Hey Magalhaes César,
Greetings,
Thank you for reaching out to us on the Microsoft Q&A forum.
As an original poster cannot accept their own answer, I am reposting it so that you can accept it an answer. Accepted answer will help other community members navigate to the appropriate solutions.
Issue: ACL's blocking traffic to A VPN Gateway
Solution: The reason of the problem is:
This is a hub & spoke design, so the GatewaySubnet has a route table to force traffic coming from vpn peers to spokes to be forwarded to the firewall.
This is mandatory, because if this route table doesnt exist, the traffic from vpn peers would use then the vnet peerings to reach the spokes. you would create asymetric routing, because the spokes have a default route to the firewall.
The spokes route tables have BGP Propagation disabled, if not, the system routes would be prioritary compared to the UDR's.
Because BGP Propagation is disabled per default in our case (all route tables are mostly applied on spokes), this setting was also disabled for the GatewaySubnet route table.
And .... This is the problem. Having this setting checked or unchecked does not have only a routing impact, but an ACL one.
This is mentioned in the documentation:
But this being counter intuitive, i indeed never suspected that.
I actually find abnormal that it partially works when BGP propagation disabled on the GatewaySubnet,
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information helps you, as this can be beneficial to other community members.
Your contribution is greatly appreciated.
Regards,
Ganesh