Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (2024)

This article describes the best practices for connectivity, traffic flows, and high availability of single-region Azure VMware Solution when using Azure Secure Virtual WAN with Routing Intent. You will learn the design details of using Secure Virtual WAN with Routing-Intent, when using Global Reach. This article breaks down Virtual WAN with Routing Intent topology from the perspective of an Azure VMware Solution private cloud, on-premises sites, and Azure native. The implementation and configuration of Secure Virtual WAN with Routing Intent are beyond the scope and aren't discussed in this document.

Single-region with Secure Virtual WAN scenario

Secure Virtual WAN with Routing Intent is only supported with Virtual WAN Standard SKU. Secure Virtual WAN with Routing Intent provides the capability to send all Internet traffic and Private network traffic to a security solution like Azure Firewall, a third-party Network Virtual Appliance (NVA), or SaaS solution. In the scenario, we have a single region network. There's a Virtual WAN with one hub. The hub has an Azure Firewall deployed, essentially making it a Secure Virtual WAN hub. Having a Secure Virtual WAN hub is a technical prerequisite to Routing Intent. The Secure Virtual WAN hub has Routing Intent enabled.

Note

When configuring Azure VMware Solution with Secure Virtual WAN Hubs, ensure optimal routing results on the hub by setting the Hub Routing Preference option to "AS Path." - seeVirtual hub routing preference

The single region consists of its own Azure VMware Solution Private Cloud and an Azure Virtual Network. Additionally, there's an on-premises site connecting back to the hub. Furthermore, Global Reach connectivity exists within the environment. Global Reach establishes a direct logical link via the Microsoft backbone, connecting Azure VMware Solution to on-premises. As shown in the diagram, Global Reach connections don't transit the Hub firewall. So, Global Reach traffic between on-premises and Azure VMware Solution, and vice versa, remains uninspected.

Note

When utilizing Global Reach, consider enhancing security between Global Reach sites by inspecting traffic within the Azure VMware Solution environment’s NSX-T or an on-premises firewall.

Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (1)

Understanding Topology Connectivity

ConnectionDescription
Connections (D)Azure VMware Solution private cloud managed ExpressRoute connection to the hub.
Connection (A)Azure VMware Solution Global Reach connection back to on-premises.
Connections (E)on-premises ExpressRoute connection to the hub.

Single-region Secure Virtual WAN Traffic Flows

The following sections cover traffic flows and connectivity for Azure VMware Solution, on-premises, Azure Virtual Networks, and the Internet.

Azure VMware Solution connectivity & traffic flows

This section focuses only on the Azure VMware Solution Cloud’s perspective. Azure VMware Solution private cloud has an ExpressRoute connection to its hub (connection labeled as "D").

The Azure VMware Solution Cloud Region establishes a connection to on-premises via ExpressRoute Global Reach, depicted as Global Reach (A) in the diagram. It's important to note that traffic via Global Reach doesn't transit the Hub firewall.

Ensure that you explicitly configure Global Reach (A). It's imperative to do this step to prevent connectivity issues between on-premises and Azure VMware Solution. For more information, see traffic flow section.

The diagram illustrates traffic flows from the perspective of the Azure VMware Solution Private Cloud.

Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (2)

Traffic Flow Chart

Traffic Flow NumberSourceDirectionDestinationTraffic Inspected on Secure Virtual WAN Hub firewall?
1Azure VMware Solution CloudVirtual NetworkYes, traffic is inspected at the Hub firewall
2Azure VMware Solution Cloudon-premisesNo, traffic bypasses firewall and transits Global Reach (A)

On-premises connectivity & traffic flow

This section focuses only on the on-premises site. As shown in the diagram, the on-premises site has an ExpressRoute connection to the hub (connections labeled as "E"). On-premises systems can communicate to Azure VMware Solution via connection Global Reach (A).

Ensure that you explicitly configure Global Reach (A). It's imperative to do this step to prevent connectivity issues between on-premises and Azure VMware Solution. For more information, see traffic flow section.

The diagram illustrates traffic flows from an on-premises perspective.

Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (3)

Traffic Flow Chart

Traffic Flow NumberSourceDirectionDestinationTraffic Inspected on Secure Virtual WAN Hub firewall?
3on-premisesAzure VMware Solution CloudNo, traffic bypasses firewall and transits Global Reach (A)
4on-premisesVirtual NetworkYes, traffic is inspected at the Hub firewall

Azure Virtual Network connectivity & traffic flow

This section focuses only on connectivity from the Azure Virtual Network perspective. As depicted in the diagram, the Virtual Network is peering directly to the hub.

