Azure Public load balancer packet forwarding to NVA or performing any kind of Source NAT or D-NAT

Pulugujju M Rao 0 Reputation points
2025-08-06T19:01:27.0033333+00:00

Tring to understand the Azure Public Load Balancer simply packet forwarding to NVA or performing any kind of Source NAT or D-NAT.

Azure Load Balancer
Azure Load Balancer
An Azure service that delivers high availability and network performance to applications.
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Marcin Policht 53,675 Reputation points MVP Volunteer Moderator
    2025-08-06T19:22:20.3966667+00:00

    The answer depends on which load balancer you're using (Standard vs Gateway) and how it's configured.

    Option 1: Standard Public Load Balancer → NVA - you're using a Standard SKU Public Load Balancer with an NVA (e.g., firewall) in the backend pool:

    Inbound Traffic (From Internet to NVA)

    • Destination NAT (D-NAT): Yes The load balancer maps the public frontend IP to the NVA's private backend IP.
    • Source NAT (SNAT): No The original source IP (i.e., the client's public IP) is preserved for inbound connections. This allows the NVA to see the real client IP.
    • Return path consideration: Return traffic must go back through the Load Balancer, or Azure will drop the packets due to asymmetric routing. Use User-Defined Routes (UDRs) to ensure symmetric traffic flow.

    Option 2: Gateway Load Balancer (GWLB) → NVA - you're using a Gateway Load Balancer to insert an NVA transparently in the data path:

    Traffic Handling

    • No NAT (No D-NAT, No SNAT) GWLB does not modify source or destination IPs. Instead, it encapsulates packets using VXLAN and sends them to the NVA.
    • The NVA receives original packets (inside the VXLAN envelope), meaning:
      • Source IP is preserved
      • Destination IP is preserved
    • Return traffic path: Must go back through the GWLB, so the VXLAN headers can be removed and the connection preserved.

    To summarize:

    Feature Standard Public Load Balancer Gateway Load Balancer
    Packet forwarding Yes, via D-NAT Yes, via VXLAN encapsulation
    Source NAT (SNAT)? No (inbound traffic) No
    Destination NAT (D-NAT)? Yes No
    Source IP preserved? Yes Yes
    Destination IP preserved? No (it's NATed to backend IP) Yes
    NVA receives original packet? No (modified destination IP) Yes
    Use case Public IP → NVA (with NAT) Transparent NVA insertion
    • Standard Public Load Balancer performs Destination NAT, preserves source IP, and requires symmetric routing.
    • Gateway Load Balancer does not perform any NAT — it forwards encapsulated packets transparently to the NVA with both source and destination IPs intact.

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

  2. Pulugujju M Rao 0 Reputation points
    2025-08-07T03:11:48.99+00:00

    Planning to configure & implement a solution using a Standard Azure Public Load Balancer with frontend one single Public IP for multiple websites hosted in Azure App services behind a Palo Alto VM-Series Firewall (NVA) and Internal Load balancer.

    Scenario: Internet Users --> Cloudflare reverse proxy --> Azure Public Load Balancer --> Palo Alto VM-series Nextgen Firewall -->Internal Load Balancer -->Azure App services

    consider the Azure hub and spoke network architecture model.

    can please provide the detailed packet flow for ingress and egress traffic for each layer.

    what are the benefits of Enable Floating IP in the Load Balancing Rule and how its working.

    Public Load Balancer performing any Network Address Translation (NAT) on the inbound and outbound traffic.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.