Skip to content

Commit 83cd10e

Browse files
committed
modified TOC
1 parent efd6055 commit 83cd10e

File tree

2 files changed

+49
-12
lines changed

2 files changed

+49
-12
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,8 +136,12 @@
136136
items:
137137
- name: Upgrade from Basic to Standard
138138
href: upgrade-virtual-wan.md
139-
- name: Create an NVA in a virtual hub
140-
href: How-to-nva-hub.md
139+
- name: Integrated NVA in a virtual hub
140+
items:
141+
- name: Create a NVA in a virtual hub
142+
href: how-to-nva-hub.md
143+
- name: Configure DNAT/Internet inbound
144+
href: how-to-nva-destination-nat.md
141145
- name: Connect a VNet to a virtual hub
142146
items:
143147
- name: Azure portal

articles/virtual-wan/how-to-nva-destination-nat.md

Lines changed: 43 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ Infrastructure management and programming for the DNAT use case in Virtual WAN i
2525
## Concepts
2626

2727
To enable the DNAT use case associate one or more Azure Public IP address resources to the Network Virtual Appliance resource. These IPs are called **internet inbound** or **internet ingress** IP addresses and are the target IP addresses users initiate connection requests to in order to access applications behind the NVA. After you configure a DNAT rule on the Network Virtual Appliance orchestrator and management software (see partner guide), the NVA management software automatically:
28-
* Programs NVA device software running in Virtual WAN to inspect and translate the corresponding traffic (set-up NAT rules and Firewall rules on NVA device). The rules that are programmed on the NVA are called **NVA DNAT rules**.
29-
* Interacts with Azure APIs to create and update **inbound security rules**. Virtual WAN control plane processes inbound security rules and programs Virtual WAN and Azure-managed NVA infrastructure components to support Destination NAT use case.
3028

29+
* Programs NVA device software running in Virtual WAN to inspect and translate the corresponding traffic (set-up NAT rules and Firewall rules on NVA device). The rules that are programmed on the NVA are called **NVA DNAT rules**.
30+
* Interacts with Azure APIs to create and update **inbound security rules**. Virtual WAN control plane processes inbound security rules and programs Virtual WAN and Azure-managed NVA infrastructure components to support Destination NAT use case.
3131

3232
### Example
3333

@@ -46,8 +46,8 @@ The following configurations are performed:
4646
The list below corresponds to the diagram above and describes the packet flow for the inbound connection:
4747

4848
1. The user initiates a connection with one of the Public IPs used for DNAT associated to the NVA.
49-
1. Azure load balances the connection request to one of the Firewall NVA instances.
50-
1. NVA inspects the traffic and translates the packet based on rule configuration. In this case, the NVA is configured to NAT and forward inbound traffic to 10.60.0.4:443. The source of the packet is also translated to the private IP of the chosen Firewall instance to ensure flow symmetry. The NVA forwards the packet and Virtual WAN routes the packet to the final destination.
49+
1. Azure load balances the connection request to one of the Firewall NVA instances. Traffic is sent to the external/untrusted interface of the NVA.
50+
1. NVA inspects the traffic and translates the packet based on rule configuration. In this case, the NVA is configured to NAT and forward inbound traffic to 10.60.0.4:443. The source of the packet is also translated to the private IP (IP of trusted/internal interface) of the chosen Firewall instance to ensure flow symmetry. The NVA forwards the packet and Virtual WAN routes the packet to the final destination.
5151

5252
#### Outbound traffic flow
5353
:::image type="content" source="./media/virtual-wan-nva-dnat/dnat-example-outbound-flow.png"alt-text="Screenshot showing outbound traffic flow."lightbox="./media/virtual-wan-nva-dnat/dnat-example-outbound-flow.png":::
@@ -74,7 +74,7 @@ The list below corresponds to the diagram above and describes the packet flow fo
7474

7575
* Inbound Traffic is automatically load-balanced across all healthy instances of the Network Virtual Appliance.
7676
* In most cases, NVAs must perform source-NAT to the Firewall private IP in addition to destination-NAT to ensure flow symmetry. Certain NVA types may not require source-NAT. Contact your NVA provider for best practices around source-NAT.
77-
* Timeout for DNAT flows is automatically set to ___ seconds.
77+
* Timeout for idle flows is automatically set to 4 minutes.
7878
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.
7979

