I currently have a site-to-site IPsec vpn tunnel configured and working to Azure. I need to create a second site-to-site IPsec VPN tunnel to a different Azure gateway. I only have one public interface so I assume it sharing the same public gateway IP.
I have created a secondary IF Tunnel for the second Azure gateway created the vpn gateway pointing to the Azure gateway, IKE2 placed the same sharekey on both sides. binded the vpn gateway to use the same public facing interface and new IF tunnel created the untrust to turst policy and turst to untrust.
in the vpn monitoring status SA is inactive and link is inactive. the IF tunnel status is set to Ready.