Skip to content

Commit 9094bae

Browse files
Merge pull request #245349 from wtnlee/riupdate
added clarifiations
2 parents 3a2493d + c459482 commit 9094bae

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

articles/virtual-wan/how-to-routing-policies.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.author: wellee
1111
---
1212
# How to configure Virtual WAN Hub routing intent and routing policies
1313

14-
15-
1614
Virtual WAN Hub routing intent allows you to set up simple and declarative routing policies to send traffic to bump-in-the-wire security solutions like Azure Firewall, Network Virtual Appliances or software-as-a-service (SaaS) solutions deployed within the Virtual WAN hub.
1715

1816
## Background
@@ -227,6 +225,9 @@ Connectivity across ExpressRoute circuits via a Firewall appliance in the hub is
227225

228226
#### Routing considerations with ExpressRoute
229227

228+
> [!NOTE]
229+
> The routing considerations below apply to all Virtual hubs in the subscription(s) that are enabled by Microsoft Support to allow ExpressRoute to ExpressRoute connectivity via a security appliance in the hub.
230+
230231
After transit connectivity across ExpressRoute circuits using a firewall appliance deployed in the Virtual Hub is enabled, you can expect the following changes in behavior in how routes are advertised to ExpressRoute on-premises:
231232
* Virtual WAN automatically advertises RFC1918 aggregate prefixes (10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12) to the ExpressRoute-connected on-premises. These aggregate routes are advertised in addition to the routes described in the previous section.
232233
* Virtual WAN automatically advertises all static routes in the defaultRouteTable to ExpressRoute circuit-connected on-premises. This means Virtual WAN advertises the routes specified in the private traffic prefix text box to on-premises.
@@ -339,9 +340,7 @@ The following steps describe how to configure routing intent and routing policie
339340

340341
:::image type="content" source="./media/routing-policies/routing-policies-private-nva.png"alt-text="Screenshot showing how to configure NVA private routing policies."lightbox="./media/routing-policies/routing-policies-private-nva.png":::
341342

342-
4. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**.
343-
344-
343+
4. If you want to configure a Private Traffic Routing Policy and have branches or virtual networks using non-IANA RFC1918 Prefixes, select **Additional Prefixes** and specify the non-IANA RFC1918 prefix ranges in the text box that comes up. Select **Done**. Make sure you add the same prefix to the Private Traffic prefix text box in all Virtual Hubs configured with Private Routing Policies to ensure the correct routes are advertised to all hubs.
345344

346345
:::image type="content" source="./media/routing-policies/private-prefixes-nva.png"alt-text="Screenshot showing how to configure additional private prefixes for NVA routing policies."lightbox="./media/routing-policies/private-prefixes-nva.png":::
347346

@@ -400,15 +399,15 @@ Assuming you have already reviewed the [Known Limitations](#knownlimitations) s
400399
### Troubleshooting Azure Firewall routing issues
401400

402401
* Make sure the provisioning state of the Azure Firewall is **succeeded** before trying to configure routing intent.
403-
* If you're using non-[IANA RFC1918](https://datatracker.ietf.org/doc/html/rfc1918) prefixes in your branches/Virtual Networks, make sure you have specified those prefixes in the "Private Prefixes" text box.
402+
* If you're using non-[IANA RFC1918](https://datatracker.ietf.org/doc/html/rfc1918) prefixes in your branches/Virtual Networks, make sure you have specified those prefixes in the "Private Prefixes" text box. Note that the configured "Private Prefixes" do not propagate automatically to other hubs in the Virtual WAN that was configured with routing intent. To ensure connectivity, add these prefixes to the "Private Prefixes" textbox in every single hub that has routing intent.
404403
* If you have specified non RFC1918 addresses as part of the **Private Traffic Prefixes** text box in Firewall Manager, you may need to configure SNAT policies on your Firewall to disable SNAT for non-RFC1918 private traffic. For more information, reference [Azure Firewall SNAT ranges](../firewall/snat-private-range.md).
405404
* Configure and view Azure Firewall logs to help troubleshoot and analyze your network traffic. For more information on how to set-up monitoring for Azure Firewall, reference [Azure Firewall diagnostics](../firewall/firewall-diagnostics.md). For an overview of the different types of Firewall logs, see [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
406405
* For more information on Azure Firewall, review [Azure Firewall Documentation](../firewall/overview.md).
407406

408407
### Troubleshooting Network Virtual Appliances
409408

410409
* Make sure the provisioning state of the Network Virtual Appliance is **succeeded** before trying to configure routing intent.
411-
* If you're using non [IANA RFC1918](https://datatracker.ietf.org/doc/html/rfc1918) prefixes in your connected on-premises or Virtual Networks, make sure you have specified those prefixes in the "Private Prefixes" text box.
410+
* If you're using non [IANA RFC1918](https://datatracker.ietf.org/doc/html/rfc1918) prefixes in your connected on-premises or Virtual Networks, make sure you have specified those prefixes in the "Private Prefixes" text box. Note that the configured "Private Prefixes" do not propagate automatically to other hubs in the Virtual WAN that was configured with routing intent. To ensure connectivity, add these prefixes to the "Private Prefixes" textbox in every single hub that has routing intent.
412411
* If you have specified non RFC1918 addresses as part of the **Private Traffic Prefixes** text box, you may need to configure SNAT policies on your NVA to disable SNAT for certain non-RFC1918 private traffic.
413412
* Check NVA Firewall logs to see if traffic is being dropped or denied by your Firewall rules.
414413
* Reach out to your NVA provider for more support and guidance on troubleshooting.

0 commit comments

Comments
 (0)