Azure Express route forced-tunneling with NVA

Mateen Baig 71 Reputation points
2021-09-28T09:44:13.327+00:00

I want to set-up forced tunneling in Azure. All traffic destined to internet should be routed to on-prem and exit to internet from there.

  • As far as i understand i need to advertise default route via BGP in Azure so that it replaces internet default route and send everything to on-prem via Express route.
  • Then i make UDRs 0.0.0.0/0 next hop to NVA Cisco firewall on all subnets in Azure.

All traffic from Azure subnets will go to NVA and from there it will be routed to on-prem or to another vNET.

Question is what about the traffic coming from on-prem to Azure ? I want that traffic to also go through NVA cisco firewall. How could it be done as gateway subnet do not support 0.0.0.0/0 UDRs with Express route setup.

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,442 questions
Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,280 questions
Azure ExpressRoute
Azure ExpressRoute
An Azure service that provides private connections between Azure datacenters and infrastructure, either on premises or in a colocation environment.
342 questions
0 comments No comments
{count} votes

Accepted answer
  1. GitaraniSharma-MSFT 49,356 Reputation points Microsoft Employee
    2021-09-28T14:26:24.983+00:00

    Hello @Mateen Baig ,

    Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.

    Your initial understanding of the setup is correct.
    You will have to advertise a default route of 0.0.0.0/0 via BGP from your on-premises to Azure, so that all your Azure traffic is sent to your on-premises via the ExpressRoute. And in order to filter all that traffic by an NVA, you can add a UDR with 0.0.0.0/0 on all the subnets (except the NVA subnet) with next hop as your Cisco Firewall NVA.

    This setup will take care of the routing from Azure to on-prem which will go as below:
    All subnets --> Cisco NVA --> ExpressRoute gateway --> On-premises.

    Now coming back to your question on what about the return traffic, yes GatewaySubnet do not support 0.0.0.0/0 UDRs but it supports UDRs with other address prefixes.
    Hence, you can add a UDR to the ExpressRoute GatewaySubnet with the address prefix of your Vnet range with next hop type Virtual Appliance and IP address of your Cisco NVA. This will make sure that any traffic that comes from your on-premises for your Azure Vnet range, when reaches your ExpressRoute gateway will be forwarded to the Cisco NVA.

    For example : If your Vnet address range is 10.0.0.0/16 then you can add a UDR to your ExpressRoute GatewaySubnet as below:
    Address prefix : 10.0.0.0/16 --> Next hop = Virtual Appliance --> Next hop = IP address of Cisco NVA
    So the routing from On-prem to Azure will go as below:
    On-premises --> ExpressRoute gateway --> Cisco NVA --> All subnets.

    Kindly let us know if the above helps or you need further assistance on this issue.

    ----------------------------------------------------------------------------------------------------------------

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    2 people found this answer helpful.

0 additional answers

Sort by: Most helpful