Just a quick drop of notes on how to configure this if anyone else needs it.

You probably searched the net and found tons of howtos on policy-based VPNs. However, I needed to do a route-based VPN my Azure resources with multi-devices and you can have only a single VPN-policy on a Gateway. Infos on IPSEC settings where taken from the Azure documentation - please make sure you read the fields marked important.

*Disclaimer: I just set this up and it works for me. I am not sure about the support from VMware or MS on this.

Overview#

The picture shows the basic setup for this example:

Image Caption
Site to site VPN between Azure and NSX-v

Azure#

Network settings#

**Address Space:** 192.168.0.0/16
**Resource Group:** blue
**Location:** West Europe
**Subnet:** 192.168.10.0/24
**Gateway Subnet:** 192.168.0.0/**24**
**Virtual Network Gateway Name:** AzureGW
**Public IP:** 1.2.3.4
**VPN Type:** Route-based
**Connection Type:** Site-to-site (IPsec)
**Gateway Type:** VPN
**Local Network Gateway Name:** On-PremisesDC

High-Level steps#

  1. Create local network(s)
  2. Create VPN-Gateway with all dependencies
  3. Create local gateway
  4. Create VPN connection

Azure has a good documentation on the implementation steps make sure you follow it and adapt it to your environment.

NSX#

Deploy an NSX Edge Gateway with a public IP on an uplink interface (in case of the example 5.6.7.8 on vNic0).

Edge VPN Settings#

Create a new IPsec connection and fill out the values as required.

Image Caption
NSX-v edge settings

Start the IPSEC connection on the NSX Edge, it should take a minute or two until the connection is up and running.

You can check the connection details on the IPSec tab of the NSX edge or via the NSX Manager CLI

show edge <edge-id> service ipsec site