You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/about-internet-routing.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,22 +35,21 @@ The following table shows the availability status of securing Internet access wi
35
35
| Security solution |Status|
36
36
|--|--|
37
37
|Azure Firewall |Generally Available in Azure Public and Azure Government Clouds.|
38
-
|Firewall NVA in the Virtual WAN hub| Generally Available in Azure Public Cloud|
39
-
| Software-as-a-service in the Virtual WAN Hub| Generally Available in Azure Public Cloud|
38
+
|Firewall NVA in the Virtual WAN hub| Generally Available in regions where [Network Virtual Appliances](about-nva-hub.md#regions) are available.|
39
+
| Software-as-a-service in the Virtual WAN Hub|Generally Avaialble in regions where [Palo Alto Cloud NGFW is available](https://docs.paloaltonetworks.com/cloud-ngfw-azure/reference/cloud-ngfw-for-azure-supported-regions-and-zones).|
40
40
41
41
### Forced tunnel
42
42
43
43
The following table shows the availability status of securing Internet access with **forced tunneling** by configuring private routing policy.
44
44
45
-
46
45
>[!IMPORTANT]
47
-
> Configuring Virtual WAN hubs in forced tunnel mode is being progressively deployed to all Azure regions. The current list of available regions are: Australia Central, Brazil South, Central India, East Asia, East US, India West, Korea Central, Malaysia South, Malaysia West, Qatar Central, UK South, and West Central US. If you have any questions regarding region availability, contact [email protected] or your Microsoft account team.
46
+
> Configuring Virtual WAN hubs in forced tunnel mode is deployed to Azure Public. Deployment is underway for Azure Government. If you have any questions regarding region availability, contact [email protected] or your Microsoft account team.
48
47
49
48
Security solution |Status|
50
49
|--|--|
51
-
|Azure Firewall |Generally Available in select Azure regions (see note above).|
52
-
|Firewall NVA in the Virtual WAN hub| Public Preview in select Azure regions (see note above). |
53
-
| Software-as-a-service in the Virtual WAN Hub| Public Preview in select Azure regions (see note above).|
50
+
|Azure Firewall |Generally Available in Azure Public.|
51
+
|Firewall NVA in the Virtual WAN hub| Public Preview in regions where [Network Virtual Appliances](about-nva-hub.md#regions) are available.|
52
+
| Software-as-a-service in the Virtual WAN Hub| Public Preview in regions where [Palo Alto Cloud NGFW is available](https://docs.paloaltonetworks.com/cloud-ngfw-azure/reference/cloud-ngfw-for-azure-supported-regions-and-zones).|
54
53
55
54
### Known Limitations
56
55
@@ -59,7 +58,7 @@ The following table shows the availability status of securing Internet access wi
59
58
* Destination-NAT (DNAT) for security solutions deployed in the Virtual WAN hub is **not supported** for Virtual WAN hubs that are configured with Forced Tunnel internet routing mode. The incoming connection for DNAT traffic originates from the Internet. However, forced tunnel mode forces return traffic via on-premises or an NVA. This routing pattern results in asymmetric routing.
60
59
* Traffic from on-premises destined for the public IP address of an Azure storage account deployed in the same Azure region as the Virtual WAN hub bypasses security solution in the hub. For more details on issue, see [Virtual WAN known issues](whats-new.md#knownissues).
61
60
* On-premises **can't** advertise forced tunnel routes more specific that 0.0.0.0/0. Advertising more specific routes like 0.0.0.0/1 and 128.0.0.0/1 from on-premises may blackhole in management traffic for Azure Firewall or NVAs integrated in the Virtual Hub.
62
-
* When a 0.0.0.0/0 route is configured as a static route on a Virtual Network connection, the **bypass next hop setting** that is configured on the Virtual Network connection is ignored and is will be considered by Virtual WAN as **bypass/equals**. This means that that traffic destined for IP addresses within Virtual Network connection with the configured 0.0.0.0/0 static route will be inspected by the security appliance in the Virtual Hub and routed directly to the destination IP in the spoke Virtual Network. Traffic will **bypass** the next hop IP configured in the static route. For a detaield example of this routing behavior, see **traffic behavior With Bypass Next Hop IP Enabled** in the [bypass next hop IP](howto-connect-vnet-hub.md#bypassexplained) document.
