<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Networking topics</title>
    <link>https://techcommunity.microsoft.com/t5/azure-networking/bd-p/AzureNetworking</link>
    <description>Azure Networking topics</description>
    <pubDate>Sat, 02 May 2026 13:32:43 GMT</pubDate>
    <dc:creator>AzureNetworking</dc:creator>
    <dc:date>2026-05-02T13:32:43Z</dc:date>
    <item>
      <title>Azure ExpressRoute - Cisco Meraki MX or directly into LAN?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-expressroute-cisco-meraki-mx-or-directly-into-lan/m-p/4514049#M777</link>
      <description>&lt;P&gt;We are in the process of deploying Azure ExpressRoute across multiple sites via a provider Layer 2 VPLS circuit and are evaluating our CPE options. Our provider is delivering a Layer 2 handoff to each site, meaning we are responsible for all Layer 3 BGP configuration on the customer edge. We currently run a full Cisco Meraki environment — Meraki MX appliances as our edge firewalls and Meraki MS switches on the LAN side — and are wondering if anyone has successfully terminated an ExpressRoute BGP session directly on a Meraki MX, or alternatively terminated it directly into the LAN without a dedicated edge router in between.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Terminating ExpressRoute BGP directly on a Meraki MX appliance — is this even possible given Meraki's limited BGP support?&lt;/LI&gt;&lt;LI&gt;Connecting the Layer 2 provider handoff (dot1Q or QinQ) directly into a Meraki MS LAN switch and routing from there — has anyone made this work, and what were the caveats?&lt;/LI&gt;&lt;LI&gt;Running a dedicated CPE router in front of the Meraki MX — and if so, how did you handle the integration between the CPE router and the Meraki SD-WAN fabric, particularly around route advertisement and traffic steering?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our provider model uses QinQ VLAN tagging with a provider-assigned S-tag and customer-defined C-tags for private and Microsoft peering. Since the provider is only delivering Layer 2, all BGP session establishment, prefix advertisement, and routing policy must be handled entirely on our CPE. Our understanding is that Meraki MX does not support QinQ subinterfaces or the level of BGP policy control needed for ExpressRoute, but we wanted to see if anyone has found a creative workaround before we commit to dedicated CPE hardware at each site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device recommendations welcome: If a dedicated CPE router is the only viable path, we'd also love to hear what devices others have used successfully for this use case. Our circuit is 1Gbps, so we need something that can handle that throughput comfortably with BGP active — but we're a mid-size enterprise and are looking for cost-effective options rather than carrier-grade platforms. What has worked well for you without breaking the budget?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any real-world experience, gotchas, or recommended architectures would be greatly appreciated, especially from anyone running a Meraki-only environment who has tackled this!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 14:09:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-expressroute-cisco-meraki-mx-or-directly-into-lan/m-p/4514049#M777</guid>
      <dc:creator>GS419</dc:creator>
      <dc:date>2026-04-23T14:09:57Z</dc:date>
    </item>
    <item>
      <title>My First TechCommunity Post: Azure VPN Gateway BGP Timer Mismatches</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/my-first-techcommunity-post-azure-vpn-gateway-bgp-timer/m-p/4503580#M776</link>
      <description>&lt;P&gt;This is my first post on the Microsoft TechCommunity.&amp;nbsp; Today is my seven-year anniversary at Microsoft.&amp;nbsp; In my current role as a Senior Cloud Solution Architect supporting Infrastructure in Cloud &amp;amp; AI Platforms, I want to start by sharing a real-world lesson learned from customer engagements rather than a purely theoretical walkthrough. This work and the update of the official documentation on &lt;STRONG&gt;Microsoft Learn&lt;/STRONG&gt; is the culmination of nearly two years of support for a very large global SD-WAN deployment with hundreds of site-to-site VPN connections into &lt;STRONG&gt;Azure VPN Gateway&lt;/STRONG&gt;. &amp;nbsp;The topic is deceptively simple—&lt;STRONG&gt;BGP timers&lt;/STRONG&gt;—but mismatched expectations can cause significant instability when connecting on‑premises environments to Azure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you’ve ever seen seemingly random BGP session resets, intermittent route loss, or confusing failover behavior, there’s a good chance that a timer mismatch between Azure and your customer premises equipment (CPE) was a contributing factor.&lt;/P&gt;
&lt;H2&gt;Customer Expectation: BGP Timer Negotiation&lt;/H2&gt;
&lt;P&gt;Many enterprise routers and firewalls support &lt;STRONG&gt;aggressive BGP timers&lt;/STRONG&gt; and expect them to be &lt;EM&gt;negotiated&lt;/EM&gt; during session establishment. A common configuration I see in customer environments looks like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Keepalive&lt;/STRONG&gt;: 10 seconds&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hold time&lt;/STRONG&gt;: 30 seconds&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This configuration is not inherently wrong. In fact, it is often used intentionally to speed up failure detection and convergence in conventional network environments.&amp;nbsp; My past experience with short timers was in a national cellular network carrier between core switching routers in adjacent racks, but all other connections used the default timer values.&lt;/P&gt;
&lt;P&gt;The challenge appears when that expectation is carried into Azure VPN Gateway.&lt;/P&gt;
&lt;H2&gt;Azure VPN Gateway Reality: Fixed BGP Timers&lt;/H2&gt;
&lt;P&gt;Azure VPN Gateway supports BGP but uses &lt;STRONG&gt;fixed timers&lt;/STRONG&gt; (60/180) and won’t negotiate down. The timers are documented:&lt;/P&gt;
&lt;P&gt;The BGP keepalive timer is 60 seconds, and the hold timer is 180 seconds. Azure VPN Gateways use fixed timer values and do not support configurable keepalive or hold timers.&lt;/P&gt;
