Skip to content

Commit e94acf0

Browse files
authored
Enhance site-to-site tunnel documentation with encryption options
Added options for selective traffic encryption and routing considerations between on-premises networks and Azure VNets.
1 parent 71d6da2 commit e94acf0

1 file changed

Lines changed: 16 additions & 1 deletion

File tree

articles/vpn-gateway/site-to-site-high-bandwidth-tunnel.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,22 @@ When using IPsec tunnels that transit ExpressRoute private peering, you must adv
8787

8888
To ensure all traffic between Azure and your on-premises network is encrypted, configure routing so that only the VPN device tunnel IPs are advertised over ExpressRoute. The actual on-premises network prefixes should be routed through the VPN Gateway, either using static routes or BGP. This approach ensures that on-premises to Azure traffic is always encrypted inside the VPN tunnel before it enters the ExpressRoute data path.
8989

90-
If you advertise on-premises network prefixes to ExpressRoute through BGP, those routes can bypass the VPN Gateway, resulting in unencrypted traffic. To prevent this issue, use a user-defined route (UDR) on your Azure virtual network to direct traffic to the VPN Gateway as the next hop. This configuration guarantees that all traffic is encrypted before transiting ExpressRoute.
90+
## <a name="Selective traffic encryption"></a>Selective traffic encryption between on premises networks and Azure VNets
91+
92+
In scenarios where only a portion of the traffic between your on-premises networks and an Azure virtual network (VNet) requires encryption, you can choose from the following configuration options.
93+
94+
**Option 1 – Traffic selection via IPsec only**
95+
96+
To ensure predictable routing, advertise different on premises IP network prefixes over ExpressRoute and over the IPsec tunnels. Advertise only the on premises prefixes that do not require encryption through the ExpressRoute circuit, and configure the IPsec tunnels to advertise only the prefixes that do require encryption.
97+
98+
**Option 2 – Route precedence using more specific network prefixes**
99+
100+
Advertise more specific (longer subnet masks) on‑premises IP network prefixes over the IPsec tunnels than the on-premises prefixes you advertise over the ExpressRoute circuit. Because Azure and on‑premises routers both select routes based on longest prefix match (LPM), these more specific prefixes learned through the IPsec tunnel will take precedence over the less specific prefixes learned through ExpressRoute. This ensures that traffic destined for those networks follows the encrypted IPsec path rather than the unencrypted ExpressRoute path.
101+
102+
These considerations apply regardless of whether static or dynamic routing is used for the IPsec tunnels.
103+
104+
Avoid advertising the same on-premises IP network prefixes simultaneously over both ExpressRoute circuit and IPsec tunnels. If the on premises routing policies give to the IPsec tunnels higher priority, outbound traffic from on-premises to Azure will prefer the IPsec path. However, Azure typically prefers routes learned from ExpressRoute Gateway when identical prefixes are received from both connections.
105+
This mismatch results in asymmetric routing, where traffic flows outbound through one path (IPsec) but returns through another (ExpressRoute). Flows with asymmetric transit can lead to packet drops, especially on stateful on-premises devices.
91106

92107
## <a name="VNetGateway"></a>Create a VPN gateway High Bandwidth tunnel
93108

0 commit comments

Comments
 (0)