Hello @TGS Service Account ,
Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.
I understand that you are trying to enable a Private Link connection for your SQL server which is behind an Active/Passive load-balanced firewall pair.
This type of setup can be found in the below tutorial:
https://learn.microsoft.com/en-us/azure/private-link/tutorial-inspect-traffic-azure-firewall
The above tutorial uses Azure Firewall, but the same setup can be used with any third-party network virtual appliance.
You need to make sure that the below configurations are done:
- Create a private endpoint for Azure SQL.
- Create a peering between the private endpoint virtual network and the edge virtual network.
- Link the virtual networks to private DNS zone. The private DNS zone created during the private endpoint creation of Azure SQL must be linked to both Edge Vnet and spoke virtual network.
- Configure firewall rules in your NVA for Azure SQL to allow communication from edge Vnet to the private endpoint of the Azure SQL server.
- Route traffic between the Edge Vnet and Azure SQL through the NVA.
Few more references:
https://learn.microsoft.com/en-us/azure/private-link/inspect-traffic-with-azure-firewall
If your active-passive load-balanced firewall pair is configured as shown in the below doc, then Source Network Address Translation (SNAT) needs to be performed by the NVA instances to attract the return traffic and avoid traffic asymmetry.
Refer: https://learn.microsoft.com/en-us/azure/architecture/networking/guide/nva-ha#load-balancer-design
If you have any additional questions or your setup is different, please share the same for further discussion.
Kindly let us know if the above helps or you need further assistance on this issue.
Please don’t forget to "Accept the answer" wherever the information provided helps you, this can be beneficial to other community members.