Azure load balancer to NVA asymmetric traffic issue

prasantc 876 Reputation points
2024-07-13T18:54:39.4933333+00:00

Asymmetric traffic issue on network capture from a VM in another vent -

Here is my design -

I have VWAN with Azure firewall which yet to secured with intent as next phase of network migration. Therefore, please ignore vWAN and vHUB when it comes as a topic of description. And I am trying to resolve private DNS from on premises using Azure DNS inbound resolver which is proxied from Azure firewall.

  1. Existing env uses third party firewall applinace to secure Azure traffic which. will soon to be migrated.
  2. Third party NVA has four VM with scalesets but most of the traffic enters from eth1, as per NVA log.
  3. Traffic into NVA enters from an Azure ILB.
  4. UDR from subnet of other vnet points to Azure ILB private IP to route traffic to NVA firewall.
  5. For private DNS I have conditional forwarder on prem and cloud. As the conditional forwarder on prem gets replicaeted to across forest including the AD with DNS server hosted in Azure.
  6. AD DNS hosted in Azure has forwarder set to wired DNS aka Azure private DNS 168.x.x.x while on prem DNS forwarder points to google and other public DNS IP.

Network Line of sight -

  1. On prem traffic enters Azure express route and does not hit the NVA in the process, therefore, traffic is not inspected by cloud hosted NVA. Therefore, test network connection to Azure firewall IP on port 53 shows successful for on prem.
  2. Cloud DNS server or VM traffic is inspected by cloud NVA. Therefore, test network connection to Azure firewall IP on port 53 shows failure from cloud DNS server in none core vnet or VM from another vnet.

Why the test network connection to Azure firewall IP on port 53 is failing for cloud resources -

  1. Traffic enters to NVA from Azure LB for NVA as the UDR points for all other vnet points to NLB front end private IP.
  2. Inside the NVA log all traffic reaching to Azure firewall from DNS or test VM on none core subnet shows sucessful for all stateful traffic. What NVA log is missing is traffic exiting out of NVA and not exiting from NLB. Therefore, NVA log does not have insight on DNS traffic test network failure.
  3. When I run network capture with wireshark from the VM in the same subnet as Azure hosted DNS server I see transmssion failure.
  4. I understanding the traffic is going from one interface (NLB front) and not exiting out of NVA eth1 is not seen by VM as stateful traffic, therefore, the fail in acknowledgement. HOW do fix this or what is the workaround this issue?

Another point -

If I add conditional forwarder with private link.service.net instead of service.net on conditional forwarder it seemed to be working, which is not the correct way of condtional forwarding for azure services with PE. It should be resolve service.net to private link.service.net and private IP

Azure DNS
Azure DNS
An Azure service that enables hosting Domain Name System (DNS) domains in Azure.
631 questions
Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
604 questions
Azure Load Balancer
Azure Load Balancer
An Azure service that delivers high availability and network performance to applications.
421 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Marcin Policht 17,615 Reputation points MVP
    2024-07-13T20:07:07.97+00:00

    Wouldn't Azure Gateway Load Balancer solve this issue for you?

    More at https://learn.microsoft.com/en-us/azure/load-balancer/gateway-overview


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments