Hello **Till Voelkner
**Thank you for your questions and for highlighting the concern about VPN tunnel initiation behavior. This is an important point, and we appreciate the chance to clarify how Azure VPN Gateway works in this context.
After our analysis and testing, we found that Azure VPN Gateway is mainly designed to act as a responder for site-to-site IPsec VPN connections. Although the Azure portal shows an “Initiator” option, this does not mean Azure will consistently or proactively start IKE negotiations like a traditional on-premises firewall or router.
In real-world use, Azure VPN Gateway does not reliably send the initial IKE_SA_INIT messages to start a tunnel on its own. Tunnel setup is generally driven by network traffic and is responder-based. Therefore, if the on-premises device (such as the MikroTik router) is set to wait for Azure to initiate the tunnel, the VPN may not establish reliably.
Regarding the “Azure as Initiator” setting: it is mainly for compatibility and legacy reasons across various VPN vendors. It allows Azure to initiate a tunnel when traffic triggers it, but it should not be seen as Azure actively bringing up the tunnel. The portal wording may imply more capability than is actually available.
For best results, we recommend the following configuration:
- Azure VPN Gateway connection mode set to Default
- MikroTik router configured as the initiator
- Enable proper DPD/keepalive settings on the MikroTik for tunnel stability
This setup keeps the VPN tunnel established at the network layer, regardless of Azure VM activity. VM scaling events won’t require extra scripts or traffic generation, and all VMs will have connectivity as soon as they start.
We agree that using VM-based ping scripts to initiate a VPN tunnel is not a professional or cloud-native solution, and it is unnecessary with the recommended configuration.