Skip to content
Related Articles
Open in App
Not now

Related Articles

Point-to-Site VPN Connection in Azure

Improve Article
Save Article
  • Last Updated : 15 Nov, 2022
Improve Article
Save Article

A Point-to-Site VPN connection allows individual clients to securely connect to the Azure virtual network. P2S connection can use one of the following protocols – 

  • OpenVPN Protocol
  • Secure Socket Tunneling Protocol
  • IKEv2 VPN

Azure offers 3 ways to authenticate a client trying to connect to the virtual network using a P2S VPN connection – 

  1. Authenticate using native Azure certificate authentication
  2. Authenticate using native Azure active directory authentication
  3. Authenticate using active directory Domain Server

This article covers connecting using Azure certificate authentication.

Steps to establish P2S VPN Connection:-

Step 1. Create a virtual network from the Azure portal with default configurations. On the Azure portal click on “Create a resource” and search for “Virtual Network” in the search bar. Select the resource shown below and click on Create.

virtual network



Step 2. Under the Basic category, select a subscription type, choose an existing resource group or create a new one, assign a name to the virtual network, and select a region where the VNET would be deployed.

create virtual network



Step 3. For our purpose no need to make any changes under the Security, IP addresses, and Tags categories. Finally, click on Review + create. A validation test will be run by Azure. Once validated successfully, click on the create button shown below.

review vn


  • After a few seconds, we can see that the VNET has been deployed.
overview vn



Step 4. Create a virtual network gateway in the VNET created in the above steps with the default configurations. Make sure the region for VNETT and VNET Gateway are the same.



Step 5. Create a self-signed root certificate using Windows PowerShell on your local machine using the following command – 

self signed root


Step 6. Create a client certificate using Windows Powershell on your local machine.



You can view the certificates in the certificate manager



  • Right-click the certificates and select “All tasks” and then select Export. A certificate export wizard will pop up. Use the “Base-64 encoded X.509” file format for the root certificate and keep other details as default. For the client certificate, select the option “Yes, export the private key” and “Personal Information Exchange – PKCS” file format with the first and last option selected.

Step 7. Now we need to upload the root certificate to the Azure virtual network gateway under the Point-to-Site configuration. Azure will perform authentication based on this root certificate.



Here, we need to specify the IP address pool. The clients connecting to the VNET via the P2S VPN connection will be allocated IP addresses from this pool. Make sure this IP address pool does not overlap with the subnets defined under your vnet and the gateway subnet.
Then, we need to copy the root certificate data under the Public certificate data. Save the details and download the VPN client. Once downloaded, extract the contents. You can see the below contents – 


You can either run Amd64 or X86 VPN client application.

Step 8. Connect to the VPN client from your local machine.


Now, we can verify the connection by checking the IP address allocated to the client from Azure.

p2s config


My Personal Notes arrow_drop_up
Related Articles

Start Your Coding Journey Now!