8080
## Managing DNAT/Internet Inbound configurations
@@ -131,17 +131,50 @@ The following section describes some common troubleshooting scenarios.
131131
* **Can't delete/disassociate Public IP from NVA**: Only IP addresses that have no rules associated with them can be deleted. Use the NVA orchestration software to remove any DNAT rules associated to that IP address.
132132
* **NVA provisioning state not succeeded**: If there are on-going operations on the NVA or if the provisioning status of the NVA is **not successful**, IP address association fails. Wait for any existing operations to terminate.
133133

134+
### <a name="healthprobeconfigs"></a> Load balancer health probes
135+
136+
NVA with internet inbound/DNAT capabilities relies on the NVA responding to three different Azure Load Balancer health probes to ensure the NVA is functioning as expected and route traffic. Health probe requests are always made from the nonpublically routable Azure IP Address [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). You should see a three-way TCP handshake performed with 168.63.129.16 in your NVA logs.
137+
138+
For more information on Azure Load Balancer health probes, see [health probe documentation](../load-balancer/load-balancer-custom-probe-overview.md).
139+
140+
The health probes Virtual WAN requires are:
141+
142+
* **Internet Inbound or DNAT health probe**: Used to forward Internet inbound traffic to NVA untrusted/external interfaces. This health probe checks the health of the **untrusted/external** interface of the NVA only.
143+
144+
|NVA Provider| Port|
145+
|--|--|
146+
|fortinet|8008|
147+
|checkpoint| 8118|
148+
149+
* **Datapath health probe**: Used to forward private (VNET/on-premises) traffic to NVA **trusted/internal** interfaces. Required for private routing policies. This health probe checks the health of the **trusted/internal** interface of the NVA only.
150+
151+
|NVA Provider| Port|
152+
|--|--|
153+
|fortinet|8008|
154+
|checkpoint| 8117|
155+
156+
* **NVA health probe**: Used to determine the health of the Virtual Machine Scale Set running the NVA software. This health probe checks the health of all interfaces of the NVA (both **untrusted/external** and **trusted/internal**).
157+
158+
|NVA Provider| Port|
159+
|--|--|
160+
|fortinet|8008|
161+
|checkpoint| 8117|
162+
163+
Ensure the NVA is configured to respond to the 3 health probes correctly. Common issues include:
164+
* Health probe response set to an incorrect port.
165+
* Health probe response incorrectly set on only the internal/trusted interface.
166+
* Firewall rules preventing health probe response.
167+
134168
### DNAT rule creation
135169

136170
* **DNAT rule creation fails**: Ensure the provisioning state of the NVA is Succeeded and that all NVA instances are healthy. Reference NVA provider documentation for details on how to troubleshoot or contact the vendor for further support.
137171

172+
Additionally, ensure that the NVA is responding to **NVA health probes** on all interfaces. See the [health probes](#healthprobeconfigs) section for more information.
173+
138174
### Datapath
139-
* **NVA doesn't see packets after user initiates connection to Public IP**: Ensure the NVA is responding to Load Balancer health probes on the external interface of the NVA. Health probe requests are made from the nonpublically routable Azure IP address [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). You should see a three-way TCP handshake performed with 168.63.129.16. The port of the handshake depends on your provider.
140175

141-
|NVA Provider| Port|
142-
|--|--|
143-
|fortinet|8008|
144-
|checkpoint| placeholderport|
176+
* **NVA doesn't see packets after user initiates connection to Public IP**: Ensure that the NVA is responding to **DNAT health probes** on the **external/untrusted** interface only. See the [health probes](#healthprobeconfigs) section for more information.
177+
145178

146179
* **Destination server doesn't see packets after NVA translation**: consider the following troubleshooting mechanisms if packets aren't being forwarded to the final destination server.
147180
* **Azure Routing issue**: Use Azure Virtual WAN portal to check the effective routes of the defaultRouteTable or the effective routes of your Network Virtual Appliance. You should see the subnet of the destination application in the effective routes.

0 commit comments

Comments
 (0)