You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/how-to-network-virtual-appliance-inbound.md
+21-24Lines changed: 21 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,12 @@ description: Learn how to use Destination NAT with a Network Virtual Appliance i
4
4
author: wellee
5
5
ms.service: azure-virtual-wan
6
6
ms.topic: how-to
7
-
ms.date: 10/25/2024
7
+
ms.date: 12/11/2024
8
8
ms.author: cherylmc
9
9
# Customer intent: As someone with a networking background, I want to create a Network Virtual Appliance (NVA) in my Virtual WAN hub and leverage destination NAT.
10
10
---
11
11
# How to configure Destination NAT (DNAT) for Network Virtual Appliance in an Azure Virtual WAN hub
12
+
12
13
The following article describes how to configure Destination NAT for Next-Generation Firewall enabled Network Virtual Appliances deployed with the Virtual WAN hub.
13
14
14
15
> [!Important]
@@ -50,27 +51,29 @@ The following list corresponds to the diagram above and describes the packet flo
50
51
1. NVA inspects the traffic and translates the packet based on rule configuration. In this case, the NVA is configured to NAT and forward inbound traffic to 10.60.0.4:443. The source of the packet is also translated to the private IP (IP of trusted/internal interface) of the chosen Firewall instance to ensure flow symmetry. The NVA forwards the packet and Virtual WAN routes the packet to the final destination.
The list below corresponds to the diagram above and describes the packet flow for the outbound response:
57
+
The following list corresponds to the diagram above and describes the packet flow for the outbound response:
56
58
57
59
1. The server responds and sends the reply packets to the NVA Firewall instance over the Firewall private IP.
58
60
1. The NAT translation is reversed and the response is sent out the untrusted interface. Azure then directly sends the packet back to the user.
59
61
60
-
## Known Issues, Limitations and Considerations
62
+
## Known Issues, Limitations, and Considerations
61
63
62
-
The following section describes known issues, limitations and considerations associatd with the Internet Inbound feature.
64
+
The following section describes known issues, limitations, and considerations associated with the Internet Inbound feature.
63
65
64
66
### Known Issues
65
67
66
68
The following table describes known issues related to the internet inbound/DNAT feature.
67
69
68
70
|Issue | Description| Mitigation|
69
71
|--|--|--|
70
-
| DNAT traffic is not forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic is not forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
71
-
|Inbound security rule configuration scalability| Inbound security rule configuration may fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
72
+
| DNAT traffic isn't forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic isn't forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
73
+
|Inbound security rule configuration scalability| Inbound security rule configuration might fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
74
+
72
75
### Limitations
73
-
76
+
74
77
* Destination NAT is supported only for the following NVAs: **checkpoint**, **fortinet-sdwan-and-ngfw** and **fortinet-ngfw**.
75
78
* Public IPs that are used for Destination NAT must meet the following requirements:
76
79
* Destination NAT Public IPs must be from the same region as the NVA resource. For example, if the NVA is deployed in the East US region, the public IP must also be from the East US region.
@@ -88,37 +91,27 @@ The following table describes known issues related to the internet inbound/DNAT
88
91
* Timeout for idle flows is automatically set to 4 minutes.
89
92
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.
90
93
91
-
92
-
93
-
94
-
95
94
## Managing DNAT/Internet Inbound configurations
96
95
97
96
The following section describes how to manage NVA configurations related to internet inbound and DNAT.
98
97
99
-
1. Navigate to your Virtual WAN Hub. Select **Network Virtual Appliances** under Third Party Providers. Click on **Manage Configurations** next to the NVA.
100
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/manage-configurations.png"alt-text="Screenshot showing how to manage configurations for NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/manage-configurations.png":::
98
+
1. Navigate to your Virtual WAN Hub. Select **Network Virtual Appliances** under Third Party Providers. Click **Manage Configurations** next to the NVA.
101
99
102
-
1. Select **Internet Inbound** under settings.
103
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/select-internet-inbound.png"alt-text="Screenshot showing how to select IP to add to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/select-internet-inbound.png":::
100
+
1. Under **Settings**, select **Internet Inbound** to open the **Internet Inbound** page.
104
101
105
102
### Associating an IP address to an NVA for Internet Inbound
106
103
107
104
1. If the NVA is eligible for internet inbound and there are no current internet inbound IP addresses associated to the NVA, select **Enable Internet Inbound (Destination NAT) by associating a public IP to this Network Virtual Appliance**. If IPs are already associated to this NVA, select **Add**.
