Skip to content

Commit 3f3ee13

Browse files
authored
Merge pull request #106032 from vhorne/fw-lb
Fw lb
2 parents dd1d8c4 + 1d52e7e commit 3f3ee13

File tree

4 files changed

+20
-4
lines changed

4 files changed

+20
-4
lines changed

articles/firewall/integrate-lb.md

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 11/19/2019
8+
ms.date: 02/28/2020
99
ms.author: victorh
1010
---
1111

@@ -23,7 +23,7 @@ With a public load balancer, the load balancer is deployed with a public fronten
2323

2424
### Asymmetric routing
2525

26-
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall is not aware of such an established session.
26+
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
2727

2828
### Fix the routing issue
2929

@@ -34,9 +34,23 @@ To avoid this problem, create an additional host route for the firewall's public
3434

3535
![Asymmetric routing](media/integrate-lb/Firewall-LB-asymmetric.png)
3636

37-
For example, the following routes are for a firewall at public IP address 13.86.122.41, and private IP address 10.3.1.4.
37+
### Route table example
3838

39-
![Route table](media/integrate-lb/route-table.png)
39+
For example, the following routes are for a firewall at public IP address 20.185.97.136, and private IP address 10.0.1.4.
40+
41+
> [!div class="mx-imgBorder"]
42+
> ![Route table](media/integrate-lb/route-table.png)
43+
44+
### NAT rule example
45+
46+
In the following example, a NAT rule translates RDP traffic to the firewall at 20.185.97.136 over to the load balancer at 20.42.98.220:
47+
48+
> [!div class="mx-imgBorder"]
49+
> ![NAT rule](media/integrate-lb/nat-rule02.png)
50+
51+
### Health probes
52+
53+
Remember, you need to have a web service running on the hosts in the load balancer pool if you use TCP health probes to port 80, or HTTP/HTTPS probes.
4054

4155
## Internal load balancer
4256

@@ -52,6 +66,8 @@ To further enhance the security of your load-balanced scenario, you can use netw
5266

5367
For example, you can create an NSG on the backend subnet where the load-balanced virtual machines are located. Allow incoming traffic originating from the firewall IP address/port.
5468

69+
![Network security group](media/integrate-lb/nsg-01.png)
70+
5571
For more information about NSGs, see [Security groups](../virtual-network/security-overview.md).
5672

5773
## Next steps
45.8 KB
Loading
29.9 KB
Loading
21.3 KB
Loading

0 commit comments

Comments
 (0)