Azure Firewall - force tunneling

Peter Stieber 45 Reputation points
2025-07-12T13:53:33.77+00:00

Why does documentation says that in order to enable force tunneling I must create an Azure Firewall with the Firewall Management NIC enabled? Can I not do that without management subnet/nic? What happens if I create udr for fw subnet to forward some traffic via on prem and send some traffic directly to internet? Or is management subnet/nic required only when using 0.0.0.0/0 on fw subnet?

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
0 comments No comments
{count} vote

Accepted answer
  1. Marcin Policht 53,675 Reputation points MVP Volunteer Moderator
    2025-07-12T14:07:58.62+00:00

    Forced tunneling diverts internet-bound traffic to an on-premises next hop (like via VPN/ExpressRoute) instead of going directly to the internet. Without the management NIC, all traffic (including Azure Firewall's own internet-dependent traffic like threat intelligence, logging, updates) would be subject to your forced tunneling rules. This causes a chicken-and-egg problem: The firewall needs to access the internet (e.g., to pull updates), but if you've forced all outbound traffic to go through on-prem, you could inadvertently block critical Azure Firewall management traffic.

    So to solve this, Azure splits the NICs into:

    • Data plane NIC (FirewallSubnet): for inspected traffic.
    • Management NIC (AzureFirewallManagementSubnet): for firewall's own system/management traffic (not user traffic).

    You could potentially avoid the Management NIC but only if you don't force tunnel 0.0.0.0/0 (i.e., you're not hijacking all outbound traffic). Here's what's allowed without Management NIC:

    Scenario Management NIC Required?
    Normal mode (no forced tunneling) Not required
    Forced tunnel specific prefixes (e.g., only on-prem routes) Not required
    Forced tunnel 0.0.0.0/0 Required
    Split routing (some traffic to internet, some via on-prem) Only if 0.0.0.0/0 is affected

    You don't need the management NIC if you do the following (Azure Firewall will still use its data NIC to access Azure services and the internet):

    • Add a User-Defined Route (UDR) to the FirewallSubnet, and
    • Route only selected prefixes (like your on-prem CIDRs) to your on-prem next hop,
    • While leaving internet-bound traffic to go out directly via default route,

    However, if you add a UDR to redirect 0.0.0.0/0 from the FirewallSubnet, then:

    • All traffic, including Azure Firewall's own system traffic, is redirected
    • This breaks firewall management unless the management NIC is enabled

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.