author | ms.service | ms.topic | ms.date | ms.author |
---|---|---|---|---|
cherylmc |
azure-vpn-gateway |
include |
10/18/2023 |
cherylmc |
The VNet-to-VNet information in this section applies to VPN gateway connections. For information about VNet peering, see Virtual network peering.
VNet-to-VNet traffic within the same region is free for both directions when you use a VPN gateway connection. Cross-region VNet-to-VNet egress traffic is charged with the outbound inter-VNet data transfer rates based on the source regions. For more information, see Azure VPN Gateway pricing. If you're connecting your VNets by using VNet peering instead of a VPN gateway, see Azure Virtual Network pricing.
No. VNet-to-VNet traffic travels across the Microsoft Azure backbone, not the internet.
Yes. VNet-to-VNet connections that use VPN gateways work across Microsoft Entra tenants.
IPsec and IKE encryption help protect VNet-to-VNet traffic.
No. Connecting multiple Azure virtual networks together doesn't require a VPN device unless you need cross-premises connectivity.
No. The virtual networks can be in the same or different Azure regions (locations).
If VNets aren't in the same subscription, do the subscriptions need to be associated with the same Microsoft Entra tenant?
No.
No. VNet-to-VNet supports connecting virtual networks within the same Azure instance. For example, you can't create a connection between global Azure and Chinese, German, or US government Azure instances. Consider using a site-to-site VPN connection for these scenarios.
Yes. You can use virtual network connectivity simultaneously with multi-site VPNs.
See the gateway requirements table.
No. VNet-to-VNet supports connecting virtual networks. It doesn't support connecting virtual machines or cloud services that aren't in a virtual network.
No. A cloud service or a load-balancing endpoint can't span virtual networks, even if they're connected together.
No. VNet-to-VNet and multi-site connections require VPN gateways with route-based (previously called dynamic routing) VPN types.
No. Both virtual networks must use route-based (previously called dynamic routing) VPNs.
Yes. All VPN tunnels of the virtual network share the available bandwidth on the VPN gateway and the same service-level agreement for VPN gateway uptime in Azure.
Redundant tunnels between a pair of virtual networks are supported when one virtual network gateway is configured as active-active.
No. You can't have overlapping IP address ranges.
Can there be overlapping address spaces among connected virtual networks and on-premises local sites?
No. You can't have overlapping IP address ranges.