<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>TSLS &#8211; Luke Smith</title>
	<atom:link href="https://www.tsls.co.uk/index.php/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tsls.co.uk/</link>
	<description>- Knowledge - Thoughts - Microsoft -</description>
	<lastBuildDate>Sat, 16 May 2026 00:09:00 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">33423662</site>	<item>
		<title>Azure Virtual WAN: What&#8217;s Actually Supported — A Practical Guide to Routing Intent, Azure Firewall, and NVA Integration</title>
		<link>https://www.tsls.co.uk/index.php/2026/05/15/azure-virtual-wan-whats-actually-supported-a-practical-guide-to-routing-intent-azure-firewall-and-nva-integration/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Fri, 15 May 2026 23:48:03 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<guid isPermaLink="false">https://www.tsls.co.uk/?p=6540</guid>

					<description><![CDATA[<p>If you've ever tried to combine Azure Firewall with Palo Alto VM-Series in an Azure Virtual WAN topology and wondered why nothing works the way you'd expect — you're not alone. After weeks of hands-on lab testing and production troubleshooting, I've documented exactly what's supported and what isn't. This post covers six real-world routing scenarios, including Routing Intent, static route splits, service chaining, and indirect spoke patterns — with a master comparison table so you can stop guessing and start building.</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2026/05/15/azure-virtual-wan-whats-actually-supported-a-practical-guide-to-routing-intent-azure-firewall-and-nva-integration/">Azure Virtual WAN: What&#8217;s Actually Supported — A Practical Guide to Routing Intent, Azure Firewall, and NVA Integration</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Introduction</h2>



<p>If you&#8217;ve ever tried to configure Azure Firewall or third-party Network Virtual Appliance (NVA) like Palo Alto VM-Series in an Azure Virtual WAN (vWAN) topology, you&#8217;ll know the documentation can be confusing, contradictory, and spread across dozens of pages and videos with snips of information. After weeks of hands-on lab testing and production deployments, I&#8217;ve compiled this guide to give you the definitive answer to one question:</p>



<p><strong>What routing and security combinations actually work in Azure vWAN — and which ones don&#8217;t?</strong></p>



<p>This post covers six common design scenarios, explains exactly why each one does or doesn&#8217;t work, and finishes with a master comparison table so you can make an informed architectural decision.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Key Concepts You Need to Understand First</h2>



<p>Before diving into the scenarios, let&#8217;s establish some fundamentals.</p>



<h3 class="wp-block-heading">What Is Routing Intent?</h3>



<p>Routing Intent is a declarative feature in Azure vWAN that allows you to configure <strong>Internet Traffic</strong> and <strong>Private Traffic</strong> routing policies on a virtual hub. When enabled, it automatically:</p>



<ul class="wp-block-list">
<li>Takes over management of the <code>defaultRouteTable</code> and all connection associations/propagations</li>



<li>Injects RFC1918 aggregate routes (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) for private traffic</li>



<li>Injects a 0.0.0.0/0 default route for internet traffic</li>



<li>Forces all connections to associate with and propagate to the <code>defaultRouteTable</code></li>
</ul>



<p>You lose the ability to use custom route tables or manually control association/propagation. The platform manages everything.</p>



<h3 class="wp-block-heading">What Is a Secured Virtual Hub?</h3>



<p>A secured virtual hub is a vWAN hub with a security solution deployed <strong>inside</strong> it. Valid security solutions are:</p>



<ul class="wp-block-list">
<li><strong>Azure Firewall</strong> (deployed in the hub)</li>



<li><strong>Integrated NVA partner</strong> (e.g., Fortinet, Barracuda — deployed in the hub via Firewall Manager)</li>



<li><strong>Palo Alto Cloud NGFW</strong> (SaaS resource deployed in the hub)</li>
</ul>



<p>A <strong>Palo Alto VM-Series deployed as IaaS in a spoke VNet</strong> is <strong>NOT</strong> a hub-integrated security solution and <strong>cannot</strong> be used as a Routing Intent next hop.</p>



<h3 class="wp-block-heading">Direct Spokes vs Indirect Spokes</h3>



<ul class="wp-block-list">
<li><strong>Direct spoke</strong>: A VNet connected directly to the vHub via a hub virtual network connection</li>



<li><strong>Indirect spoke</strong>: A VNet peered to another spoke (typically an NVA transit VNet) that is connected to the vHub. The indirect spoke has no direct connection to the hub.</li>
</ul>



<h3 class="wp-block-heading">The Golden Rule of vWAN Static Routes</h3>



<p>There are two mutually exclusive ways to steer traffic to Azure Firewall in a vHub:</p>



<ol class="wp-block-list">
<li><strong>Routing Intent</strong> (declarative, platform-managed)</li>



<li><strong>Static routes in hub route tables</strong> (manual, operator-managed)</li>
</ol>



<p><strong>You cannot mix these two approaches.</strong> Enabling Routing Intent on a hub that has manually configured static routes will cause conflicts, and the platform will not reconcile them automatically.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 1: Full Routing Intent (Both Policies)</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>Azure Firewall deployed in a secured vHub with Routing Intent enabled for <strong>both</strong> Internet and Private traffic. All spokes connected directly to the hub. No third-party NVA.</p>



<pre class="wp-block-code"><code>          Spoke 4              Spoke 5
        (direct conn)        (direct conn)
              \                  /
               \                /
         ┌──────────────────────────┐
         │   Secured vHub           │
         │   Azure Firewall         │
         │   Routing Intent:        │
         │   Internet → AzFW        │
         │   Private  → AzFW        │
         └──────────────────────────┘
                    │
               ExpressRoute / VPN
                    │
                On-Premises
</code></pre>



<h3 class="wp-block-heading">Traffic Flows</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Source → Destination</th><th>Path</th><th>Inspected?</th></tr></thead><tbody><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Spoke</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Branch</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Spoke → Internet</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Branch → Internet</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Inter-hub (if multi-hub)</td><td>Via Azure Firewall (both hubs)</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Configuration</h3>



<p><strong>Routing Intent:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Policy</th><th>Destination</th><th>Next Hop</th></tr></thead><tbody><tr><td>InternetTraffic</td><td>Internet</td><td>Azure Firewall</td></tr><tr><td>PrivateTraffic</td><td>PrivateTraffic</td><td>Azure Firewall</td></tr></tbody></table></figure>



<p><strong>VNet Connections (managed by platform):</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Setting</th><th>Value</th></tr></thead><tbody><tr><td>Associated route table</td><td><code>defaultRouteTable</code> (auto)</td></tr><tr><td>Propagated route tables</td><td><code>defaultRouteTable</code> + <code>noneRouteTable</code> (auto)</td></tr><tr><td><code>enableInternetSecurity</code></td><td><code>true</code> (auto)</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Prerequisites</h3>



<ul class="wp-block-list">
<li>Only <code>defaultRouteTable</code> and <code>noneRouteTable</code> can exist — delete all custom route tables</li>



<li>No static routes with next hop type = VNet connection</li>



<li>Azure Firewall must be deployed <strong>in</strong> the hub (not in a spoke VNet)</li>



<li>If non-RFC1918 private address space is used, add it as &#8220;Private Traffic Prefixes&#8221;</li>
</ul>



<h3 class="wp-block-heading">Critical Lesson Learnt</h3>



<p>If the hub previously had static routes, custom next hops, or custom route tables <strong>before</strong> Routing Intent was enabled, simply deleting those routes while intent is active is <strong>not sufficient</strong>. The correct procedure is:</p>



<ol class="wp-block-list">
<li><strong>Fully remove</strong> Routing Intent</li>



<li><strong>Delete</strong> all static routes, custom next hops, and custom route tables</li>



<li><strong>Verify</strong> only <code>defaultRouteTable</code> and <code>noneRouteTable</code> remain</li>



<li><strong>Re-enable</strong> Routing Intent</li>
</ol>



<p>This forces the platform to rebuild the routing state from scratch.</p>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fully Supported</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 2: PA Cloud NGFW (Internet) + Azure Firewall (Private) with Routing Intent</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>Split the security duties using Routing Intent with <strong>two different in-hub security solutions</strong>: Palo Alto Cloud NGFW (a SaaS offering deployed inside the vHub) for internet traffic, and Azure Firewall for private/east-west traffic.</p>



