AVS HCX Migration Connectivity via Azure VPN Gateway in Hub VNet—Supported Design
I am planning to migrate my on-premises VMware workloads to Azure VMware Solution (AVS) using HCX. I want to confirm whether the following network design is fully supported and recommended by Microsoft:
Scenario:
- My on-premises datacenter is connected to Azure via a Site-to-Site VPN that terminates on the Azure VPN Gateway deployed in the Hub VNet.
In the AVS Private Cloud, I will configure and deploy HCX for migration.
I will link the Hub VNet to the AVS ExpressRoute circuit using the “Add VNet Connection” option available in the AVS portal.
The Hub VNet is peered to multiple Spoke VNets where other Azure workloads reside.
Azure Firewall is deployed in the Hub VNet to inspect and control all traffic flows.
I plan to use manual UDRs to direct all on-premises and Spoke VNet traffic through Azure Firewall before it reaches AVS.
Questions for confirmation:
Is this architecture supported by Microsoft for AVS HCX migrations (Site-to-Site VPN → Hub VNet → Azure Firewall → AVS)?
Are there any known limitations or considerations when using Site-to-Site VPN (instead of ExpressRoute) to connect the on-premises environment to AVS for HCX migration?
Is it correct that BGP routes from the AVS ExpressRoute connection will propagate into the Hub VNet and, by extension, to Spoke VNets if peering is configured with route propagation?
Do you recommend any specific NSX-T or UDR configurations in AVS to ensure smooth HCX migration traffic flow over this setup?
- How AVS hosted VM will access Internet?
I want to be sure this design will not introduce unsupported configurations for HCX migrations or AVS connectivity.
Azure VMware Solution
-
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-08T07:31:14.5666667+00:00 Hi Paul,
Your design is mostly supported and aligns with Microsoft's reference architectures for hybrid connectivity and AVS migrations using VMware HCX. There are important limitations, and recommendations that need to be considered to ensure a fully functional and supportable configuration.
Site-to-Site VPN is supported for AVS connectivity and HCX migrations, but it is not recommended for production-scale migrations. VPN connections have higher latency, lower throughput, and are less reliable compared to ExpressRoute. Microsoft and VMware recommend ExpressRoute for production HCX migrations, especially for large workloads or latency-sensitive applications.
VPN bandwidth is typically limited (often 1 Gbps or less per tunnel), which can bottleneck large migrations. ExpressRoute offers much higher, dedicated bandwidth. vMotion over VPN is NOT supported by HCX. It requires high throughput and low latency, only supported with ExpressRoute.
Is it correct that BGP routes from the AVS ExpressRoute connection will propagate into the Hub VNet and, by extension, to Spoke VNets if peering is configured with route propagation?
Yes — BGP route propagation works as follows:
- AVS exposes BGP-learned prefixes via Private Peering on the ExpressRoute circuit.
- When you do “Add VNet Connection” in AVS, it establishes a route table injection into the Hub VNet.
- If you enable
Use remote gatewayandAllow gateway transitin VNet peering, these routes can propagate to Spoke VNets**.**https://free.blessedness.top/en-us/azure/route-server/expressroute-vpn-support
Also, see General design considerations and recommendations
Hub-spoke vs. Virtual WAN network topology
If you don't have an ExpressRoute connection from on-premises to Azure and you're instead using S2S VPN, you can use Virtual WAN to transit connectivity between your on-premises VPN and the Azure VMware Solution ExpressRoute. If you're using a hub-spoke topology, you need Azure Route Server. For more information, see Azure Route Server support for ExpressRoute and Azure VPN.
HCX communication relies on L3 IP reachability and port access. Routing traffic through Azure Firewall is fine, as long as:
Required HCX ports are opened
Traffic is correctly NATed or routed
HCX Mobility Optimized Networking (MON) is an optional feature to enable when using HCX Network Extensions (NE). MON provides optimal traffic routing under certain scenarios to prevent network tromboning between the on-premises and cloud-based resources on extended networks.
Internet Access for AVS-Hosted VMs
- Options:
- Azure VMware Solution Managed SNAT: Microsoft-managed outbound NAT for AVS VMs. Simple, but limited control and visibility.https://free.blessedness.top/en-us/azure/azure-vmware/architecture-design-public-internet-access
- Internet Service Hosted in Azure: Use Azure Firewall or a third-party NVA in the Hub VNet to provide outbound internet access. This is the most common and recommended pattern for centralized security and logging.
- Public IP to NSX-T Edge: Assign a public IP directly to NSX-T Edge for direct internet access (less common, more exposure).
- Best Practice: Route all AVS VM internet-bound traffic through Azure Firewall in the Hub VNet. Use UDRs to direct default (0.0.0.0/0) traffic from AVS towards the firewall, ensuring security and compliance.
