The root cause is a missing or incorrect route configuration on the Azure side of the AVS network integration.
Specific Cause: When a new NSX-T segment is created, its subnet is propagated up to the NSX T0 router and the AVS ExpressRoute circuit. However, Azure does not automatically learn and propagate the route for this new subnet back into the VNet's default route table.
Mechanism: Traffic returning from the Azure VNet to the new NSX segment requires an explicit route—a User Defined Route (UDR)—in the VNet's route table that points the segment's subnet back to the AVS ExpressRoute circuit via the Virtual Network Gateway IP. The absence of this UDR causes the return packets to be dropped.
The issue is resolved by manually adding a User Defined Route (UDR) to the Azure Route Table associated with the Gateway Subnet of the Azure VNet connecting to AVS.
Identify the CIDR block of the new NSX segment that is experiencing the routing failure (e.g., 10.#.1.0/24).
Determine the Next Hop IP, which is the AVS ExpressRoute Gateway IP (typically the private cloud's gateway IP used for the ExpressRoute connection).
Navigate to the Azure Route Table attached to the VNet's Gateway Subnet in the Azure portal.
Add a new route with the following parameters:
ROUTE-NSX-SEGMENT-NEW).10.#.1.0/24).Adding this UDR explicitly tells the Azure VNet to send traffic destined for the new segment's subnet to the Virtual network gateway, thereby establishing the required return path and resolving the asymmetric routing failure.