<pre class="wp-block-code"><code>          Spoke 4              Spoke 5
        (direct conn)        (direct conn)
              \                  /
               \                /
         ┌──────────────────────────┐
         │   Secured vHub           │
         │                          │
         │   Azure Firewall         │
         │   (private traffic)      │
         │                          │
         │   PA Cloud NGFW (SaaS)   │
         │   (internet traffic)     │
         │                          │
         │   Routing Intent:        │
         │   Internet → PA NGFW     │
         │   Private  → AzFW        │
         └──────────────────────────┘
</code></pre>



<h3 class="wp-block-heading">Traffic Flows</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Source → Destination</th><th>Path</th><th>Inspected by</th></tr></thead><tbody><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Spoke</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Branch</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td></tr><tr><td>Spoke → Internet</td><td>Via PA Cloud NGFW</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Branch → Internet</td><td>Via PA Cloud NGFW</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Why This Works</h3>



<p>PA Cloud NGFW is a <strong>SaaS resource deployed inside the vHub</strong> — it&#8217;s a first-class Routing Intent next hop, just like Azure Firewall. You can point each routing policy at a different in-hub resource.</p>



<h3 class="wp-block-heading">Trade-offs</h3>



<ul class="wp-block-list">
<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Cleanest split architecture — fully declarative, single-hop</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fully supported by Microsoft and Palo Alto</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA Cloud NGFW integrates with Panorama / Strata Cloud Manager</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Requires PA Cloud NGFW licensing (consumption-based SaaS) — <strong>not</strong> existing VM-Series licensing</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Feature set differ from VM-Series</li>
</ul>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fully Supported</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 3: Routing Intent with Private-Only Policy + PA VM-Series (Spoke) for Internet</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>Enable Routing Intent for <strong>only Private Traffic</strong> (pointing at Azure Firewall), then use a static route on the PA transit VNet connection to steer internet traffic (0.0.0.0/0) to the Palo Alto VM-Series in a spoke VNet.</p>



<pre class="wp-block-code"><code>          Spoke 4              Spoke 5       PA Transit VNet
        (direct conn)        (direct conn)   (direct conn +
              \                  /            static 0/0 → PA)
               \                /                 │
         ┌──────────────────────────┐             │
         │   Secured vHub           │─────────────┘
         │   Azure Firewall         │
         │   Routing Intent:        │
         │   Private  → AzFW        │
         │   Internet → ???         │
         └──────────────────────────┘
</code></pre>



<h3 class="wp-block-heading">Why This DOESN&#8217;T Work</h3>



<p>When Routing Intent is enabled — even with only the Private Traffic policy — <strong>the platform takes over management of the <code>defaultRouteTable</code></strong> and all connection associations/propagations. You cannot layer a static route (0.0.0.0/0 → PA ILB) on a VNet connection on top of an active Routing Intent configuration.</p>



<p>The static route pattern documented by Microsoft for Routing Intent is specifically for <strong>reaching indirect spokes behind an NVA</strong> — not for routing internet traffic to an NVA in a spoke bypassing the hub security solution.</p>



<p>Routing Intent next hops must be a resource deployed <strong>in or integrated with the vHub</strong>:</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Valid Next Hop</th><th>Type</th></tr></thead><tbody><tr><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Azure Firewall</td><td>Deployed in hub</td></tr><tr><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Integrated NVA partner</td><td>Deployed in hub</td></tr><tr><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA Cloud NGFW</td><td>SaaS in hub</td></tr><tr><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA VM-Series in a spoke VNet</td><td>Not valid</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Not Supported — Tested and Confirmed</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 4: Service Chaining Azure Firewall (Hub) → PA VM-Series (Spoke) for Internet</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>Use Routing Intent for both policies pointing at Azure Firewall, then have Azure Firewall &#8220;forward&#8221; internet-bound traffic to the PA VM-Series in a spoke VNet for deep inspection before egress.</p>



<pre class="wp-block-code"><code>          Spoke 4
        (direct conn)
              │
              ▼
         Azure Firewall (hub)
              │
              ▼  ← "forward internet to PA"
         PA Transit VNet (spoke)
              │
              ▼
           Internet
</code></pre>



<h3 class="wp-block-heading">Why This DOESN&#8217;T Work</h3>



<p>There is <strong>no mechanism</strong> to get traffic from Azure Firewall inside the hub to an NVA in a spoke:</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>What you&#8217;d need</th><th>Why it&#8217;s impossible</th></tr></thead><tbody><tr><td>UDR on Azure Firewall&#8217;s subnet</td><td>It&#8217;s managed infrastructure — no subnet access</td></tr><tr><td>VNet peering into the firewall</td><td>Hub infrastructure isn&#8217;t peerable</td></tr><tr><td>Azure FW &#8220;forward to next hop&#8221; rule</td><td>Azure FW rules allow/deny/DNAT — no &#8220;forward to NVA&#8221; action</td></tr><tr><td>BGP from PA in spoke to vHub router</td><td>PA VM-Series IaaS can&#8217;t BGP peer with the vHub router</td></tr></tbody></table></figure>



<p>Azure Firewall in a vHub is a <strong>walled garden</strong>. There is no data-plane path from Azure Firewall to say &#8220;after inspection, send this to the PA ILB in a spoke VNet.&#8221;</p>



<p>Microsoft does document a &#8220;Forced Tunnel&#8221; mode, but the valid sources of a 0.0.0.0/0 for forced tunnel are limited to: on-premises (via BGP), an NVA deployed <strong>in</strong> the hub, or a SaaS solution in the hub — not an NVA in a spoke VNet.</p>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Not Supported — No Mechanism Exists</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 5: Static Routes Only — PA VM-Series (Internet), east\west not supported</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>Manually configure static routes in the <code>defaultRouteTable</code> to steer 0.0.0.0/0 to the <strong>PA VM-Series</strong> transit VNet connection for internet access. RFC1918 traffic to PA VM-Series NOT supported</p>



<pre class="wp-block-code"><code>                    ┌──────────────────────────────┐
                    │  vHub (Secured - NO Routing   │
                    │  Intent enabled)              │
                    │  Azure Firewall deployed      │
                    │                               │
                    │  defaultRouteTable:           │
                    │  ┌──────────────────────────┐ │
                    │  │ 10.0.0.0/8    → NA       │ │
                    │  │ 172.16.0.0/12 → NA       │ │
                    │  │ 192.168.0.0/16→ NA       │ │
                    │  │ 0.0.0.0/0     → PA conn  │ │
                    │  └──────────────────────────┘ │
                    └──┬────────┬────────┬──────────┘
                       │        │        │
                  Spoke 4   Spoke 5   PA Transit VNet
</code></pre>



<h3 class="wp-block-heading">Traffic Flows</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Source → Destination</th><th>Path</th><th>Inspected by</th></tr></thead><tbody><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Spoke</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Branch</td><td>Via Azure Firewall</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Spoke → Internet</td><td>Via PA transit VNet → PA</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Branch → Internet</td><td>Via PA transit VNet → PA</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Inter-hub</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Not inspected</strong></td><td>Direct via vWAN backbone</td></tr><tr><td>Branch <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Branch</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Not inspected</strong></td><td>Direct via vHub</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Configuration</h3>



<p><strong><code>defaultRouteTable</code> Static Routes:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Route Name</th><th>Destination Prefix</th><th>Next Hop Type</th><th>Next Hop</th></tr></thead><tbody><tr><td><code>private_traffic</code></td><td><code>10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16</code></td><td>Azure Firewall</td><td>Azure Firewall resource ID</td></tr><tr><td><code>internet_traffic</code></td><td><code>0.0.0.0/0</code></td><td>Virtual Network Connection</td><td>PA transit VNet connection</td></tr></tbody></table></figure>



<p><strong>Spoke VNet Connections (Spoke 4, Spoke 5, etc.):</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Setting</th><th>Value</th></tr></thead><tbody><tr><td>Associated route table</td><td><code>defaultRouteTable</code></td></tr><tr><td>Propagated route tables</td><td><code>noneRouteTable</code></td></tr><tr><td>Propagated labels</td><td><code>none</code></td></tr><tr><td>Static routes</td><td>None</td></tr><tr><td><code>enableInternetSecurity</code></td><td><code>true</code></td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Critical</strong>: Spokes must propagate to <code>noneRouteTable</code>, not <code>defaultRouteTable</code>. If spokes propagated their specific prefixes (e.g., 10.20.20.0/24), these would be more specific than the RFC1918 aggregates (10.0.0.0/8) and traffic would bypass Azure Firewall via longest-prefix match.</p>
</blockquote>