&lt;P&gt;This behavior is consistent across supported VPN Gateway SKUs that offer BGP support. Unlike some on‑premises devices, Azure will not adapt its timers downward during session establishment.&lt;/P&gt;
&lt;H2&gt;What Happens During a Timer Mismatch&lt;/H2&gt;
&lt;P&gt;When a CPE is configured with a &lt;STRONG&gt;30‑second hold timer&lt;/STRONG&gt;, it expects to receive BGP keepalives well within that window. Azure, however, sends BGP keepalives every &lt;STRONG&gt;60 seconds&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;From the CPE’s point of view:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;No keepalive is received within 30 seconds&lt;/LI&gt;
&lt;LI&gt;The BGP hold timer expires&lt;/LI&gt;
&lt;LI&gt;The session is declared dead and torn down&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Azure may not declare the peer down on the same timeline as the CPE.&amp;nbsp; This mismatch leads to repeated session flaps.&lt;/P&gt;
&lt;H2&gt;The Hidden Side Effect: BGP State and Stability Controls&lt;/H2&gt;
&lt;P&gt;During these rapid teardown and re‑establishment cycles, many CPE platforms rebuild their BGP tables and may increment internal &lt;STRONG&gt;routing metadata&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;When this occurs repeatedly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure observes unexpected and rapid route updates&lt;/LI&gt;
&lt;LI&gt;The BGP finite state machine is forced to continually reset and re‑converge&lt;/LI&gt;
&lt;LI&gt;BGP session stability is compromised&lt;/LI&gt;
&lt;LI&gt;CPE equipment logging may trigger alerts and internal support tickets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The resulting behavior is often described by customers as “Azure randomly drops routes” or “BGP is unstable”, when the instability originates from mismatched BGP timer expectations between the CPE and Azure VPN Gateway.&lt;/P&gt;
&lt;H2&gt;Why This Is More Noticeable on VPN (Not ExpressRoute)&lt;/H2&gt;
&lt;P&gt;This issue is far more common with &lt;STRONG&gt;VPN Gateway&lt;/STRONG&gt; than with &lt;STRONG&gt;ExpressRoute&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;ExpressRoute supports &lt;STRONG&gt;BFD&lt;/STRONG&gt; and allows faster failure detection without relying solely on aggressive BGP timers. VPN Gateway does not support BFD, so customers sometimes compensate by lowering BGP timers on the CPE—unintentionally creating this mismatch.&lt;/P&gt;
&lt;P&gt;The VPN path is &lt;STRONG&gt;Internet/WAN-like&lt;/STRONG&gt; where delay/loss/jitter is normal, so conservative timer choices are stability-focused.&lt;/P&gt;
&lt;H2&gt;Updated Azure Documentation&lt;/H2&gt;
&lt;P&gt;The good news is that the &lt;STRONG&gt;official Azure documentation has been updated&lt;/STRONG&gt; to clearly state the fixed BGP timer values for VPN Gateway:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Keepalive&lt;/STRONG&gt;: 60 seconds&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hold time&lt;/STRONG&gt;: 180 seconds&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Timer negotiation&lt;/STRONG&gt;: Azure uses fixed timers&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-vpn-faq#what-are-the-bgp-timer-settings-for-site-to-site-s2s-vpn-connections" target="_blank"&gt;Azure VPN Gateway FAQ | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This clarification helps set the right expectations and prevents customers from assuming Azure behaves like conventional CPE routers.&lt;/P&gt;
&lt;H2&gt;Practical Guidance&lt;/H2&gt;
&lt;P&gt;If you are connecting a CPE to Azure VPN Gateway using BGP:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do &lt;STRONG&gt;not&lt;/STRONG&gt; configure BGP timers lower than Azure’s defaults&lt;/LI&gt;
&lt;LI&gt;Align CPE timers to &lt;STRONG&gt;60 / 180&lt;/STRONG&gt; or higher&lt;/LI&gt;
&lt;LI&gt;Avoid using aggressive timers as a substitute for BFD&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For further resilience:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Consider &lt;STRONG&gt;Active‑Active VPN Gateways&lt;/STRONG&gt; for better resiliency&lt;/LI&gt;
&lt;LI&gt;Use &lt;STRONG&gt;4 Tunnels&lt;/STRONG&gt; commonly implemented in a &lt;STRONG&gt;bowtie configuration&lt;/STRONG&gt; for even better resiliency and traffic stability&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Closing Thoughts&lt;/H2&gt;
&lt;P&gt;This is a great example of how cloud networking often behaves &lt;STRONG&gt;&lt;EM&gt;correctly&lt;/EM&gt;, but differently&lt;/STRONG&gt; than &lt;STRONG&gt;conventional on&lt;/STRONG&gt;&lt;STRONG&gt;‑premises networking environments&lt;/STRONG&gt;. Understanding those differences—and documenting them clearly—can save hours of troubleshooting and frustration.&lt;/P&gt;
&lt;P&gt;If this post helps even one engineer avoid a late‑night or multi-month BGP debugging session, then it has done its job.&lt;/P&gt;
&lt;P&gt;I did use AI (M365 Copilot) to aid in formatting and to validate technical accuracy.&amp;nbsp; Otherwise, these are my thoughts.&lt;/P&gt;
&lt;P&gt;Thanks for reading my first TechCommunity post.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 19:41:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/my-first-techcommunity-post-azure-vpn-gateway-bgp-timer/m-p/4503580#M776</guid>
      <dc:creator>joclemen</dc:creator>
      <dc:date>2026-03-18T19:41:45Z</dc:date>
    </item>
    <item>
