P2S Internet Access with ALZ Architecture (vWan)

JC 10 Reputation points
2023-08-20T15:11:25.36+00:00

I'm doing a POC learning a bit more about Azure vWAN. The infrastructure is based on the ALZ architecture (with minor adjustments). No ER, just using S2S and P2S VPN (only P2S configured at this stage - OpenVPN w/ AAD + address pools). Have a few spokes peered to the hub and default route is 0.0.0.0/0 - AzFw. The P2S works as expected... connects w/o any errors and I'm able to reach VMs in the spokes. Now for the question (fair warning - I'm very much in the learning stage). I cannot figure out how to allow internet access to specific sites via the P2S VPN. For example, let's say I want to allow users connecting via the P2S to access the Azure Portal. I tried creating IP groups (that parallel the P2S client address pools) and setting up application rules for the portal (using those ip groups and fqdn for the portal)... but I still cannot connect. I'm missing something really basic here, but cannot seem to figure it out. Thanks for any help or guidance you can offer!

Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
189 questions
Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
573 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. GitaraniSharma-MSFT 47,676 Reputation points Microsoft Employee
    2023-08-21T09:57:48.7233333+00:00

    Hello @JC ,

    Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.

    I understand that you would like to know how to allow Internet access via the P2S VPN in your Virtual WAN.

    In order to reach the Internet via Azure P2S VPN gateway, you need to configure forced tunneling for your Virtual WAN Point-to-site VPN.

    Refer the below doc which explains how to configure forced tunneling for Virtual WAN Point-to-site VPN:

    https://learn.microsoft.com/en-us/azure/virtual-wan/how-to-forced-tunnel

    Forced tunneling allows you to send all traffic (including Internet-bound traffic) from remote users to Azure. In Virtual WAN, forced tunneling for Point-to-site VPN remote users signifies that the 0.0.0.0/0 default route is advertised to remote VPN users.

    You need to deploy a virtual hub with Azure firewall manager and add the P2S VPN Gateway to allow your egress traffic that will be controlled by a firewall policy.

    Refer: https://learn.microsoft.com/en-us/azure/firewall-manager/secure-cloud-network

    When you secure internet traffic via Azure Firewall (Firewall Manager), you can advertise the 0.0.0.0/0 route or any custom route to your VPN clients. This makes your clients send the internet bound traffic to Azure for inspection. Then, firewall SNATs the packet to the Public IP of Azure Firewall for egress to Internet.

    To do this, you need to setup an Azure Firewall & then configure a Policy to allow P2S traffic to Internet. --> Since you already have an Azure Firewall, this will be easy for you.

    You also need to make sure the EnableInternetSecurity flag is turned on for your Point-to-site VPN gateway. This flag must be set to true for your clients to be properly configured for forced-tunneling.

    And then advertise custom routes to your VPN clients.

    Refer: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-p2s-advertise-custom-routes

    https://learn.microsoft.com/en-us/azure/vpn-gateway/azure-vpn-client-optional-configurations#add-custom-routes

    Kindly let us know if the above helps or you need further assistance on this issue.


    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.