Firewall NAT 1:1 for inbound and outbound
I have 2 firewalls that are behind a public load balancer. The two FTDs can't have a limitation that it can't accept secondary IP on the NICs. So the backend is limited to 2 outbound IP addresses. Unfortunately, using GWLB is not applicable since the East-West traffic is not supported.
I defined 2 backends using the two interfaces, and I used that to have a 1:1 NAT translation for inbound traffic.
Thus, the inbound connections have the following 1:1 mapping:
Public IP 1 -> ServerA
Public IP2 -> Server B
However, the problem is the outbound. Since technically I'm using the same backend IPs 10.0.1.6 and 10.0.17, the public load balancer can't properly NAT it 1:1
I have the following outbound rules in the public load balancer:
The effect is that when the server initiates an outbound connection, it gets the following IP address:
Server A -> Gets public IP 1
Server B -> Gets public IP 1 (but I'm expecting that this should be public IP2)
- Is there a way in the load balancer to get around this? The outbound and inbound should traverse via the firewall
- I believe this is possible using the public load balancer, then stitched with the GWLB; 1:1 NAT translation for inbound and outbound (please correct me if I'm wrong). However, the problem is that the East-West traffic should go via the FW. Is there a way in Azure to have the east-west traffic inspection?