Skip to content

Commit be3b45c

Browse files
authored
Merge pull request #114319 from skishen525/patch-32
Update virtual-wan-global-transit-network-architecture.md
2 parents a48252c + 2a71fc4 commit be3b45c

File tree

1 file changed

+29
-1
lines changed

1 file changed

+29
-1
lines changed

articles/virtual-wan/virtual-wan-global-transit-network-architecture.md

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: virtual-wan
99
ms.topic: article
10-
ms.date: 02/06/2020
10+
ms.date: 05/07/2020
1111
ms.author: cherylmc
1212

1313
---
@@ -112,6 +112,15 @@ The Remote User-to-branch path lets remote users who are using a point-to-site c
112112

113113
The VNet-to-VNet transit enables VNets to connect to each other in order to interconnect multi-tier applications that are implemented across multiple VNets. Optionally, you can connect VNets to each other through VNet Peering and this may be suitable for some scenarios where transit via the VWAN hub is not necessary.
114114

115+
116+
## <a name="DefaultRoute"></a>Force Tunneling and Default Route in Azure Virtual WAN
117+
118+
Force Tunneling can be enabled by configuring the enable default route on a VPN, ExpressRoute, or Virtual Network connection in Virtual WAN.
119+
120+
A virtual hub propagates a learned default route to a virtual network/site-to-site VPN/ExpressRoute connection if enable default flag is 'Enabled' on the connection.
121+
122+
This flag is visible when the user edits a virtual network connection, a VPN connection, or an ExpressRoute connection. By default, this flag is disabled when a site or an ExpressRoute circuit is connected to a hub. It is enabled by default when a virtual network connection is added to connect a VNet to a virtual hub. The default route does not originate in the Virtual WAN hub; the default route is propagated if it is already learned by the Virtual WAN hub as a result of deploying a firewall in the hub, or if another connected site has forced-tunneling enabled.
123+
115124
## <a name="security"></a>Security and policy control
116125

117126
The Azure Virtual WAN hubs interconnect all the networking end points across the hybrid network and potentially see all transit network traffic. Virtual WAN hubs can be converted to Secured Virtual Hubs by deploying the Azure Firewall inside VWAN hubs to enable cloud-based security, access, and policy control. Orchestration of Azure Firewalls in virtual WAN hubs can be performed by Azure Firewall Manager.
@@ -139,6 +148,25 @@ The VNet-to-Internet or third-party secured transit enables VNets to connect to
139148
### Branch-to-Internet or third-party Security Service (j)
140149
The branch-to-Internet or third-party Secure transit enables branches to connect to the internet or a supported third-party security services via the Azure Firewall in the virtual WAN hub.
141150

151+
### How do I enable default route (0.0.0.0/0) in a Secured Virtual Hub
152+
153+
Azure Firewall deployed in a Virtual WAN hub (Secure Virtual Hub) can be configured as default router to the Internet or Trusted Security Provider for all branches (connected by VPN or Express Route), spoke Vnets and Users (connected via P2S VPN).
154+
This configuration must be done using Azure Firewall Manager. See Route Traffic to your hub to configure all traffic from branches (including Users) as well as Vnets to Internet via the Azure Firewall.
155+
156+
This is a two step configuration:
157+
158+
1. Configure Internet traffic routing using Secure Virtual Hub Route Setting menu. Configure Vnets and Branches that can send traffic to the internet via the Firewall.
159+
160+
2. Configure which Connections (Vnet and Branch) can route traffic to the internet (0.0.0.0/0) via the Azure FW in the hub or Trusted Security Provider. This step ensures that the default route is propagated to selected branches and Vnets that are attached to the Virtual WAN hub via the Connections.
161+
162+
### Force Tunneling Traffic to On-Premises Firewall in a Secured Virtual Hub
163+
164+
If there is already a default route learned (via BGP) by the Virtual Hub from one of the Branches (VPN or ER sites), this default route is overridden by the default route learned from Azure Firewall Manager setting. In this case, all traffic that is entering the hub from Vnets and branches destined to internet, will be routed to the Azure Firewall or Trusted Security Provider.
165+
166+
> [!NOTE]
167+
> Currently there is no option to select on-premises Firewall or Azure Firewall (and Trusted Security Provider) for internet bound traffic originating from Vnets, Branches or Users. The default route learned from the Azure Firewall Manager setting is always preferred over the default route learned from one of the branches.
168+
169+
142170
## Next steps
143171

144172
Create a connection using Virtual WAN and Deploy Azure Firewall in VWAN hub(s).

0 commit comments

Comments
 (0)