Azure vWAN - lost connection during creation peering with custom RT

Maciej Rybak 40 Reputation points
2024-08-21T06:56:38.1433333+00:00

HI Azure Community

We have Virtual WAN with two HUBS , one in US and one EU. In US HUB we have seven Vnets peered to the HUB/Firewall and all traffic is going via AzureFW. Everything is working with default RT. (there is only route 0.0.0.0/0 to Azure Firewall)

Now for new project we created new, dedicated vnet and we want to peer to the same Hub/Firewall but with custom route table. With current configuration (also only routing 0.0.0.0/0 next hop same AzureFW) we lost all communication for this seven Vntes. (even If there is independent vnet and route table).

Can you help me with that? I guess there is something wrong with that RT/routing.

I didn't configure it and I have some assumptions why it doesn't work but I wanted to ask you for advice

Thank you

Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
224 questions
{count} votes

Accepted answer
  1. Rohith Vinnakota 1,000 Reputation points Microsoft Vendor
    2024-08-23T15:28:09.9466667+00:00

    Hello Maciej Rybak,

    Welcome to the Microsoft Q&A Platform! Thank you for asking your question here

    Custom Route Table Configuration:

    • Ensure the custom route table (DMZ) is correctly configured to route traffic to the Azure Firewall.

     Association of Custom Route Table:

    • Associate the custom route table with your new VNet. Make sure the new VNet is correctly associated with the custom DMZ route table.

    Peering Configuration:

    • Verify that the new VNet is peered with the existing VNets through the Virtual WAN hub. Check the peering setup between the new VNet and existing VNets.

    Route Propagation Settings:

    • Confirm that route propagation settings are correctly configured. Ensure routes are advertised properly between VNets, including both default and custom routes.

    Azure Firewall Rules:

    • Update Azure Firewall rules to handle traffic from both the existing VNets and the new VNet. Ensure rules are updated to accommodate traffic from the new VNet.

    Connectivity Testing:

    • Test connectivity between VNets to ensure all VNets can communicate as expected.

    Monitoring and Adjustments:

    • Monitor network traffic and route tables for any issues or conflicts. Adjust configurations as necessary based on observed performance or connectivity issues.

    Additional Considerations:

    • BGP Routes: Since you mentioned BGP routes from SD-WAN, ensure that these routes are not conflicting with your custom route table settings.
    • Route Table Overlaps: Check for any overlapping routes between the default and custom route tables that might be causing conflicts.

    Kindly let us know if the above helps or you need further assistance on this issue.

    If you have any further queries, do let us know. If the answer is helpful, please click "Accept Answer" and "Upvote it."

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.