Skip to content

Commit 7f0a418

Browse files
Merge pull request #268954 from halkazwini/rs-spoke
Freshness
2 parents 6e1ec64 + d95368b commit 7f0a418

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/route-server/route-injection-in-spokes.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Default route injection in spoke virtual networks
33
titleSuffix: Azure Route Server
4-
description: Learn about how Azure Route Server injects routes in virtual networks (VNets).
5-
services: route-server
4+
description: Learn how Azure Route Server injects routes in virtual networks (VNets) in different topologies.
65
author: halkazwini
7-
ms.service: route-server
8-
ms.topic: conceptual
9-
ms.date: 03/29/2023
106
ms.author: halkazwini
11-
ms.custom: template-concept, engagement-fy23
7+
ms.service: route-server
8+
ms.topic: concept-article
9+
ms.date: 03/13/2024
10+
11+
#CustomerIntent: As an Azure administrator, I want to use Azure Route Server so it dynamically injects routes in spoke virtual networks (VNets).
1212
---
1313

1414
# Default route injection in spoke virtual networks
@@ -62,7 +62,7 @@ The Azure Firewall subnet learns the routes coming from both ExpressRoute and th
6262

6363
## Traffic symmetry
6464

65-
If multiple NVA instances are used in active/active scenario for better resiliency or scalability, traffic symmetry will be a requirement if the NVAs need to keep the state of the connections. This is, for example, the case of Next Generation Firewalls.
65+
If multiple NVA instances are used in active/active scenario for better resiliency or scalability, traffic symmetry is a requirement if the NVAs need to keep the state of the connections. This is, for example, the case of Next Generation Firewalls.
6666

6767
- For connectivity from the Azure virtual machines to the public internet, the NVA uses source network address translation (SNAT) so that the egress traffic will be sourced from the NVA's public IP address, hence achieving traffic symmetry.
6868
- For inbound traffic from the internet to workloads running in virtual machines, additional to destination network address translation (DNAT), the NVAs will require to do source network address translation (SNAT), to make sure that the return traffic from the virtual machines lands at the same NVA instance that processed the first packet.
@@ -91,13 +91,13 @@ The next hop for the `0.0.0.0/0` route is the NVA, so the spoke VNets still need
9191

9292
If traffic from ExpressRoute to the spoke VNets is to be sent to a firewall NVA for inspection, a route table in the GatewaySubnet is still required, otherwise the ExpressRoute virtual network gateway will send packets to the virtual machines using the routes learnt from VNet peering. The routes in this route table should match the spoke prefixes, and the next hop should be the IP address of the firewall NVA (or the load balancer in front of the firewall NVAs, for redundancy). The firewall NVA can be the same as the SDWAN NVA in the diagram above, or it can be a different device such as Azure Firewall, since the SDWAN NVA can advertise routes with the next-hop pointing to other IP addresses. The following diagram shows this design with the addition of Azure Firewall:
9393

94-
:::image type="content" source="./media/scenarios/route-injection-split-route-server-with-firewall.png" alt-text="Diagram showing a basic hub and spoke topology with on-premises connectivity via ExpressRoute, an Azure Firewall and two Route Servers.":::
94+
:::image type="content" source="./media/scenarios/route-injection-split-route-server-with-firewall.png" alt-text="Diagram showing a basic hub and spoke topology with on-premises connectivity via ExpressRoute, an Azure Firewall, and two Route Servers.":::
9595

9696
This design allows automatic injection of routes in spoke VNets without interference from other routes learned from ExpressRoute, VPN or an SDWAN environment, and the addition of firewall NVAs for traffic inspection.
9797

98-
## Next steps
98+
## Related content
9999

100-
* Learn more about [Azure Route Server support for ExpressRoute and Azure VPN](expressroute-vpn-support.md)
101-
* Learn how to [Configure peering between Azure Route Server and Network Virtual Appliance](tutorial-configure-route-server-with-quagga.md)
100+
- Learn more about [Azure Route Server support for ExpressRoute and Azure VPN](expressroute-vpn-support.md).
101+
- Learn how to [Configure peering between Azure Route Server and Network Virtual Appliance](tutorial-configure-route-server-with-quagga.md).
102102

103103

0 commit comments

Comments
 (0)