Configure IPSec Encryption over Express Route

Aakriti Verma 21 Reputation points
2020-07-22T16:55:09.913+00:00

Hi ,

I want to know the difference of configuration between Coexistence of Express ROute and S2S
and the encryption of Express ROute by creating IPSec Tunnel.

In Coexisting --
we create 1 VPN Gateway and 1 ER Gateway in one Virtual Network

In IPSec --
WHat is the high level process ?
Please note I also have Private Peering , so I have Exp Route Gateway as well.

I need to understand the differnce in configuration.

Thanks in advance!

Azure ExpressRoute
Azure ExpressRoute
An Azure service that provides private connections between Azure datacenters and infrastructure, either on premises or in a colocation environment.
381 questions
0 comments No comments
{count} votes

Accepted answer
  1. GitaraniSharma-MSFT 49,651 Reputation points Microsoft Employee
    2020-07-23T09:09:51.78+00:00

    Hello @Aakriti Verma ,

    There are 3 ways to use IPSec encryption over ExpressRoute:

    1.IPSec can be done over ExpressRoute Microsoft peering:
    https://learn.microsoft.com/en-us/azure/expressroute/site-to-site-vpn-over-microsoft-peering

    2.IPSec can also be done over Private peering, but you will need to use Virtual WAN:
    https://learn.microsoft.com/en-us/azure/virtual-wan/vpn-over-expressroute

    3.MACsec can be used with ExpressRoute Direct and you can also use IPSec in addition to MACSec with ExpressRoute direct:
    https://learn.microsoft.com/en-us/azure/expressroute/expressroute-about-encryption

    If you use IPSec VPN over MS peering, it is specifically a S2S VPN between on-premise VPN device and Azure VNET's VPN gateway. So by this way you can have S2S VPN established over MS peering (in normal scenarios S2S VPN established over Internet). It is meant for communication with VNET resources only.
    Using this method, the traffic for PaaS services from on-premises will not be encrypted but it will traverse as normal traffic over MS peering.

    If you use IPSec over Private peering for Virtual WAN, it provides encrypted transit between the on-premises networks and Azure virtual networks over ExpressRoute, without going over the public internet or using public IP addresses.

    On the other hand, MacSec with ER Direct provides point to point encryption between your device and Microsoft device. So in this case all traffic such as, BGP control traffic, Private peering traffic , MS peering traffic - which includes PaaS service traffic as well, gets encrypted using MacSec keys.

    Since you already have an ExpressRoute gateway with private peering, you can go for IPSec VPN over MS peering (if interested).

    Configuring a site-to-site VPN over ExpressRoute helps you secure encrypted connectivity between your on-premises network and your Azure virtual networks (VNets) over an ExpressRoute private connection. You can use Microsoft peering to establish a site-to-site IPsec/IKE VPN tunnel between your selected on-premises networks and Azure VNets. Configuring a secure tunnel over ExpressRoute allows for data exchange with confidentiality, anti-replay, authenticity, and integrity.

    To configure a site-to-site VPN connection over ExpressRoute, you must leverage ExpressRoute Microsoft peering. VPN tunnels over Microsoft peering can be terminated either using VPN gateway, or using an appropriate Network Virtual Appliance (NVA) available through Azure Marketplace. You can exchange routes statically or dynamically over the encrypted tunnels without exposing the route exchange to the underlying Microsoft peering.
    13493-ipsecoverexr.jpg

    Co-existence of S2S and ExpressRoute helps you in use the Site-to-Site VPN as a secure failover path for ExpressRoute, or use Site-to-Site VPNs to connect to sites that are not connected through ExpressRoute.
    Please refer : https://learn.microsoft.com/en-us/azure/expressroute/expressroute-howto-coexist-resource-manager

    Hope this helps!

    Kindly let us know if the above helps or you need further assistance on this issue.


    Please don’t forget to "Accept the answer" wherever the information provided helps you, this can be beneficial to other community members.

    1 person found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Andy 21 Reputation points
    2020-07-22T20:47:01.977+00:00

    You will be able to create S2S tunnel over Express Route by using NVA ( like Cisco CSR ). It will allows you to seamlessly failover from Express Route to Internet backup path.

    The process shouldn't be much different for VPN gateway. Your on-prem router can reach VPN gateway public IPs over the internet and over the Express Route public peering.

    So your failover might looks like following :

    13373-vpngw.png

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.