S2S VPN not propagating route to spoke and hub vnet

aferland 1 Reputation point
2022-11-23T20:47:36.37+00:00

I have a hub and spoke topology and one of my spoke hosts a VPN Gateway that has a S2S VPN with another VNET (in another tenant).

The IP Range of the remote network (10.10.6.0/24) (connected with S2S VPN) is not added in my route table (and therefore in the BGP table).

What am I missing here? What configuration do I have to do to have this IP range propagated in my route table and BGP table?

263642-image.png

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,368 questions
Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,131 questions
Azure ExpressRoute
Azure ExpressRoute
An Azure service that provides private connections between Azure datacenters and infrastructure, either on premises or in a colocation environment.
321 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Joe Carlyle 661 Reputation points MVP
    2022-11-24T09:40:41.07+00:00

    Your current architecture won't work I am afraid. There is no capability to write those transient hops into system route tables.

    You could make it work, if you change your 10.6 spoke to terminate in your hub VNG rather than on a spoke, which would be best practice and give you central routing.

    There is no other architecture that will write routes over BGP as you require.

    1 person found this answer helpful.

  2. Bas Pruijn 946 Reputation points
    2022-11-24T13:23:24.823+00:00

    In theory you might be able to add a user defined route to the 10.10.4.0/24 network defining the next hop for the 10.10.6.0/24 network to be the IP address of the VPN Gateway in the 10.10.5.0/24 network. Whether this would then automatically be propagated over BGP to the LAN network, I do not know (but I sincerely doubt that). You night need to add extra custom routes to your LAN network to make this work.

    you could start with adding this UDR and then test from the VM in the 10.10.4.0/24 network and see if that VM can connect. I bet that in your current set-up this VM also cannot connect to the 10.10.6.0/24 network. You first need to fix that step. Then you can look into propagating that communication to the LAN network.

    I do agree with @Joe Carlyle that your set-up is not according to best practices.