<p><strong>PA Transit VNet Connection:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Setting</th><th>Value</th></tr></thead><tbody><tr><td>Associated route table</td><td><code>defaultRouteTable</code></td></tr><tr><td>Propagated route tables</td><td><code>noneRouteTable</code></td></tr><tr><td>Static route</td><td><code>0.0.0.0/0</code> → PA ILB VIP</td></tr><tr><td><code>enableInternetSecurity</code></td><td><strong><code>false</code></strong> <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a0.png" alt="⚠" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Critical</strong>: If <code>enableInternetSecurity</code> is <code>true</code> on the PA connection, the 0.0.0.0/0 route gets advertised back to the PA VNet, creating a <strong>routing loop</strong>. The PA must use its own external interface for internet egress.</p>
</blockquote>



<h3 class="wp-block-heading">Limitations</h3>



<ul class="wp-block-list">
<li><strong>Inter-hub traffic is not inspected</strong> — traffic between hubs bypasses Palo Alto (inter-hub inspection requires Routing Intent)</li>



<li><strong>Branch-to-branch traffic is not inspected</strong> — ExpressRoute <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> VPN bypasses not inspected</li>



<li><strong>Cannot enable Routing Intent</strong> — the two approaches are mutually exclusive</li>



<li><strong>Manual route management</strong> — static routes must be maintained across all hubs</li>
</ul>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fully Supported for Internet Access only</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Scenario 6: Transit NVA vNet &#8211; PA VM-Series for Everything — Indirect Spoke Pattern (No Azure Firewall)</h2>



<h3 class="wp-block-heading">The Design</h3>



<p>No Azure Firewall, no Routing Intent. Standard vHub with all spokes peered to a regional PA transit VNet. The PA handles all inspection — internet and east-west. UDRs on every spoke subnet point 0.0.0.0/0 at the PA internal load balancer VIP.</p>



<pre class="wp-block-code"><code>     Spoke 4              Spoke 5
   (VNet peer)          (VNet peer)
        \                  /
         \                /
      PA Transit VNet (NVA)
      (PA VM-Series Active/Active
       behind Standard ILB)
              │
         Hub VNet Connection
         (static routes for spoke
          prefixes → PA ILB VIP)
              │
         ┌──────────────────────┐
         │  vHub (Standard)     │
         │  No Azure Firewall   │
         │  No Routing Intent   │
         └──────────────────────┘
                  │
             ExpressRoute / VPN
                  │
              On-Premises
</code></pre>



<h3 class="wp-block-heading">Traffic Flows</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Source → Destination</th><th>Path</th><th>Inspected by</th></tr></thead><tbody><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Spoke</td><td>Via PA (UDR → PA ILB)</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Spoke <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2194.png" alt="↔" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Branch</td><td>Via PA → vHub → Branch</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Spoke → Internet</td><td>Via PA (SNAT) → Internet</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Branch → Spoke</td><td>Via vHub → PA transit → PA → Spoke</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto</td></tr><tr><td>Inter-hub (remote spokes)</td><td>Via vHub → remote hub → PA → Spoke</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Palo Alto (at source)</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Configuration</h3>



<p><strong>Spoke Subnets — UDR:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Route</th><th>Next Hop</th><th>Gateway Route Propagation</th></tr></thead><tbody><tr><td><code>0.0.0.0/0</code></td><td>PA internal LB VIP</td><td><strong>Disabled</strong></td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>UDRs must be applied to <strong>every</strong> subnet in every spoke VNet.</p>
</blockquote>



<p><strong>PA Transit VNet Connection to vHub:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Setting</th><th>Value</th></tr></thead><tbody><tr><td>Associated route table</td><td><code>defaultRouteTable</code></td></tr><tr><td>Propagated route tables</td><td><code>defaultRouteTable</code> (label: <code>default</code>)</td></tr><tr><td>Static route</td><td>Spoke summary prefix → PA ILB VIP</td></tr><tr><td><code>enableInternetSecurity</code></td><td><code>false</code></td></tr></tbody></table></figure>



<p><strong><code>defaultRouteTable</code>:</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Route</th><th>Destination</th><th>Next Hop</th></tr></thead><tbody><tr><td>Regional spoke summary</td><td>e.g., <code>10.20.0.0/16</code></td><td>PA transit VNet connection</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Advantages</h3>



<ul class="wp-block-list">
<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Single inspection point — PA handles everything</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Uses existing PA VM-Series licensing and Panorama</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No Azure Firewall cost</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Full PA feature set (App-ID, Threat Prevention, URL Filtering, SSL Decryption, WildFire)</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Proven pattern for enterprises with existing Palo Alto investment</li>
</ul>



<h3 class="wp-block-heading">Limitations</h3>



<ul class="wp-block-list">
<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> More complex operational management (UDRs on every subnet, static routes per spoke)</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No Routing Intent simplicity</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Spoke onboarding requires UDR creation and VNet peering</li>



<li><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> PA becomes a single point of inspection (capacity planning critical)</li>
</ul>



<h3 class="wp-block-heading">Verdict: <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fully Supported — Production Proven</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Master Comparison Table</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th></th><th>Scenario 1</th><th>Scenario 2</th><th>Scenario 3</th><th>Scenario 4</th><th>Scenario 5</th><th>Scenario 6</th></tr></thead><tbody><tr><td><strong>Name</strong></td><td>Full Routing Intent</td><td>Cloud NGFW + AzFW Routing Intent</td><td>Private Intent + PA Spoke</td><td>Service Chain AzFW → PA</td><td>Static Routes</td><td>Transit NVA Network</td></tr><tr><td><strong>Supported?</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td></tr><tr><td><strong>Routing Intent</strong></td><td>Both policies</td><td>Both policies</td><td>Partial</td><td>Both policies</td><td>None</td><td>None</td></tr><tr><td><strong>Internet inspection</strong></td><td>Azure Firewall</td><td>PA Cloud NGFW</td><td>—</td><td>—</td><td>Palo Alto VM-Series</td><td>Palo Alto VM-Series</td></tr><tr><td><strong>East-west inspection</strong></td><td>Azure Firewall</td><td>Azure Firewall</td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No, Direct vHub</td><td>Palo Alto VM-Series</td></tr><tr><td><strong>Inter-hub inspection</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Via PA at source</td></tr><tr><td><strong>Branch-to-branch inspection</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> No</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Via PA</td></tr><tr><td><strong>Uses PA VM-Series IaaS</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td></tr><tr><td><strong>Uses PA Cloud NGFW</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td></tr><tr><td><strong>Uses Azure Firewall</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td><td>—</td><td>—</td><td>yes, instead of Palo Alto</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td></tr><tr><td><strong>Custom route tables</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Not allowed</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Not allowed</td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Supported</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Supported</td></tr><tr><td><strong>UDRs on spoke subnets</strong></td><td>Not required</td><td>Not required</td><td>—</td><td>—</td><td>Not required</td><td>Required (every subnet)</td></tr><tr><td><strong>Operational complexity</strong></td><td>Low</td><td>Low</td><td>—</td><td>—</td><td>Medium</td><td>Medium-High</td></tr><tr><td><strong>Routing management</strong></td><td>Platform-managed</td><td>Platform-managed</td><td>—</td><td>—</td><td>Manual static routes or BGP</td><td>Manual UDRs + static routes or BGP</td></tr><tr><td><strong>Spoke onboarding effort</strong></td><td>Low (connect to hub)</td><td>Low (connect to hub)</td><td>—</td><td>—</td><td>Low (connect to hub)</td><td>High (peer + UDR per subnet)</td></tr><tr><td><strong>Azure Firewall cost</strong></td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Yes</td><td>—</td><td>—</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> None</td><td><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> None</td></tr><tr><td><strong>PA licensing model</strong></td><td>N/A</td><td>Cloud NGFW SaaS</td><td>—</td><td>—</td><td>VM-Series IaaS</td><td>VM-Series IaaS</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Decision Flowchart</h2>



