Hello @Paul
Thanks for reaching out to Microsoft Q&A.
I understand that you're in a bit of a bind with reaching the limit of 30 Site-to-Site (S2S) connections on your Gen1 Azure VPN Gateway.
Creating a new Spoke VNet and deploying a new VPN Gateway (VNG) there is technically feasible. You would then establish a Site-to-Site connection between the new VNG and your existing Hub VNG. This approach allows you to maintain your current connections while accommodating new ones beyond the 30 limits.
Configurations Needed:
- Routing: Configure appropriate routing by setting up User Defined Routes (UDRs) on workload subnets in the new Spoke VNet to direct traffic through the Hub VNet for inspection, and enable BGP on both gateways for dynamic route propagation or maintain static routes if BGP is not supported.
- Gateway Transit: Ensure that gateway transit is enabled to allow traffic to flow through the gateway in the Spoke VNet.
- Firewall Inspection: Configure your Azure Firewall rules to include the new subnet in the Spoke so that traffic can be inspected appropriately.
- Apply UDRs in the Spoke pointing to the Hub Firewall as the next hop.
- Ensure the Hub Firewall subnet is reachable via the VPN tunnel.
Alternatively, use Azure Firewall Manager for centralized policy enforcement across multiple VNets.
Option 3 is recommended as a temporary workaround. For long-term scalability and simplified management, Azure Virtual WAN is strongly recommended.
If your goal is to minimize downtime without migrating to Virtual WAN, you should proceed with upgrading the VPN Gateway SKU. Option 1 is the recommended approach.
Best Practices for PSKs:
- Use Azure Key Vault to store your Pre-Shared Keys (PSKs) securely.
- Regularly rotate PSKs to minimize the risk of exposure.
- Consider automating the update and dissemination of the PSKs to connected sites to enhance security during migration.
To ensure Azure Firewall inspects traffic coming through the new VNet:
- Make sure your route definitions in the Azure Firewall include the addresses/subnets of both your Hub and Spoke VNets.
- Create specific rules that manage traffic from the Spoke VNet to the resources in the Hub to prevent any traffic from bypassing inspection.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".