ACL's blocking traffic to A VPN Gateway

Magalhaes César 31 Reputation points
2024-10-12T15:00:13.1133333+00:00

Hi,

I've been working around a problem with a VPN Gateway i built a few days ago. It appears the traffic is blocked inbound to this gateway by an ACL that i cant edit, control or even see.

The former architecture is a hub/spoke design connected with an onPrem firewall.

At first i detected that i couldnt access the datacenter using ports other than 179, 443 and 500 (and a few more above 8800).

In order to troubleshoot this behavior, i remove parts of this architecture to isolate the problem.

So the setup now, is 2 vpn gateways connected via a site to site connection. My tests are done while placing 2 VM's in a different subnet, but on the same VNET of each of the gateways.

There a no NSG's configured in any of those subnets.

VNET A (  VM_A 172.18.0.100 + VNET GATEWAY A ) <—> S2S connection <—>  VNET B  ( VM_B 10.200.1.4 + VNET GATEWAY B )

Symptoms are :

If i do a port scan (netcat/nmap) from VM A to VM B, only 3 ports are observed to pass through vnet gateway A, and reach VM B (tcpdump 'host 
Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,566 questions
Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,533 questions
{count} votes

Accepted answer
  1. Ganesh Patapati 1,745 Reputation points Microsoft Vendor
    2024-10-29T11:37:23.6+00:00

    Hey Magalhaes César,

    Greetings,

    Thank you for reaching out to us on the Microsoft Q&A forum.

    As an original poster cannot accept their own answer, I am reposting it so that you can accept it an answer. Accepted answer will help other community members navigate to the appropriate solutions.

    Issue: ACL's blocking traffic to A VPN Gateway

    Solution: The reason of the problem is:

    This is a hub & spoke design, so the GatewaySubnet has a route table to force traffic coming from vpn peers to spokes to be forwarded to the firewall.

    This is mandatory, because if this route table doesnt exist, the traffic from vpn peers would use then the vnet peerings to reach the spokes. you would create asymetric routing, because the spokes have a default route to the firewall.

    The spokes route tables have BGP Propagation disabled, if not, the system routes would be prioritary compared to the UDR's.

    Because BGP Propagation is disabled per default in our case (all route tables are mostly applied on spokes), this setting was also disabled for the GatewaySubnet route table.

    And .... This is the problem. Having this setting checked or unchecked does not have only a routing impact, but an ACL one.

    This is mentioned in the documentation:

    https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview#border-gateway-protocol

    But this being counter intuitive, i indeed never suspected that.

    I actually find abnormal that it partially works when BGP propagation disabled on the GatewaySubnet,


    Please don’t forget to close the thread by clicking "Accept the answer" wherever the information helps you, as this can be beneficial to other community members.

    Your contribution is greatly appreciated.

    Regards,

    Ganesh

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.