      <title>Azure VM Persistent Route Setup</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-vm-persistent-route-setup/m-p/4502007#M773</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I hope to get some advice on a routing issue from Azure to an on-premises system.&lt;/P&gt;&lt;P&gt;A little background first, please bear with me:&lt;/P&gt;&lt;P&gt;We have an on-premises VM that connects to an isolated Thirdparty network via an On-Prem Cisco ASA FW specifically for this purpose.&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;OnPrem VM's IP: 10.100.10.23/24&amp;nbsp;&lt;/P&gt;&lt;P&gt;OnPrem dedicated FW - Local Inside Interface IP: 10.100.10.190&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;OnPrem dedicated FW - 3rdParty Interface IP: 10.110.255.137&lt;/P&gt;&lt;P&gt;Thirdparty router IP: 10.110.255.138 - This routes to aditional devices on 10.10.227.10 and 20.10.227.10.&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;There are static routes configured for 3rd party FW interface using:&lt;/P&gt;&lt;P&gt;3rdParty Interface - 10.10.227.10 255.255.255.255 - 10.110.255.138 (Gateway IP)&lt;/P&gt;&lt;P&gt;3rdParty Interface - 20.10.227.10 255.255.255.255 - 10.110.255.138 (Gateway IP)&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;The on-premises VM (10.100.10.23) has persistent routes added to allow connectivity:&lt;/P&gt;&lt;P&gt;Network Address&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Netmask&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Gateway Address&amp;nbsp; &amp;nbsp; &amp;nbsp;Metric&lt;/P&gt;&lt;P&gt;10.10.227.10&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.255&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;20.10.227.10&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.255&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;10.110.255.136&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.252&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;The above works fine on-prem but I now need to migrate the On-Prem VM service into Azure.&lt;/P&gt;&lt;P&gt;Azure Side&lt;/P&gt;&lt;P&gt;I have created a test Azure VM with a static IP in an isolated subnet (no other devices using it) in the Production subscription of our LZ (Hub and Spoke topology).&lt;/P&gt;&lt;P&gt;We have a site-to-site VPN connected to our on-premises FW using a VPN Gateway configured in the Connectivity subscription of our LZ (as expected).&lt;/P&gt;&lt;P&gt;We have defined subnets for on-premises address spaces in the Local Network Gateway:&lt;/P&gt;&lt;P&gt;10.100.10.0/24, 10.100.11.0/24, 10.100.13.0/24, 10.100.14.0/24 (Local Subnets) and 172.16.50.0 (VPN client Subnet)&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Main Problem that I'm requesting advice for:&lt;/P&gt;&lt;P&gt;When I add the defined persistent routes on the Azure VM (IP address: 10.150.1.10/24) as is on the On-Prem VM&lt;/P&gt;&lt;P&gt;Network Address&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Netmask&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Gateway Address&amp;nbsp; &amp;nbsp; &amp;nbsp;Metric&lt;/P&gt;&lt;P&gt;10.10.227.10&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.255&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;20.10.227.10&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.255&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;10.110.255.136&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.252&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.100.10.190&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;&lt;P&gt;I'm unable to ping the 10.10.227.10 and 20.10.227.10 addresses, even though the routes have been added by the 3rd party on their network side.&lt;/P&gt;&lt;P&gt;All Network Objects, static routes, groups and rules are duplicated on the ASA FW for the Azure VM as is for the On-Prem VM and I can access/ping the ASA FW inside interface no problem .&lt;/P&gt;&lt;P&gt;Is there a specific way I need to route the persistent routes from Azure side, have I missed something in the configuration above to get the connectivity I require?&lt;/P&gt;&lt;P&gt;Please all advice is welcomed!&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Nitrox&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 14:33:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-vm-persistent-route-setup/m-p/4502007#M773</guid>
      <dc:creator>nitrox2000</dc:creator>
      <dc:date>2026-03-13T14:33:07Z</dc:date>
    </item>
    <item>
      <title>Traffic processing BGP Azure VPN gateway A/A</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/traffic-processing-bgp-azure-vpn-gateway-a-a/m-p/4496361#M769</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone explain how Azure processes the traffic with implemented a VPN gateway in Active Active mode?.&lt;/P&gt;&lt;P&gt;Azure firewall premium is also configured. BGP is without preferences.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user route definition is set up to the next hop Azure firewall .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible in this scenario occurs the asymmetric routing with traffic drop by azure firewall ?&lt;/P&gt;&lt;P&gt;In my understand is that, if we need to configure User route definition on Gateway subnet to inspect traffic to peering subnet, so the firewall don't see traffic passing through VPN gateway. Traffic going through ipsec tunnels can go different paths and firewall do not interfere because everything is routed to it by user route definition.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2026 20:51:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/traffic-processing-bgp-azure-vpn-gateway-a-a/m-p/4496361#M769</guid>
      <dc:creator>Lechu</dc:creator>
      <dc:date>2026-02-22T20:51:49Z</dc:date>
    </item>
    <item>
      <title>Help! - How is VNet traffic reaching vWAN/on‑prem when the VNet isn’t connected to the vWAN hub</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/help-how-is-vnet-traffic-reaching-vwan-on-prem-when-the-vnet-isn/m-p/4495408#M767</link>
