Enforcing All Traffic Through Azure Firewall with Site-to-Site VPN Between Azure Tenants – Asymmetric Routing and RDP Failure

Paul 0 Reputation points
2025-07-11T19:07:37.1666667+00:00

Problem Statement

Scenario:

We have two Azure tenants (Tenant1 and Tenant2) connected via Site-to-Site VPN.

In Tenant1, we have deployed Azure Firewall in a hub virtual network.

All traffic must be forced through Azure Firewall for inspection, including any communication from VMs in Tenant1 to VMs in Tenant2.

  • To achieve this, we have applied a User-Defined Route (UDR) in the Tenant1 VM subnet:
      0.0.0.0/0 → Next hop: Azure Firewall
    
    We created appropriate Firewall Network Rules allowing the necessary traffic flows.

Observed Behavior:

When this UDR is in place, RDP connections initiated from Tenant1 VMs to Tenant2 VMs fail (RDP hangs on connecting).

If we remove the UDR (allowing default system routing) or set the Next Hop to Virtual Network Gateway instead of Firewall, RDP works as expected.


Diagnosis:

The failure appears to be caused by asymmetric routing:

Outbound traffic from Tenant1 VMs to Tenant2 VMs flows through the Firewall and over the VPN.

  **Return traffic from Tenant2 VMs bypasses the Firewall** and flows directly back over the VPN tunnel to the Tenant1 VMs.

  
     Because Azure Firewall is stateful, it expects the return packets to come back through itself to maintain connection state. When this does not happen, the connection breaks.
```---

---
**Specific Question:**

What is the recommended, supported approach to **enforce all traffic inspection through Azure Firewall while maintaining symmetric routing for inter-tenant VPN traffic**?

Should Azure Firewall **automatically SNAT** outbound traffic to private IP ranges (e.g., 172.16.0.0/12), or is there an explicit configuration required to force SNAT for these flows to avoid asymmetric return paths?

If the default SNAT behavior is insufficient, what best practices or design patterns are recommended to accomplish this scenario without compromising connectivity?

---
---
Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
{count} votes

1 answer

Sort by: Most helpful
  1. G Sree Vidya 4,005 Reputation points Microsoft External Staff Moderator
    2025-07-11T21:56:35.2266667+00:00

    Hello Paul

    It looks like you're facing a challenge with enforcing traffic through Azure Firewall while maintaining symmetric routing for your VPN traffic between two Azure tenants.

    Here's an approach you might consider:

    1. By Default, Azure Firewall does not SNAT outbound traffic to private IP ranges (e.g., 172.16.0.0/12) per IANA RFC 1918 unless the organization uses a public IP range for private networks. For your scenario, since Tenant2 uses a private IP range, SNAT is not applied by default, leading to asymmetric routing.
    2. Refer Doc 1: https://learn.microsoft.com/en-us/azure/firewall/firewall-faq
    3. Refer Doc 2: https://learn.microsoft.com/en-us/azure/firewall/features
    4. To avoid asymmetric routing, you must explicitly configure the Azure Firewall Policy to SNAT traffic destined for Tenant2’s address space (e.g., 172.16.0.0/12).
    5. This is done by modifying the “Private IP ranges (SNAT)” settings in the Firewall Policy to include Tenant2’s address space for SNAT, as described above.
    6. After applying the SNAT configuration, verify that the source IP of outbound packets to Tenant2 is the Azure Firewall’s private IP (e.g., 10.0.1.4) using Azure Firewall logs or Network Watcher.

    I hope this helps! If these answers your query, do click the "Upvote" and click "Accept the answer" of which might be beneficial to other community members reading this thread.

    If the above is unclear or you are unsure about something, please add a comment below.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.