<pre class="wp-block-code"><code>Do you need a third-party NVA (e.g., Palo Alto) for ANY traffic?
│
├─ NO → Scenario 1 (Azure Firewall + Full Routing Intent)
│
└─ YES → Is it PA Cloud NGFW (SaaS) or PA VM-Series (IaaS)?
         │
         ├─ Cloud NGFW → Scenario 2 (Cloud NGFW Internet + AzFW Private)
         │
         └─ VM-Series IaaS → Do you need Azure Firewall for east-west?
                              │
                              ├─ YES → Scenario 5 (Static Routes Split)
                              │        &#x26a0; No inter-hub or branch-to-branch inspection, traffic is direct via vWAN\vHubs
                              │
                              └─ NO → Scenario 6 (Transit NVA vNet)
                                       &#x2705; Full inspection coverage
</code></pre>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The Azure vWAN routing landscape is powerful but opinionated. The platform gives you clean, declarative routing through Routing Intent — but only if your security solutions are deployed <strong>inside</strong> the hub. The moment you introduce an IaaS NVA in a spoke VNet, you&#8217;re working outside the Routing Intent model and must use manual static routes and UDRs.</p>



<p>The two approaches — Routing Intent and static routes — are <strong>mutually exclusive</strong>. Understanding this single constraint will save you hours of troubleshooting.</p>



<p><strong>Key takeaways:</strong></p>



<ol class="wp-block-list">
<li><strong>Routing Intent next hops must be in-hub resources</strong> — Azure Firewall, integrated NVA, or Cloud NGFW SaaS</li>



<li><strong>PA VM-Series IaaS in a spoke is NOT a valid Routing Intent next hop</strong> — no matter how you configure it</li>



<li><strong>You cannot service-chain from Azure Firewall in a hub to an NVA in a spoke</strong> — there&#8217;s no mechanism</li>



<li><strong>You CAN split Azure Firewall (east-west) and PA VM-Series (internet) using static routes</strong> — but you must NOT enable Routing Intent</li>



<li><strong>If the hub had pre-existing static routes before Routing Intent was enabled</strong>, you must fully remove intent, clean up all routes, and re-enable — the platform doesn&#8217;t auto-reconcile</li>
</ol>



<p>Choose the scenario that matches your security requirements, licensing investment, and operational maturity. There&#8217;s no single &#8220;right&#8221; answer — but there are several combinations that simply don&#8217;t work, and now you know which ones they are.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><em>Tested and validated in lab and production environments, May 2026. Based on Microsoft Learn documentation and hands-on deployment experience.</em></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>That&#8217;s the full blog post ready to copy. Want me to also generate a featured image / header graphic for it, or export it as a Word document?</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2026/05/15/azure-virtual-wan-whats-actually-supported-a-practical-guide-to-routing-intent-azure-firewall-and-nva-integration/">Azure Virtual WAN: What&#8217;s Actually Supported — A Practical Guide to Routing Intent, Azure Firewall, and NVA Integration</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6540</post-id>	</item>
		<item>
		<title>Azure DevOps Backup and Recovery</title>
		<link>https://www.tsls.co.uk/index.php/2024/05/28/azure-devops-backup-and-recovery/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Tue, 28 May 2024 15:45:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tsls.co.uk/?p=5789</guid>

					<description><![CDATA[<p>I have been asked on a number of occasions if a third-party backup solution for Azure Azure DevOps would be required. Hopefully this article helps to resolve that mystery, or gives you something more to</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2024/05/28/azure-devops-backup-and-recovery/">Azure DevOps Backup and Recovery</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have been asked on a number of occasions if a third-party backup solution for Azure Azure DevOps would be required.</p>



<p>Hopefully this article helps to resolve that mystery, or gives you something more to think about as the answer will depend on your situation.</p>



<p>First of all lets look at the recovery options already available. The table below highlights the key backup and recovery features. </p>



<figure class="wp-block-table"><table><tbody><tr><td>Feature</td><td>Details</td><td>Useful Reading</td></tr><tr><td>Azure DevOps SLA</td><td>99.9%</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops</a></td></tr><tr><td>HA</td><td>Replicated to regional pair i.e. if the primary location was UK South the replica would be in UK West &#8211; the data is not transferred outside of the geographical regions&nbsp;</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops</a></td></tr><tr><td>HA Failover</td><td>Microsoft Initiated (not automated and can&#8217;t be requested)</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/organizations/security/data-protection?view=azure-devops</a></td></tr><tr><td>Organisation Backup</td><td>28 Days from the point of deletion&nbsp;</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/organizations/accounts/recover-your-organization?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/organizations/accounts/recover-your-organization?view=azure-devops</a></td></tr><tr><td>Project Backup</td><td>28 Days from the point of deletion</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/organizations/projects/delete-project?view=azure-devops&amp;tabs=browser#restore-a-deleted-project">https://learn.microsoft.com/en-us/azure/devops/organizations/projects/delete-project?view=azure-devops&amp;tabs=browser#restore-a-deleted-project</a></td></tr><tr><td>Built-in service asset recovery solution&#8217;s:</td><td>&#8211;</td><td>&#8211;</td></tr><tr><td>Pipeline items*</td><td>30 Days and is restored from the Recycle Bin or YAML imported from Repo&nbsp;</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/release-notes/2019/pipelines/sprint-147-update#restore-deleted-release-pipelines">https://learn.microsoft.com/en-us/azure/devops/release-notes/2019/pipelines/sprint-147-update#restore-deleted-release-pipelines</a></td></tr><tr><td>Board items*</td><td>30 Days and is restored from the Recycle Bin</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/boards/backlogs/remove-delete-work-items?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/boards/backlogs/remove-delete-work-items?view=azure-devops</a></td></tr><tr><td>Artifacts*</td><td>30 Days and is restored from the Recycle Bin</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/artifacts/how-to/delete-and-recover-packages?view=azure-devops&amp;tabs=nuget">https://learn.microsoft.com/en-us/azure/devops/artifacts/how-to/delete-and-recover-packages?view=azure-devops&amp;tabs=nuget</a></td></tr><tr><td>Test Plan items</td><td>No</td><td></td></tr><tr><td>Repo&#8217;s</td><td>Git based revert/commit/Branch&nbsp;TFVC Rollback Change</td><td><a href="https://learn.microsoft.com/en-us/azure/devops/repos/git/undo?view=azure-devops&amp;tabs=visual-studio-2022">https://learn.microsoft.com/en-us/azure/devops/repos/git/undo?view=azure-devops&amp;tabs=visual-studio-2022</a><a href="https://learn.microsoft.com/en-us/azure/devops/repos/tfvc/roll-back-changesets?view=azure-devops">https://learn.microsoft.com/en-us/azure/devops/repos/tfvc/roll-back-changesets?view=azure-devops</a></td></tr></tbody></table></figure>



<p>Note: If the user (with the correct level of permissions) enters the recycle bin and selects permanently delete item then the asset/item will be removed and can&#8217;t be recovered</p>



<p>What have we learnt. Backups are retained for 28-days after a project or organisation is deleted. Asset recovery is available by using the recycle-bin and is kept for 30-days or your source code can be reverted or rolled back. Therefore your business will need to answer the following questions.</p>



<ol class="wp-block-list" start="1">
<li>Is it important to be able to restore accidently deleted DevOps Projects and Organisations beyond the 28-day window</li>



<li>Do you need to be able to restore Pipelines and Board Assets/Items beyond the 30-day recycle Bin</li>



<li>Do you need the ability to granularly restore Test Plans?
<ol class="wp-block-list" start="1">
<li>Note: Although these will be in a deleted Organisation and Project Backup &#8211; Granular asset restores are not part of the built in service. so, once a test is deleted it can&#8217;t be recovered</li>
</ol>
</li>



<li>For Repos are you looking for a recycle bin restore? rather than using the built in Git capabilities</li>
</ol>



<p>If you answer yes to any of the questions from points 1-4 then you will need a third-party backup solution from the likes of Keepit (https://www.keepit.com) or Backrightup (https://backrightup.com).</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2024/05/28/azure-devops-backup-and-recovery/">Azure DevOps Backup and Recovery</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5789</post-id>	</item>
		<item>
		<title>Evaluating VPN and SASE Options for Secure and Reliable Access</title>
		<link>https://www.tsls.co.uk/index.php/2024/04/20/evaluating-vpn-and-sase-options-for-secure-and-reliable-access/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Sat, 20 Apr 2024 17:31:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tsls.co.uk/?p=5696</guid>

