Blog Post

Azure Networking Blog
4 MIN READ

vWAN to vWAN Connectivity Options

Adam_Torkar's avatar
Adam_Torkar
Icon for Microsoft rankMicrosoft
Feb 19, 2025

This article explains the various connection options available today to connect multiple Virtual WAN environments.

Option 1: IPSec Tunnels using Azure Virtual Network Gateways

In this option users can simply provision Azure Virtual Network Gateways on each vhub in each vWAN environment to connect both vWANs together. It's important to note that today you cannot change the vWAN virtual Network Gateway ASN, which is 65515. This is hardcoded inside the vhub gateway config. At a later date, there should be an option to change the virtual network gateway ASN. For this reason, you cannot do BGP over IPSEC due to BGP loop prevention and seeing its own ASN in the path. The remote vhub will receive routes from the source vhub with 65515 in the AS-PATH and BGP will drop that. Therefore, if you want to connect two different vWAN environments, the tunnels need to be static, no BGP option. The other thing to note is max throughput you can get per tunnel is around 2.4Gbps, and this is an SDN limitation. This can be increased by adding more tunnels.

Pros:

  • Uses Azure native VPN gateways for each respective vhub and vWAN
  • Cheaper than using dedicated high bandwidth links like ExpressRoute

Cons:

  • Cannot use BGP due to the vHub gateway ASN hard-coded with 65515
  • VPN tunnel throughput is max 2.4Gbps per tunnel depending on ciphers

 

Option 2: ExpressRoute Circuits using MSEE hair pinning

This is another option using Azure native solutions. If there is already an Express-Route circuit provisioned, we can simply hook the other vhubs in each vWAN environment to the use the same express-route circuit. Like regular hub+spoke, when multiple vnets are connected to the same circuit, the egress point is the MSEE at the peering pops. Traffic between each vhub in different vWANs will simply hairpin down to the Azure MSEEs and each pop location before traveling to the remote vhub and vwan environment.

Side note, I wrote another blog with my colleague Daniel Mauser on MSEE hairpin alternatives here

Pros:

  • Minimal setup required with existing express-route circuits
  • Higher bandwidth then SDWan or IPSEC tunnels

Cons:

  • Latency can be an issue as the egress point is the peering pop
  • This can tax the remote gateway for ingress flows if fast-path is not available
  • Cost of running the Express-Route circuit

 

Option 3: SDWan Tunnels with BGP+IPSEC Inside the vHubs

This option is good for users who are already running their own SDWAN devices today to connect to on-prem WAN links or don't need the extra bandwidth of Express-Route. Deploying SDWan partner devices in each respective vhub to build the connections between vWans, users can run BGP over IPSEC to make the connectivity. In order to make the routing work, inside the SDWAN operating system, it's necessary to do "AS-Path Replace or AS-Path Exclude" BGP commands for the vhub 65520 and Route Server 65515 ASNs. The command for example would be "as-path exclude 65520 65515" or similar depending on the vendor. You would then need to apply that inbound route-map to each BGP peer. That way, the remote vWAN vhub won't drop the route, because it won't see its own ASN in the path. This is the same behavior is option 1, except here we have the ability to do BGP manipulation on third party devices unlike the Azure Virtual Network Gateways. The SDWANs can use different ASNs and do eBGP, or they could also be the same ASN and have an iBGP session.

Pros:

  • More granular control and options to manipulate routing
  • Potential for more optimal throughput and tunning
  • Some devices can also double duty and do inspection

Cons:

  • Complexity to setup and maintain
  • Only certain SDWan devices are supported inside the vhubt today
  • Potentially more expensive than Azure Virtual Network Gateways
  • SDWan devices cannot be combined with NVAs inside the vhub

 

Option 4: SDWan Tunnels with BGP+IPSEC with SDWan devices BGP peered in Spokes

This would be the similar to option 3, except we have the SDWAN device in a spoke vnet that is vnet peered to each vhub. We then would BGP peer the SDWAN device to the Route Server instances inside the vhub. This is a good for scenarios where users have SDWAN devices that cannot be deployed inside vhubs, but still support BGP. Like above, we need to apply inbound route-maps to each SDWan device and do the "same as-path exclude or as-path replace on both 65520 and 65515 ASNs" so the receiving end does not drop the routes.

Pros:

  • More granular control and options to manipulate routing
  • Potential for more optimal throughput and tunning
  • Some devices can also double duty and do inspection
  • Flexibility for deployment outside the vhubs

Cons:

  • Complexity to setup and maintain
  • Potentially more expensive than Azure Virtual Network Gateway

 

Side note regarding non vWAN vnets that you wish to connect to vWAN environments for new deployments!

The following steps would need to be enabled on both the vhub and regular Azure Vnet with the Express-Route Gateway to allow the hair-pinning!

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Updated Feb 19, 2025
Version 1.0
No CommentsBe the first to comment