09-10-2021 07:22 AM
We've deployed an FTDv in Azure which appears to be working okay and has internet access through the associated Azure public IP on the outside interface.
The VM's only seem to work when the default routes are supplied via Azure and use the Azure Internet.
As soon as we set a UDR on the Azure server subnet e.g 0.0.0.0/0 next hop NGFW- 10.150.4.4 all of the traffic on the server subnet (10.150.5.0/24) stops and we lose access to the servers until we take out the UDR and let the traffic route through the Azure internet route again.
Not sure where this is going wrong? I would have though an Azure UDR forcing all of the server traffic to the inside interface of the NGFW would work?
Just for info, the servers can ping the FTDv inside interface and vice versa even when the UDR is in place.
09-14-2021 01:40 PM
Hard to tell without getting more info and probably best to reach out to TAC. But a few things to check:
1. NAT
2. Routing on FTD (E.g. does FTD know where to route for the .5 subnet)
3. Access Control Policy
Thank you for rating helpful posts!
09-14-2021 11:11 PM
09-15-2021 12:04 AM
Hi All,
Traffic to the .5 subnet was routed correctly, we could ping the inside interface of the FTD from the Azure VM's and vice versa.
The NAT rules to be honest there was just the single dynamic rule translating any inside address to the outside interface which should have been fine to get internet access for the VM's, there weren't any VPN's at this stage.
We believe the problem was likely on the Azure user defined routes side of things but as this is a proof of concept we dont have Cisco or Microsoft support using demo licenses.
As we ran out of time trying to get the vFTD working, we resorted to using route-based VPN tunnels using the native Azure virtual gateway which is working fine.
We'll revisit the FTDv if the proof of concept is signed off and goes into full production.
Thanks
09-15-2021 12:11 AM
09-15-2021 12:17 AM
Hi,
Initially, we were simply trying to get the Azure VM's to go through the vFTD for there internet access so the dynamic NAT rule should have been fine, there wasn't any VPN's configured at that stage so no need for LAN to LAN traffic being exempt.
We'll try again in the future.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide