal, open your newly created VM and follow the process as defined in the detailed documentation as provided by Microsoft. First-timers must go through all steps as defined in the Microsoft documentation: Create a virtual network. Specify address space and subnets. Add a gateway subnet. Specify a DNS server (optional). Create a virtual network gateway. Generate certificates: Obtain the .cer file for the root certificate: generate a network-side certificate and paste the public part in the Gateway >P2S configuration.Generate a client certificate. Add the client address pool. Upload the root certificate .cer Install the VPN client configuration package. Download the client configuration package: for example, VPN client (e.g. x64).Install the client configuration package. Install the client certificate - generate a client certificate for secure connection to VPN. Connect to Azure - verify that you can connect to your VM using its private IP address. Verify your connection.