Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you would like to use a 3rd party NVA to connect Azure VNET (along with Networks connected via VPN and ExR).
Since this is a 3rd party NVA, I would suggest you check with their documentations/support to get more clarity.
With that said,
- Assuming the NVA has 2 NICs in 2 subnets,
- Ideally, the externalSubnet should be the one exposed to the Internet - i.e., it should be the one connecting the External Network
- And the internalSubnet/NVASubnet should be the receiving and sending traffic to the Azure VNET (VPN and ExR).
- The internal <-> external NIC should be handled by the OS
- Terminology wise, the above is preferred and used.
Wrt Routing,
- On the AzureFirewallSubnet, you should have a route pointing the external network's address space to the NVA
- On the NVA's internalSubnet/NVASubnet, you should have a route pointing the Azure VNET (VPN and ExR) 's address space to the Azure Firewall
- You mentioned "default" route in your verbatim
- But please use specific routes/address spaces.
- Note that the above is only valid as long as all other subnets have a route table attached pointing all traffic to the Azure Firewall.
You can use this as a reference : Use Azure Firewall to route a multi hub and spoke topology
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.