61
+
* When a 0.0.0.0/0 route is configured as a static route on a Virtual Network connection, the **bypass next hop setting** that is configured on the Virtual Network connection is ignored and considered to be set to **bypass/equals**. This means that that traffic destined for IP addresses within Virtual Network connection with the configured 0.0.0.0/0 static route will be inspected by the security appliance in the Virtual Hub and routed directly to the destination IP in the spoke Virtual Network. Traffic will **bypass** the next hop IP configured in the static route. For a detailed example of this routing behavior, see **traffic behavior with Bypass Next Hop IP enabled** in the [bypass next hop IP](howto-connect-vnet-hub.md#bypassexplained) document.
63
62
* The default route learned from ExpressRoute can't be advertised to another ExpressRoute circuit. This means you can't configure Virtual WAN to route Internet traffic from one ExpressRoute circuit to another ExpressRoute circuit for egress.
64
63
* If there is no 0.0.0.0/0 route learnt from on-premises or a static route configured to point to a NVA in a spoke Network, the effective routes on the security solution incorrectly displays 0.0.0.0/0 with next hop Internet. As Internet-traffic is not forwarded to the security solution in the hub when forced tunnel mode is configured without an explicit 0.0.0.0/0 learnt from on-premises or configured as a static route, effective routes should **not** contain a 0.0.0.0/0 route.
Copy file name to clipboardExpand all lines: articles/virtual-wan/how-to-routing-policies.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,9 +107,9 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
107
107
108
108
* Routing Intent simplifies routing by managing route table associations and propagations for all connections (Virtual Network, Site-to-site VPN, Point-to-site VPN, and ExpressRoute). Virtual WANs with custom route tables and customized policies therefore can't be used with the Routing Intent constructs.
109
109
* Encrypted ExpressRoute (Site-to-site VPN tunnels running over ExpressRoute circuits) is supported in hubs where routing intent is configured if Azure Firewall is configured to allow traffic between VPN tunnel endpoints (Site-to-site VPN Gateway private IP and on-premises VPN device private IP). For more information on the required configurations, see [Encrypted ExpressRoute with routing intent](#encryptedER).
110
+
* For deployments where static routes are specified on a Virtual Network connection with **proagate static routes enabled**, the **bypass next hop setting** that is configured on the Virtual Network connection is ignored and is considered to be set to **bypass/equals**. This means that if the connected Virtual Network address space (corresponding to the connection with the configured static route) is a subnet within the configured static route on the Virtual Network connection, traffic destined for the Virtual Network will be inspected by the security appliance in the Virtual Hub and routed **directly** to the destination IP in the spoke Virtual Network. Traffic will **bypass** the next hop IP configured in the static route. For a detailed example of this routing behavior, see **traffic behavior with Bypass Next Hop IP enabled** in the [bypass next hop IP](howto-connect-vnet-hub.md#bypassexplained) document.
110
111
* The following connectivity use cases are **not** supported with Routing Intent:
111
-
* Static routes in the defaultRouteTable that point to a Virtual Network connection can't be used in conjunction with routing intent. However, you can use the [BGP peering feature](scenario-bgp-peering-hub.md).
112
-
* Static routes on the Virtual Network connection with "static route propagation" aren't applied to the next-hop resource specified in private routing policies. Support for applying static routes on Virtual Network connections to private routing policy next-hop is on the roadmap.
112
+
* Static routes in the defaultRouteTable that point to a Virtual Network connection can't be used in conjunction with routing intent. Instead of using static routes on the defaultRouteTable, you you can use the [BGP peering feature](scenario-bgp-peering-hub.md) or apply static routes on the Virtual Network connection with "static route propagation" enabled. Routes learnt via BGP or specified as a static route on a Virtual Network connection **are applied** to the next-hop resource specified in private routing policies.
