Using Subnet Inspection in Azure to Redirect Subnet-Level Traffic to Aviatrix Transit FireNet

Aviatrix’s subnet inspection feature allows you to redirect subnet-level traffic to the Aviatrix Transit FireNet Gateway for inspection by a firewall appliance such as Check Point, Palo Alto Firewall, or Fortinet FortiGate.

With this feature, you can assign subnets to a subnet group and enable an inspection policy for the subnet group. Traffic between subnets in different subnet groups with an inspection policy is then redirected to the firewall for inspection. Previously traffic inspection policies could only be applied at the VNet level, which meant that traffic from all subnets in a VNet would be inspected by the firewall.

The subnet inspection feature is currently only available for Azure.

Supported Features

The following features are supported when subnet groups are enabled.

  • Intra-VNet and Inter-VNet traffic inspection

  • ActiveMesh 2.0

  • High Performance Encryption (HPE)

  • Transit FireNet High Availability (HA) mode

  • Supported firewalls: Palo Alto Networks, Check Point, Fortinet

  • Terraform

Unsupported Features

The following features are not supported when subnet groups are enabled.

  • Egress FireNet Inspection (Dual Transit FireNet)

  • Azure Secondary CIDR not supported

Disabled Features

The following features are not supported and are disabled when subnet groups are enabled.

  • Customized SNAT on Spoke gateway

  • Customized Spoke advertised CIDRs

  • Customized Spoke VPC Route Table

  • Filter Learned Routes to Spoke VPC

  • Auto-advertised Spoke Site2Cloud CIDRs

  • BGP on Spoke

What is a Subnet Group?

A subnet group defines a logical grouping of subnets in a VNet. A subnet group is local to a VNet and does not span across multiple VNets. Traffic between subnets in the same subnet group flows through the Azure native virtual network and is not inspected by the firewall in the Aviatrix Transit FireNet configuration. If you want to inspect traffic between subnets in the same VNet, the subnets must be in different subnet groups.

Traffic Traversal in Subnet Groups

When subnet groups are created in a VNet, traffic from the subnet groups is redirected to the Aviatrix Transit FireNet Gateway for inspection, if you enable the inspection policy for the subnet groups.

Traffic for subnets that are part of a subnet group but do not have an inspection policy traverse the Aviatrix Transit FireNet gateway but are not redirected to or inspected by the firewall.

Intra-VNet Subnet Inspection for Subnets in the same Subnet Group

Traffic between VMs in the same subnet or subnet group is not inspected. If you want to inspect traffic between VMs in different subnets in the same VNet, the subnets must be in different subnet groups. For more information, refer to Connectivity Scenarios Between VMs in Subnets.

intraVNET vm segmentation
The diagrams in the scenarios below show single gateways for brevity. High Availability (HA) configuration is supported for Spoke and Transit FireNet gateways.

Intra-VNet Subnet Inspection

intraVNET subnet ins

Inter-VNet Subnet Inspection Over a Shared Transit FireNet

interVNET shared FireNet

Single Region Inter-VNet Subnet Inspection Over Transit Peering

In this scenario, the blue and green subnet groups have an inspection policy, and the orange subnet group does not. The traffic between the blue and green subnet groups traverses the firewall on either side. Since the orange subnet group does not have an inspection policy, the traffic between the orange and green subnet groups is not inspected by the firewall connected to the Transit FireNet to which the orange subnet group’s Spoke is attached. However, since the green subnet group has an inspection policy, the traffic between the orange and green subnet group traverses the firewall connected to the peer Transit FireNet.

interVNET transit peering

Multi-Region Inter-VNet Subnet Inspection Over Transit Peering

The traffic traversal is similar to the Inter-VNet Subnet Inspection Over Transit Peering scenario.

multiregion vnet

Connectivity Scenarios Between VMs in Subnets

The following tables list different scenarios for connectivity between VMs in subnets that you need to consider when using subnet groups.

Intra-VNet Subnet Inspection

VM in Subnet A VM in Subnet B Connectivity Between VMs Comment

Not in a subnet group

Not in a subnet group

Yes

Not in a subnet group

In a subnet group

No

Subnet A must be in a subnet group for connectivity; you must configure a default subnet group. See Important Recommendations.

In a subnet group

In a subnet group

Yes

Subnets can either be in the same or different subnet groups.

