Skip to content

Commit 9fa8756

Browse files
authored
1 parent 9289bbf commit 9fa8756

File tree

1 file changed

+14
-5
lines changed

1 file changed

+14
-5
lines changed

articles/route-server/vmware-solution-default-route.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: 'Injecting default route to Azure VMware Solution'
33
description: Learn about how to advertise a default route to Azure VMware Solution with Azure Route Server.
44
services: route-server
5-
author: jomore
5+
author: erjosito
66
ms.service: route-server
77
ms.topic: conceptual
88
ms.date: 02/03/2022
9-
ms.author: jomore
9+
ms.author: erjosito
1010
---
1111

1212
# Injecting a default route to Azure VMware Solution
@@ -26,11 +26,20 @@ Communication between Azure VMware Solution and the on-premises network will typ
2626

2727
## Communication between Azure VMware Solution and the on-premises network via NVA
2828

29-
If not only the Internet traffic should be inspected by the NVA, but also traffic between AVS and the on-premises network instead of being sent over ExpressRoute Global Reach, an additional transit VNet is required to avoid potential routing loops, which would be originated since a single ExpressRoute gateway wouldn't be able to route packets properly (more specifically, the User Defined Routes in the GatewaySubnet can either point to the NVA or to on-premises, but not to both).
29+
There are two main scenarios for this pattern:
3030

31-
An additional NVA would be required in this transit VNet, and both NVAs would exchange the routes they learn from their respective Azure Route Servers via BGP and some sort of encapsulation protocol such as VXLAN or IPsec, as the following diagram shows.
31+
- ExpressRoute Global Reach might not be available on a particular region to interconnect the ExpressRoute circuits of AVS and the on-premises network.
32+
- Some organizations might have the requirement to send traffic between AVS and the on-premises network through an NVA (typically a firewall).
3233

33-
:::image type="content" source="./media/scenarios/vmware-solution-to-on-premises.png" alt-text="Diagram of AVS to on-premises communication with Route Server.":::
34+
If both ExpressRoute circuits (to AVS and to on-premises) are terminated in the same ExpressRoute gateway, you could think that the gateway is going to route packets across them. However, an ExpressRoute gateway is not designed to do that. Instead, you need to hairpin the traffic to a Network Virtual Appliance that is able to route the traffic. To that purpose, the NVA should advertise a superset of the AVS and on-premises prefixes, as the following diagram shows:
35+
36+
:::image type="content" source="./media/scenarios/vmware-solution-to-on-premises-hairpin.png" alt-text="Diagram of AVS to on-premises communication with Route Server in a single region.":::
37+
38+
As the diagram shows, the NVA needs to advertise a more generic (less specific) prefix that both the on-premises network and AVS. You need to be careful with this approach, since the NVA might be potentially attracting traffic that it should not (since it is advertising wider ranges, in the example above the whole `10.0.0.0/8` network).
39+
40+
If two regions are involved, you would need an NVA would in each region, and both NVAs would exchange the routes they learn from their respective Azure Route Servers via BGP and some sort of encapsulation protocol such as VXLAN or IPsec, as the following diagram shows.
41+
42+
:::image type="content" source="./media/scenarios/vmware-solution-to-on-premises.png" alt-text="Diagram of AVS to on-premises communication with Route Server in two regions.":::
3443

3544
The reason why encapsulation is needed is because the NVA NICs would learn the routes from ExpressRoute or from the Route Server, so they would send packets that need to be routed to the other NVA in the wrong direction (potentially creating a routing loop returning the packets to the local NVA).
3645

0 commit comments

Comments
 (0)