					<description><![CDATA[<p>A comparison of five VPN options and their network and security implications Introduction Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, such as the Internet,</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2024/04/20/evaluating-vpn-and-sase-options-for-secure-and-reliable-access/">Evaluating VPN and SASE Options for Secure and Reliable Access</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A comparison of five VPN options and their network and security implications</p>



<h1 class="wp-block-heading">Introduction</h1>



<p>Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, such as the Internet, to access corporate resources and services. VPN is widely used by remote workers and mobile users who need to connect to their organisation’s network and applications. However, VPN also has some limitations and challenges, such as performance degradation, bandwidth consumption, complexity, and security risks.</p>



<p>Secure Access Service Edge (SASE) is a new concept that combines network and security functions into a unified cloud-based service. SASE aims to provide secure and fast access to any application, anywhere, and on any device. SASE solutions, such as zScaler and Entra global secure gateway, leverage modern security approaches, such as zero trust network access (ZTNA), cloud access security broker (CASB), and software-defined perimeter (SDP), to protect the data and identity of the users and devices.</p>



<p>The purpose of the next sections is to assess broadly how a VPN and SASE can access corporate resources and services (Cloud and non-cloud based). It will contrast the five main VPN options and their advantages and disadvantages from a network speed, reliability, high availability and security point of view. It will also suggest a VPN option or a No VPN option that uses modern security methods and functions.</p>



<h1 class="wp-block-heading">VPN Options</h1>



<p>There are five main VPN options that can be used to access corporate resources and services. They are:</p>



<ul class="wp-block-list">
<li>VPN Forced Tunnel: 100% of traffic goes into VPN appliance, including on-premise, Internet, and all SaaS/M365</li>



<li>VPN Forced Tunnel with few exceptions: VPN tunnel is used by default (default route points to VPN), with few, most important exempt scenarios that are allowed to go direct</li>



<li>VPN Forced Tunnel with broad exceptions: VPN tunnel is used by default (default route points to VPN), with broad exceptions that are allowed to go direct (such as all Microsoft 365, All Salesforce, All Zoom)</li>



<li>VPN Selective Tunnel: VPN tunnel is used only for corpnet-based services (typically on-premise). Default route (Internet and all Internet-based services) goes direct.</li>



<li>No VPN: A variation of #2. Instead of legacy VPN, all corpnet services are published through modern security approaches (like Zscaler and Microsoft Entra Global Secure Access)</li>
</ul>



<h1 class="wp-block-heading">Pros and Cons of VPN Options</h1>



<p>The following table summarizes the pros and cons of each VPN option from a network speed, reliability, high availability and security perspective.</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>VPN Option</strong></td><td><strong>Pros</strong></td><td><strong>Cons</strong></td></tr><tr><td>VPN Forced Tunnel</td><td>Simple and consistent configurationCentralised network and security policiesFull visibility and control of traffic</td><td>High bandwidth consumption and costPoor user experience and productivityLow scalability and resilienceOngoing maintenance, hardware upgrades and management</td></tr><tr><td>VPN Forced Tunnel with few exceptions</td><td>Reduced bandwidth consumption and costImproved user experience and productivity for exempt scenariosCentralised network and security policies for most trafficFull visibility and control of most traffic</td><td>Complex and inconsistent configurationPoor user experience and productivity for non-exempt scenariosLow scalability and resilience for non-exempt scenariosPotential security risks due to VPN bypass or compromise (unless a cloud solution is used to protect SaaS Services)Ongoing maintenance, hardware upgrades and management</td></tr><tr><td>VPN Forced Tunnel with broad exceptions</td><td>Significantly reduced bandwidth consumption and costSignificantly improved user experience and productivity for exempt scenariosCentralized network and security policies for most trafficFull visibility and control of most traffic</td><td>Very complex and inconsistent configurationPoor user experience and productivity for non-exempt scenariosLow scalability and resilience for non-exempt scenariosPotential security risks due to VPN bypass or compromise (unless a cloud solution is used to protect SaaS Services)Ongoing maintenance, hardware upgrades and management</td></tr><tr><td>VPN Selective Tunnel</td><td>Minimal bandwidth consumption and costOptimal user experience and productivity for all scenariosHigh scalability and resilience for all scenariosCentralized network and security policies for corpnet-based servicesFull visibility and control of corpnet-based services</td><td>Complex and inconsistent configurationLack of network and security policies for Internet-based servicesLack of visibility and control of Internet-based servicesPotential security risks due to VPN bypass or compromise (unless a cloud solution is used to protect SaaS Services)Ongoing maintenance, hardware upgrades and management</td></tr><tr><td>No VPN</td><td>No bandwidth consumption and cost for VPNOptimal user experience and productivity for all scenariosHigh scalability and resilience for all scenariosModern and consistent security policies for all servicesFull visibility and control of all services</td><td>Requires SASE solutions and integrationRequires identity and device managementRequires cloud and network optimization</td></tr></tbody></table></figure>



<h1 class="wp-block-heading">Recommendation</h1>



<p>Based on the comparison of the VPN options, the recommendation is to use either the VPN Selective Tunnel option or the No VPN option, depending on the availability and feasibility of the SASE solutions and integration. Both options offer the best network speed, reliability, high availability and security for accessing corporate resources and services.</p>



<p>The VPN Selective Tunnel option is suitable for organisations that have a mix of corpnet-based and Internet-based services, and that want to reduce the VPN bandwidth consumption and cost, and improve the user experience and productivity, while maintaining the network and security policies for the corpnet-based services. However, this option also requires complex and inconsistent configuration, and lacks network and security policies for the Internet-based services (such as Microsoft 365).</p>



<p>The No VPN option is suitable for organisations that have mostly Internet-based services, and that want to eliminate the VPN bandwidth consumption and cost, and optimize the user experience and productivity, while applying modern and consistent security policies for all services. This option also provides full visibility and control of all services, and leverages the features of the SASE solutions, such as zScaler, Entra Global Secure Access (GSA), FortiGate FortiSASE . However, this option also requires SASE solutions and integration, identity and device management, and cloud and network optimisation.</p>



<p>Some of the features of the SASE solutions that improve the security posture over a traditional VPN are:</p>



<ul class="wp-block-list">
<li>Tenant restriction option (Feature of Microsoft Entra): This feature allows the organisation to restrict the access to its cloud services only to the authorized devices and users, and prevent the access from any unauthorized or compromised devices or users.</li>



<li>Conditional Access (Feature of Microsoft Entra): This feature allows the organisation to enforce granular and dynamic policies based on the context of the user, device, location, application, and data, and grant or deny the access accordingly.</li>



<li>Continuous Access Evaluation (Feature of Microsoft Entra): This feature allows the organisation to monitor and evaluate the security posture of the user and device continuously, and adjust the access level or revoke the access if any changes or anomalies are detected.</li>



<li>Support for multi-platform: This feature allows the organisation to support and secure the access from any device and platform, such as Windows, Android, Mac, Linux, iOS, etc.</li>
</ul>



<p>Useful reference materials:</p>



<ol class="wp-block-list" start="1">
<li><a href="https://learn.microsoft.com/en-us/entra/global-secure-access/overview-what-is-global-secure-access">What is Global Secure Access? &#8211; Global Secure Access | Microsoft Learn</a></li>



<li><a href="https://learn.microsoft.com/en-us/entra/global-secure-access/concept-clients">Learn about the Global Secure Access clients for Microsoft Entra Private Access and Microsoft Entra Internet Access &#8211; Global Secure Access | Microsoft Learn</a></li>



<li><a href="https://www.zscaler.com/resources/data-sheets/zscaler-internet-access.pdf">Zscaler Internet Access | AI-Powered Security Service Edge</a></li>



<li><a href="https://www.fortinet.com/uk/products/sase">SASE Solution &#8211; Secure Access Service Edge | Fortinet</a></li>



<li><a href="https://www.ivanti.com/en-gb/company/history/pulse-secure">Pulse Secure: Secure Access Made Easy | Ivanti</a></li>
</ol>



