@LeonT ,
Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
From your verbatim, I take it that you'd like to route Internet bound traffic (externally hosted SQL Server outside of Azure) from a local machine via Azure using P2S
Please Note :
- The use case of Azure P2S VPN Gateway is to connect your remote devices to Azure VNET
- It is not designed to provide internet connectivity to P2S Clients.
- See : Custom routes for P2S VPN clients
While you can make this work with a help of a NVA such as Azure Firewall,
- This is not recommended with regular VPN gateway.
- If you require this feature, we'd suggest you consider vWAN Secured Hub with "Internet Traffic Routing Policy" enabled
If you are still interested using a regular VPN Gateway,
- Consider deploying a NVA or Azure Firewall on the VNET and route all traffic to the Firewall from the VPN Gateway.
- You should advertise additional custom routes of the externally hosted service's IP to the P2S Clients.
- On the GatewaySubnet, attach a UDR with routes 0.0.0.0/1 and 128.0.0.0/1 pointing to the nextHop as the NVA's/Azure Fierwall's IP Address
- Now, this Firewall will provide the P2S Clients with Internet connectivity
- And the outgoing communication will use the Pubic IP of the Azure Firewall
- Which you can whitelist in the externally hosted service's Firewall.
NOTE :
- The Firewall should have an Allow rule allowing traffic to pass through it
Kindly let us know if this helps or you need further assistance on this issue.
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.