@Anonymous When you disable default route propagation in a spoke virtual network that has Azure Bastion, it means that the spoke will not automatically use the default route from the hub for Internet-bound traffic. Instead, you need to manually configure the routes in the spoke's route table.
Here's how you can handle Internet access for resources like Virtual Machines (VMs) and Azure Kubernetes Service (AKS) in the spoke:
Disable Default Route Propagation: Ensure that the default route propagation is disabled in the spoke's route table.
Add Custom Routes: Manually add custom routes in the spoke's route table to direct Internet-bound traffic to the appropriate next hop. For example, you can add a route with the destination 0.0.0.0/0
and the next hop as the Azure Virtual WAN hub's firewall or Network Virtual Appliance (NVA).
- Configure Azure Firewall or NVA: Ensure that the Azure Firewall or NVA in the hub is configured to handle Internet-bound traffic. This might involve setting up appropriate firewall rules and routing policies.
Verify Connectivity: Test the connectivity from the VMs and AKS in the spoke to ensure they can access the Internet through the configured routes and firewall/NVA.
By following these steps, you can route Internet-bound traffic from your VMs and AKS in the spoke through the Azure Virtual WAN hub while still using Azure Bastion for secure access.
See:
https://learn.microsoft.com/en-us/azure/virtual-wan/how-to-routing-policies
https://learn.microsoft.com/en-us/answers/questions/1476560/cant-connect-after-adding-default-route