user-guides

Firewall-based solution (Azure Firewall in vWAN hubs)

Architecture

Architecture
Click to view full size

Goal

Important note about P2S (User VPN)

P2S is typically client-initiated. It is good for laptop→Azure reachability testing, but it is not a perfect proxy for “on-prem DC routing” (S2S/ER).
The firewall design still applies the same way when the “DC” is an S2S/ER connection.

High-level design

Per hub:

Key principle

A firewall only helps if the traffic traverses it.
So you need routing/steering configuration to force inter-spoke flows (and possibly on-prem flows) through the firewall.

In vWAN this can be achieved using:

Implementation steps (conceptual)

1) Deploy Azure Firewall in each hub

Manage policies centrally with Firewall Manager:

2) Configure routing/steering so spoke traffic traverses firewall

Depending on what is available in the environment:

Preferred: Routing Intent (vWAN)

Alternative: Route-table steering

3) Define firewall policy (baseline)

Create rules (examples; adjust for your environment):

Deny all inter-spoke (default)

Allow spoke → on-prem/DC

Allow exceptions on request (explicit)

4) Logging and monitoring

Enable:

Validation

Expected outcomes

How to test

Why this approach is generally preferred at scale

Considerations