
Issue with Azure Privat Endpoint for Storage Account and F5 SSLVPN

Hi All,
we are facing currently an issue with DNS Name Resolution, Azure Private Endpoint and SSLVPN by F5 which I would like to explian and I hope someone has an idea, how to solve it.
Following setup exists:
On Azure:
- Azure Hub and Spoke
- Private DNS Resolver
- Storage Account with Private Endpoint
- Private DNS Zone "privatelink.blob.core.windows.net" with an A-Entry for the Private Endpoint IP of Stoagreaccount
On Prem:
- Conditional Forwarder for "blob.core.windows.net" to the dns inbound ip of Private DNS resolver
Testcase 1:
- Nslookup from Server/VDI in DC network, "somename.blob.core.windows.net" is correctly resolved to IP Adress of the private endpoint, so everything works as expected.
- Connection works
Testcase 2:
- Same test, just from SSLVPN-Connected client: public IP is getting resolved and
- no connection is possible because public access not allowed.
We have made some deeper investigation and identified the root cause.
The F5 ist using https://learn.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-ip-web-service?view=o365-worldwide to exclude O365 traffic from the VPN.
But in the O365 IP/Domain List, there is also following entry in
{
"id": 67,
"serviceArea": "Common",
"serviceAreaDisplayName": "Microsoft 365 Common and Office Online",
"urls": [
"*.blob.core.windows.net"
],
"tcpPorts": "443",
"expressRoute": false,
"category": "Default",
"required": false,
"notes": "Security and Compliance Center eDiscovery export"
}
This explains, why the resolution and traffic to a Storage Account is not going to the vpn connection.
So any idea how we can:
- ignore/remove entry ID 67 on this web service list?
if not
- force F5 to still route the storage account traffic to the VPN
Many thanks for your thoughts.
Regards
Joerg
Microsoft 365 and Office | Install, redeem, activate | For business | Windows
