Route Traffic via Azure Firewall

Occasional Contributor



I have a number of virtual networks within a subscription and a hub network which hosts an Azure Firewall. Within each network is a virtual machine with a public IP. I can't peer the networks to the hub as these all need to be completely isolated. Is it possible to setup RPD rules on the firewall to route to the different Public IPs within each network.


Im thinking of NAT rules with different ports. but i cant get this to work even if i just use 3389. Im thinking its something to do with routing?


Any ideas, or even a better way to do this?



1 Reply





Even if they are peered with hub spokes are still isolated until you allow forwaded traffic. 

You can create proper rule to deny unauthorised traffic at the subnet and firewall level . By doing that you can filter and log all traffic in and out 

You can eliminate all the public IP and use dnat rules  if you don't want to put vpn Gateway 


Tutorial: Filter inbound Internet traffic with Azure Firewall DNAT using the portal | Microsoft Docs