Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
As per your observation, there is no out of the box service available in Azure as of today, to support this.
The possible solution is that you can use a NVA (Such as Azure Firewall) and NAT the traffic to your OnPrem server
- Deploy an Azure Firewall on the Azure VNET which contains the VPN Gateway
- Note that Azure Firewall comes with it's own Public IP
- Azure Firewall also supports DNAT
- Let's say the Azure Firewall's Public IP is A.A.A.A and OnPrem server's private IP is B.B.B.B
- Then you should create a DNAT Rule such that
- Protocol : TCP
- Source type : IP address
- Source : *
- Destination Addresses : A.A.A.A (Azure Firewall's Public IP)
- Destination ports : 3389
- Translated Address : B.B.B.B (OnPrem server's private IP)
- Translated port : 3389 (OnPrem server's RDP Port)
This way, Azure Firewall is practically acting as Cloud NAT Device to your OnPrem server for RDP.
You can also use other 3rd party NVAs after validating whether they support a similar NAT feature.
Also see : Rule processing Logic in Firewall Policy
P.S : I did a lab and I can confirm this is working. From the logs, you can see the traffic is allowed
Thanks,
Kapil
Please Accept an answer if correct.
Original posters help the community find answers faster by identifying the correct answer.