Skip to content

Commit 53b5911

Browse files
committed
docs: Update designing-for-high-availability-with-expressroute.md - freshness review
1 parent 8bc6517 commit 53b5911

1 file changed

Lines changed: 10 additions & 24 deletions

File tree

Lines changed: 10 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: 'Azure ExpressRoute: Designing for high availability'
33
description: This page provides architectural recommendations for high availability while using Azure ExpressRoute.
4-
services: expressroute
54
author: duongau
65
ms.service: azure-expressroute
76
ms.topic: concept-article
8-
ms.date: 11/18/2024
7+
ms.date: 03/16/2026
98
ms.author: duau
109
# Customer intent: As a network architect, I want to design a high availability Azure ExpressRoute setup, so that I can ensure robust and uninterrupted connectivity for my organization's critical applications and services.
1110
---
@@ -21,25 +20,25 @@ Azure ExpressRoute is designed for high availability, providing carrier-grade pr
2120

2221
The following figure illustrates the recommended way to connect using an Azure ExpressRoute circuit to maximize availability.
2322

24-
[![1]][1]
23+
:::image type="content" source="./media/designing-for-high-availability-with-expressroute/exr-reco.png" alt-text="Diagram of the recommended way to connect using Azure ExpressRoute for high availability.":::
2524

2625
For high availability, it's essential to maintain redundancy throughout the end-to-end network. This means maintaining redundancy within your on-premises network and not compromising redundancy within your service provider network. At a minimum, this involves avoiding single points of network failure. Redundant power and cooling for network devices further improve high availability.
2726

2827
### First mile physical layer design considerations
2928

3029
If you terminate both the primary and secondary connections of an Azure ExpressRoute circuit on the same Customer Premises Equipment (CPE), you compromise high availability within your on-premises network. Additionally, configuring both connections using the same port of a CPE forces the partner to compromise high availability on their network segment. This can occur by terminating the two connections under different subinterfaces or merging the two connections within the partner network, as illustrated below.
3130

32-
[![2]][2]
31+
:::image type="content" source="./media/designing-for-high-availability-with-expressroute/suboptimal-lastmile-connectivity.png" alt-text="Diagram of suboptimal last mile connectivity for ExpressRoute circuits.":::
3332

3433
Terminating the primary and secondary connections of an Azure ExpressRoute circuit in different geographical locations can compromise network performance. If traffic is actively load-balanced across connections terminated in different locations, substantial differences in network latency between the two paths can result in suboptimal performance.
3534

36-
For geo-redundant design considerations, see [Designing for disaster recovery with Azure ExpressRoute][DR].
35+
For geo-redundant design considerations, see [Designing for disaster recovery with Azure ExpressRoute](./designing-for-disaster-recovery-with-expressroute-privatepeering.md).
3736

3837
### Active-active connections
3938

4039
Microsoft network operates the primary and secondary connections of Azure ExpressRoute circuits in active-active mode. However, you can force the redundant connections to operate in active-passive mode through your route advertisements. Advertising more specific routes and BGP AS path prepending are common techniques to prefer one path over the other.
4140

42-
To improve high availability, it's recommended to operate both connections in active-active mode. This allows Microsoft network to load balance traffic across the connections on a per-flow basis.
41+
To improve high availability, Microsoft recommends operating both connections in active-active mode. This allows Microsoft network to load balance traffic across the connections on a per-flow basis.
4342

4443
Running connections in active-passive mode risks both connections failing if the active path fails. Common causes for failure include lack of active management of the passive connection and passive connection advertising stale routes.
4544

@@ -52,7 +51,7 @@ Alternatively, running connections in active-active mode results in only about h
5251

5352
Microsoft peering is designed for communication between public endpoints. Typically, on-premises private endpoints are Network Address Translated (NATed) with public IPs on the customer or partner network before communicating over Microsoft peering. Using both primary and secondary connections in an active-active setup affects how quickly you recover from a failure in one of the connections. Two different NAT options are illustrated below:
5453

55-
[![3]][3]
54+
:::image type="content" source="./media/designing-for-high-availability-with-expressroute/nat-options.png" alt-text="Diagram of NAT options for Microsoft peering with ExpressRoute.":::
5655

5756
#### Option 1:
5857

@@ -67,7 +66,7 @@ A common NAT pool is used before splitting traffic between the primary and secon
6766
The NAT pool remains reachable even if the primary or secondary connection fails, allowing the network layer to reroute packets and recover faster.
6867

