Skip to content

Commit f910209

Browse files
adstuartvhorne
andauthored
Update articles/firewall/forced-tunneling.md
yes the important point is to capture that you do not have the choice to deploy or not deploy in forced tunnel mode, when putting azfw in vwan Co-authored-by: Vic <[email protected]>
1 parent aebc7ab commit f910209

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/firewall/forced-tunneling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ When you configure a new Azure Firewall, you can route all Internet-bound traffi
1616
Azure Firewall provides automatic SNAT for all outbound traffic to public IP addresses. Azure Firewall doesn’t SNAT when the destination IP address is a private IP address range per IANA RFC 1918. This logic works perfectly when you egress directly to the Internet. However, with forced tunneling enabled, Internet-bound traffic is SNATed to one of the firewall private IP addresses in the AzureFirewallSubnet. This hides the source address from your on-premises firewall. You can configure Azure Firewall to not SNAT regardless of the destination IP address by adding *0.0.0.0/0* as your private IP address range. With this configuration, Azure Firewall can never egress directly to the Internet. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
1717

1818
> [!IMPORTANT]
19-
> If you deploy Azure Firewall inside of a Virtual WAN Hub (Secured Virtual Hub), please note that advertising the default route over Express Route or VPN Gateway is not currently supported. A fix is being investigated.
19+
> If you deploy Azure Firewall inside of a Virtual WAN Hub (Secured Virtual Hub), advertising the default route over Express Route or VPN Gateway is not currently supported. A fix is being investigated.
2020
2121
## Forced tunneling configuration
2222

0 commit comments

Comments
 (0)