      <description>&lt;img /&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I needed some clarity on how the following is working:&lt;/P&gt;&lt;P&gt;Attached is a network diagram of our current setup. The&amp;nbsp;&lt;STRONG&gt;function apps&lt;/STRONG&gt; (in VNet-1) initiate a connection(s) to a specific &lt;STRONG&gt;IP:Port&lt;/STRONG&gt;&amp;nbsp;or&amp;nbsp;&lt;STRONG&gt;FQDN:Port&lt;/STRONG&gt; in the on-premises network(s). A &lt;STRONG&gt;Private DNS zone&lt;/STRONG&gt; ensures that any FQDN is resolved to the correct internal IP address of the on-prem endpoint. In our setup, both the &lt;STRONG&gt;function app&lt;/STRONG&gt; and the &lt;STRONG&gt;external firewall &lt;/STRONG&gt;reside in the &lt;STRONG&gt;same VNet. T&lt;/STRONG&gt;his firewall is described as “Unattached” because it is&amp;nbsp;not the built-in firewall of a secured vWAN hub, but rather an independent Azure Firewall deployed in that VNet.&lt;STRONG&gt; &lt;/STRONG&gt;The VNet has a user-defined &lt;STRONG&gt;default route (0.0.0.0/0)&lt;/STRONG&gt; directing &lt;STRONG&gt;all outbound traffic to the firewall’s IP&lt;/STRONG&gt;. The firewall then &lt;STRONG&gt;filters the traffic&lt;/STRONG&gt;, allowing only traffic destined to whitelisted on-premises IP: Port or FQDN: Port combinations (using &lt;EM&gt;IP Groups&lt;/EM&gt;), and blocking everything else.&lt;/P&gt;&lt;P&gt;The critical question and the part that I am unable to figure out is: &lt;STRONG&gt;Once the firewall permits a packet, how does Azure know to route it to the vWAN hub and on to the site-to-site VPN?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Because VNet-1 &lt;/EM&gt;truly has &lt;STRONG&gt;no connection at all to the vWAN hub&lt;/STRONG&gt; (no direct attachment, no peering, no VPN from the NVA). But the traffic is still reaching the on-prem sites. Unable to figure out how this is happening. Am I missing something obvious?&lt;/P&gt;&lt;P&gt;Any help on this would be appreciated.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 14:14:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/help-how-is-vnet-traffic-reaching-vwan-on-prem-when-the-vnet-isn/m-p/4495408#M767</guid>
      <dc:creator>YuktiVerma2025</dc:creator>
      <dc:date>2026-02-17T14:14:53Z</dc:date>
    </item>
    <item>
      <title>Help ! - Hub Spoke Architecture and Routing via NVA</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/help-hub-spoke-architecture-and-routing-via-nva/m-p/4493100#M764</link>
      <description>&lt;P&gt;I have a classic example of routing. I want to force all traffic via Fortigate firewalls. EastWest and NorthSouth. However when large Supernet of Azure Vnet is used to route and force the traffic via UDR at gateway subnet, its not working. Because Routes learned at Hub Vnet via Vnet peering is taking precedence.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To isolate, i have created multiple small subnet routes for Gateway subnet. Each pointing to spoke vnet and next hop as Fortigate firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However this is working, i want to make solution solid. Means if someone creates new vnet in future and peer with Hub, it should not get direct traffic. Is that possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or this is typical shortcoming of Azure where routing works with preference to vnet peeering.?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is architecture -&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 12:21:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/help-hub-spoke-architecture-and-routing-via-nva/m-p/4493100#M764</guid>
      <dc:creator>Amolamolrev</dc:creator>
      <dc:date>2026-02-06T12:21:56Z</dc:date>
    </item>
    <item>
      <title>Spoke-Hub-Hub Traffic with VPN Gateway BGP and Firewall Issue</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/spoke-hub-hub-traffic-with-vpn-gateway-bgp-and-firewall-issue/m-p/4471878#M750</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I’m facing a situation where I’m trying to have Azure Firewall Inspection on the VPN Gateway VNET-VNET Connectivity. It seems to work if I go from &lt;STRONG&gt;SpokeA-HubAFirewall-HubAVPN—HubBVPN-SpokeB&lt;/STRONG&gt; but if I try to go from &lt;STRONG&gt;SpokeA-HubAFirewall-HubAVPN-HubBVM or Inbound Resolver&lt;/STRONG&gt; it fails to route correctly according to Connectivity Troubleshooter it stops at HubAVPN with&amp;nbsp;&lt;STRONG&gt;Local Error: RouteMissing &lt;/STRONG&gt;but then reaches destination health so makes me believe it’s getting there but not following the route I want it to take which might be causing routing issues. What Am I missing here? This connectivity was working before introducing the Azure Firewall for Inspection with the UDR. Is what I’m trying to accomplish not possible? I’ve tried different types of UDR rules on the Gateway Subnet, and this is my most recent configuration. The reason I’m trying to accomplish this is because I’m seeing a similar error in our Hub-Spoke Hybrid environment and I’m trying to replicate the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Current Configuration&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;2x Hubs with Spoke networks attached so example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Hub-Spoke-A Configuration:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Hub-A Contains&lt;/STRONG&gt; following subnets and Resources&lt;/P&gt;&lt;P&gt;VPN Gateway - GateWaySubnet&lt;/P&gt;&lt;P&gt;Azure Firewall - AzureFirewallSubnet&lt;/P&gt;&lt;P&gt;Inbound Private Resolver - PrivateResolverSubnet&lt;/P&gt;&lt;P&gt;Virtual Machine – VM Subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway Subnet has an attached UDR with the following routes&lt;/P&gt;&lt;P&gt;Propagation - True&lt;/P&gt;&lt;P&gt;Prefix Destination – &lt;STRONG&gt;&lt;U&gt;Hub-B&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Next Hop Type – Virtual Appliance&lt;/P&gt;&lt;P&gt;Next Hope IP – &lt;STRONG&gt;&lt;U&gt;Hub-A Firewall&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prefix Destination – &lt;STRONG&gt;&lt;U&gt;Spoke-B&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Next Hop Type – Virtual Appliance&lt;/P&gt;&lt;P&gt;Next Hope IP – &lt;STRONG&gt;&lt;U&gt;Hub-A Firewall&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Hub-Spoke-B Configuration:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Hub-B Contains&lt;/STRONG&gt; following subnets and Resources&lt;/P&gt;&lt;P&gt;VPN Gateway - GateWaySubnet&lt;/P&gt;&lt;P&gt;Azure Firewall - AzureFirewallSubnet&lt;/P&gt;&lt;P&gt;Inbound Private Resolver - PrivateResolverSubnet&lt;/P&gt;&lt;P&gt;Virtual Machine – VM Subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway Subnet has an attached UDR with the following Routes&lt;/P&gt;&lt;P&gt;Propagation - True&lt;/P&gt;&lt;P&gt;Prefix Destination – &lt;STRONG&gt;&lt;U&gt;Hub-A&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Next Hop Type – Virtual Appliance&lt;/P&gt;&lt;P&gt;Next Hope IP – &lt;STRONG&gt;&lt;U&gt;Hub-B Firewall&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prefix Destination – &lt;STRONG&gt;&lt;U&gt;Spoke-A&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Next Hop Type – Virtual Appliance&lt;/P&gt;&lt;P&gt;Next Hope IP – &lt;STRONG&gt;&lt;U&gt;Hub-B Firewall&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Spoke&lt;/U&gt;&lt;/STRONG&gt; Subnets has an attached UDR with the following Routes&lt;/P&gt;&lt;P&gt;Propagation - True&lt;/P&gt;&lt;P&gt;Prefix Destination – 0.0.0.0/0&lt;/P&gt;&lt;P&gt;Next Hop Type – Virtual Appliance&lt;/P&gt;&lt;P&gt;Next Hope IP – HubA/HubB &lt;STRONG&gt;&lt;U&gt;Firewall (Depending on what hub its peered to)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN Gateways HA VNET-VNET with BGP Enabled. I can see that it knows the routes and like I said this was working prior introducing the UDRs for force traffic through the azure firewall.