Routing Configuration for Connecting External Network to Azure via NVA and Azure Firewall

Roshan Roy 0 Reputation points
2024-11-27T21:17:21.0866667+00:00

Hi There,
I have a requirement to connect an external network to the Azure infrastructure via a Network Virtual Appliance (NVA). The NVA contains an external subnet, which needs to be connected to Azure resources, as well as other resources connected via ExpressRoute and the Azure VPN Gateway. All production VNets point to the Azure Firewall as their default route.

topology

As I understand it, two route table entries are required for this setup:

  1. The first route table should be attached to the NVA subnet, with a default route pointing towards the Azure Firewall.
  2. The second route table should be attached to the Azure Firewall subnet, with routes for the external networks received via the NVA.

Please correct me if my approach is wrong

Thanks in Advance

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
779 questions
{count} votes

1 answer

Sort by: Most helpful
  1. KapilAnanth-MSFT 49,536 Reputation points Microsoft Employee Moderator
    2024-11-28T05:14:09.0966667+00:00

    @Roshan Roy ,

    Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.

    I understand that you would like to use a 3rd party NVA to connect Azure VNET (along with Networks connected via VPN and ExR).

    Since this is a 3rd party NVA, I would suggest you check with their documentations/support to get more clarity.

    With that said,

    • Assuming the NVA has 2 NICs in 2 subnets,
      • Ideally, the externalSubnet should be the one exposed to the Internet - i.e., it should be the one connecting the External Network
      • And the internalSubnet/NVASubnet should be the receiving and sending traffic to the Azure VNET (VPN and ExR).
      • The internal <-> external NIC should be handled by the OS
    • Terminology wise, the above is preferred and used.

    Wrt Routing,

    • On the AzureFirewallSubnet, you should have a route pointing the external network's address space to the NVA
    • On the NVA's internalSubnet/NVASubnet, you should have a route pointing the Azure VNET (VPN and ExR) 's address space to the Azure Firewall
      • You mentioned "default" route in your verbatim
      • But please use specific routes/address spaces.
    • Note that the above is only valid as long as all other subnets have a route table attached pointing all traffic to the Azure Firewall.

    You can use this as a reference : Use Azure Firewall to route a multi hub and spoke topology

    Thanks,

    Kapil


    Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.