<p><strong>Final Note:</strong> Microsoft Entra Global Secure Access is a fairly new service and some of its features are still in preview, which means as of writing that are not yet fully functional. However, the technology is built on services that are well-established and widely used, such as Application Proxy, Conditional Access and Continuous Access Evaluation. It might be a good idea to evaluate the use of both VPN selective Tunnelling and Entra GSA together. Entra GSA could be applied to Microsoft 365 traffic. Traffic for Microsoft would go directly from the local internet breakout and be secured by Entra GSA.</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2024/04/20/evaluating-vpn-and-sase-options-for-secure-and-reliable-access/">Evaluating VPN and SASE Options for Secure and Reliable Access</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5696</post-id>	</item>
		<item>
		<title>Entra Remote Network to Draytek 2860n Failure</title>
		<link>https://www.tsls.co.uk/index.php/2023/10/17/entra-remote-network-to-draytek-2860n-failure/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Tue, 17 Oct 2023 18:58:56 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.tsls.co.uk/?p=5373</guid>

					<description><![CDATA[<p>This article details the configuration issues with a Draytek 2860n VPN into Microsoft Entra. Issue You try to connect your Draytek 2860n but receive the below error in the logs: 2023-10-17 18:36:26 &#160;[IPSEC][L2L][1:EntraVPN][@xxx.xxx.xxx.13] IKE link</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2023/10/17/entra-remote-network-to-draytek-2860n-failure/">Entra Remote Network to Draytek 2860n Failure</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This article details the configuration issues with a Draytek 2860n VPN into Microsoft Entra.</p>



<h2 class="wp-block-heading">Issue</h2>



<p>You try to connect your Draytek 2860n but receive the below error in the logs:</p>



<figure class="wp-block-table"><table><tbody><tr><td>2023-10-17 18:36:26</td><td>&nbsp;[IPSEC][L2L][1:EntraVPN][@xxx.xxx.xxx.13] IKE link timeout: state linking</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : IKE SA #9760:STATE_IKESA_I is going to be deleted, delete its CHILD SA #9761:STATE_PARENT_I2</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : INFORMATIONAL : Receive IKEv2 Delete IKE SA request from xxx.xxx.xxx.13, deleting #9760</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : IKESA inR2 : Can&#8217;t decrypt message</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Missing payload : IKEv2_NP_v2SA+0x1840</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Received IKEv2 Notify&nbsp;[12345]</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Recv IKEv2_AUTH[35] Reply msgid 1 from xxx.xxx.xxx.13, Peer is IKEv2 Responder</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : #9760 IKE SA Established, REPLACE after 21375 seconds</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : IKESA inR1_outI2 : Create CHILD SA #9761, IKE SA is #9760</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : NAT_T Lookup : Peer is behind NAT</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : IKESA inR1_outI2 : Receive Notify IKEv2_NAT_DETECTION_DESTINATION_IP[16389]</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : IKESA inR1_outI2 : Receive Notify IKEv2_NAT_DETECTION_SOURCE_IP[16388]</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Received IKEv2 Notify IKEv2_NAT_DETECTION_DESTINATION_IP[16389]</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Received IKEv2 Notify IKEv2_NAT_DETECTION_SOURCE_IP[16388]</td></tr><tr><td>&nbsp;2023-10-17 18:36:14</td><td>&nbsp;## IKEv2 DBG : Recv IKEv2_SA_INIT[34] Reply msgid 0 from xxx.xxx.xxx.13, Peer is IKEv2 Responder</td></tr><tr><td>&nbsp;2023-10-17 18:36:13</td><td>&nbsp;## IKEv2 DBG : IKESA outI1 : Create IKE SA #9760 Profile Index 1</td></tr><tr><td>&nbsp;2023-10-17 18:36:13</td><td>&nbsp;Dialing Node1 (EntraVPN) : xxx.xxx.xxx.13</td></tr><tr><td>&nbsp;2023-10-17 18:36:13</td><td>&nbsp;Re-dial L2L[1], ifno: 10, status: 0 from WEB&#8230;</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">Reason</h2>



<p>Reason for the failure is because the device is unable to decrypt the key. This might be because cypher suites are not be supported. &#8211; Currently working with Draytek to understand how this can be resolved.</p>



<p></p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2023/10/17/entra-remote-network-to-draytek-2860n-failure/">Entra Remote Network to Draytek 2860n Failure</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5373</post-id>	</item>
		<item>
		<title>How to create a remote network into Entra Global Security Access</title>
		<link>https://www.tsls.co.uk/index.php/2023/09/17/how-to-create-a-remote-network-into-entra-global-security-access/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 18:26:00 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.tsls.co.uk/?p=5369</guid>

					<description><![CDATA[<p>The following steps detail how to create a direct VPN connection using FortiGate Firewall into the Entra Global Security Access service to protect network traffic of all device within your corporate networks. The scenario is</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2023/09/17/how-to-create-a-remote-network-into-entra-global-security-access/">How to create a remote network into Entra Global Security Access</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The following steps detail how to create a direct VPN connection using FortiGate Firewall into the Entra Global Security Access service to protect network traffic of all device within your corporate networks.</p>



<p>The scenario is focused on a FortiGate Firewall Appliance but other VPN Devices should work in a similar way.</p>



<p>NB: not all VPN device will work. IKEv2 Phase 2 is limited to support only GCMAES128, GCMAES192, GCMAES256 and not all device will support these cyphers.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<figure class="wp-block-table is-style-regular"><table><tbody><tr><td><strong><span style="text-decoration: underline;">Step</span></strong></td><td><strong><span style="text-decoration: underline;">Screenshot</span></strong></td></tr><tr><td>Navigate to <a href="https://entra.microsoft.com/">https://entra.microsoft.com/</a> &nbsp; <br>Expand Global Secure Access <br>Expand Remote Network &nbsp;<br> Click &#8220;Create remote network&#8221;</td><td> <img fetchpriority="high" decoding="async" width="600" height="445" class="wp-image-5402 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic1.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic1.png 962w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic1-300x222.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic1-768x569.png 768w" sizes="(max-width: 600px) 100vw, 600px" />&nbsp;</td></tr><tr><td><strong>Basic Information: &nbsp; </strong><br><br>Name: &lt;Endpoint Name&gt; <br>Region: &lt;Local Region&gt; &nbsp; <br><br>Click Next</td><td><img decoding="async" width="600" height="198" class="wp-image-5403 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic2.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic2.png 746w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic2-300x99.png 300w" sizes="(max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Connectivity Information: &nbsp;</strong> <br><br>Select Add a Link</td><td> &nbsp;<img decoding="async" width="600" height="325" class="wp-image-5419 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic3.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic3.png 495w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic3-300x162.png 300w" sizes="(max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Add a Link &#8211; General Information </strong>&nbsp; <br><br>Link Name: &lt;Name of the connected location&gt; <br>Device Type: &lt;Your VPN Device Make&gt; <br>IP Address: &lt;Your VPN Public IP&gt; <br>Local BGP Address: &lt;Microsoft BGP IP Address which you generate and must not conflict with any existing networks&gt; <br>Peer BGP Address: &lt;Your Route BGP Address&gt; <br>Link ASN: &lt;Your Router BGP ASN Address&gt; <br>Redundancy: &lt;Select as per your requirements&gt; <br>Bandwidth capacity: &lt;Select you required capacity; 250mbps, 500mbps, 750mbps, 1000mbps&gt; &nbsp; <br><br>Click Next</td><td><img loading="lazy" decoding="async" width="600" height="758" class="wp-image-5411 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic4.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic4.png 554w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic4-237x300.png 237w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Add a Link &#8211; Details Information  </strong> <br><br>Protocol: IKEv2 IPSEC/IKE <br>Policy: &lt;Default / Custom>   <br><br>If custom then the following options will need to be completed:   <br><br>IKE Phase 1: Encryption: &lt;AES128, AES192, AES256, GCMAES128, GCMAES265> <br>IKEv2 integrity: &lt;SHA256,SHA384, GCMAES128, GCMAES265> <br>DH Group: &lt;DHGroup14,>   <br>IKE Phase 2: <br>IPSec Encryption: &lt;GCMAES128, GCMAES192, GCMAES256, None> <br>IPSec Integrity: &lt;GCMAES128, GCMAES192, GCMAES256, SHA256> <br>PFS Group: &lt;None, PFS1, PFS2, PFS14, PFS2048, PFSMM, SCP256, ECP384> <br>SA lifetime (seconds): &lt;value from 300 &#8211; 86400>   <br><br>Click Next   <br><br>Note: SA IP Range must be configured as 0.0.0.0/0 &#8211; 0.0.0.0/0</td><td>&nbsp; &nbsp; <img loading="lazy" decoding="async" width="600" height="968" class="wp-image-5412 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic5.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic5.png 563w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic5-186x300.png 186w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Add a Link &#8211; Security &nbsp; </strong><br><br>Pre-shared key (PSK): &lt;enter a key to be used on Entra and on your VPN Device&gt;<br><br>Click Save</td><td> &nbsp;<img loading="lazy" decoding="async" width="600" height="217" class="wp-image-5413 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic6.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic6.png 563w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic6-300x109.png 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Connectivity Tab Information: </strong>&nbsp; <br><br>Click Next</td><td> &nbsp;<img loading="lazy" decoding="async" width="600" height="146" class="wp-image-5414 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic7.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic7.png 1402w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic7-300x73.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic7-1024x249.png 1024w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic7-768x187.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Traffic Profile: </strong>&nbsp; <br>Select the traffic profile for this connection</td><td><img loading="lazy" decoding="async" width="600" height="181" class="wp-image-5415 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic8.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic8.png 781w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic8-300x91.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic8-768x232.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td><strong>Review + Create Information &nbsp; <br></strong><br>Confirm the information is correct &nbsp; <br><br>Click Create remote network</td><td><img loading="lazy" decoding="async" width="600" height="296" class="wp-image-5416 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pic9.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pic9.png 1012w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic9-300x148.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pic9-768x379.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td>From the main remote network <br><br>Select view configuration</td><td><img loading="lazy" decoding="async" width="600" height="105" class="wp-image-5417 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pin10.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pin10.png 1427w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pin10-300x53.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pin10-1024x179.png 1024w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pin10-768x135.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr><tr><td>From the network configuration &nbsp; <br><br>Click Copy and Save</td><td><img loading="lazy" decoding="async" width="600" height="474" class="wp-image-5418 colorbox-5369" style="width: 600px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/10/pin11.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/10/pin11.png 560w, https://www.tsls.co.uk/wp-content/uploads/2023/10/pin11-300x237.png 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /></td></tr></tbody></table></figure>



