Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you are setting up Outbound access via Azure Firewall.
I see you have
- A route table attached to the subnet of your source (Azure Container Instance)
- With NextHop as the Private IP of the Azure Firewall for the route 37.97.x.x
May I ask why you are checking ICMP Tracert here?
- As long as the intermediate hop is in the Azure Firewall Subnet, this is fine.
- However, please make sure that you only access the destination with TCP and not ICMP
- This is because Network filtering rules for non-TCP/UDP protocols (for example ICMP) don't work for Internet bound traffic
- See : Azure Firewall limitations
- You can try to access the destination using Telnet or Test-NetConnection
- Open powerShell and run Test-NetConnection -ComputerName www.google.com -Port 443
- You can use Azure Firewall Diagnostic logs to check whether or not the traffic reached the Firewall
- And also, whether or not Firewall allowed this traffic
- And which rule was processed to allow/deny this traffic.
Should there be any follow-up questions or concerns, please let us know and we shall try to address them.
Thanks,
Kapil