Partner Case Study | Ontinue
July 9, 2025Listening at Scale: Using Gen AI to Understand 10,000 Voices
July 9, 2025By shruthi_nair Mays_Algebary
Inspection plays a vital role in network architecture, and each customer may have unique inspection requirements. This article explores common inspection scenarios in both Hub-and-Spoke and Virtual WAN (vWAN) topologies.
We’ll walk through design approaches assuming a setup with two Hubs or Virtual Hubs (VHubs) connected to on-premises environments via ExpressRoute. The specific regions of the Hubs or VHubs are not critical, as the same design principles can be applied across regions.
Scenario1: Hub-and-Spoke Inspection Patterns
In the Hub-and-Spoke scenarios, the baseline architecture assumes the presence of two Hub VNets. Each Hub VNet is peered with its local spoke VNets as well as with the other Hub VNet (Hub2-VNet). Additionally, both Hub VNets are connected to both local and remote ExpressRoute circuits to ensure redundancy.
Note:
- In Hub-and-Spoke scenarios, connectivity between virtual networks over ExpressRoute circuits across Hubs is intentionally disabled. This ensures that inter-Hub traffic uses VNet peering, which provides a more optimized path, rather than traversing the ExpressRoute circuit.
- In Scenario 1, we present two implementation approaches: a traditional method and an alternative leveraging Azure Virtual Network Manager (AVNM).
Option1: Full Inspection
A widely adopted design pattern is to inspect all traffic, both east-west and north-south, to meet security and compliance requirements. This can be implemented using a traditional Hub-and-Spoke topology with VNet Peering and User-Defined Routes (UDRs), or by leveraging AVNM with Connectivity Configurations and centralized UDR management.
In the traditional approach:
- VNet Peering is used to connect each spoke to its local Hub, and to establish connectivity between the two Hubs.
- UDRs direct traffic to the firewall as the next hop, ensuring inspection before reaching its destination.
- These UDRs are applied at the Spoke VNets, the Gateway Subnet, and the Firewall Subnet (especially for inter-region scenarios), as shown in the below diagram.
As your environment grows, managing individual UDRs and VNet Peerings manually can become complex. To simplify deployment and ongoing management at scale, you can use AVNM.
With AVNM:
- Use the Hub-and-Spoke connectivity configuration to manage routing within a single Hub.
- Use the Mesh connectivity configuration to establish Inter-Hub connectivity between the two Hubs.
- AVNM also enables centralized creation, assignment, and management of UDRs, streamlining network configuration at scale.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
✅ |
Spoke ↔ Spoke |
✅ |
Spoke ↔ Internet |
✅ |
Option2: Selective Inspection between Azure VNet
In some scenarios, full traffic inspection is not required or desirable. This may be due to network segmentation based on trust zones, for example, traffic between trusted VNets may not require inspection. Other reasons include high-volume data replication, latency-sensitive applications, or the need to reduce inspection overhead and cost.
In this design, VNets are grouped into trusted and untrusted zones. Trusted VNets can exist within the same Hub or across different Hubs. To bypass inspection between trusted VNets, you can connect them directly using VNet Peering or AVNM Mesh connectivity topology.
It’s important to note that UDRs are still used and configured as described in the full inspection model (Option 1). However, when trusted VNets are directly connected, system routes (created by VNet Peering or Mesh connectivity) take precedence over custom UDRs. As a result, traffic between trusted VNets bypasses the firewall and flows directly. In contrast, traffic to or from untrusted zones follows the UDRs, ensuring it is routed through the firewall for inspection.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
✅ |
Spoke ↔ Internet |
✅ |
Spoke ↔ Spoke (Same Zones) |
❌ |
Spoke ↔ Spoke (Across Zones) |
✅ |
Option3: No inspection to on-premises
In cases where a firewall at the on-premises or colocation site already inspects traffic from Azure, customers typically aim to avoid double inspection. To support this in the above design, traffic destined for on-premises is not routed through the firewall deployed in Azure. For the UDRs applied to the spoke VNets, ensure that “Propagate Gateway Routes” is set to true, allowing traffic to follow the ExpressRoute path directly without additional inspection in Azure.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
❌ |
Spoke ↔ Spoke |
✅ |
Spoke ↔ Internet |
✅ |
Option4: Internet Inspection Only
While not generally recommended, some customers choose to inspect only internet-bound traffic and allow private traffic to flow without inspection. In such cases, spoke VNets can be directly connected using VNet Peering or AVNM Mesh connectivity. To ensure on-premises traffic avoids inspection, set “Propagate Gateway Routes” to true in the UDRs applied to spoke VNets. This allows traffic to follow the ExpressRoute path directly without being inspected in Azure.
