Hello Maciej Rybak,
Welcome to the Microsoft Q&A Platform! Thank you for asking your question here
Custom Route Table Configuration:
- Ensure the custom route table (DMZ) is correctly configured to route traffic to the Azure Firewall.
Association of Custom Route Table:
- Associate the custom route table with your new VNet. Make sure the new VNet is correctly associated with the custom DMZ route table.
Peering Configuration:
- Verify that the new VNet is peered with the existing VNets through the Virtual WAN hub. Check the peering setup between the new VNet and existing VNets.
Route Propagation Settings:
- Confirm that route propagation settings are correctly configured. Ensure routes are advertised properly between VNets, including both default and custom routes.
Azure Firewall Rules:
- Update Azure Firewall rules to handle traffic from both the existing VNets and the new VNet. Ensure rules are updated to accommodate traffic from the new VNet.
Connectivity Testing:
- Test connectivity between VNets to ensure all VNets can communicate as expected.
Monitoring and Adjustments:
- Monitor network traffic and route tables for any issues or conflicts. Adjust configurations as necessary based on observed performance or connectivity issues.
Additional Considerations:
- BGP Routes: Since you mentioned BGP routes from SD-WAN, ensure that these routes are not conflicting with your custom route table settings.
- Route Table Overlaps: Check for any overlapping routes between the default and custom route tables that might be causing conflicts.
Kindly let us know if the above helps or you need further assistance on this issue.
If you have any further queries, do let us know. If the answer is helpful, please click "Accept Answer" and "Upvote it."