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 18:04:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/spoke-hub-hub-traffic-with-vpn-gateway-bgp-and-firewall-issue/m-p/4471878#M750</guid>
      <dc:creator>CUrti300</dc:creator>
      <dc:date>2025-11-20T18:04:09Z</dc:date>
    </item>
    <item>
      <title>What would be the expected behavior for an NSP?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/what-would-be-the-expected-behavior-for-an-nsp/m-p/4471260#M748</link>
      <description>&lt;P&gt;I'm using a network security perimeter in Azure.&lt;/P&gt;&lt;P&gt;In the perimeter there are two resources assigned: A storage Account and An Azure SQL Databse.&lt;/P&gt;&lt;P&gt;I'm using the BULK INSERT dbo.YourTable FROM 'sample_data.csv' getting data from the storage account.&lt;/P&gt;&lt;P&gt;The NSP is enforced for both resources, so the public connectivity is denied for resources outside the perimeter&lt;/P&gt;&lt;P&gt;I have experienced this behavior: the azure SQL CANNOT access the storage account when I run the command. I resolved using:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I need to add an outbound rule in the NSP to reach the storage fqdn&lt;/LI&gt;&lt;LI&gt;I need to add an inbound rule in the NSP to allow the public IP of the SQL Azure&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;When I do 1 and 2, azure SQL is able to pump data from the storage.&lt;/P&gt;&lt;P&gt;IMHO this is not the expected behavior for two resources in the NSP. I expect that, as they are in the same NSP, they can communicate to each other.&lt;/P&gt;&lt;P&gt;I have experienced a different behavior when using keyvault in the same NSP. I'm using the keyvault to get the keys for encryption for the same storage. For the key vault, i didn't have to create any rule to make it able to communicate to the storage, as they are in the same NSP.&lt;/P&gt;&lt;P&gt;I know, Azure SQL is in preview for the NSP and the keyvault in GA, but I want to ask if the experienced behavior (the SQL CANNOT connect to the storage even if in the same NSP) is due to a unstable or unimplemented feature, or I'm missing something? What is the expected behavior?&lt;BR /&gt;&lt;BR /&gt;Thank you community!!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 08:57:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/what-would-be-the-expected-behavior-for-an-nsp/m-p/4471260#M748</guid>
      <dc:creator>Antonio Buonaiuto</dc:creator>
      <dc:date>2025-11-19T08:57:53Z</dc:date>
    </item>
    <item>
      <title>Azure traffic to storage account</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-traffic-to-storage-account/m-p/4459831#M704</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve set up a storage account in &lt;STRONG&gt;Tenant A&lt;/STRONG&gt;, located in the &lt;STRONG&gt;AUEast&lt;/STRONG&gt; region, with public access. I also created a VM in &lt;STRONG&gt;Tenant B&lt;/STRONG&gt;, in the same region (AUEast). I’m able to use IP whitelisting on the storage account in Tenant A to allow traffic only from the VM in Tenant B. However, in the App Insights logs, the traffic appears as 10.X.X.X, likely because the VM is in the same region. I'm unsure why the public IP isn't reflected in the logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moreover, I am not sure about this part&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security-limitations#:~:text=You%20can%27t%20use%20IP%20network%20rules%20to%20restrict%20access%20to%20clients%20in%20the%20same%20Azure%20region%20as%20the%20storage%20account.%20IP%20network%20rules%20have%20no%20effect%20on%20requests%20that%20originate%20from%20the%20same%20Azure%20region%20as%20the%20storage%20account.%20Use%20Virtual%20network%20rules%20to%20allow%20same%2Dregion%20requests." target="_blank"&gt;You can't use IP network rules to restrict access to clients in the same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use&amp;nbsp;Virtual network rules to allow same-region requests.&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems contradictory, as IP whitelisting is working on the storage account. I assume the explanation above applies only when the client is hosted in the &lt;STRONG&gt;same tenant and region&lt;/STRONG&gt; as the storage account, and not when the client is in a &lt;STRONG&gt;different tenant&lt;/STRONG&gt;, even if it's in the same region.&lt;/P&gt;&lt;P&gt;I’d appreciate it if someone could shed some light on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mohsen&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 05:37:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-traffic-to-storage-account/m-p/4459831#M704</guid>
      <dc:creator>Mohsenhs</dc:creator>
      <dc:date>2025-10-08T05:37:00Z</dc:date>
    </item>
    <item>
      <title>Azure Express Route Peering with on Prem Firewall</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-express-route-peering-with-on-prem-firewall/m-p/4456300#M688</link>
      <description>&lt;P&gt;Is there any way we can have express route peer BGP directly with on Prem Firewall via /29 subnet&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall has active / standby and VIP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The express route peering require two /30 . if I have an active standby and VIP on the firewall how is that going to work ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 15:22:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-express-route-peering-with-on-prem-firewall/m-p/4456300#M688</guid>
