You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/integrate-lb.md
+20-4Lines changed: 20 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: article
8
-
ms.date: 11/19/2019
8
+
ms.date: 02/28/2020
9
9
ms.author: victorh
10
10
---
11
11
@@ -23,7 +23,7 @@ With a public load balancer, the load balancer is deployed with a public fronten
23
23
24
24
### Asymmetric routing
25
25
26
-
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall is not aware of such an established session.
26
+
Asymmetric routing is where a packet takes one path to the destination and takes another path when returning to the source. This issue occurs when a subnet has a default route going to the firewall's private IP address and you're using a public load balancer. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Since the firewall is stateful, it drops the returning packet because the firewall isn't aware of such an established session.
27
27
28
28
### Fix the routing issue
29
29
@@ -34,9 +34,23 @@ To avoid this problem, create an additional host route for the firewall's public
In the following example, a NAT rule translates RDP traffic to the firewall at 20.185.97.136 over to the load balancer at 20.42.98.220:
47
+
48
+
> [!div class="mx-imgBorder"]
49
+
> 
50
+
51
+
### Health probes
52
+
53
+
Remember, you need to have a web service running on the hosts in the load balancer pool if you use TCP health probes to port 80, or HTTP/HTTPS probes.
40
54
41
55
## Internal load balancer
42
56
@@ -52,6 +66,8 @@ To further enhance the security of your load-balanced scenario, you can use netw
52
66
53
67
For example, you can create an NSG on the backend subnet where the load-balanced virtual machines are located. Allow incoming traffic originating from the firewall IP address/port.
0 commit comments