Hello Paul
It looks like you're facing a challenge with enforcing traffic through Azure Firewall while maintaining symmetric routing for your VPN traffic between two Azure tenants.
Here's an approach you might consider:
- By Default, Azure Firewall does not SNAT outbound traffic to private IP ranges (e.g., 172.16.0.0/12) per IANA RFC 1918 unless the organization uses a public IP range for private networks. For your scenario, since Tenant2 uses a private IP range, SNAT is not applied by default, leading to asymmetric routing.
- Refer Doc 1: https://learn.microsoft.com/en-us/azure/firewall/firewall-faq
- Refer Doc 2: https://learn.microsoft.com/en-us/azure/firewall/features
- To avoid asymmetric routing, you must explicitly configure the Azure Firewall Policy to SNAT traffic destined for Tenant2’s address space (e.g., 172.16.0.0/12).
- This is done by modifying the “Private IP ranges (SNAT)” settings in the Firewall Policy to include Tenant2’s address space for SNAT, as described above.
- After applying the SNAT configuration, verify that the source IP of outbound packets to Tenant2 is the Azure Firewall’s private IP (e.g., 10.0.1.4) using Azure Firewall logs or Network Watcher.
I hope this helps! If these answers your query, do click the "Upvote" and click "Accept the answer" of which might be beneficial to other community members reading this thread.
If the above is unclear or you are unsure about something, please add a comment below.