BGP Routing Path

Handian Sudianto 6,541 Reputation points
2025-03-15T01:25:32.85+00:00

Active active mode in the VPN Gateway set to enabled, this mean Azure will have 2 BGP Peer IP and 2 VPN Public IP.

Azure BGP Peer IP : 10.201.0.4 and 10.201.0.5

I also have 2 local connection from VGW to my onpremises using 2 different internet connection.

Onprem BGP Peer IP : 10.201.0.101 and 10.201.0.201

BGP Peer 10.201.0.101 connected to 10.201.0.4 and BGP Peer 10.201.0.201 connected to 10.201.0.5

So in this picture we can see there are another 2 BGP with status connecting. 10.201.0.101 to 10.201.0.5 and 10.201.0.201 to 10.201.0.4.

Can i know if this configuration is right for active active mode?

User's image

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
{count} votes

1 answer

Sort by: Most helpful
  1. Ganesh Patapati 10,385 Reputation points Microsoft External Staff Moderator
    2025-03-17T18:28:14.0166667+00:00

    Hello Handian Sudianto

    image (47) As per the above screenshot, you have created two BGP connections between Azure's two public IPs and two on-prem IPs, which are shown as connected in the green lines. However, you have not created cross-redundancy BGP sessions between Azure BGP peer (10.201.0.4) and on-prem BGP peer (10.201.0.201), and Azure BGP peer (10.201.0.5) and on-prem BGP peer (10.201.0.101), resulting in a connecting state as shown in the violet lines.

    NOTE: If you want dual redundancy active-active mode, you need to setup full mesh connectivity of four IPsec tunnels between your Azure virtual network gateway and you're on-premises network.

    Refer: https://learn.microsoft.com/en-us/azure/vpn-gateway/about-active-active-gateways#dual-redundancy-active-active-mode-design

    In active-active mode, each Azure VPN Gateway instance has a unique public IP address and BGP peer IP. Both instances establish independent IPsec/IKE S2S VPN tunnels to your on-premises VPN devices. This ensures high availability and load balancing.

    Your setup with two on-premises BGP peers (10.201.0.101 and 10.201.0.201) connecting to two Azure BGP peers (10.201.0.4 and 10.201.0.5) is correct. However, the additional "connecting" BGP sessions (10.201.0.101 to 10.201.0.5 and 10.201.0.201 to 10.201.0.4) might indicate that the on-premises devices are attempting to establish redundant connections to both Azure instances. This is expected behavior in active-active mode, as Azure supports multiple BGP sessions for redundancy.


    I hope this has been helpful!

    If above is unclear and/or you are unsure about something add a comment below.

    please don’t forget to close the thread by clicking Accept the answer wherever the information provided helps you, as this can be beneficial to other community members. Accepted answer


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.