Your design is supported for connectivity and small-scale migrations, but for production workloads and to avoid unsupported scenarios, ExpressRoute is required for HCX migrations. Proper NSX-T, firewall, and routing configuration is essential for a smooth experience. https://www.provirtualzone.com/migrating-workloads-to-azure-vmware-solution-with-vmware-hcx-a-practical-guide/
Hope it helps!
Let me know if you have any further queries!
If the information is helpful, please click "upvote" to let us know!
-
Paul • 20 Reputation points
2025-07-08T07:45:12.7766667+00:00 May I inquire whether it is possible to utilize User-Defined Routes (UDRs) in place of Azure Route Server for traffic routing? The following is my current understanding.
- Traffic Flow – On-Prem → AVS
On-Prem VM
→
On-Prem VPN Device
→
VPN Tunnel
→
Azure VPN Gateway
→
(UDR: Next hop = Azure Firewall)
→
Azure Firewall
→
(System Route)
→
AVS ExpressRoute
→
AVS vCenter / Workload VM
- Return Traffic Flow – AVS → On-Prem
AVS Workload
→
AVS ExpressRoute
→
Azure Hub VNet
→
(UDR: Next hop = Azure Firewall)
→
Azure Firewall
→
(UDR: Next hop = VPN Gateway)
→
Azure VPN Gateway
→
VPN Tunnel
→
On-Prem VM
- Traffic Flow – Spoke VNet → AVS
Spoke VM
→
(UDR: Next hop = Azure Firewall)
→
Azure Firewall
→
(System Route)
→
AVS
-
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-08T09:23:43.41+00:00 Hi Paul
On-Prem → AVS (via VPN, Azure Firewall, UDRs)
- You can use UDRs in the Hub VNet to direct traffic from the VPN Gateway to Azure Firewall, then rely on system routes to reach the AVS ExpressRoute Gateway.
- This approach is supported for basic traffic inspection and control.
https://free.blessedness.top/en-us/azure/cloud-adoption-framework/scenarios/azure-vmware/virtual-network-connectivity
AVS → On-Prem (Return Path)
- UDRs can be used to direct return traffic from AVS (via the Hub VNet) through Azure Firewall and then to the VPN Gateway.
- However, AVS itself does not support UDRs; it learns routes dynamically via BGP. This means you must ensure that the correct routes are advertised to AVS via BGP for the return path to function as intended.
- If you rely solely on UDRs in Azure, you may face challenges with route propagation and symmetry, especially as your environment scales or changes.
Spoke VNet → AVS
- UDRs in spoke VNets can direct traffic to Azure Firewall, which then forwards to AVS via system routes.
- This is a common and supported pattern for centralized inspection. https://free.blessedness.top/en-us/azure/cloud-adoption-framework/scenarios/azure-vmware/network-design-guide-intro
As per my understanding, UDRs are suitable for basic traffic steering in Azure, but they cannot fully replace ARS for AVS route propagation and dynamic routing needs. For production or complex scenarios, use ARS to ensure supported and maintainable connectivity.
Hope it helps!
Please tag me if you have any further queries!
If the information is helpful, please click "upvote" to let us know!
-
Paul • 20 Reputation points
2025-07-08T20:54:58.9933333+00:00 I have deployed Azure VMware Solution (AVS) and configured hybrid connectivity as follows:
On-premises connectivity: Site-to-Site VPN to Azure Hub VNet using Azure VPN Gateway (BGP enabled)
AVS connectivity: AVS ExpressRoute circuit linked to Hub VNet (using express route gateway and expressroute connection)
Routing: Manual UDRs forcing all traffic through Azure Firewall for inspection
Firewall: Network rules permitting required ports for AVS management and HCX
Current Status:
From Azure Hub and Spoke VNets, I can successfully access the AVS vCenter URL and other management interfaces.
However, from an on-premises VM, the vCenter URL is not reachable.
Request for Assistance:
Could you please help confirm:
- Are there any additional configuration steps needed to ensure on-premises clients can reach the AVS vCenter over the Site-to-Site VPN path?
- Is there any known limitation regarding AVS management endpoint access from on-premises networks when using Site-to-Site VPN
- Do we need to create specific DNS records or firewall rules (in Azure Firewall or NSX-T) to enable this connectivity?
- What are the recommended steps to troubleshoot this scenario (e.g., packet capture locations, effective routes validation, or NSX-T Edge firewall configuration)?
-
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-09T03:13:55.8166667+00:00 To route traffic from on-prem → Azure VPN Gateway → AVS via ER, you must enable:
ExpressRoute Global Reach between your Azure VPN Gateway and the AVS ExpressRoute circuit.
Without Global Reach, the AVS private cloud prefixes are not reachable from the on-prem network.