Inter-VNet Subnet Inspection

VM in Subnet A VM in Subnet B Connectivity Between VMs Comment

Not in a subnet group

Not in a subnet group

Yes

Only if VNet B has no configured subnet groups. See Important Recommendations.

In a subnet group

Not in a subnet group

No

Only if VNet B has no configured subnet groups. See Important Recommendations.

In a subnet group

In a subnet group

Yes

Subnets can either be in the same or different subnet groups.

Inter-VNet Subnet Inspection over Transit Peering

The connection behavior is the same as Inter-VNet Subnet Inspection.

VM in Subnet A VM in Subnet B Connectivity Between VMs Comment

Not in a subnet group

Not in a subnet group

Yes

Only if VNet B has no configured subnet groups.

In a subnet group

Not in a subnet group

No

Only if VNet B has no subnet groups configured. See Important Recommendations; configure a default subnet group.

In a subnet group

In a subnet group

Yes

Subnets can either be in the same or different subnet groups.

Important Recommendations

  • There is a downtime of 10 – 20 seconds when you add or remove subnets from a subnet group. If this downtime is not acceptable, be sure to add or remove subnet groups during a maintenance window.

  • For connectivity between VMs in different subnets, the subnets must be in different subnet groups. For subnets that do not need an inspection policy, create a subnet group named default, and add the subnets to the default subnet group. All other subnets that require traffic inspection and have an inspection policy set, add the subnets to custom subnet groups.

  • Only learned and Aviatrix-created routes are carried over from the subnet routing tables to the subnet group routing tables created by Aviatrix. Once a subnet is added to a group, you can manually recreate custom routes in the subnet group route table through the Azure console.

Configuring Azure Spoke Subnet Groups

For Azure-based Transit FireNet Gateways that have Spoke Gateways attached, you can use the Azure Spoke Subnet Groups dialog to add Azure Spoke Subnet Groups to these attached Spoke Gateways.

You cannot add Azure Spoke Subnet Groups to a Spoke Gateway that has inspection enabled.

You must remove Azure Spoke Subnet Groups from Azure Transit Gateways before removing FireNet functionality from those gateways.

Adding Azure Spoke Subnet Groups

When you add an Azure Spoke subnet group, selecting the Spoke Gateway automatically synchronizes the Subnet(s) list with the Azure portal so that the list is refreshed with any new subnets for this Spoke Gateway.

  1. On the Security > FireNet > FireNet Gateways tab, click the name of an Azure FireNet Gateway that has at least one Spoke Gateway attached.

  2. Click the Policy tab.

  3. Click Azure Spoke Subnet Groups.

  4. In the Azure Spoke Subnet Groups dialog, you can:

    • Edit or delete an existing subnet group (if editing, you can only add or remove a subnet group; if deleting, you are prompted if you want to delete the subnet group)

    • Add a Subnet Group

  5. If adding a subnet group, click +Azure Spoke Subnet Group.

    400

  6. Enter a name for the Subnet Group.

  7. Select the Spoke Gateway (only Spoke Gateways attached to this Transit FireNet are available). The Subnet(s) list is automatically refreshed with any new subnets for this Spoke Gateway from the Azure portal.

  8. Select the Subnet Group(s).

    400

  9. Click Save. It may take a couple of minutes for the changes to save.

  10. After the changes are saved, click Close to close the Create Azure Spoke Subnet Group dialog.

  11. The new subnet group is displayed on the Azure Spoke Subnet Groups dialog.

Adding Inspection Policy for Spoke Subnet Group

After your new subnet groups are created, you can add them to the inspection policy for this particular Azure Transit FireNet gateway.

  1. Select the Spoke Subnet Group in the Policy list.

  2. Click Add in the Actions list.

    spoke subnet group policy

See Configuring FireNet Inspection Policies for more information.

Removing Spoke Subnet Groups

  1. Disable inspection for the Spoke Subnet Group by selecting the group on the FireNet Gateways > Policy tab and then selecting Remove from the Actions menu.

  2. On the Policy tab, click Azure Spoke Subnet Groups.

  3. In the Azure Spoke Subnet Groups dialog, select the delete icon 25 next to the subnet group.

  4. Click Delete to confirm that you want to delete the subnet group.

  5. When the deletion is complete, click Close to close the dialog.