Azure Virtual WAN - routing internet traffic for P2S connections

NSimpraga 166 Reputation points
2022-05-14T21:41:44.61+00:00

Greetings,

this question relates to the following already existing one: https://video2.skills-academy.com/en-us/answers/questions/589858/azure-wan-and-p2s-vpn-forced-tunneling.html

I am facing the same issue: after connecting successfully to the P2S VPN of the virtual hub in the VWAN, my client routing still uses my local adapter and my default ISP's public IP.
The proposed solution of adding the 0.0.0.0/1 and 128.0.0.0/1 routes to the route table of the virtual hub does not work (extensively tested), since for unknown reasons the two routes do not get propagated to the client this way.

201956-image.png
201966-image.png

After 'Securing Internet Traffic' through the UI in the Security Configuration of the Firewall, the 0.0.0.0/0 route gets added to the route table and that route does get propagated to the client but it does not force the traffic to use the VPN connection, instead it stays on the local adapter & client ISP public IP.

201967-image.png
201934-image.png
202002-image.png

The only workaround that is working is manually editing the azurevpnconfig.xml file and adding the two 0.0.0.0/1 and 128.0.0.0/1 routes there manually. After that the routes show up in the Azure VPN Client and the VWAN Firewall public IP starts to be used. Also one peculiarity here is that tracert and ping (ICMP?) through cmd stop working after this type of configuration.

Is there any proper way to force these two routes to be propagated & advertised to the clients, without a workaround like mentioned above?
This workaround is not acceptable since it moves a central part of configuration away from the central portal and into a simple configuration file which will be distributed and can easily be manually edited.

I suppose this is somewhat of a bug which needs to be adressed by Microsoft.

Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
197 questions
Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,267 questions
0 comments No comments
{count} vote

6 answers

Sort by: Most helpful
  1. risolis 8,701 Reputation points
    2022-05-14T21:57:29.38+00:00

    Hello @NSimpraga

    Thank you for your post.

    I would like to assist you on this one.... I wonder if you can gather a route print output while the PC is connected to the VPN client pls.

    Regards,

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.


  2. risolis 8,701 Reputation points
    2022-05-15T19:38:54.29+00:00

    Hello @NSimpraga

    I hope you are doing excellent.

    Do you have any other concern at this time?

    Looking forward to hear back from you.

    BR,

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    0 comments No comments

  3. risolis 8,701 Reputation points
    2022-05-20T07:44:16.907+00:00

    Hello @NSimpraga

    Thank you for your patience on this.

    I want to give my own observation for this set up.

    For instance, I would like to provide this great and basic statement below:

    203959-image.png

    This is a great detail to keep in mind when forcing traffic being inspected from Azure Firewall.

    204042-image.png

    Private traffic prefixes can be also an IP Public address within your Azure environment.

    204003-image.png

    Once it is read, lets try to understand how to get this going as the way you intent or was planned.
    For instance, I have the next observations below:

    -Route propagation on PS2 tunnel can be applied to VNET-VNET peering using the BGP protocol(Also remember that if it is more than one VNET Peering so, you might be using allow transit and so on).

    • Route propagation on PS2 tunnel can be applied to Local Gateway networks
    • Route propagation on PS2 tunnel can be applied to virtual network address prefixes
      • Routes learned from other BGP peering sessions connected to the Azure VPN gateway, except for the default route or routes that overlap with any virtual network prefix.
    • Routes learned from other BGP peering sessions connected via ExpressRoute.
    • Routes learned when propagation is enabled from custom route tables

    Having said that, I know that you are using a VIRTUAL WAN set up but the same expected behavior is happening as it is explained on the next page.

    https://video2.skills-academy.com/en-us/azure/vpn-gateway/vpn-gateway-about-point-to-site-routing

    Finally, I would say that the remaining option might be the one you implemented which is Manually on the VPN client configuration file, use an NVA or BGP route propagation from on-premises.

    I hope this time the information provided before was useful as well as a good guidance to understand the behavior observed.

    Best Regards,

    0 comments No comments

  4. NSimpraga 166 Reputation points
    2022-05-20T11:07:16.083+00:00

    Basically, what you are saying is the following: there is no proper solution to the problem, I need to use the workaround which is insecure and easily circumventable by any end-user who can open an .xml file and change it to his own liking, and by doing so break any company policy for routing and inspecting VPN traffic?

    Very poor from Microsoft. One of the most basic functionalities of forcing the routing of internet traffic through a VPN is missing... from such an expensive and comprehensive solution (Azure VWAN) which should offer all these things out of the box.


  5. NSimpraga 166 Reputation points
    2022-05-23T11:58:53.18+00:00

    I am a bit dissapointed but this falls out of the scope of support provided here, and, as you said, a support ticket might be the next step.
    Thank you for your time and assistance!