Thursday, 14 November 2024

BGP Capabilities and Limitations in Azure.



Border Gateway Protocol (BGP) is a widely used routing protocol on the Internet, designed for exchanging routing and reachability information between multiple networks. In the context of Azure Virtual Networks, BGP facilitates communication between Azure VPN gateways and your on-premises VPN devices, known as BGP peers or neighbours. It allows them to share "routes," enabling both gateways to understand the availability and accessibility of network prefixes through the respective gateways or routers. Additionally, BGP supports transit routing by sharing learned routes from one BGP peer with all other connected BGP peers, enabling efficient multi-network communication.

 

The BGP supports Automatic Failover VPN in Azure.

If the VPN tunnel needs an Automatic Failover VPN Connection, for example, if a customer has two internet connections over two separate links, we can create an additional connection on the Azure side using the existing virtual network gateway to have a redundant connection to customers on-premise. We can configure the BGP, which supports the Azure virtual network gateway and will route traffic through the available tunnel if one connection goes down.

 

VPN connection redundancy.

  • Using AS path prepending, you can influence routing decisions between multiple connections to your on-premises sites.
  • Azure VPN gateway will honour AS Path prepending to help make routing decisions when BGP is enabled.
  • A shorter AS Path will be preferred in BGP path selection.

For example, if there are two separate VPN connections to your on-premises router, we can enable BGP on our VPN gateway and then advertise the primary connection address prefix with a short AS path and the secondary connection address prefix with a longer AS path.

 

BGP Limitations in Azure

The Azure VPN gateway using BGP automatically advertises the following routes to your on-premises devices, and these cannot be excluded:

  • The Virtual network address prefixes.
  • Address prefixes for each Local Network Gateway connected to the Azure VPN gateway.
  • Routes learned from other BGP peering sessions connected to the Azure VPN gateway, excluding the default route and any routes that overlap with a virtual network prefix.

There is no way to restrict advertising to only one Address prefix from Azure to on-premises. Currently, there is no option to use Route filters to receive/advertise IP ranges for specific IP ranges on the Azure VPN Gateway.

 

The solution for restricting the BGP unwanted traffic.

  • The easiest way to achieve this is via on-prem routers. You will have to apply a BGP route filter to the on-prem routers.
  • Deploy the VPN directly to the spoke VNet and not choose the option to route via the remote gateway. This will only advertise the specific VNet range to the on-premises.
  • Deploy the 3rd party VPN on Azure (NetworkAppliances) that can do route filtering.

No comments:

Post a Comment