<h2 class="wp-block-heading">FortiGate Firewall Configuration</h2>



<p>The following table details the steps to configure a FortiGate Firewall (in this instance a 60E)</p>



<p></p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Step</strong></td><td><strong>Screenshot</strong></td></tr><tr><td>Navigate to your routers IP http://x.x.x.x<br><br>Expand VPN<br>Expand IPsec Tunnel<br>Click Create New Tunnel<br><br></td><td><img loading="lazy" decoding="async" width="650" height="304" class="wp-image-5434 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG1.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG1.png 1308w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG1-300x140.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG1-1024x479.png 1024w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG1-768x359.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Within the Wizard<br><br>Name: VPNtoEntra<br>Template Type: Custom<br><br>Click Next</td><td><img loading="lazy" decoding="async" width="650" height="231" class="wp-image-5435 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG2.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG2.png 1363w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG2-300x107.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG2-1024x364.png 1024w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG2-768x273.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>On the Next Screen complete the following:<br><br>IP Version: IPv4<br>IP Address: EntraID VPN<br>Interface: WAN Port<br>NAT: Disabled<br>DPD: On Idle<br>Method: PSK<br>Pre-Shared Key: xxxxx<br>IKE: 2<br><br></td><td><img loading="lazy" decoding="async" width="650" height="706" class="wp-image-5436 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG3.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG3.png 1280w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG3-276x300.png 276w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG3-943x1024.png 943w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG3-768x834.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Phase 1 Proposal<br>Encryption: AES256<br>Authentication: SHA256<br>DH: G14<br>Key Life: 86400<br><br>Phase 2 Proposal<br>Local Address: 0.0.0.0/0.0.0.0<br>Remote Address: 0.0.0.0/0.0.0.0<br>Encryption:  AES256GCM<br>Enable PFS: uncheck<br>Key Lifetime: 27000 (from above)<br><br>Next Click OK</td><td><img loading="lazy" decoding="async" width="650" height="897" class="wp-image-5437 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG4.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG4.png 1010w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG4-217x300.png 217w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG4-742x1024.png 742w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG4-768x1060.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Configure BGP<br><br>Navigate to Network<br>Expand BGP (if missing add via system/feature visibility)<br>Enter your Local AS: (ASN from above)<br>Under Neighbors <br>Click Create New<br></td><td><img loading="lazy" decoding="async" width="650" height="384" class="wp-image-5441 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG5.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG5.png 598w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG5-300x177.png 300w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Add in the Azure BGP details:<br><br>IP: (Azure BGP from above)<br>Remote AS: (Azure ASN from above)<br>Update source: name of your IPSEC tunnel<br>Enable Enforce eBGP multihop<br>Enable Activate IPv4<br>Check Soft reconfiguration<br>Check Capability: route refresh<br><br>Click OK</td><td><img loading="lazy" decoding="async" width="650" height="690" class="wp-image-5442 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG6.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG6.png 717w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG6-283x300.png 283w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Navigate to Network<br>Expand BGP (if missing add via system/feature visibility)<br><br>Add in the local networks<br><br>Click Apply<br><br></td><td><img loading="lazy" decoding="async" width="650" height="483" class="wp-image-5443 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG7.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG7.png 1172w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG7-300x223.png 300w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG7-1024x760.png 1024w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG7-768x570.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Confirm the BGP has established and is not idle</td><td><img loading="lazy" decoding="async" width="650" height="188" class="wp-image-5444 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG8.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG8.png 745w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG8-300x87.png 300w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>And confirm that the routes are visible </td><td><img loading="lazy" decoding="async" width="650" height="627" class="wp-image-5440 colorbox-5369" style="width: 650px;" src="http://www.tsls.co.uk/wp-content/uploads/2023/09/FG9.png" alt="" srcset="https://www.tsls.co.uk/wp-content/uploads/2023/09/FG9.png 692w, https://www.tsls.co.uk/wp-content/uploads/2023/09/FG9-300x290.png 300w" sizes="auto, (max-width: 650px) 100vw, 650px" /></td></tr><tr><td>Next you will need to config<br>the firewall policy to allow <br>the internal traffic to Entra</td><td>TBC</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Make sure the following are in place:</p>



<ul class="wp-block-list">
<li>SA is configured with the routes 0.0.0.0/0 &#8211; 0.0.0.0/0.</li>



<li>Route is configured for the Entra BGP Peer within the subnet /32 i.e. 172.16.2.254/32 (172.16.2.254 being the Microsoft BGP endpoint).</li>



<li>Within BGP make sure enforce eBGP multihop is enabled (if you see packets being RST/DROP from your router IP to the Azure BGP IP it&#8217;s likely because eBGP is not enabled.</li>



<li>Routes to your local network is enabled in BGP</li>
</ul>
</div>
</div>
</div></div>
<p>The post <a href="https://www.tsls.co.uk/index.php/2023/09/17/how-to-create-a-remote-network-into-entra-global-security-access/">How to create a remote network into Entra Global Security Access</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5369</post-id>	</item>
		<item>
		<title>Remote Controller LG Magic Remote, Sonos and Sky Q</title>
		<link>https://www.tsls.co.uk/index.php/2020/10/28/remote-controller-lg-magic-remote-sonos-and-sky-q/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 16:06:23 +0000</pubDate>
				<category><![CDATA[Media]]></category>
		<guid isPermaLink="false">http://www.tsls.co.uk/?p=5072</guid>

					<description><![CDATA[<p>If like me you have the following setup you might be struggling to get the remotes to work with all of the devices. Hopefully this article will help you to over come this frustration. Using</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/10/28/remote-controller-lg-magic-remote-sonos-and-sky-q/">Remote Controller LG Magic Remote, Sonos and Sky Q</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If like me you have the following setup you might be struggling to get the remotes to work with all of the devices. Hopefully this article will help you to over come this frustration.</p>



