Skip to content

Commit 4561e5e

Browse files
author
Jill Grant
authored
Merge pull request #291833 from cherylmc/images6
freshness review
2 parents 1c15942 + 865a096 commit 4561e5e

File tree

7 files changed

+21
-24
lines changed

7 files changed

+21
-24
lines changed

articles/virtual-wan/how-to-network-virtual-appliance-inbound.md

Lines changed: 21 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,12 @@ description: Learn how to use Destination NAT with a Network Virtual Appliance i
44
author: wellee
55
ms.service: azure-virtual-wan
66
ms.topic: how-to
7-
ms.date: 10/25/2024
7+
ms.date: 12/11/2024
88
ms.author: cherylmc
99
# Customer intent: As someone with a networking background, I want to create a Network Virtual Appliance (NVA) in my Virtual WAN hub and leverage destination NAT.
1010
---
1111
# How to configure Destination NAT (DNAT) for Network Virtual Appliance in an Azure Virtual WAN hub
12+
1213
The following article describes how to configure Destination NAT for Next-Generation Firewall enabled Network Virtual Appliances deployed with the Virtual WAN hub.
1314

1415
> [!Important]
@@ -50,27 +51,29 @@ The following list corresponds to the diagram above and describes the packet flo
5051
1. NVA inspects the traffic and translates the packet based on rule configuration. In this case, the NVA is configured to NAT and forward inbound traffic to 10.60.0.4:443. The source of the packet is also translated to the private IP (IP of trusted/internal interface) of the chosen Firewall instance to ensure flow symmetry. The NVA forwards the packet and Virtual WAN routes the packet to the final destination.
5152

5253
#### Outbound traffic flow
54+
5355
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/example-outbound-flow.png"alt-text="Screenshot showing outbound traffic flow." lightbox="./media/virtual-wan-network-virtual-appliance-inbound/example-outbound-flow.png":::
5456

55-
The list below corresponds to the diagram above and describes the packet flow for the outbound response:
57+
The following list corresponds to the diagram above and describes the packet flow for the outbound response:
5658

5759
1. The server responds and sends the reply packets to the NVA Firewall instance over the Firewall private IP.
5860
1. The NAT translation is reversed and the response is sent out the untrusted interface. Azure then directly sends the packet back to the user.
5961

60-
## Known Issues, Limitations and Considerations
62+
## Known Issues, Limitations, and Considerations
6163

62-
The following section describes known issues, limitations and considerations associatd with the Internet Inbound feature.
64+
The following section describes known issues, limitations, and considerations associated with the Internet Inbound feature.
6365

6466
### Known Issues
6567

6668
The following table describes known issues related to the internet inbound/DNAT feature.
6769

6870
|Issue | Description| Mitigation|
6971
|--|--|--|
70-
| DNAT traffic is not forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic is not forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
71-
|Inbound security rule configuration scalability| Inbound security rule configuration may fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
72+
| DNAT traffic isn't forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic isn't forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
73+
|Inbound security rule configuration scalability| Inbound security rule configuration might fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
74+
7275
### Limitations
73-
76+
7477
* Destination NAT is supported only for the following NVAs: **checkpoint**, **fortinet-sdwan-and-ngfw** and **fortinet-ngfw**.
7578
* Public IPs that are used for Destination NAT must meet the following requirements:
7679
* Destination NAT Public IPs must be from the same region as the NVA resource. For example, if the NVA is deployed in the East US region, the public IP must also be from the East US region.
@@ -88,37 +91,27 @@ The following table describes known issues related to the internet inbound/DNAT
8891
* Timeout for idle flows is automatically set to 4 minutes.
8992
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.
9093

91-
92-
93-
94-
9594
## Managing DNAT/Internet Inbound configurations
9695

9796
The following section describes how to manage NVA configurations related to internet inbound and DNAT.
9897

99-
1. Navigate to your Virtual WAN Hub. Select **Network Virtual Appliances** under Third Party Providers. Click on **Manage Configurations** next to the NVA.
100-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/manage-configurations.png"alt-text="Screenshot showing how to manage configurations for NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/manage-configurations.png":::
98+
1. Navigate to your Virtual WAN Hub. Select **Network Virtual Appliances** under Third Party Providers. Click **Manage Configurations** next to the NVA.
10199

102-
1. Select **Internet Inbound** under settings.
103-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/select-internet-inbound.png"alt-text="Screenshot showing how to select IP to add to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/select-internet-inbound.png":::
100+
1. Under **Settings**, select **Internet Inbound** to open the **Internet Inbound** page.
104101

