-
Notifications
You must be signed in to change notification settings - Fork 618
Description
Statement:
I have two hostpools that behave differently with this configuration. Hostpool-A is Entra joined and Intune managed. Hostpool-B is Active Directory joined (Intune join can be irrelevant for this exercise).
Problem:
- Odd behaviour with AVD and Azure Firewall on AD-joined AVD machines and Entra-joined AVD machines.
Config params/scenario: Recreate Steps
- Route (UDR) sends all traffic to Hub vNET with Fw ***Hub-Spoke Architecture. This is being sent to the NVA "fw appliance".
- Peered vNET-Hub to vNET-Spoke
- Fw is configured with the base rules from this repo.
- AVD vNET-Spoke is configured with the DNS and Fw private IP as the DNS server.
- Fw has DNS proxy enabled and custom DNS set to CloudFlare/Google, but for my scenario, since I have an AD environment, I set the IP to my AD/DNS server .
- CA policy that allows AVD connections with MFA (This is normal).
- All Fw rules are configured to allow my AVD subnet "172.16.2.0/24"
- I have the default NSG with little config and one DNAT rule for RDP **To be deleted.
Outcomes:
- Hostpool-A (With AD) works just fine with the base rules. As my AVD-A-PC1 "172.16.2.1" is AD-joined.
- Hostpool-B (With Entra join) keeps getting an error that my password is incorrect on AVD-B-PC2 "172.16.2.6".
Troubleshooting:
- Disconnected the route config (UDR) and adjusted the hostpool RDP settings to include (targetisaadjoined:i:1;requireauthenticationserver:i:1). This worked, and my AVD login was successful without the UDR enabled/associated.
Further Issues:
- Upon enabling the UDR, I had the same password incorrect issue.
I enabled Azure Monitor logging and reviewed the logs as they streamed. I noticed some denied actions and adjusted my firewall as these were not in the base rules provided, and that worked with my AD-joined environment. Looking back, I could have created a wildcard for the following rules, but I was troubleshooting each rule as it came.
I have attached a snapshot of all the configured rules. The collection name is "ApplicationRules_AVD-AuthForAADLogin" and "ApplicationRules_AVD-Intune" I probably do not need the "
NetworkRules_AVD-Authentication," but it's 01:20 AM in South Africa, and I am tired.
I have attached the rules I had to add to make this work as required, but figured I would share this so that someone doesn't have to spend 3 days' worth of Event logs, MSFT documentation and LLMS.
I have also attached my Azure Firewall logs as I was doing my troubleshooting.
Here's a route print of my Intune-joined AVD VM after everything was resolved.
azfwpolicy-AVD-FirewallPolicy-v2-rcg-DefaultNetworkRuleCollectionGroup.json
azfwpolicy-AVD-FirewallPolicy-v2-rcg-DefaultDnatRuleCollectionGroup.json
azfwpolicy-AVD-FirewallPolicy-v2-rcg-DefaultApplicationRuleCollectionGroup.json
Desired Outcome:
- Microsoft to review the documentation and add some clarity on rules, also the DNS proxy config, to make more sense.
- Microsoft to advise on rules for each scenario, as I suspect I will not be the only one with this scenario.