      <dc:creator>ahmedaljawad</dc:creator>
      <dc:date>2025-09-23T15:22:11Z</dc:date>
    </item>
    <item>
      <title>How to setup Internet access after All Basic IPs be retired on September 30, 2025</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/how-to-setup-internet-access-after-all-basic-ips-be-retired-on/m-p/4456084#M687</link>
      <description>&lt;P&gt;As subject, what can I do to maintain Internet access&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 05:02:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/how-to-setup-internet-access-after-all-basic-ips-be-retired-on/m-p/4456084#M687</guid>
      <dc:creator>JasonIp</dc:creator>
      <dc:date>2025-09-23T05:02:36Z</dc:date>
    </item>
    <item>
      <title>Hub spoke design with NVA firewall</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/hub-spoke-design-with-nva-firewall/m-p/4452972#M682</link>
      <description>&lt;P&gt;I have my Azure landing zone setup but it isn't working as i expected.&lt;/P&gt;&lt;P&gt;So i have a vnet named vnet-lz-fw-001 with 2 subnets. External and Trusted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then have a NVA Watchguard Firewall with an interface on each subnet.&lt;/P&gt;&lt;P&gt;I then have 2 further vnets, vnet-lz-prod-001 and vnet-lz-id-001.&lt;/P&gt;&lt;P&gt;Each of these vnets has peering to vnet-lz-fw-001 but no peering between each other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;vnet-lz-prod-001 and vnet-lz-id-001 have user defined routes to point to each other via the trusted interface on the Watchguard NVA&lt;/P&gt;&lt;P&gt;The Watchguard firewall has static routes to point to each subnet in the vnets via the Trusted interface gateway address.&lt;/P&gt;&lt;P&gt;Virtual machines in both vnet-lz-prod-001 and vnet-lz-id-001 can ping each other, but when they do its not routing via the Watchguard firewall. Is this as expected behavior?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Virtual machines in both vnet-lz-prod-001 and vnet-lz-id-001 can ping the trusted interface on the Watchguard Firewall ok&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 13:15:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/hub-spoke-design-with-nva-firewall/m-p/4452972#M682</guid>
      <dc:creator>jlhall1000</dc:creator>
      <dc:date>2025-09-10T13:15:31Z</dc:date>
    </item>
    <item>
      <title>Storage not reachable from network using service endpoint.</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/storage-not-reachable-from-network-using-service-endpoint/m-p/4448952#M679</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Here is the situation.&lt;/P&gt;&lt;P&gt;The storage (File share )had assigned networks to allow access.&lt;/P&gt;&lt;P&gt;We refresh some changes in the NSG from the network using bicep code ( Outbound was permitted all- no change. Inbound - we updated a name of a rule).&lt;/P&gt;&lt;P&gt;What happened: no more access to the storage. No more connection on SMB port. The port was reported as closed.&lt;/P&gt;&lt;P&gt;We removed the storage configuration of allowed networks ( the status was still Green), we add it back and magically it started to work.&lt;/P&gt;&lt;P&gt;Any hints of what could have went wrong?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 06:45:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/storage-not-reachable-from-network-using-service-endpoint/m-p/4448952#M679</guid>
      <dc:creator>Adrian Chirtoc</dc:creator>
      <dc:date>2025-08-28T06:45:52Z</dc:date>
    </item>
    <item>
      <title>CloudNetDraw – Instantly generate Azure network diagrams</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/cloudnetdraw-instantly-generate-azure-network-diagrams/m-p/4428768#M670</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to share a tool I’ve built that might help some of you who regularly document or review Azure network topologies.&lt;/P&gt;&lt;P&gt;CloudNetDraw is a free tool that generates Azure network diagrams (HLD and MLD) directly from your environment. It supports both user login and service principals — or you can self-host it.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What it does:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Visualizes hub and spoke topology&lt;/LI&gt;&lt;LI&gt;Shows all subnets with CIDRs&lt;/LI&gt;&lt;LI&gt;Highlights NSG and UDR presence&lt;/LI&gt;&lt;LI&gt;Exports editable Draw.io files&lt;/LI&gt;&lt;LI&gt;Hosted version available, or deploy it yourself&lt;/LI&gt;&lt;LI&gt;Open source on GitHub&lt;/LI&gt;&lt;/UL&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Try it here:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;https://www.cloudnetdraw.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;GitHub repo:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;https://github.com/krhatland/cloudnet-draw&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Privacy &amp;amp; Security:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CloudNetDraw does not collect any information about your network resources or environment. Drawings are generated in memory and deleted immediately after use. We do not store, access, or analyze your topology data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would love to hear your thoughts or suggestions!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kristoffer&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 08:00:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/cloudnetdraw-instantly-generate-azure-network-diagrams/m-p/4428768#M670</guid>
      <dc:creator>khatland</dc:creator>
      <dc:date>2025-07-01T08:00:43Z</dc:date>
    </item>
    <item>
      <title>Monitor Azure network components</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/monitor-azure-network-components/m-p/4413640#M666</link>