6968
> [!NOTE]
70-
> * If using NAT option 1 (independent NAT pools for primary and secondary connections) and mapping a port of an IP address from one NAT pool to an on-premises server, the server will not be reachable via the Azure ExpressRoute circuit if the corresponding connection fails.
69+
> * If using NAT option 1 (independent NAT pools for primary and secondary connections) and mapping a port of an IP address from one NAT pool to an on-premises server, the server won't be reachable via the Azure ExpressRoute circuit if the corresponding connection fails.
7170
> * Terminating Azure ExpressRoute BGP connections on stateful devices can cause failover issues during planned or unplanned maintenance by Microsoft or your Azure ExpressRoute Provider. Test your setup to ensure proper failover, and when possible, terminate BGP sessions on stateless devices.
7271
7372
## Fine-tuning features for private peering
@@ -76,27 +75,14 @@ This section reviews optional features that help improve the high availability o
7675

7776
### Availability Zone aware Azure ExpressRoute virtual network gateways
7877

79-
An Availability Zone in an Azure region combines a fault domain and an update domain. To achieve the highest resiliency and availability, configure a zone-redundant Azure ExpressRoute virtual network gateway. For more information, see [About zone-redundant virtual network gateways in Azure Availability Zones][zone redundant vgw]. To configure a zone-redundant virtual network gateway, see [Create a zone-redundant virtual network gateway in Azure Availability Zones][conf zone redundant vgw].
78+
An Availability Zone in an Azure region combines a fault domain and an update domain. To achieve the highest resiliency and availability, configure a zone-redundant Azure ExpressRoute virtual network gateway. For more information, see [About zone-redundant virtual network gateways in Azure Availability Zones](../vpn-gateway/about-zone-redundant-vnet-gateways.md). To configure a zone-redundant virtual network gateway, see [Create a zone-redundant virtual network gateway in Azure Availability Zones](../vpn-gateway/create-zone-redundant-vnet-gateway.md).
8079

8180
### Improving failure detection time
8281

83-
Azure ExpressRoute supports BFD over private peering, reducing failure detection time over the Layer 2 network between Microsoft Enterprise Edge (MSEEs) and their BGP neighbors on the on-premises side from about 3 minutes (default) to less than a second. Quick failure detection helps hasten recovery. For more information, see [Configure BFD over Azure ExpressRoute][BFD].
82+
Azure ExpressRoute supports BFD over private peering, reducing failure detection time over the Layer 2 network between Microsoft Enterprise Edge (MSEEs) and their BGP neighbors on the on-premises side from about 3 minutes (default) to less than a second. Quick failure detection helps hasten recovery. For more information, see [Configure BFD over Azure ExpressRoute](./expressroute-bfd.md).
8483

8584
## Next steps
8685

8786
This article discussed designing for high availability of an Azure ExpressRoute circuit. An Azure ExpressRoute circuit peering point is pinned to a geographical location and can be affected by catastrophic failures impacting the entire location.
8887

89-
For design considerations to build geo-redundant network connectivity to the Microsoft backbone that can withstand catastrophic failures affecting an entire region, see [Designing for disaster recovery with Azure ExpressRoute private peering][DR].
90-
91-
<!--Image References-->
92-
[1]: ./media/designing-for-high-availability-with-expressroute/exr-reco.png "Recommended way to connect using ExpressRoute"
93-
[2]: ./media/designing-for-high-availability-with-expressroute/suboptimal-lastmile-connectivity.png "Suboptimal last mile connectivity"
94-
[3]: ./media/designing-for-high-availability-with-expressroute/nat-options.png "NAT options"
95-
96-
97-
<!--Link References-->
98-
[zone redundant vgw]: ../vpn-gateway/about-zone-redundant-vnet-gateways.md
99-
[conf zone redundant vgw]: ../vpn-gateway/create-zone-redundant-vnet-gateway.md
100-
[Configure Global Reach]: ./expressroute-howto-set-global-reach.md
101-
[BFD]: ./expressroute-bfd.md
102-
[DR]: ./designing-for-disaster-recovery-with-expressroute-privatepeering.md
88+
For design considerations to build geo-redundant network connectivity to the Microsoft backbone that can withstand catastrophic failures affecting an entire region, see [Designing for disaster recovery with Azure ExpressRoute private peering](./designing-for-disaster-recovery-with-expressroute-privatepeering.md).

0 commit comments

Comments
 (0)