<ol class="wp-block-list">
<li>LG Magic Remote ( OLED Screen)</li>



<li>Sky Q remote (basic controller)</li>



<li>Sonos Soundbar</li>
</ol>



<p>Using the LG Magic Remote select the home button.</p>



<ol class="wp-block-list">
<li>Select LG Device Connections</li>



<li>Select Soundbar</li>



<li>Select Optical </li>



<li>Select Pioneer</li>



<li>Select Option 1 and Save</li>
</ol>



<p>From Sky Q</p>



<ol class="wp-block-list">
<li>Select Settings</li>



<li>Select Setup</li>



<li>Select Remote Controls</li>



<li>Select Sky Remote</li>



<li>Configure the TV and Home Theatre with the following codes </li>
</ol>



<p>TV = 0206 (LG) | Home Theatre = ?0041 (Pioneer)</p>



<p>From the Sonos App</p>



<ol class="wp-block-list">
<li>Settings</li>



<li>System</li>



<li>Speaker Name</li>



<li>Remote Control Setup</li>



<li>Point the sky remote at the soundbar and press the volume button.</li>
</ol>



<p>Both the Sky remote and LG remote should be able to control the TV, Volume and Sky.</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/10/28/remote-controller-lg-magic-remote-sonos-and-sky-q/">Remote Controller LG Magic Remote, Sonos and Sky Q</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5072</post-id>	</item>
		<item>
		<title>Azure App Gateway Log Analytics</title>
		<link>https://www.tsls.co.uk/index.php/2020/07/14/azure-app-gateway-log-analytics/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 15:35:35 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.tsls.co.uk/?p=5064</guid>

					<description><![CDATA[<p>Run the following query within log analytics attached to the Azure App Gateway to review the WAF logs. AzureDiagnostics &#124; where ResourceType == &#8220;APPLICATIONGATEWAYS&#8221; and Category == &#8220;ApplicationGatewayFirewallLog&#8221;</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/07/14/azure-app-gateway-log-analytics/">Azure App Gateway Log Analytics</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Run the following query within log analytics attached to the Azure App Gateway to review the WAF logs.</p>



<p>AzureDiagnostics | where ResourceType == &#8220;APPLICATIONGATEWAYS&#8221; and Category == &#8220;ApplicationGatewayFirewallLog&#8221;</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/07/14/azure-app-gateway-log-analytics/">Azure App Gateway Log Analytics</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5064</post-id>	</item>
		<item>
		<title>Azure MySQL In App Manager &#8211; Increase Import Size</title>
		<link>https://www.tsls.co.uk/index.php/2020/04/21/azure-mysql-app-manager-increase-import-size/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Tue, 21 Apr 2020 03:59:47 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">http://www.tsls.co.uk/?p=4984</guid>

					<description><![CDATA[<p>When importing a database using phpmyadmin via the Azure App Service MySQL In App Manage you find the Import Maximum size is set to 8,192KiB (Max:8,192KiB). To increase the php upload size please run through</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/04/21/azure-mysql-app-manager-increase-import-size/">Azure MySQL In App Manager &#8211; Increase Import Size</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When importing a database using phpmyadmin via the Azure App Service MySQL In App Manage you find the Import Maximum size is set to 8,192KiB (Max:8,192KiB).</p>
<p>To increase the php upload size please run through the following steps:</p>
<p>In the Azure Portal, select your App Service<br />
Navigate to Configuration<br />
Select Application Settings<br />
Click New Application settings</p>
<p>Name = PHP_INI_SCAN_DIR<br />
Value = D:\home\site\ini</p>
<p>Click Save</p>
<p>Then Under Development Tools select Advanced Toolees (KUDU) or navigate to https://<sitename>.scm.azurewebsites.net</p>
<p>From the menu select Debug Console\CMD</p>
<p>Go to site directory and press the “+” button and create an “ini” directory.<br />
In the ini directory, create an “extensions.ini” file.<br />
Press the edit button next to the file.<br />
Add the following to the file and save.  This will modify the Master values.<br />
upload_max_filesize=30M<br />
post_max_size=30M<br />
Go to the wwwroot directory and create a “.user.ini” file.<br />
Edit the file and add the same values as mentioned in step 7 above. This will modify the Local values.<br />
Restart the site using the Azure Portal.<br />
PHPMyAdmin Import page will also reflect the changes.</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/04/21/azure-mysql-app-manager-increase-import-size/">Azure MySQL In App Manager &#8211; Increase Import Size</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4984</post-id>	</item>
		<item>
		<title>Office 365 DLP Action Encrypt email messages Missing</title>
		<link>https://www.tsls.co.uk/index.php/2020/02/11/4884/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 11 Feb 2020 09:18:47 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">http://www.tsls.co.uk/?p=4884</guid>

					<description><![CDATA[<p>ISSUE When you create an Office 365 Data Loss Protection (DLP) Policy the Action to &#8220;Encrypt email messages (applies only to content in Exchange)&#8221; is missing. RESOLUTION: Exchange Online Azure AD Rights Management needs to</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/02/11/4884/">Office 365 DLP Action Encrypt email messages Missing</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ISSUE</p>
<p>When you create an Office 365 Data Loss Protection (DLP) Policy the Action to &#8220;Encrypt email messages (applies only to content in Exchange)&#8221; is missing.</p>
<p>RESOLUTION:</p>
<p>Exchange Online Azure AD Rights Management needs to be eneabled.</p>
<p>Download the Exchange Online PowerShell from: https://docs.microsoft.com/en-us/powershell/exchange/exchange-online/exchange-online-powershell?view=exchange-ps</p>
<p><code><br />
Connect-ExchangeOnline<br />
Connect-AadrmService<br />
(Get-AadrmConfiguration).LicensingIntranetDistributionPointUrl -match “https:\/\/[0-9A-Za-z\.-]*” | Out-Null; $matches[0]</code></p>
<p><code>#Copy URL into $list below<br />
$irmConfig = Get-IRMConfiguration<br />
$list = $irmConfig.LicensingLocation<br />
$list += “https://512889fd-d24f-4f29-87e1-7111b27ebada.rms.eu.aadrm.com/_wmcs/licensing“<br />
Set-IRMConfiguration -LicensingLocation $list<br />
Set-IRMConfiguration -internallicensingenabled $true<br />
&lt;\code&gt;</p>
<p></code></p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/02/11/4884/">Office 365 DLP Action Encrypt email messages Missing</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4884</post-id>	</item>
		<item>
		<title>Lansweeper Windows Firewall Requriements</title>
		<link>https://www.tsls.co.uk/index.php/2020/01/22/lansweeper-windows-firewall-requriements/</link>
		
		<dc:creator><![CDATA[Luke Smith]]></dc:creator>
		<pubDate>Wed, 22 Jan 2020 09:35:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.tsls.co.uk/?p=4794</guid>

					<description><![CDATA[<p>The following rules need to be in place for lansweeper to run: &#160; netsh advfirewall firewall add rule name=&#8221;ICMP Allow incoming V4 echo request&#8221; protocol=&#8221;icmpv4:8,any&#8221; dir=in action=allow netsh firewall set service RemoteAdmin enable netsh firewall</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/01/22/lansweeper-windows-firewall-requriements/">Lansweeper Windows Firewall Requriements</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The following rules need to be in place for lansweeper to run:</p>
<p>&nbsp;</p>
<p style="margin: 0in; font-family: Calibri; font-size: 11.0pt;">netsh advfirewall firewall add rule name=&#8221;ICMP Allow incoming V4 echo request&#8221; protocol=&#8221;icmpv4:8,any&#8221; dir=in action=allow</p>
<p style="margin: 0in; font-family: Calibri; font-size: 11.0pt;">netsh firewall set service RemoteAdmin enable</p>
<p style="margin: 0in; font-family: Calibri; font-size: 11.0pt;">netsh firewall add portopening protocol=tcp port=135 name=DCOM_TCP135</p>
<p>The post <a href="https://www.tsls.co.uk/index.php/2020/01/22/lansweeper-windows-firewall-requriements/">Lansweeper Windows Firewall Requriements</a> appeared first on <a href="https://www.tsls.co.uk">TSLS - Luke Smith</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4794</post-id>	</item>
	</channel>
</rss>