      <description>&lt;P&gt;Hi team,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Hope you're doing well.&lt;/P&gt;&lt;P&gt;Today, I need some advices to implement monitoring on network resources.&lt;/P&gt;&lt;P&gt;For one of my clients, I'm in charge of deploying the dedicated infrastructure foundation for each project.&lt;/P&gt;&lt;P&gt;This foundation is essentially composed of:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A virtual network (VNET),&lt;/LI&gt;&lt;LI&gt;One or more subnets (SNETs),&lt;/LI&gt;&lt;LI&gt;A Route Table (RT) dedicated to a subnet,&lt;/LI&gt;&lt;LI&gt;User Defined Routes (UDRs) associated with an RT,&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This infrastructure foundation is consumed by the project, so it's imperative that we have a dashboard view to assess the health of each component.&lt;/P&gt;&lt;P&gt;To provide visual monitoring, I want to leverage Azure Monitor.&lt;/P&gt;&lt;P&gt;I therefore want to create a Network dashboard, where I can see the status of resources at a glance.&lt;/P&gt;&lt;P&gt;The problem is that the metrics currently offered by Azure Monitor for dashboard creation are quite limited, according to the official Microsoft documentation.&lt;/P&gt;&lt;P&gt;Here is the list of official Microsoft links for Azure resources that offer metrics:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;VNEt and subnets - Virtual Networks: https://learn.microsoft.com/en-us/azure/azure-monitor/reference/supported-metrics/microsoft-network-virtualnetworks-metrics&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I also checked on Network Insights, and unfortunately, the solution don't support the mentioned components.&lt;/P&gt;&lt;P&gt;I know it's also possible to use workbooks to retrieve certain information.&lt;/P&gt;&lt;P&gt;Are there any native Azure solutions that provide visual monitoring of these resources?&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 08:11:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/monitor-azure-network-components/m-p/4413640#M666</guid>
      <dc:creator>arnaud_grow-una</dc:creator>
      <dc:date>2025-05-14T08:11:31Z</dc:date>
    </item>
    <item>
      <title>Az Virtual Network Manager Multi-Region Hub-Spoke Topology</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/az-virtual-network-manager-multi-region-hub-spoke-topology/m-p/4397643#M660</link>
      <description>&lt;P&gt;I'm evaluating Network Manager for a customer with a fairly default topology scenario being multi-region hub-spoke with inter-region meshed hubs. However, I find the existing documentation unclear and the product not intuitive enough on how to achieve this. There is a matching graphic on this following learn article, but the accompanying text above rather mentions the global mesh option to connect spokes in different regions, not hubs...&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/architecture/networking/architecture/hub-spoke#automation-with-azure-virtual-network-manager" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/architecture/networking/architecture/hub-spoke#automation-with-azure-virtual-network-manager&lt;/A&gt;&lt;/P&gt;&lt;P&gt;My configuration approach so far is:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Network groups containing all VNets of a region&lt;UL&gt;&lt;LI&gt;Hub &amp;amp; spoke connectivity configuration applied with group and selecting matching regional hub VNet&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Network group of hub VNets&lt;UL&gt;&lt;LI&gt;Mesh connectivity configuration with global mesh enabled applied to group&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, when I look at the visualization, there seems to be no connection among the hubs.&lt;/P&gt;&lt;P&gt;Is this the right way or did I miss/misinterpret something?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 16:28:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/az-virtual-network-manager-multi-region-hub-spoke-topology/m-p/4397643#M660</guid>
      <dc:creator>Lyndon678</dc:creator>
      <dc:date>2025-03-26T16:28:54Z</dc:date>
    </item>
    <item>
      <title>Azure Load Balancer and security headers</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-load-balancer-and-security-headers/m-p/4390088#M656</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If I need to set &lt;A class="lia-external-url" href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Origin" target="_blank"&gt;Access-Control-Allow-Origin&lt;/A&gt; (something else than *) in the server. Does anybody have experiences if that is header is traveling through the Azure Load Balancer? Some documentations are saying that LB needs to be able to support these headers. I'm asking this in this way, as this is kind of preparing for the future, while not be able to test that yet. Neither I was not able to find any Azure documentation for this.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 15:30:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-load-balancer-and-security-headers/m-p/4390088#M656</guid>
      <dc:creator>Petri-X</dc:creator>
      <dc:date>2025-03-06T15:30:46Z</dc:date>
    </item>
    <item>
      <title>DNS Private Resolver forwarding ruleset resiliency</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/dns-private-resolver-forwarding-ruleset-resiliency/m-p/4369368#M653</link>
      <description>&lt;P&gt;We are using DNS Private Resolver for all our tenant's Azure DNS resolution. We have a DNS forwarding ruleset set up that forwards all DNS requests for "ourcompany.com." to 10.0.0.100 (primary onprem DNS server IP) and 10.0.0.200 (secondary onprem DNS server IP). This is all working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have just been looking at the resiliency of this setup. If both IPs were unreachable for five minutes, would the DNS private resolver return any cached DNS results for *.ourcompany.com or would the queries simply fail?&lt;/P&gt;&lt;P&gt;If only the primary IP (10.0.0.100) were unavailable, presumably DNS queries would still succeed due to use of the secondary IP, but would there be any noticeable increase in the time to respond to DNS queries as a result?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 11:55:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/dns-private-resolver-forwarding-ruleset-resiliency/m-p/4369368#M653</guid>