108
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/add-inbound-ip.png"alt-text="Screenshot showing how to add IP to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/add-inbound-ip.png":::
109
105
110
106
1. Select the resource group and the IP address resource that you want to use for internet inbound from the dropdown.
111
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/select-ip.png"alt-text="Screenshot showing how to select an IP."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/select-ip.png":::
107
+
112
108
1. Click **save**.
113
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/save-ip.png"alt-text="Screenshot showing how to save IP."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/save-ip.png":::
114
109
115
110
### View active inbound security rules using an Internet Inbound Public IP
116
111
117
112
1. Find the Public IP you want to view and click **View rules**.
118
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/view-rules.png"alt-text="Screenshot showing how to view rules associated to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/view-rules.png":::
119
113
1. View the rules associated to the public IP.
120
-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/rules.png"alt-text="Screenshot showing displayed rules associated to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/rules.png":::
121
-
114
+
122
115
### Remove Internet Inbound public IP from existing NVA
123
116
124
117
> [!NOTE]
@@ -138,6 +131,7 @@ The following section contains NVA provider-specific instructions on configuring
The following section describes some common troubleshooting scenarios.
142
136
143
137
### Public IP Association/Disassociation
@@ -155,7 +149,7 @@ For more information on Azure Load Balancer health probes, see [health probe doc
155
149
156
150
The health probes Virtual WAN requires are:
157
151
158
-
***Internet Inbound or DNAT health probe**: Used to forward Internet inbound traffic to NVA untrusted/external interfaces. This health probe checks the health of the **untrusted/external** interface of the NVA only.
152
+
***Internet Inbound or DNAT health probe**: Used to forward Internet inbound traffic to NVA untrusted/external interfaces. This health probe checks the health of the **untrusted/external** interface of the NVA only.
159
153
160
154
|NVA Provider| Port|
161
155
|--|--|
@@ -184,14 +178,13 @@ Ensure the NVA is configured to respond to the 3 health probes correctly. Common
184
178
### DNAT rule creation
185
179
186
180
***DNAT rule creation fails**: Ensure the provisioning state of the NVA is Succeeded and that all NVA instances are healthy. Reference NVA provider documentation for details on how to troubleshoot or contact the vendor for further support.
187
-
181
+
188
182
Additionally, ensure that the NVA is responding to **NVA health probes** on all interfaces. See the [health probes](#healthprobeconfigs) section for more information.
189
183
190
184
### Datapath
191
185
192
186
***NVA doesn't see packets after user initiates connection to Public IP**: Ensure that the NVA is responding to **DNAT health probes** on the **external/untrusted** interface only. See the [health probes](#healthprobeconfigs) section for more information.
193
187
194
-
195
188
***Destination server doesn't see packets after NVA translation**: consider the following troubleshooting mechanisms if packets aren't being forwarded to the final destination server.
196
189
***Azure Routing issue**: Use Azure Virtual WAN portal to check the effective routes of the defaultRouteTable or the effective routes of your Network Virtual Appliance. You should see the subnet of the destination application in the effective routes.
197
190
***NVA operating system routing issue**: Check the internal routing table of the NVA operating system. You should see routes corresponding to the destination subnets learnt dynamically from the NVA. Make sure there are no route filters/maps that are dropping relevant prefixes.
@@ -204,3 +197,7 @@ Ensure the NVA is configured to respond to the 3 health probes correctly. Common
204
197
***Application hosted on-premises**: Make sure there are no route filters on the on-premises side that filter out routes corresponding to the hub address space. Because the NVA source-NAT's traffic to a Firewall Private IP, the on-premises must accept the hub address space.
205
198
***Application inter-hub**: Inter-hub routing for DNAT use cases aren't supported. Make sure the resource you're trying to access is connected to the same hub as the NVA that has the DNAT rule configured.
206
199
***Packet capture on NVA interface**: Perform packet captures on the NVA trusted interface. You should see the application server send return traffic directly to the NVA instance. Make sure you compare packet captures before and after Firewall rules are applied to ensure packets to ensure proper Firewall rule configuration.
200
+
201
+
## Next steps
202
+
203
+
For more information about Virtual WAN, see the [Virtual WAN FAQ](virtual-wan-faq.md)
0 commit comments