Scenario2: vWAN Inspection Options
Now we will explore inspection options using a vWAN topology.
Across all scenarios, the base architecture assumes two Virtual Hubs (VHubs), each connected to its respective local spoke VNets. vWAN provides default connectivity between the two VHubs, and each VHub is also connected to both local and remote ExpressRoute circuits for redundancy.
It’s important to note that this discussion focuses on inspection in vWAN using Routing Intent. As a result, bypassing inspection for traffic to on-premises is not supported in this model.
Option1: Full Inspection
As noted earlier, inspecting all traffic, both east-west and north-south, is a common practice to fulfill compliance and security needs. In this design, enabling Routing Intent provides the capability to inspect both, private and internet-bound traffic. Unlike the Hub-and-Spoke topology, this approach does not require any UDR configuration.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
✅ |
Spoke ↔ Spoke |
✅ |
Spoke ↔ Internet |
✅ |
Option2: Using different firewall flavors for traffic inspection
- Using different firewall flavors inside VHub for traffic inspection
Some customers require specific firewalls for different traffic flows, for example, using Azure Firewall for East-West traffic while relying on a third-party firewall for North-South inspection. In vWAN, it’s possible to deploy both Azure Firewall and a third-party network virtual appliance (NVA) within the same VHub. However, as of this writing, deploying two different third-party NVAs in the same VHub is not supported. This behavior may change in the future, so it’s recommended to monitor the known limitations section for updates. With this design, you can easily control which firewall handles East-West versus North-South traffic using Routing Intent, eliminating the need for UDRs.
- Deploying third-party firewalls in spoke VNets when VHub limitations apply
If the third-party firewall you want to use is not supported within the VHub, or if the managed firewall available in the VHub lacks certain required features compared to the version deployable in a regular VNet, you can deploy the third-party firewall in a spoke VNet instead, while using Azure Firewall in the VHub.
In this design, the third-party firewall (deployed in a spoke VNet) handles internet-bound traffic, and Azure Firewall (in the VHub) inspects East-West traffic. This setup is achieved by peering the third-party firewall VNet to the VHub, as well as directly peering it with the spoke VNets. These spoke VNets are also connected to the VHub, as illustrated in the diagram below. UDRs are required in the spoke VNets to forward internet-bound traffic to the third-party firewall VNet. East-West traffic routing, however, is handled using the Routing Intent feature, directing traffic through Azure Firewall without the need for UDRs.
Note: Although it is not required to connect the third-party firewall VNet to the VHub for traffic flow, doing so is recommended for ease of management and on-premises reachability.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
✅ Inspected using Azure Firewall |
Spoke ↔ Spoke |
✅ Inspected using Azure Firewall |
Spoke ↔ Internet |
✅ Inspected using Third Party Firewall |
Option3: Selective Inspection between Azure VNets
Similar to the Hub-and-Spoke topology, there are scenarios where full traffic inspection is not ideal. This may be due to Azure VNets being segmented into trusted and untrusted zones, where inspection is unnecessary between trusted VNets. Other reasons include large data replication between specific VNets or latency-sensitive applications that require minimizing inspection delays and associated costs.
In this design, trusted and untrusted VNets can reside within the same VHub or across different VHubs. Routing Intent remains enabled to inspect traffic between trusted and untrusted VNets, as well as internet-bound traffic. To bypass inspection between trusted VNets, you can connect them directly using VNet Peering or AVNM Mesh connectivity.
Unlike the Hub-and-Spoke model, this design does not require UDR configuration. Because trusted VNets are directly connected, system routes from VNet peering take precedence over routes learned through the VHub. Traffic destined for untrusted zones will continue to follow the Routing Intent and be inspected accordingly.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
✅ |
Spoke ↔ Internet |
✅ |
Spoke ↔ Spoke (Same Zones) |
❌ |
Spoke ↔ Spoke (Across Zones) |
✅ |
Option4: Internet Inspection Only
While not generally recommended, some customers choose to inspect only internet-bound traffic and bypass inspection of private traffic. In this design, you only enable the Internet Inspection option within Routing Intent, so private traffic bypasses the firewall entirely. The VHub manages both intra-and inter-VHub routing directly.
Connectivity Inspection Table
Connectivity Scenario |
Inspected |
On-premises ↔ Azure |
❌ |
Spoke ↔ Internet |
✅ |
Spoke ↔ Spoke |
❌ |