Forum Discussion
Route Traffic via Azure Firewall
Hi,
I have a number of virtual networks within a subscription and a hub network which hosts an Azure Firewall. Within each network is a virtual machine with a public IP. I can't peer the networks to the hub as these all need to be completely isolated. Is it possible to setup RPD rules on the firewall to route to the different Public IPs within each network.
Im thinking of NAT rules with different ports. but i cant get this to work even if i just use 3389. Im thinking its something to do with routing?
Any ideas, or even a better way to do this?
Thanks
- ibnmbodjiSteel Contributor
Hi
Even if they are peered with hub spokes are still isolated until you allow forwaded traffic.
You can create proper rule to deny unauthorised traffic at the subnet and firewall level . By doing that you can filter and log all traffic in and out
You can eliminate all the public IP and use dnat rules if you don't want to put vpn Gateway
Tutorial: Filter inbound Internet traffic with Azure Firewall DNAT using the portal | Microsoft Docs