A Secure Hub with enabled Routing Intent always sends the default RFC 1918 addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) to peered Virtual Networks, plus any other prefixes that are added as "Private Traffic Prefixes" - seeRouting Intent Private Address Prefixes. In our scenario, with Routing Intent enabled, all resources in the Virtual Network currently possess the default RFC 1918 addresses and use the Hub firewall as the next hop. All traffic ingressing and egressing the Virtual Network will always transit the Hub firewall. For more information, see traffic flow section.

Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (4)

Traffic Flow Chart

Traffic Flow NumberSourceDirectionDestinationTraffic Inspected on Secure Virtual WAN hub firewall?
5Virtual NetworkAzure VMware Solution CloudYes, traffic is inspected at the Hub firewall
6Virtual NetworkAzure VMware Solution CloudYes, traffic is inspected at the Hub firewall

Internet connectivity

This section focuses only on how internet connectivity is provided for Azure native resources in the Virtual Network and the Azure VMware Solution Private Cloud. There are several options to provide internet connectivity to Azure VMware Solution. - seeInternet Access Concepts for Azure VMware Solution

Option 1: Internet Service hosted in Azure
Option 2: VMware Solution Managed SNAT
Option 3: Azure Public IPv4 address to NSX-T Data Center Edge

Although you can use all three options with Single Region Secure Virtual WAN with Routing Intent, "Option 1: Internet Service hosted in Azure" is the best option when using Secure Virtual WAN with Routing Intent and is the option that is used to provide internet connectivity in the scenario. The reason why "Option 1" is considered the best option with Secure Virtual WAN is due to its ease of security inspection, deployment, and manageability.

With Routing Intent, you can choose to generate a default route from the hub firewall. This default route is advertised to your Virtual Network and to Azure VMware Solution. This section is broken into two sections, one that explains internet connectivity from an Azure VMware Solution perspective and another from the Virtual Network perspective.

Azure VMware Solution Internet Connectivity

When Routing Intent is enabled for internet traffic, the default behavior of the Secure Virtual WAN Hub is to not advertise the default route across ExpressRoute circuits. To ensure the default route is propagated to the Azure VMware Solution from the Azure Virtual WAN, you must enable default route propagation on your Azure VMware Solution ExpressRoute circuits - seeTo advertise default route 0.0.0.0/0 to endpoints. Once changes are complete, the default route 0.0.0.0/0 is then advertised via connection “D” from the hub. It's important to note that this setting shouldn't be enabled for on-premises ExpressRoute circuits. Even though connection “D” advertises the default route 0.0.0.0/0 to Azure VMware Solution, the default route is also advertised to on-premises via Global Reach (A). As a result, the recommendation is to implement a BGP Filter on your on-premises equipment to exclude learning the default route. This step ensures that on-premises internet connectivity isn't impacted.

Virtual Network Internet Connectivity

When Routing Intent for internet access is enabled, the default route generated from the Secure VWAN Hub is automatically advertised to the hub-peered Virtual Network connections. You'll notice under Effective Routes for the Virtual Machines’ NICs in the Virtual Network that the 0.0.0.0/0 next hop is the hub firewall.

For more information, see the traffic flow section.

Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (5)

Traffic Flow Chart

Traffic Flow NumberSourceDirectionDestinationTraffic Inspected on Secure Virtual WAN hub firewall?
7Azure VMware Solution CloudInternetYes, traffic is inspected at the Hub firewall
8Virtual NetworkInternetYes, traffic is inspected at the Hub firewall

Next steps

  • For more information on Virtual WAN hub configuration, seeAbout virtual hub settings.
  • For more information on how to configure Azure Firewall in a Virtual Hub, seeConfigure Azure Firewall in a Virtual WAN hub.
  • For more information on how to configure the Palo Alto Next Generation SAAS firewall on Virtual WAN, seeConfigure Palo Alto Networks Cloud NGFW in Virtual WAN.
  • For more information on Virtual WAN hub routing intent configuration, seeConfigure routing intent and policies through Virtual WAN portal.
Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach (2024)
Top Articles
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5507

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.