Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you would like to use an NVA for inspecting traffic that leaves Azure VNET and enters Azure VNET via Azure VPN Gateway.
Consider a testVM in Azure which should send traffic to the NVA before reaching the VPN Gateway
- testVM - defaultSubnet
- NVA - nvaSubnet
- Azure VPN Gateway - GatewaySubnet
- OnPrem Range - 10.10.0.0/16
- Azure VNET Range - 10.20.0.0/16
A. Azure to OnPrem
- Create a route table "toOnPREM" and attach it to the defaultSubnet
- Add a route to the OnPREM Range "10.10.0.0/16" and set the next Hop as NVA with NVA's private IP
- Do not add any route table to the "nvaSubnet"
- The default system routes/BGP routes learned from VPN Gateway will forward the traffic from NVA to the VPN Gateway and your OnPremises.
- NOTE : If your OnPREM is advertising ranges such as "10.10.1.0/24", "10.10.2.0/24" (i.e., breaking the bigger range into smaller ones), then you must override them accordingly.
B. OnPrem to Azure
- In the GatewaySubnet, create and attach a route table "toAzure"
- Since we cannot add "0.0.0.0/0", you can add the Azure VNET Range and attach it here.
- This becomes, "10.20.0.0/16" ----> NVA Private IP
- This will forward all the traffic to Azure VNET to the NVA
- Now, the default system routes learned from the VNET will enable the NVA to route traffic to the VMs in Azure.
Refer : Virtual network traffic routing
Please let us know if we can be of any further assistance here.
Thanks,
Kapil
Please Accept an answer if correct.
Original posters help the community find answers faster by identifying the correct answer.