Hello Glenn Fetalvero,
Thank you for posting your question in the Microsoft Q&A forum.
Direct Traffic Flow (GWLB -> NVA LB -> End Nodes)
- GWLB can forward traffic via VXLAN to your third-party LB (another NVA) instead of end nodes.
- Configure the GWLB’s backend pool to target the LB’s VXLAN tunnel endpoint (VTEP).
- The LB then distributes traffic to servers (via its own backend pool).
Chaining GWLB -> FW -> Third-Party LB
- Route traffic from GWLB to a firewall (e.g., Palo Alto, Check Point) first for inspection.
- The FW forwards clean traffic to the third-party LB via VXLAN or internal IP.
- Limitation: Azure GWLB itself cannot be chained to another GWLB.
VXLAN Integration for FW + LB
- Deploy both FW and LB as NVAs with VXLAN support.
- GWLB sends traffic to the FW’s VTEP, which then routes to the LB’s VTEP (over VXLAN or internal network).
- LB directs traffic to servers via its backend interface.
Some of the key considerations as below are:
- Azure Constraints: GWLB cannot target another GWLB but can point to NVAs (FW/LB).
- VXLAN Requirements: Ensure all NVAs (FW, LB) support VXLAN encapsulation.
- Routing: Use UDRs (User-Defined Routes) to steer traffic between GWLB → FW → LB → servers.
If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated.