|
1 | 1 | ---
|
2 | 2 | title: Default route injection in spoke virtual networks
|
3 | 3 | titleSuffix: Azure Route Server
|
4 |
| -description: Learn about how Azure Route Server injects routes in virtual networks (VNets). |
5 |
| -services: route-server |
| 4 | +description: Learn how Azure Route Server injects routes in virtual networks (VNets) in different topologies. |
6 | 5 | author: halkazwini
|
7 |
| -ms.service: route-server |
8 |
| -ms.topic: conceptual |
9 |
| -ms.date: 03/29/2023 |
10 | 6 | ms.author: halkazwini
|
11 |
| -ms.custom: template-concept, engagement-fy23 |
| 7 | +ms.service: route-server |
| 8 | +ms.topic: concept-article |
| 9 | +ms.date: 03/13/2024 |
| 10 | + |
| 11 | +#CustomerIntent: As an Azure administrator, I want to use Azure Route Server so it dynamically injects routes in spoke virtual networks (VNets). |
12 | 12 | ---
|
13 | 13 |
|
14 | 14 | # Default route injection in spoke virtual networks
|
@@ -62,7 +62,7 @@ The Azure Firewall subnet learns the routes coming from both ExpressRoute and th
|
62 | 62 |
|
63 | 63 | ## Traffic symmetry
|
64 | 64 |
|
65 |
| -If multiple NVA instances are used in active/active scenario for better resiliency or scalability, traffic symmetry will be a requirement if the NVAs need to keep the state of the connections. This is, for example, the case of Next Generation Firewalls. |
| 65 | +If multiple NVA instances are used in active/active scenario for better resiliency or scalability, traffic symmetry is a requirement if the NVAs need to keep the state of the connections. This is, for example, the case of Next Generation Firewalls. |
66 | 66 |
|
67 | 67 | - For connectivity from the Azure virtual machines to the public internet, the NVA uses source network address translation (SNAT) so that the egress traffic will be sourced from the NVA's public IP address, hence achieving traffic symmetry.
|
68 | 68 | - For inbound traffic from the internet to workloads running in virtual machines, additional to destination network address translation (DNAT), the NVAs will require to do source network address translation (SNAT), to make sure that the return traffic from the virtual machines lands at the same NVA instance that processed the first packet.
|
@@ -91,13 +91,13 @@ The next hop for the `0.0.0.0/0` route is the NVA, so the spoke VNets still need
|
91 | 91 |
|
92 | 92 | If traffic from ExpressRoute to the spoke VNets is to be sent to a firewall NVA for inspection, a route table in the GatewaySubnet is still required, otherwise the ExpressRoute virtual network gateway will send packets to the virtual machines using the routes learnt from VNet peering. The routes in this route table should match the spoke prefixes, and the next hop should be the IP address of the firewall NVA (or the load balancer in front of the firewall NVAs, for redundancy). The firewall NVA can be the same as the SDWAN NVA in the diagram above, or it can be a different device such as Azure Firewall, since the SDWAN NVA can advertise routes with the next-hop pointing to other IP addresses. The following diagram shows this design with the addition of Azure Firewall:
|
93 | 93 |
|
94 |
| -:::image type="content" source="./media/scenarios/route-injection-split-route-server-with-firewall.png" alt-text="Diagram showing a basic hub and spoke topology with on-premises connectivity via ExpressRoute, an Azure Firewall and two Route Servers."::: |
| 94 | +:::image type="content" source="./media/scenarios/route-injection-split-route-server-with-firewall.png" alt-text="Diagram showing a basic hub and spoke topology with on-premises connectivity via ExpressRoute, an Azure Firewall, and two Route Servers."::: |
95 | 95 |
|
96 | 96 | This design allows automatic injection of routes in spoke VNets without interference from other routes learned from ExpressRoute, VPN or an SDWAN environment, and the addition of firewall NVAs for traffic inspection.
|
97 | 97 |
|
98 |
| -## Next steps |
| 98 | +## Related content |
99 | 99 |
|
100 |
| -* Learn more about [Azure Route Server support for ExpressRoute and Azure VPN](expressroute-vpn-support.md) |
101 |
| -* Learn how to [Configure peering between Azure Route Server and Network Virtual Appliance](tutorial-configure-route-server-with-quagga.md) |
| 100 | +- Learn more about [Azure Route Server support for ExpressRoute and Azure VPN](expressroute-vpn-support.md). |
| 101 | +- Learn how to [Configure peering between Azure Route Server and Network Virtual Appliance](tutorial-configure-route-server-with-quagga.md). |
102 | 102 |
|
103 | 103 |
|
0 commit comments