Azure Virtual WAN

Peter Stieber 180 Reputation points
2025-07-25T15:12:34.0333333+00:00

I have a vWAN with 2 hubs ( hub-1 & hub-2). I have ER Circuit deployed in hub-1. All works well except that VNETs that are peered to hub2 don't see prefixing from expressRoute. The same is for prefixes coming from VPN - they are not propagated to other hubs. What do I need to do to propagate those prefixes to all vnets that are peered with hub2 ?

Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
{count} votes

1 answer

Sort by: Most helpful
  1. Suwarna S Kale 3,951 Reputation points
    2025-07-26T02:33:12.6266667+00:00

    Hello Peter Stieber,

    Thank you for posting your question in the Microsoft Q&A forum. 

    The core issue stems from Azure Virtual WAN's default routing behavior, where prefixes learned in one hub are not automatically propagated to other hubs without explicit configuration. When an ExpressRoute circuit is attached to Hub-1, its routes remain confined to that hub's routing tables unless inter-hub propagation is enabled. Similarly, VPN-connected prefixes follow the same isolation principle. This design ensures segmentation by default but requires manual intervention for cross-hub route sharing. 

    The lack of visibility in Hub-2 occurs because:  

    1. Enable Inter-Hub Routing in Virtual WAN - Navigate to Virtual WAN → Routing → Configuration and ensure Branch-to-branch traffic is enabled. This allows route exchange between hubs. 
    2. Verify Route Propagation in Hub-2 - Go to Hub-2 → Routing → Route Tables and confirm that: 
      • The ExpressRoute (ER) prefixes from Hub-1 are being propagated. 
      • VPN prefixes (if any) are included in the effective routes. 
    3. Check Route Association & Propagation - Ensure Hub-2’s default route table is associated with: 
      • All connected VNETs (so they receive routes from Hub-1). 
      • ExpressRoute & VPN gateways (if applicable). 
    4. Manually Propagate ER Routes (If Needed) - If routes are still missing, manually configure Static Routes in Hub-2’s route table to include Hub-1’s ER prefixes. 
    5. Validate Effective Routes - Use Azure Network Watcher --> Effective Routes on a VM in Hub-2’s VNET to confirm ER/VPN prefixes appear. 
    6. Consider Azure Virtual WAN Custom Routing (Advanced) - If default propagation fails, define custom route tables with explicit route rules for inter-hub traffic. 

    Without these configurations, Virtual WAN treats each hub as an independent routing domain, isolating prefixes and breaking expected connectivity. Proper route propagation requires intentional setup to override this default behavior. 

    If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated. 


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.