Skip to main content
High availability for Azure VPN Gateways ensures your VPN connectivity remains online even when parts of the infrastructure fail. This article explains Azure’s zone-redundant gateway deployments and the two primary gateway availability modes: active-standby (default) and active-active. Use this guidance to design VPN solutions that meet your availability and throughput requirements.

Zone-redundant virtual network gateways

Azure supports zone-redundant virtual network gateways to protect against zonal failures. When zone redundancy is enabled, VPN Gateway instances are deployed across multiple Availability Zones within a region. If one Availability Zone experiences an outage, the gateway instance in another zone continues handling traffic so connections stay up.
A network architecture diagram titled "Zone-Redundant Deployment" showing zone-redundant virtual network gateways (two instances) in a gateway subnet. Arrows indicate cross‑premises ingress/egress traffic being routed to VMs distributed across three availability zones.
Key points
  • Zone-redundant deployment places gateway instances in multiple Availability Zones within a single region.
  • Protects against a zonal outage by allowing the remaining instance(s) to keep connections alive.
  • Useful when minimizing downtime due to hardware or AZ failures is a priority.

Gateway availability modes

Azure VPN Gateways operate in one of two availability modes: active-standby (the default) and active-active. Each mode offers different resiliency and throughput characteristics.

Active-standby (default)

In the default active-standby configuration:
  • Two gateway instances are present: one active and one standby.
  • The active instance handles all traffic; the standby is synchronized and ready to take over.
  • Failover to the standby instance is automatic and designed to minimize downtime.
  • Disabling active-active does not remove the standby instance — it remains for failover.
When to use:
  • Typical choice when single-instance throughput is sufficient and you want automatic fast failover without extra on-prem configuration.

Active-active

Active-active configures both gateway instances to handle traffic concurrently:
  • Each instance typically has its own public IP address.
  • Both gateways accept connections, increasing resiliency and aggregate throughput.
  • On-premises devices should connect to both cloud public IPs. This commonly results in multiple IPsec tunnels (for example, two cloud gateways and two on-prem devices can produce up to four IPsec tunnels).
  • Use routing (BGP or static) to manage path selection and failover between instances.
When to use:
  • Required when you need higher available throughput and want no single gateway instance to be a bottleneck.
  • Recommended when you can mirror redundancy on the on-premises side.
A diagram titled "High Availability Options for VPN Connections" comparing Active/Standby (default) and Active/Active modes for Azure VPN gateways. The left side shows one active gateway with a standby instance connecting to an on‑prem VPN, while the right side shows two active gateways each connected to two on‑prem VPNs for higher availability.

Comparison at a glance

FeatureActive-StandbyActive-ActiveZone-Redundant
Number of active instances1 active, 1 standby2 active (both handle traffic)2+ instances across AZs
Failover behaviorAutomatic to standbyLoad-sharing + failover via routingSurvives AZ failure
On-prem requirementsSingle connection can workMust configure connections to both public IPsRecommended to have redundant on-prem devices
ThroughputLimited to one instanceAggregate throughput of both instancesDepends on SKU and AZ placement
Typical use caseSimpler deployments, automatic failoverHigh throughput and resiliencyProtection against zonal outages

Implementation checklist

  • Choose the right gateway SKU for desired throughput and features (consult Azure docs for SKU details).
  • For active-active:
    • Provision two public IPs (one per gateway instance).
    • Configure on-premises devices to establish tunnels to both public IPs.
    • Use BGP or static routing to manage path selection and failover.
  • For zone redundancy:
    • Enable zone-redundant gateway option where supported.
    • Confirm the gateway SKU supports zone redundancy.
  • Test failover scenarios (cloud-side and on-prem-side) before production cutover.
  • Monitor connection metrics and gateway health in Azure Monitor.
Active-active increases availability and aggregate throughput, but requires matching redundancy and correct routing on the on-premises side—configure connections to both cloud public IPs and use BGP or appropriate static routes to control failover.

Additional resources

Now that you understand zone-redundant deployments, active-standby, and active-active modes, you can design Azure VPN Gateway architectures to meet specific availability and bandwidth requirements.