virtual wan
16 TopicsUsing Azure Bastion via through vWAN Virtual Hub
I have a feedback about Azure Bastion. I am using the ability to use Azure Bastion with multiple virtual networks via vNET Peering. I would like to extend this feature to use it via a Virtual WAN hub. However, the current Azure Bastion does not seem to detect peering through a virtual hub. I hope Azure Bastion to be able to connect to VM hosts on different virtual networks via a virtual hub.3.1KViews4likes1CommentAz-firewall-mon(itor) - near real time Azure Firewall flow log analyser
Hello, networking expert! I’m excited to share with you an update on my personal open source project: az-Firewall-mon: Az-firewall-monitor is an open-source tool that helps you answer to the following question: what is happening in my azure Firewall right now? It provides an alternative and opinionable way to access and inspect Azure Firewall logs, without using Log Analytics or Kusto queries. It provides a simple and intuitive interface that shows you what is happening on your firewall right now (or almost). to filter your data you can use both a full text search or natural language thanks to his integration with chatGPT4. Here a sample full text search interaction: here a sample natural language interaction Try out az-firewall-monitor at https://az-firewall-mon.duckiesfarm.com/ or have a look at the source code on GitHub at https://github.com/nicolgit/azure-firewall-mon Thank you!169Views1like0CommentsHow to split traffic on VWAN with PALO and AZFW
Hello all, I have a virtual wan environment that we'd like to essentially split in two. Traffic from on prem will reach all servers in the cloud. ON prem at the edge is a palo alto device, we'd like to build a palo alto device in the cloud, and a wvd environment that would use this palo alto device to egress traffic to the internet and essentially serve as the FW for the WVD environment. We'd also like to enable SECURE VIRTUAL HUB and use the AzFW to serve as FW for the other NON WVD servers that exist in the cloud. There are some requirements that we have to maintain that we cannot achieve with the AzFW for the "end user instances" within the cloud. Server internet traffic is highly regulated, and really non existent, but we need a separate place to control it rather than using the PA device. All VNETS are peered to the hub, the DMZ vnet included. The palo device lives in the DMZ vnet because it's not natively supported as a secondary security device by VWAN. 1.) is this architecture possible (secure virtual hub, + NVA on peered VNET) 2.) if so, what do I need to do from a routing perspective because just enabling the secure virtual hub significantly changes my routing tables for all peered vnets. DIAGRAM ATTACHED TO THIS MESSAGE Thanks for the help. -johnSolved2.1KViews1like2Comments