Hello @Ajay Chauhan ,
I understand you have created a site-to-site VPN connection with route-based VPN between Azure and your on-prem Cisco VPN device which is working fine with static routes, and you are able to reach Azure resources. Now you would like to enable BGP on your below existing configuration with active-active disabled and would like to know which IP should be configured on Azure VPN gateway for BGP.
int tunnel 11
ip address 169.254.0.1 255.255.255.255
I'm not sure what your complete Cisco side configuration is, but it looks like you've not enabled BGP on Cisco VPN device yet.
Could you please let me know what does the 169.254.0.1 address specifies in your configuration? The config you shared says int tunnel 11, and I believe this is just the inner address of your tunnel and has nothing to do with BGP.
Only if your on-premises VPN devices use APIPA address for BGP, you must select an address from the Azure-reserved APIPA address range for VPN, which is from 169.254.21.0 to 169.254.22.255.
Refer: https://zcusa.951200.xyz/en-us/azure/vpn-gateway/bgp-howto#2-create-testvnet1-gateway-with-bgp
Your on-premises BGP peer address must not be the same as the public IP address of your VPN device or from the virtual network address space of the VPN gateway. You can use a different IP address on the VPN device for your BGP peer IP. It can be an address assigned to the loopback interface on the device (either a regular IP address or an APIPA address).
So, if you use a regular IP address as your BGP IP on Cisco device, then you don't have to use APIPA BGP IP addresses on your Azure VPN gateway and by default, Azure will assign a private IP address from the GatewaySubnet prefix range automatically as the Azure BGP IP address on the VPN gateway.
But if you use an APIPA address as your BGP IP on Cisco device, then you must use Azure-reserved APIPA address range for VPN gateway (169.254.21.0 to 169.254.22.255).
If you need help with Cisco side configuration script, you can download a configuration script for your VPN device from Azure portal with the corresponding values of your Azure VPN gateway, virtual network, and on-premises network address prefixes, and VPN connection properties, etc. already filled in.
Refer: https://zcusa.951200.xyz/en-us/azure/vpn-gateway/vpn-gateway-download-vpndevicescript
You can go to the site-to-site connection of your VPN gateway in Azure portal and on Overview pane, select Download configuration and then select the device vendor, device family & firmware version to download the configuration script for the required device. You can choose Cisco ASA VTI with BGP or some other option depending upon your requirement.
Kindly let us know if the above helps or you need further assistance on this issue.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.