I think I have done that. Let me specify the config so you can check. Each Azure region has it's own vmx and a unique client pool subnet. Each Azure region has a route from the client pool subnet only to each local vmx not to each other. In Azure the original region, (UK south) has routes from all subnets with servers in to the new (Uk West) vmx client subnet with next hop set to the vmx address. (It also has these routes to the vmx in that region) The only UK south subnet I haven't added this route to is the client vpn subnet. Wasn't sure if it was required from one vmx subnet to the other vmx subnet but tried it to see but no difference. Is this required or not? As this is to be a highly available Vmx setup I want them to be able to route independently from each other in case one fails. My problem is that when connected to the new client VPN after successful ldap authentication it can't ping servers that is possible on the original client vpn. Any ideas what is missing or not right?
... View more