105102
### Associating an IP address to an NVA for Internet Inbound
106103

107104
1. If the NVA is eligible for internet inbound and there are no current internet inbound IP addresses associated to the NVA, select **Enable Internet Inbound (Destination NAT) by associating a public IP to this Network Virtual Appliance**. If IPs are already associated to this NVA, select **Add**.
108-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/add-inbound-ip.png"alt-text="Screenshot showing how to add IP to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/add-inbound-ip.png":::
109105

110106
1. Select the resource group and the IP address resource that you want to use for internet inbound from the dropdown.
111-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/select-ip.png"alt-text="Screenshot showing how to select an IP."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/select-ip.png":::
107+
112108
1. Click **save**.
113-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/save-ip.png"alt-text="Screenshot showing how to save IP."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/save-ip.png":::
114109

115110
### View active inbound security rules using an Internet Inbound Public IP
116111

117112
1. Find the Public IP you want to view and click **View rules**.
118-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/view-rules.png"alt-text="Screenshot showing how to view rules associated to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/view-rules.png":::
119113
1. View the rules associated to the public IP.
120-
:::image type="content" source="./media/virtual-wan-network-virtual-appliance-inbound/rules.png"alt-text="Screenshot showing displayed rules associated to NVA."lightbox="./media/virtual-wan-network-virtual-appliance-inbound/rules.png":::
121-
114+
122115
### Remove Internet Inbound public IP from existing NVA
123116

124117
> [!NOTE]
@@ -138,6 +131,7 @@ The following section contains NVA provider-specific instructions on configuring
138131
|fortinet-ngfw| [Fortinet NGFW documentation](https://aka.ms/fortinetngfwdnat) |
139132

140133
## Troubleshooting
134+
141135
The following section describes some common troubleshooting scenarios.
142136

143137
### Public IP Association/Disassociation
@@ -155,7 +149,7 @@ For more information on Azure Load Balancer health probes, see [health probe doc
155149

156150
The health probes Virtual WAN requires are:
157151

158-
* **Internet Inbound or DNAT health probe**: Used to forward Internet inbound traffic to NVA untrusted/external interfaces. This health probe checks the health of the **untrusted/external** interface of the NVA only.
152+
* **Internet Inbound or DNAT health probe**: Used to forward Internet inbound traffic to NVA untrusted/external interfaces. This health probe checks the health of the **untrusted/external** interface of the NVA only.
159153

160154
|NVA Provider| Port|
161155
|--|--|
@@ -184,14 +178,13 @@ Ensure the NVA is configured to respond to the 3 health probes correctly. Common
184178
### DNAT rule creation
185179

186180
* **DNAT rule creation fails**: Ensure the provisioning state of the NVA is Succeeded and that all NVA instances are healthy. Reference NVA provider documentation for details on how to troubleshoot or contact the vendor for further support.
187-
181+
188182
Additionally, ensure that the NVA is responding to **NVA health probes** on all interfaces. See the [health probes](#healthprobeconfigs) section for more information.
189183

190184
### Datapath
191185

192186
* **NVA doesn't see packets after user initiates connection to Public IP**: Ensure that the NVA is responding to **DNAT health probes** on the **external/untrusted** interface only. See the [health probes](#healthprobeconfigs) section for more information.
193187

194-
195188
* **Destination server doesn't see packets after NVA translation**: consider the following troubleshooting mechanisms if packets aren't being forwarded to the final destination server.
196189
* **Azure Routing issue**: Use Azure Virtual WAN portal to check the effective routes of the defaultRouteTable or the effective routes of your Network Virtual Appliance. You should see the subnet of the destination application in the effective routes.
197190
* **NVA operating system routing issue**: Check the internal routing table of the NVA operating system. You should see routes corresponding to the destination subnets learnt dynamically from the NVA. Make sure there are no route filters/maps that are dropping relevant prefixes.
@@ -204,3 +197,7 @@ Ensure the NVA is configured to respond to the 3 health probes correctly. Common
204197
* **Application hosted on-premises**: Make sure there are no route filters on the on-premises side that filter out routes corresponding to the hub address space. Because the NVA source-NAT's traffic to a Firewall Private IP, the on-premises must accept the hub address space.
205198
* **Application inter-hub**: Inter-hub routing for DNAT use cases aren't supported. Make sure the resource you're trying to access is connected to the same hub as the NVA that has the DNAT rule configured.
206199
* **Packet capture on NVA interface**: Perform packet captures on the NVA trusted interface. You should see the application server send return traffic directly to the NVA instance. Make sure you compare packet captures before and after Firewall rules are applied to ensure packets to ensure proper Firewall rule configuration.
200+
201+
## Next steps
202+
203+
For more information about Virtual WAN, see the [Virtual WAN FAQ](virtual-wan-faq.md)
Binary file not shown.

0 commit comments

Comments
 (0)