Part of routes learned by Azure VPN Gateway is not propagated to its VNET

Cat Mucius 91 Reputation points
2025-03-01T12:09:43.71+00:00

Good day,

We have a very curious and non-standard situation.

We have a VPN Gateway connected to number of BGP-over-IPsec peers. It learns routes from them by BGP and propagates (injects) them into its VNET (as well as to a number of spoke VNETs, all having the "Enable <spoke-VNET> to use remote gateway or route server" flag set).

All works as planned, except one thing - routes learned from particular peer (a Virtual WAN of another tenant) are NOT propagated to the Gateway-hosting VNET or to spoke VNETs peered with it.

I should emphasize that:

  1. The routes from the Virtual WAN ARE learned by the VPN Gateway - it's not a issue of non-working site-to-site VPN. It even successfully re-advertises them to its other peers.
  2. It's NOT a problem of a Route Table (UDR) blocking propagation - I was checking "Effective routes" for VMs attached to subnets without UDRs or with UDRs having the propagation enabled. Besides, routes from all other BGP peers appear there. Only routes from the Virtual WAN do not.
  3. If I configure static route towards the Virtual WAN on the "Local Network Gateways" representing it - the route IS successfully propagated to the VNETs.
  4. Apparently, it's also NOT a problem with max limits: I've disconnected some BGP peers temporarily from the VPN Gateway to see whether the Virtual WAN routes will be injected instead of theirs - and no, this DIDN'T happen.
  5. I've tried resetting the VPN connections, the VPN Gateway itself and the gateway on the Virtual WAN side - this didn't make any difference.

What can cause these specific routes not to arrive to the SDN level?

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,678 questions
{count} votes

2 answers

Sort by: Most helpful
  1. Cat Mucius 91 Reputation points
    2025-03-03T15:39:52.92+00:00

    Microsoft support have discovered the reason.

    Besides being peered with a number of regular BGP-over-IPsec peers, the same VPN Gateway of mine was also used to establish BGP-over-IPsec-over-ExpressRoute connections with on-premises routers, a setup described in the "Configure a Site-to-Site VPN connection over ExpressRoute private peering" article.

    Such setup requires ExpressRoute Gateway to be deployed in the same GatewaySubnet of the same VNET as the VPN Gateway. The ExpressRoute Gateway comes with non-modifiable ASN 65515 and its instances establish BGP peerings with instances of the VPN Gateway.

    But Virtual WAN also comes with the same ASN 65515, which also cannot be changed. So a conflict arose, which prevented (not exactly clear why) the routes learned by the VPN Gateway to be propagated to the VNETs using it.

    As soon as I removed the ExpressRoute Gateway, the problem disappeared. (Just disconnecting it from the ExpressRoute circuit wasn't enough, as it still continued to advertise its own addresses with ASN 65515).


    As a workaround, I simply set up the ExpressRoute connectivity via the Virtual WAN - deployed an ExpressRoute Gateway, connected it to my circuit (the Authorizations mechanism allows easily doing so across tenants) and established IPsec tunnels over it to the site-to-site VPN Gateway of the same WAN Hub. No ASN conflict arises in this case.

    The architecture is outlined at "ExpressRoute encryption: IPsec over ExpressRoute for Virtual WAN".

    0 comments No comments

  2. Praveen Bandaru 850 Reputation points Microsoft External Staff
    2025-03-03T17:40:46.0066667+00:00

    Hello Cat Mucius

    Greetings!

    I'm glad that you were able to resolve your issue and thank you for posting your solution so that others experiencing the same thing can easily reference this!

    Since the Microsoft Q&A community has a policy that "The question author cannot accept their own answer. They can only accept answers by others", I'll repost your solution.

    Please click "Accept" the answer as original posters help the community find answers faster by identifying the correct answer.

    Issue: Part of routes learned by Azure VPN Gateway is not propagated to its VNET

    Resolution:

    Besides being peered with a number of regular BGP-over-IPsec peers, the same VPN Gateway of mine was also used to establish BGP-over-IPsec-over-ExpressRoute connections with on-premises routers, a setup described in the "Configure a Site-to-Site VPN connection over ExpressRoute private peering" article.

    Such setup requires ExpressRoute Gateway to be deployed in the same GatewaySubnet of the same VNET as the VPN Gateway. The ExpressRoute Gateway comes with non-modifiable ASN 65515 and its instances establish BGP peerings with instances of the VPN Gateway.

    But Virtual WAN also comes with the same ASN 65515, which also cannot be changed. So a conflict arose, which prevented (not exactly clear why) the routes learned by the VPN Gateway to be propagated to the VNETs using it.

    As soon as I removed the ExpressRoute Gateway, the problem disappeared. (Just disconnecting it from the ExpressRoute circuit wasn't enough, as it still continued to advertise its own addresses with ASN 65515).

    As a workaround, I simply set up the ExpressRoute connectivity via the Virtual WAN - deployed an ExpressRoute Gateway, connected it to my circuit (the Authorizations mechanism allows easily doing so across tenants) and established IPsec tunnels over it to the site-to-site VPN Gateway of the same WAN Hub. No ASN conflict arises in this case.

    The architecture is outlined at "ExpressRoute encryption: IPsec over ExpressRoute for Virtual WAN".

    1. Document that VPN Gateway used in conjunction with ExpressRoute Gateway cannot be peered with any Virtual WAN (at least if BGP is used for this peering).
    2. Allow changing ASN either for ExpressRoute Gateway, for Virtual WAN or for both.

    Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.