Skip to content

Commit 301d2bf

Browse files
committed
first draft
1 parent 1bd87b2 commit 301d2bf

File tree

1 file changed

+51
-0
lines changed

1 file changed

+51
-0
lines changed

articles/virtual-wan/how-to-routing-policies.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,57 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
9696
* Network Virtual Appliances (NVAs) can only be specified as the next hop resource for routing intent if they're Next-Generation Firewall or dual-role Next-Generation Firewall and SD-WAN NVAs. Currently, **checkpoint**, **fortinet-ngfw** and **fortinet-ngfw-and-sdwan** are the only NVAs eligible to be configured to be the next hop for routing intent. If you attempt to specify another NVA, Routing Intent creation fails. You can check the type of the NVA by navigating to your Virtual Hub -> Network Virtual Appliances and then looking at the **Vendor** field. [**Palo Alto Networks Cloud NGFW**](how-to-palo-alto-cloud-ngfw.md) is also supported as the next hop for Routing Intent, but is considered a next hop of type **SaaS solution**.
9797
* Routing Intent users who want to connect multiple ExpressRoute circuits to Virtual WAN and want to send traffic between them via a security solution deployed in the hub can enable open up a support case to enable this use case. Reference [enabling connectivity across ExpressRoute circuits](#expressroute) for more information.
9898

99+
### Virtual Network Limitations
100+
101+
> [!NOTE]
102+
> The maximum number of Virtual Network address spaces that you can connect to a single Virtual WAN hub is adjustable. Please open an Azure support case request a limit increase. The limits are applicable at the Virtual WAN hub level. If you have multiple Virtual WAN hubs that require a limit increase, request a limit increase for all Virtual WAN hubs in your Virtual WAN hub.
103+
104+
105+
For customers using routing intent, the maximum number of address spaces across all Virtual Networks **directly connected** to a single Virtual WAN hub is 400. This limit is applied to each Virtual WAN hub in a Virtual WAN hub. Virtual Network address spaces connected to Virtual WAN other Virtual WAN hubs do not contribute to this limit.
106+
107+
If the number of directly connected Virtual Network address spaces connected to a hub exceeds the limit, enabling routing intent on the Virtual Hub will fail. For hubs already configured with routing intent where Virtual Network address spaces exceeds the limit as a result of an operation such as a Virtual Network address space update, the newly connected address space may not be routable.
108+
109+
Request a limit increase if your network has Virtual Network address spaces greater than 90% of the limit or if you have any planned network expansion or deployment operations that will increase the number of Virtual Network address spaces past this limit.
110+
111+
The following table provides a few example Virtual Network address space calculation.
112+
113+
|Virtual Hub| Virtual Network Count| Address spaces per Virtual Network | Total number of Virtual Network address spaces connected to Virtual Hub| Suggested Action|
114+
|--|--|--|--|--|
115+
| Hub #1| 200| 1 | 200| No action required, request limit increase once there are ~350 address spaces.|
116+
| Hub #2| 150 | 3 | 450| Request limit increase to enable routing intent.|
117+
| Hub #3 |370 | 1| 370| Request limit increase.|
118+
119+
You can use the following Powershell script to approximate the number of address spaces in Virtual Networks connected to a single Virtual WAN hub. Run this script for all Virtual WAN hubs in your Virtual WAN. An Azure Monitor metric to allow you to track and configure alerts on connected Virtual Network address spaces is on the roadmap.
120+
121+
```powershell-interactive
122+
$hubVNETconnections = Get-AzVirtualHubVnetConnection -ParentResourceId "/subscriptions/<subscription id>/resourceGroups/<resource group name>/providers/Microsoft.Network/virtualHubs/<virtual hub name>"
123+
124+
$addressSpaceCount = 0
125+
126+
foreach($connection in $hubVNETconnections) {
127+
128+
try{
129+
130+
$resourceURI = $connection.RemoteVirtualNetwork.Id
131+
$RG = ($resourceURI -split "/")[4]
132+
$name = ($resourceURI -split "/")[8]
133+
$VNET = Get-AzVirtualNetwork -Name $name -ResourceGroupName $RG -ErrorAction "Stop"
134+
$addressSpaceCount += $VNET.AddressSpace.AddressPrefixes.Count
135+
}
136+
catch{
137+
Write-Host "An error ocurred while processing VNET connected to Virtual WAN hub with resource URI: " -NoNewline
138+
Write-Host $resourceURI
139+
Write-Host "Error Message: " -ForegroundColor Red
140+
Write-Host $_.Exception.Message -ForegroundColor Red
141+
}
142+
finally{
143+
}
144+
}
145+
Write-Host "Total Address Spaces in VNETs connected to this Virtual WAN Hub: " -ForegroundColor Green -NoNewline
146+
Write-Host $addressSpaceCount -ForegroundColor Green
147+
```
148+
149+
99150
## Considerations
100151

101152
Customers who are currently using Azure Firewall in the Virtual WAN hub without Routing Intent may enable routing intent using Azure Firewall Manager, Virtual WAN hub routing portal or through other Azure management tools (PowerShell, CLI, REST API).

0 commit comments

Comments
 (0)