To check:
- Go to AVS → Connectivity → Global Reach
- Ensure it shows "Connected" to the VPN Gateway’s ExpressRoute circuit
- If not, establish it by linking the on-prem circuit and AVS circuit via Global Reach.https://free.blessedness.top/en-us/azure/azure-vmware/configure-site-to-site-vpn-gateway
-
AVS itself does not support UDRs. All routing within AVS is handled by BGP and NSX-T. Ensure that routes to on-premises are advertised into AVS via BGP.
If accessing
https://vcenter.cloud.com, DNS must resolve the AVS vCenter IP.DNS options:
- Use AVS-built-in DNS forwarder or a custom DNS server that resolves AVS management names.
- Or use IP directly (e.g.,
https://10.10.0.10for vCenter).
Allow required ports (e.g., 443 for vCenter, 902/903 for ESXi management) in Azure Firewall and NSX-T Gateway Firewall. https://techdocs.broadcom.com/us/en/vmware-cis/nsx/vmware-nsx/4-2/administration-guide/network-address-translation.html
On-premises access to AVS vCenter via Site-to-Site VPN is supported, but requires correct BGP route propagation, DNS configuration, and firewall rule alignment. Azure Route Server is strongly recommended for dynamic routing between VPN and ExpressRoute gateways. Troubleshoot by validating routes, DNS, and firewall rules at each hop, and use packet captures and NSX-T Traceflow for deeper analysis.
Hope it helps!
Let me know if you have any further queries!
If the information is helpful, please click "upvote" to let us know!
-
Paul • 20 Reputation points
2025-07-09T17:46:17.54+00:00 Hello Mounika, I would like to confirm my understanding of how Azure Route Server will integrate.
My design to enable end-to-end connectivity between our on-premises environment and Azure VMware Solution (AVS).
Current Scenario
- On-premises connectivity: Site-to-Site VPN terminating on Azure VPN Gateway in the Hub VNet (BGP enabled).
- AVS connectivity: AVS ExpressRoute circuit linked to the Hub VNet using "ExpressRoute Connection."
- Routing: Currently using manual UDRs to direct traffic through Azure Firewall.
Your Recommended Approach with Azure Route Server
- Deploy Azure Route Server into a dedicated /27 subnet (RouteServerSubnet) within the same Hub VNet.
- Enable branch-to-branch traffic on Route Server to support transitive routing between the VPN Gateway and AVS ExpressRoute.
- Create BGP peering relationships:
- Peer Azure Route Server with the Azure VPN Gateway (using the VPN Gateway BGP ASN and BGP Peering IP).
- Peer Azure Route Server with the AVS ExpressRoute (using the AVS BGP ASN and BGP Peering IP).
- Validate that dynamic BGP routes are propagated between the VPN Gateway and AVS ExpressRoute circuits through the Route Server (allowing on-prem prefixes to reach AVS and vice versa).
- Maintain UDRs in the Hub and Spoke VNets to force traffic through Azure Firewall for security inspection, without overriding system routes to AVS in the FirewallSubnet.
Confirm that this configuration will support on-prem access to AVS management endpoints (vCenter, NSX Manager) and workload segments without requiring ExpressRoute Global Reach.
Request for Confirmation
Could you please review and confirm whether this understanding and approach are correct and fully supported?
Additionally, if there are any special considerations or best practices when configuring Azure Route Server with AVS ExpressRoute, I would appreciate your guidance.
Thank you very much for your assistance.
-
Paul • 20 Reputation points
2025-07-10T10:05:58.53+00:00 Can i get an update on this?
-
Paul • 20 Reputation points
2025-07-11T01:46:13.9633333+00:00 @Mounika Reddy Anumandla , awaiting your response
-
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-11T05:36:18.7833333+00:00 Hi Paul,
I am checking internally on this to give you a concrete information! Please hold on while I get back to you with an update!
Thank you for understanding!
-
Paul • 20 Reputation points
2025-07-14T18:50:32.54+00:00 @Mounika Reddy Anumandla , I am still waiting for your response
-
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-14T20:19:40.8966667+00:00 Hi Paul,
Apologies for delay in response! But it usually takes time to contact the right team on this! I am working on it!
Thank you for understanding! -
Mounika Reddy Anumandla • 6,975 Reputation points • Moderator
2025-07-15T05:10:01.7733333+00:00 Hi Paul,
I would like to bring to your attention that we offer technical support in the forums, but not full consultations on solution architecture and recommendations.
To ensure that you receive a clear and helpful answer to your questions, it's important to post them individually. When you have multiple questions, each with its own distinct scenario, it can make it more difficult for the community to understand the problem and provide an accurate solution. For this reason, we recommend that you create separate threads for each of your questions. This way, the community can give you their undivided attention and provide the best possible response.
Hope you understand!
Sign in to comment