I'm coming across a weird issue here.
We have two subents in Azure. Let's call them Subnet1 and Subnet2
Subnet1 has a UDR to point traffic to the internal interface of the firewall.
This works, we see the traffic come into the firewall. We don't see any return traffic from the server in subnet 2. There is a static route pointing to the azure fabric .1 address.
When I do a flow basic, the firewall is unable to send the traffic to the gateway (azure .1 address) because there is no ARP.
Route found, interface ethernet1/2, zone 2, nexthop 10.38.225.1
Resolve ARP for IP 10.38.225.1 on interface ethernet1/2
Packet dropped, no ARP
I assume the firewall has corresponding routes for both subnets pointing to the first IP of the internal subnet the firewall is attached two.
Also, check to ensure the interface has IP Forwarding enabled on the azure side. If you do need to change this setting. Reboot the firewall. I have seen it not apply until after reboot.
From there, double check your NSGs.
Since this intrazone traffic, it should be allowed, but you may not be logging it due to the inherent rule. Override logging on intrazone, it may give you some further information in the Monitor.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!