Hi Blair,
Thanks for the reply..
Does this setup require our on-prem to support NAT-T ?
- NAT-T (NAT Traversal) is generally required when IPsec VPN traffic needs to traverse a NAT device. In your scenario, since you plan to reuse the existing public IP by setting up NAT on your firewall, the VPN traffic will indeed pass through a NAT device.
- Azure Virtual WAN supports IPsec/IKE (IKEv1 and IKEv2) for site-to-site VPNs, and NAT-T is part of the IPsec standard for handling NAT scenarios.
- Therefore, your on-prem VPN device must support NAT-T if you are doing NAT on the firewall for the public IP reuse. Without NAT-T, IPsec tunnels typically fail when NAT is present.
Reference link:https://learn.microsoft.com/en-us/azure/virtual-wan/nat-rules-vpn-gateway
Is BGP routing supported ?
- Yes, BGP is supported with Azure Virtual WAN site-to-site VPN connections.
- You can enable BGP on the VPN gateway and configure BGP peering with your on-premises device.
Hope you find this comment helpful, Please “up-vote” for the information provided , this can be beneficial to community members.
Kindly let us know if you have any additional questions.
Thanks