Background: I have a hub-and-spoke architecture where I am using Azure Firewall and an Azure Load Balancer to route traffic to a Virtual Machine Scale Set (VMSS). The VMSS hosts multiple web projects.
The Issue: When a user accesses a project via its URL, the backend application on the VMSS sees the Private IP address of the Azure Firewall (or Load Balancer) instead of the original Public IP of the user. This is preventing us from correctly whitelisting user IPs and logging accurate telemetry.
Current Setup:
- Ingress: Traffic hits Azure Firewall (DNAT) -> Azure Load Balancer -> VMSS.
SNAT: I have not explicitly enabled SNAT, but the firewall appears to be translating the source IP to its internal address.
Protocol: [Mention if it's HTTP/HTTPS or TCP/UDP].
Goal: I need the backend applications on the VMSS to be able to identify the original client's public IP address.
I have a hub-and-spoke architecture where I am using Azure Firewall and an Azure Load Balancer to route traffic to a Virtual Machine Scale Set (VMSS). The VMSS hosts multiple web projects.
The Issue: When a user accesses a project via its URL, the backend application on the VMSS sees the Private IP address of the Azure Firewall (or Load Balancer) instead of the original Public IP of the user. This is preventing us from correctly whitelisting user IPs and logging accurate telemetry.
Current Setup:
Ingress: Traffic hits Azure Firewall (DNAT) -> Azure Load Balancer -> VMSS.
SNAT: I have not explicitly enabled SNAT, but the firewall appears to be translating the source IP to its internal address.
Protocol: [Mention if it's HTTP/HTTPS or TCP/UDP].
Goal: I need the backend applications on the VMSS to be able to identify the original client's public IP address.