      <dc:creator>saggettattraxys</dc:creator>
      <dc:date>2025-01-22T11:55:46Z</dc:date>
    </item>
    <item>
      <title>BGP Routing from and to VPN Gateway</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/bgp-routing-from-and-to-vpn-gateway/m-p/4363869#M651</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am setting up a lab concerning vWAN connection to onprem via SDWAN and I have some issues getting the routing to work properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a hub which symbolizes the on-premises hub with a VPN gateway (gw-onprem) and a VM (on-prem-hubvm)&amp;nbsp;deployed. &lt;BR /&gt;Attached to the onprem-hub is&lt;/P&gt;
&lt;P&gt;a) on-prem spoke with a VM (on-prem VM).&lt;BR /&gt;b) two vnets that symbolize the sdwan. Both of which have a VPN gateway as well as one VM each deployed (gw-sd-1/2)&lt;BR /&gt;The SDWan Gateways are connected via s2s to two different vWAN hubs in two different locations. The vWAN has a third Hub which is not directly connected to on-prem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I am trying to lab is what direction the traffic is tacking from the vWAN Hubs to the last on-premise VM. The traffic currently goes all the way through the s2s vpn connection, but it gets dropped afterwards.&lt;BR /&gt;&lt;BR /&gt;I am struggling to set-up the routing from the sd-gw's to the on-premises machine. The routing needs to work through BGP&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The goal of the Lab is to see which path to on-premises is preferred if the hub preference is AS Path (shortest BGP Path).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;BGP is enabled on all VPN Gateways&lt;BR /&gt;The SD GWs are peered to the onprem Hub GW but no vnet peering.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The on-premises Vnets are peered.&lt;BR /&gt;&lt;BR /&gt;Somehow the VPN Gateways are not learning the routes to on-premises. I tried pointing the way with UDRs but somehow it also isnt working&lt;BR /&gt;I've tried setting up UDRs so that the traffic would be the following&lt;BR /&gt;&lt;BR /&gt;vWAN Hub -&amp;gt; sd GW &amp;gt; sd VM &amp;gt; GW-onprem (&amp;gt; on-prem-hubvm) &amp;gt; on-prem VM&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 15:28:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/bgp-routing-from-and-to-vpn-gateway/m-p/4363869#M651</guid>
      <dc:creator>LMR</dc:creator>
      <dc:date>2025-01-08T15:28:26Z</dc:date>
    </item>
    <item>
      <title>Azure Firewall has no capacity to maintain source IP on outbound traffic?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-networking/azure-firewall-has-no-capacity-to-maintain-source-ip-on-outbound/m-p/4362318#M648</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My use case:&amp;nbsp;&lt;/STRONG&gt;To have multiple static public IP addresses attached to Azure Firewall with SNAT rules configured so that the public IP isn't just randomly selected. We have multiple services that have whitelisting configured for specific public load balancer IPs and now we are trying to move them behind Azure Firewall. Since there is whitelisting on the destination, the public IP being randomly selected won't work.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My resources:&amp;nbsp;&lt;/STRONG&gt;One instance of premium SKU Azure Firewall. Hub and spoke architecture. Route tables being used to force traffic through Firewall (routed to private IP of firewall)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The research I have conducted:&amp;nbsp;&lt;/STRONG&gt;I have tried absolutely everything I can think of before coming to this forum and from what I can tell the 4 ways of outbound connectivity provided by Azure are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default outbound connectivity. &lt;SPAN class="lia-text-color-8"&gt;Against best practice to do this and won't work since its routing through a virtual appliance (firewall)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Associate a NAT gateway to a subnet.&amp;nbsp;&lt;SPAN class="lia-text-color-8"&gt;This won't work since we have only one instance of Azure Firewall and the requirement for multiple public IPs to be used.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Assign a public IP to a virtual machine.&amp;nbsp;&lt;SPAN class="lia-text-color-8"&gt;Not applicable, sitting in backend pool of a load balancer, single public IP to be used for multiple member servers.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Using the frontend IP address(es) of a load balancer for outbound via outbound rules.&amp;nbsp;&lt;SPAN class="lia-text-color-8"&gt;Needs to go through the firewall, impossible unless we can somehow integrate the firewall between the load balancer and the backend pool?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;Expanding more on the load balancer scenario, I ran across this documentation in Microsoft Learn.&lt;/SPAN&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;This looks great to tackle the asymmetric routing issue, however, we are only interested in maintaining the source IP for &lt;STRONG&gt;&lt;U&gt;outbound&lt;/U&gt;&lt;/STRONG&gt; traffic, this would again just use the firewalls public IP for outbound traffic and again randomly select it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Consensus&lt;/STRONG&gt;: It seems bizarre to me that Azure has no capacity for static SNAT configuration like most firewalls do. I would have thought a large amount of use cases would require this function. Am I missing something? Is there another workaround? Or is Azure just behind the 8ball with networking.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks heaps in advance for any help :)&lt;/P&gt;&lt;P&gt;Much Appreciated,&lt;/P&gt;&lt;P&gt;usernameone101&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 01:31:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-networking/azure-firewall-has-no-capacity-to-maintain-source-ip-on-outbound/m-p/4362318#M648</guid>
      <dc:creator>usernameone101</dc:creator>
      <dc:date>2025-01-03T01:31:31Z</dc:date>
    </item>
  </channel>
</rss>

