Skip to main content
Azure Virtual Network (VNet) peering enables private, low-latency connectivity between two VNets so resources (for example, virtual machines) communicate using private IP addresses without traversing the public internet. Peering works across subscriptions and tenants and can be configured within a single Azure region (regional peering) or across Azure regions (global peering). When you use private DNS zones to resolve names across VNets, name resolution may succeed even when VNets are separate. However, name resolution alone does not provide network connectivity — VNet peering fills that connectivity gap by enabling direct network paths between VNets.
A slide titled "VNet Peering – Features" showing VNet1 in Region 1 peered globally to VNet2 in Region 2, and VNet2 peered regionally to VNet3. Below the diagram are three feature boxes labeled "Data Path", "Multi-Tenant Support", and "Non-Transitive."
Types of peering
Peering typeScopeTypical use case
Regional VNet PeeringVNets within the same Azure regionLow-latency private connectivity between application tiers or business units in the same region
Global VNet PeeringVNets across Azure regionsCross-region disaster recovery, geo-distributed services, or cross-region shared services
Key features and behaviors
FeatureWhat it means
Data path over Microsoft backboneTraffic between peered VNets flows privately over Azure’s backbone—never over the public internet—providing lower latency and improved security.
Cross-subscription & cross-tenantPeering supports VNets across subscriptions and Azure Active Directory tenants for flexible organizational topologies.
Non-transitive connectivityPeering is not transitive: a VNet peered to VNet B and VNet B peered to VNet C does not imply A can reach C. Direct peering or routing/forwarding is required.
Address space requirementVNets must have non-overlapping IP address ranges to establish peering.
Hub-spoke topology, NVAs, and gateway transit A common and scalable design is the hub-spoke topology. In this pattern the hub VNet hosts shared services such as:
  • Network Virtual Appliances (NVAs) for inspection, filtering, and custom forwarding.
  • A VPN Gateway or ExpressRoute gateway to connect to on-premises networks.
Spoke VNets peer with the hub. Because peering is non-transitive, spoke-to-spoke traffic does not automatically route via the hub. To route spoke-to-spoke traffic through a hub NVA you must:
  1. Configure the NVA to forward traffic (enable IP forwarding on the NVA’s network interface and implement the required routing rules on the appliance).
  2. Create User Defined Routes (UDRs) in spokes to point to the hub/NVA so traffic is sent to the hub for inspection or custom routing.
  3. Ensure Network Security Groups (NSGs) allow the forwarded traffic through the spokes and hub.
Gateway transit allows spokes to reuse a single gateway in the hub instead of deploying a gateway per VNet. To enable gateway transit:
  • On the hub VNet peering resource, enable “Allow gateway transit”.
  • On each spoke VNet peering resource, enable “Use remote gateways”.
This configuration reduces gateway deployment cost and centralizes connectivity to on‑premises networks or other VPN/ExpressRoute endpoints.
A diagram titled "Implementing VNet Peering" showing a hub-and-spoke Azure network where VNet A and VNet B are peered to a HUB VNet, with a VPN gateway in the hub providing gateway transit to on-premises. It also shows a network virtual appliance (NVA), UDR routing, and labels like "No VPN Required," "Full Connectivity," and "Non-Overlapping."
Limitations, requirements, and best practices
TopicGuidance
Overlapping IP rangesPeering cannot be created if VNets have overlapping address spaces—plan IP addressing to avoid overlaps.
Security controlsPeering does not bypass NSGs or Azure Firewall—apply security controls and logging as needed.
Transitive scenariosFor spoke-to-spoke via hub, use NVAs with forwarding + UDRs or configure direct peering between spokes.
Cost considerationsData transfer costs may apply for cross-region (global) peering—review Azure pricing for inter-region data transfer.
VNet peering is non-transitive and requires non-overlapping address spaces. If you need traffic inspection or spoke-to-spoke routing via a hub, you must configure forwarding on NVAs, UDRs, and NSGs appropriately—peering alone will not provide transit routing.
Configuration overview (Azure Portal)
  1. In the Azure portal, open one VNet and select Peerings > + Add.
  2. Provide the peering name and select the remote VNet (can be in another subscription/tenant).
  3. Choose peering options:
    • Allow virtual network access (enable to permit traffic).
    • Allow gateway transit (enable on the hub side if sharing a gateway).
    • Use remote gateways (enable on spoke side to use hub gateway).
  4. Repeat from the remote VNet or select the “Create remote peering” option to auto-provision the reciprocal peering.
  5. Verify routes and NSGs, and update UDRs if using an NVA for transit.
When you want multiple VNets to share a single VPN or ExpressRoute gateway, configure “Allow gateway transit” on the hub and “Use remote gateways” on the spoke peerings. This reduces gateway deployment costs while centralizing connectivity.
Summary / When to use VNet peering
  • Use Azure VNet peering for low-latency, private connectivity over the Microsoft backbone.
  • Use regional peering for intra-region connectivity and global peering for cross-region connections.
  • Use hub-and-spoke with gateway transit to centralize shared services (gateways, NVAs) and reduce duplication.
  • Plan IP addressing to avoid overlaps, and implement UDRs + NVAs when you require inspection or custom routing between spokes.
Links and references