2026 Futuriom 50: Highlights →Explore

Back to Learn Center

Azure VPN (Azure Virtual Private Network): Azure VPN Gateway Architecture, Types, and Best Practices

Azure VPN (Azure Virtual Private Network) is typically implemented using Azure VPN Gateway to encrypt traffic over the public internet between an Azure virtual network (VNet) and (1) on-premises networks, (2) remote users, or (3) other VNets. In this guide, you’ll learn how Azure VPN works, which connection type to choose (S2S, P2S, VNet-to-VNet, and ExpressRoute coexistence), what protocols are supported, how SKUs impact throughput, and a practical troubleshooting checklist.

What is Azure VPN (Azure Virtual Private Network)?

In Azure, “Azure VPN” usually refers to using VPN Gateway (a type of virtual network gateway) to create encrypted tunnels (IPsec/IKE) for hybrid connectivity and secure remote access. You can use it to:

  • Connect on-premises ↔ Azure VNet (Site-to-Site)

  • Connect remote users/devices ↔ Azure VNet (Point-to-Site)

  • Connect Azure VNet ↔ Azure VNet (VNet-to-VNet)

Azure VPN Architecture (how it works)

A basic Azure VPN (VPN Gateway) deployment includes:

Local Area Network (LAN)

The foundation of this architecture is your company’s private local area network (LAN), which forms the internal backbone of your network infrastructure.

Virtual Private Network (VPN) device

A crucial component, the VPN device, offers external connectivity to the LAN. This can be a hardware-based solution or a software service like the Routing and Remote Access Service (RRAS) in Windows Server 2012.

Virtual network

In Azure, the cloud application and Azure VPN Gateway components reside within the same virtual network, ensuring streamlined connectivity and security.

Azure VPN Gateway

The VPN Gateway service allows you to connect the virtual network to the local area network using a VPN device. This service includes the following elements:

  • Virtual Network Gateway: Acts as a virtual VPN device for the virtual network, routing traffic from the LAN to the virtual network.

  • Local Network Gateway: Represents the on-premises VPN device abstraction, routing cloud application traffic to the LAN.

  • Connection: Holds properties specifying the connection type (e.g., IPSec) and the shared key for encrypting traffic.

  • Gateway Subnet: A dedicated subnet for maintaining the virtual network gateway.

  • Internal Load Balancer: Routes VPN Gateway network traffic to the cloud application through an internal load balancer located in the application’s front-end subnet.

Traffic flow + encryption overview

Traffic is encrypted between endpoints (Azure VPN Gateway and the other VPN endpoint) using IPsec/IKE. For P2S, the tunnel is initiated by the client device to the gateway. For S2S and VNet-to-VNet, tunnels are established between gateways/devices as configured.

Azure VPN Connection Types (Choose the Right One)

Conceptually there are 2 types of connections between possible environments using Networks and Azure Gateway.

Site to Site (S2S)

This connection uses IPsec (IKE v1 and IKE v2) to establish a secure link between a virtual network and a local site. Once established, resources behind the local gateway can securely communicate with Azure resources. This option is ideal for allowing entire local networks to access Azure resources without individual device connections.

In comparison with the next option (Point to Site), each team in our local network doesn’t need to make a connection to the Azure virtual network to access its resources.

Point-to-Site (P2S)

Leveraging SSTP (Secure Sockets Tunnel Protocol), P2S allows individual client devices to connect to the Azure network. It requires a VPN client on each device, making it suitable for scenarios where only specific devices need access to Azure resources.

Point-to-Site connections do not need a VPN dial-up device but work with a VPN client installed on the Device. However, only such equipment can connect to Azure resources. In the case that several teams need access to these resources, each of them must mark a Point-to-Site VPN.

Multi-Site

A variation of the S2S type, Multi-Site VPN enables linking multiple external locations to the same Azure virtual network. It’s particularly useful for organizations with several branches or remote sites needing access to shared Azure resources.

Azure VPN offers a versatile and secure way to extend your on-premises networks into the cloud. Whether it’s a single remote user needing access to Azure resources (P2S), an entire local network (S2S), or multiple external sites (Multi-Site), Azure VPN provides tailored solutions for various business requirements. By harnessing these capabilities, businesses can achieve greater operational agility, enhanced security, and seamless integration between their on-premises and cloud environments.

Azure VPN protocols and authentication (what’s supported)

IKEv2 and IPsec/IKE (S2S)

S2S VPN in Azure uses IPsec/IKE tunnels. Ensure encryption/auth settings and NAT/traversal requirements match your on-prem device capabilities and Azure configuration.

P2S protocols: IKEv2 / OpenVPN (and SSTP migration notes)

For P2S, Azure supports options including IKEv2 and OpenVPN. Microsoft also provides guidance for moving off SSTP, including a noted 128 concurrent connection limit for SSTP and migration paths to OpenVPN or IKEv2.

