Yes, you are correct. Azure Virtual Network encryption is intended to encrypt traffic between virtual machines within a virtual network, but it does not support Azure DNS Private Resolver, Application Gateway, and Azure Firewall.
- Traffic between VMs in the same VNET is encrypted. However, when traffic passes through Azure Firewall, encryption may not be applied because Azure Firewall does not support Virtual Network encryption.
Additionally, the Azure firewall filters traffic based on your set rules, but it does not decrypt or inspect encrypted traffic. If encryption is applied before traffic reaches the firewall, it may not enforce rules effectively.
- If deep packet inspection is required, please explore alternative security solutions that offer encrypted traffic analysis at this time.
Refer : https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-encryption-faq
Use Virtual Network Flow Logs to verify if traffic is encrypted between VMs.
If you would like to request this feature, please post it in the Azure feedback. All the feedback you share in these forums will be monitored and reviewed by the Microsoft engineering teams responsible for building Azure.
Azure Networking Feedback Forum · Community
Please add a comment below if you have any further questions.