user-guides

Route-table based solution (vWAN vHub Route Tables)

Architecture

Architecture
Click to view full size

Goal

Important note about P2S (User VPN)

P2S is primarily for client → Azure access. It is not a perfect substitute for a routed on‑prem/DC network (S2S/ER).
This route-table model focuses on preventing spoke↔spoke routing in the vHub while allowing the user VPN client to access spokes as required.

Concepts (simple)

High-level design

Per hub, create:

Why per-spoke tables?

If Sub1 and Sub2 share the same route table, they will learn each other’s routes and be able to communicate.
Per-spoke tables ensure each spoke only learns routes you explicitly allow.

Implementation steps

1) Create route tables (per hub)

In Hub1 (East US) create:

In Hub2 (Central India) create:

2) Configure VNet connections (spokes)

For each spoke connection, set:

Example:

This ensures:

3) Configure P2S user VPN (per hub)

Enable P2S User VPN on Hub1 and Hub2.

Then ensure the P2S connection (User VPN) is configured such that:

Practical approach:

Note: The exact configuration options for P2S route propagation/association differ based on vWAN/user VPN configuration in the portal and client settings. Some setups require configuring address pools and advertised routes explicitly in the User VPN configuration.

4) (Optional) Allow “exception” spoke-to-spoke connectivity

If HCL wants to allow Sub1 ↔ Sub2 in the future:

This keeps exceptions explicit and isolated.

Validation

Expected outcomes

How to test

From a VM in Sub1:

From Laptop (User VPN connected):

Risks / limitations