Practical takeaway: If you still have SSTP-based clients, plan a migration (profiles, client rollout, and a cutover window), because SSTP and OpenVPN can’t coexist on the same gateway due to both being TLS-based.

Gateway SKUs, throughput, and scalability

How to pick a SKU (the sane way)

Choose a VPN Gateway SKU based on:

  • Required features (including availability/zone support)

  • Expected throughput and number of tunnels/users

  • SLA/architecture requirements

Microsoft notes the VPN Gateway SKU portfolio is being consolidated, including transitions from non-AZ to AZ-supported SKUs—so avoid designing around legacy/non-preferred SKUs when launching something new.

Throughput expectations (and why tests matter)

Published throughput is guidance, but real throughput depends on:

  • Gateway SKU limits

  • Crypto overhead + packet sizes

  • VM NIC throughput + OS settings

  • ISP bandwidth and latency

Microsoft provides a practical workflow for validating throughput end-to-end—use it before committing to a design.

Azure VPN vs VNet peering vs ExpressRoute

Choose Azure VPN (Azure Virtual Private Network / VPN Gateway) when…

  • You need encrypted tunnels over the internet for hybrid connectivity or remote access

  • You need a backup path to ExpressRoute

  • You need connectivity where ExpressRoute is not available or not justified

Choose VNet peering when…

  • You’re connecting Azure ↔ Azure VNets and want a simpler, high-performance approach without putting a gateway in the data path (common case)

Choose ExpressRoute when…

  • You want a private connection that doesn’t traverse the public internet and typically offers higher reliability/lower latency characteristics than internet VPN

Important nuance: Microsoft explicitly calls out that for VNet-to-VNet connectivity, VNet peering is generally recommended compared to connecting VNets through ExpressRoute gateways due to gateway bandwidth/performance constraints in the data path.

Common pitfalls + troubleshooting checklist

Use this as your “first 15 minutes” checklist when Azure VPN is flaky:

Addressing & routing

  • Overlapping CIDRs between on-prem and VNet (or between VNets) → breaks routing and is painful to fix later.

  • Confirm effective routes on NICs (Azure portal “Effective routes” / route tables). For peering scenarios, effective routes also help confirm peering propagation.

  • If using BGP, ensure ASN + BGP peer IPs + route propagation expectations match what Azure supports (see VPN Gateway docs/FAQ).

P2S client issues

  • Wrong client profile (cert/auth mismatch or stale config)

  • Protocol mismatch (IKEv2 vs OpenVPN vs SSTP legacy)

  • SSTP scale limit symptoms (if still used) and planned migration steps

S2S tunnel problems

  • IPsec/IKE policy mismatch (encryption/integrity/DH/PFS)

  • On-prem device NAT-T/firewall rules blocking IKE/IPsec

  • Public IP changes on the on-prem device side without updates in Azure

  • Multiple tunnels/paths causing asymmetric routing

DNS and name resolution

  • “VPN is up but apps fail” often = DNS. Confirm the client or on-prem resolvers can resolve private zones/records reachable through the tunnel.

Performance complaints

  • Confirm the gateway SKU is appropriate and not saturated

  • Validate end-to-end throughput using Microsoft’s recommended approach (gateway + VM + ISP).

FAQ About Azure Virtual Private Network

  1. What is Azure VPN (Azure Virtual Private Network)? Azure VPN refers to encrypted connectivity in Azure, typically delivered through Azure VPN Gateway to connect VNets to on-premises networks, remote users, or other VNets over the public internet.

  2. What’s the difference between S2S and P2S in Azure VPN? S2S connects a whole on-premises network to an Azure VNet over IPsec/IKE. P2S connects individual client devices (like laptops) into a VNet, commonly for remote access.

  3. Can I use Azure VPN to connect two VNets? Yes. You can create VNet-to-VNet connections using VPN Gateway (useful across regions or specific constraints), though VNet peering can be a simpler option depending on requirements.

  4. Which protocols does Azure VPN Gateway support for P2S? Microsoft provides options such as IKEv2 and OpenVPN, and also publishes guidance for transitioning off SSTP in applicable scenarios.

  5. How do I choose the right Azure VPN Gateway SKU? Choose based on required features, availability needs, and throughput expectations. Microsoft documents SKU guidance and notes ongoing SKU portfolio changes/migrations.

  6. What throughput can I expect from Azure VPN? Throughput varies by SKU and real-world conditions (crypto overhead, latency, ISP bandwidth). Microsoft recommends validating throughput and treating estimates as guidance.

Become the cloud networking hero of your business.

See how Aviatrix can increase security and resiliency while minimizing cost, skills gap, and deployment time.

Cta pattren Image