113
113
* The ability to deploy both an SD-WAN connectivity NVA and a separate Firewall NVA or SaaS solution in the **same** Virtual WAN hub is currently in the road-map. Once routing intent is configured with next hop SaaS solution or Firewall NVA, connectivity between the SD-WAN NVA and Azure is impacted. Instead, deploy the SD-WAN NVA and Firewall NVA or SaaS solution in different Virtual Hubs. Alternatively, you can also deploy the SD-WAN NVA in a spoke Virtual Network connected to the hub and leverage the virtual hub [BGP peering](scenario-bgp-peering-hub.md) capability.
114
114
* Network Virtual Appliances (NVAs) can only be specified as the next hop resource for routing intent if they're Next-Generation Firewall or dual-role Next-Generation Firewall and SD-WAN NVAs. Currently, **checkpoint**, **fortinet-ngfw**, **fortinet-ngfw-and-sdwan** and **cisco-tdv-vwan-nva** are the only NVAs eligible to be configured to be the next hop for routing intent. If you attempt to specify another NVA, Routing Intent creation fails. You can check the type of the NVA by navigating to your Virtual Hub -> Network Virtual Appliances and then looking at the **Vendor** field. [**Palo Alto Networks Cloud NGFW**](how-to-palo-alto-cloud-ngfw.md) is also supported as the next hop for Routing Intent, but is considered a next hop of type **SaaS solution**.
115
115
* Routing Intent users who want to connect multiple ExpressRoute circuits to Virtual WAN and want to send traffic between them via a security solution deployed in the hub can enable open up a support case to enable this use case. Reference [enabling connectivity across ExpressRoute circuits](#expressroute) for more information.
Copy file name to clipboardExpand all lines: articles/virtual-wan/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ You can also find the latest Azure Virtual WAN updates and subscribe to the RSS
27
27
28
28
| Type |Area |Name |Description | Date added | Limitations |
29
29
| --- |---|---|---|---|---|
30
-
| Feature| Routing| Forced tunnel| November 2025| Forced tunnel gives additional flexibility when routing internet traffic via security solutions deployed in the Virtual WAN hub. Forced tunnel mode allows customers who use routing intent to first inspect internet-bound traffic via a security solution deployed in the hub and then forward inspected traffic via a dynamically learnt 0.0.0.0/0 route learnt from on-premises or Network Virtual Appliance, or a static route configured on a Virtual WAN spoke Virtual Network connection. For more information on supported internet access patterns in Virtual WAN, see [about internet routing in Virtual WAN](about-internet-routing.md)| See [internet routing in Virtual WAN](about-internet-routing.md) for limitations as well as region restrictions. |
30
+
| Feature| Routing| Forced tunnel| November 2025| Forced tunnel gives additional flexibility when routing internet traffic via security solutions deployed in the Virtual WAN hub. Forced tunnel mode allows customers who use routing intent to first inspect internet-bound traffic via a security solution deployed in the hub and then forward inspected traffic via a dynamically learnt 0.0.0.0/0 route learnt from on-premises or Network Virtual Appliance, or a static route configured on a Virtual WAN spoke Virtual Network connection. For more information on supported internet access patterns in Virtual WAN, see [about internet routing in Virtual WAN](about-internet-routing.md)| See [internet routing in Virtual WAN](about-internet-routing.md) for more information regarding limitation and availability. |
31
31
| Feature | Routing | Route-maps | General Availability of Route-maps. Route-maps is a feature that gives you the ability to control route advertisements and routing for Virtual WAN virtual hubs. | April 2025|[Known limitations](route-maps-about.md#considerations-and-limitations)|
32
32
| Metric| Routing | [New Virtual hub metrics](monitor-virtual-wan-reference.md#hub-router-metrics)| There are now two new Virtual WAN hub metrics that display the virtual hub's capacity and spoke Virtual Machine (VM) utilization: **Routing Infrastructure Units** and **Spoke VM Utilization**.| August 2024 | The **Spoke VM Utilization** metric represents an approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support.
33
33
| Feature| Routing |[Routing intent](how-to-routing-policies.md)| Routing intent is the mechanism through which you can configure Virtual WAN to send private or internet traffic via a security solution deployed in the hub.|May 2023|Routing Intent is Generally Available in Azure public cloud. See documentation for [other limitations](how-to-routing-policies.md#knownlimitations).|
0 commit comments