An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Hi Rajesh Swarnkar,
Thanks for reaching out in Microsoft Q&A forum,
Your S2S setup between two Azure VPN Gateways won't work it's using the wrong connection pattern. Here's the deal in plain English:
You're building this:
VPN Gateway (centralindia) > Local Network Gateway > Connection > VPN Gateway (southindia)
Local Network Gateways tell Azure, "this is an on-premises VPN device." But you're pointing them at another Azure VPN Gateway. Azure's control plane goes, "Wait, where's the customer VPN appliance?" and the IPsec handshake fails silently hence "Unknown."
Your Settings Are Fine, Architecture Isn't
Your connection config looks good:
- IKEv2 enabled
- Default mode
- BGP enabled (perfect for Route Server testing)
- Standard PSK
This isn't a config tweak issue; it's the wrong topology.
Option 1: VNet-to-VNet Connections (Keeps IPsec)
Delete your current connections. Recreate properly:
1. vpng-centralindia > Connections > +Add > "VNet-to-VNet" - Target: vpng-southindia directly (no LNG)
2. vpng-southindia > Connections > +Add > "VNet-to-VNet" - Target: vpng-centralindia directly (no LNG)
Option 2: Global VNet Peering (Recommended for Route Server)
Simplest fix, no IPsec, pure Azure backbone:
1. Delete both failing connections + both Local Network Gateways
2. Central VNet → Peerings → +Add → South VNet
- Allow gateway transit: YES
3. South VNet → Peerings → +Add → Central VNet
- Use remote gateways: YES
Route Server shines with peering:
- Central Route Server learns VPN Gateway routes → propagates to South via peering
- South Route Server learns Central routes → full mesh automatically
- No tunnel state to manage
- BGP works end-to-end
On-Prem > Central VPN > Route Server > Peering > South Route Server > South VPN > On-Prem
Go with peering since you're testing Route Server:
1. Delete connect-central-to-south2 & connect-south-to-central2
2. Delete Ing-in-centralindia & Ing-in-southindia (LNGs)
3. Create bidirectional Global VNet Peering with gateway transit
4. Watch Route Servers auto-propagate routes
Official Docs:
- VPN Gateway Connection Types
- VNet-to-VNet Setup
- Global VNet Peering + Gateway Transit
- Route Server Overview
Kindly let us know if the above helps or you need further assistance on this issue.
Please do not forget to
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.