vWAN for SDWAN and Firewall - critical design

ZEIN Ahmed OBS/S EUR 125 Reputation points
2023-12-21T19:44:51.21+00:00

@GitaraniSharma-MSFT If you can help Here, please.

i have vWAN with multiple vHubs (assume vHubx and vHuby , each one in different region).
vHubx and vHubY hosting SDWAN NVA that make fullmesh connection with all SDWAN sites.
but vHubx and vHubY are not connected to each other via SDWAN, i.e. traffic between Azure regions is using Azure inter-regional connection between the vHubs not via egress internet using SDWAN (this is cheaper option based on Azure billing, correct?)

now, i have a need to deploy firewall in the vHubs, the firewall will be anyone of the available NVA in the vHub (fortigate or checkpoint).
The target: to make traffic inspection for north south traffic (from vnets to SDWAN), and also it may be required to make firewalling for east west traffic between vNets

below the available options i can see, and i have many questions in each option.

OPTION 1: using dedicated vHUB for the standalone firewall, below drawing

red lines represents the full mesh between the vHubs
User's image

questions for Option1:
Opt1 Q1-East west traffic vnet1< -- > vnet2 is not passing via Firewall (vFG), yes/no?

Opt1 Q2-East west traffic vnet1< -- > vnet3 is not passing via Firewall (vFG) , Yes/no?

Opt1 Q3-What can be done to make East west traffic vnet1< -- > vnet2 pass via the Firewall (vFG)?

Opt1 Q4-North South traffic vnet1 < -- > on-premises (SDWAN):



Case1: no public IP for the Firewalls WAN - Firewall at vHubX1 no need to access internet.

How traffic from vNet1 can access SDWAN and pass via Firewall?
in this topology, the traffic will go to the vHubX1 routing units and will use the full mesh to the vHubX2 routing units (BGP , AS path 65520 65520) and reach the SDWAN NVA, without passing via the Firewalls?



Case2:public IP for the Firewalls WAN – Firewalls at vHubX1 will access internet.
same question as case1

How traffic from vNet1 can access SDWAN and pass via Firewall?
in this topology, the traffic will go to the vHubX1 routing units and will use the full mesh to the vHubX2 routing units (BGP , AS path 65520 65520) and reach the SDWAN NVA, without passing via the Firewalls?



Opt1 Q5- intent routing can help or not? the main issue with intent routing it enforce all 
private IPs (RFC1982) to go through the firewall, however the target is selective:
e.g. vnet1 to vnet3 no firewalling, but vnet1 to sdwan use firewall




Opt1 Q6-for the North south traffic mentioned in question 4, the traffic will pass via vHubX1 and then vHubx2(both in same region), but i understand that Azure billing for vHub is consider the processing data, so this will make double pricing, e.g. data of 10TB per month processed in vHubX1 and vHubX2 is double price the 10TB per month processed in vHubX1 only (if no vHubX2 at all)?

OPTION 2: using same vHUB for the SDWAN NVA and standalone firewall, below drawing

red lines represents the full mesh between the vHubs

User's image

questions for Option2:
Opt2 Q1-East west traffic vnet1< -- > vnet2 is not passing via Firewall (vFG), yes/no?

Opt2 Q2-East west traffic vnet1< -- > vnet3 is not passing via Firewall (vFG) , Yes/no?

Opt2 Q3-What can be done to make East west traffic vnet1< -- > vnet2 pass via the Firewall (vFG)?

Opt2 Q4-North South traffic vnet1 < -- > on-premises (SDWAN):



Case1: no public IP for the Firewalls WAN - Firewall at vHubX no need to access internet.

How traffic from vNet1 can access SDWAN and pass via Firewall?
in this topology, the traffic will go to the vHubX routing units and will use the BGP routes to reach the SDWAN NVA, without passing via the Firewalls?

 should we shutdown the bgp between SDWAN NVA and vHub and enable it with firewall? (how this can be done in details)

Case2:public IP for the Firewalls WAN – Firewalls at vHubX will access internet.
same question as case1
:
How traffic from vNet1 can access SDWAN and pass via Firewall?
in this topology, the traffic will go to the vHubX routing units and will use the BGP routes to reach the SDWAN NVA, without passing via the Firewalls?

 should we shutdown the bgp between SDWAN NVA and vHub and enable it with firewall? (how this can be done in details)

Opt2 Q5- intent routing can help or not? the main issue with intent routing it enforce all 
private IPs (RFC1982) to go through the firewall, however the target is selective:
e.g. vnet1 to vnet3 no firewalling, but vnet1 to sdwan use firewall



Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
197 questions
{count} votes

Accepted answer
  1. ChaitanyaNaykodi-MSFT 24,231 Reputation points Microsoft Employee
    2023-12-22T03:40:58.51+00:00

    @ZEIN Ahmed OBS/S EUR

    Thank you for reaching out.

    Based on your questions above.

    traffic between Azure regions is using Azure inter-regional connection between the vHubs not via egress internet using SDWAN (this is cheaper option based on Azure billing, correct?

    Yes, these are the pricing for Data transfer in Azure.

    Reference: https://video2.skills-academy.com/en-us/azure/virtual-wan/pricing-concepts#data-transfer

    Regarding Options you mentioned above.

    As per my understanding from the architectures shared above I think OPTION 2: using same vHUB for the SDWAN NVA and standalone firewall will not be possible due to the limitation below

    As the ability to deploy both an SD-WAN connectivity NVA and a separate Firewall NVA or SaaS solution in the same Virtual WAN hub is currently in the road-map. Once routing intent is configured with next hop SaaS solution or Firewall NVA, connectivity between the SD-WAN NVA and Azure is impacted. Instead, deploy the SD-WAN NVA and Firewall NVA or SaaS solution in different Virtual Hubs. Alternatively, you can also deploy the SD-WAN NVA in a spoke Virtual Network connected to the hub and leverage the virtual hub BGP peering capability. This limitation is currently documented here.

    You can also explore dual-role SD-WAN connectivity and security (Next-Generation Firewall) Network Virtual Appliances

    Before I answer any questions related to Option1. Have you considered deploying the architecture as described here with BGP peering feature of VWAN.

    Hope this helps! Please let me know if you have any additional questions and we will gladly continue with our discussion. Thank you!


    ​​Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful