All posts
Azure Networking

Azure App Gateways In A Secured Hub VNet

· Mike Hosker

Following on from my last post discussing micro segmentation within an Azure secured hub, I will now cover deploying internet-facing resources — specifically Application Gateways — into the same secured VWAN hub architecture.

The Problem: Asymmetric Routing

When you deploy an Application Gateway into a spoke VNet connected to a secured VWAN hub, you hit an asymmetric routing problem:

  • Inbound traffic arrives directly through the Application Gateway's public IP — bypassing the firewall entirely
  • Return traffic is forced through the Azure Firewall because the secured hub advertises a default route with the firewall as the next hop

The Application Gateway receives traffic on one path and attempts to return it on another. This asymmetry breaks the gateway.

Diagram showing asymmetric traffic flow with an Application Gateway in a secured hub VNet

The Fix

The solution is to disable internet traffic security for the VNet containing the Application Gateway. This stops the secured hub from advertising the default route to that specific VNet, letting internet traffic flow directly.

In the portal:

  1. Navigate to Firewall Manager → Virtual Hubs
  2. Select the relevant virtual hub
  3. Go to Security Configuration
  4. Find the VNet containing your Application Gateway
  5. Click "Remove internet traffic security"

VWAN Security Configuration panel showing the internet traffic security setting

That's it. The Application Gateway can now handle its own inbound and outbound internet traffic symmetrically, while other spoke VNets remain protected through the firewall.

Beyond Application Gateways

This same issue — and fix — applies to any directly internet-facing resource hosted in a secured hub spoke VNet. Examples include VMs running Netscaler images or any other NVA that manages its own public IP traffic.

The key principle: if a resource manages its own internet-facing traffic path, it cannot also have that traffic forced through a firewall hop on return. Remove internet traffic security for that VNet specifically, and leave it enabled for everything else.


See also: Azure Virtual Network Micro Segmentation With Secure VWAN Hubs