You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-dnat.md
+49-59Lines changed: 49 additions & 59 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: tutorial
8
-
ms.date: 02/26/2020
8
+
ms.date: 03/02/2020
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -34,21 +34,21 @@ For this tutorial, you create a two peered VNets:
34
34
## Create a resource group
35
35
36
36
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
37
-
2. On the Azure portal home page, click**Resource groups**, then click**Add**.
37
+
2. On the Azure portal home page, select**Resource groups**, then select**Add**.
38
38
3. For **Resource group name**, type **RG-DNAT-Test**.
39
39
4. For **Subscription**, select your subscription.
40
40
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
41
-
6.Click**Create**.
41
+
6.Select**Create**.
42
42
43
43
## Set up the network environment
44
44
45
45
First, create the VNets and then peer them.
46
46
47
47
### Create the Hub VNet
48
48
49
-
1. From the Azure portal home page, click**All services**.
50
-
2. Under **Networking**, click**Virtual networks**.
51
-
3.Click**Add**.
49
+
1. From the Azure portal home page, select**All services**.
50
+
2. Under **Networking**, select**Virtual networks**.
51
+
3.Select**Add**.
52
52
4. For **Name**, type **VN-Hub**.
53
53
5. For **Address space**, type **10.0.0.0/16**.
54
54
6. For **Subscription**, select your subscription.
@@ -61,13 +61,13 @@ First, create the VNets and then peer them.
61
61
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.md#why-does-azure-firewall-need-a-26-subnet-size).
62
62
63
63
10. For **Address range**, type **10.0.1.0/26**.
64
-
11. Use the other default settings, and then click**Create**.
64
+
11. Use the other default settings, and then select**Create**.
65
65
66
66
### Create a spoke VNet
67
67
68
-
1. From the Azure portal home page, click**All services**.
69
-
2. Under **Networking**, click**Virtual networks**.
70
-
3.Click**Add**.
68
+
1. From the Azure portal home page, select**All services**.
69
+
2. Under **Networking**, select**Virtual networks**.
70
+
3.Select**Add**.
71
71
4. For **Name**, type **VN-Spoke**.
72
72
5. For **Address space**, type **192.168.0.0/16**.
73
73
6. For **Subscription**, select your subscription.
@@ -77,72 +77,62 @@ First, create the VNets and then peer them.
77
77
78
78
The server will be in this subnet.
79
79
10. For **Address range**, type **192.168.1.0/24**.
80
-
11. Use the other default settings, and then click**Create**.
80
+
11. Use the other default settings, and then select**Create**.
81
81
82
82
### Peer the VNets
83
83
84
84
Now peer the two VNets.
85
85
86
-
#### Hub to spoke
87
-
88
-
1. Click the **VN-Hub** virtual network.
89
-
2. Under **Settings**, click **Peerings**.
90
-
3. Click **Add**.
91
-
4. Type **Peer-HubSpoke** for the name.
86
+
1. Select the **VN-Hub** virtual network.
87
+
2. Under **Settings**, select **Peerings**.
88
+
3. Select **Add**.
89
+
4. Type **Peer-HubSpoke** for the **Name of the peering from VN-Hub to VN-Spoke**.
92
90
5. Select **VN-Spoke** for the virtual network.
93
-
6. Click **OK**.
94
-
95
-
#### Spoke to hub
96
-
97
-
1. Click the **VN-Spoke** virtual network.
98
-
2. Under **Settings**, click **Peerings**.
99
-
3. Click **Add**.
100
-
4. Type **Peer-SpokeHub** for the name.
101
-
5. Select **VN-Hub** for the virtual network.
102
-
6. Click **Allow forwarded traffic**.
103
-
7. Click **OK**.
91
+
6. Type **Peer-SpokeHub** for **Name of peering from VN-Spoke to VN-Hub**.
92
+
7. For **Allow forwarded traffic from VN-Spoke to VN-Hub** select **Enabled**.
93
+
8. Select **OK**.
104
94
105
95
## Create a virtual machine
106
96
107
97
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
108
98
109
-
1. From the Azure portal home page, click**All services**.
110
-
2. Under **Compute**, click**Virtual machines**.
111
-
3.Click**Add**, and click**Windows Server**, click**Windows Server 2016 Datacenter**, and then click**Create**.
99
+
1. From the Azure portal home page, select**All services**.
100
+
2. Under **Compute**, select**Virtual machines**.
101
+
3.Select**Add**, and select**Windows Server**, select**Windows Server 2016 Datacenter**, and then select**Create**.
112
102
113
103
**Basics**
114
104
115
105
1. For **Name**, type **Srv-Workload**.
116
106
5. Type a username and password.
117
107
6. For **Subscription**, select your subscription.
118
-
7. For **Resource group**, click**Use existing**, and then select **RG-DNAT-Test**.
108
+
7. For **Resource group**, select**Use existing**, and then select **RG-DNAT-Test**.
119
109
8. For **Location**, select the same location that you used previously.
120
-
9.Click**OK**.
110
+
9.Select**OK**.
121
111
122
112
**Size**
123
113
124
114
1. Choose an appropriate size for a test virtual machine running Windows Server. For example, **B2ms** (8 GB RAM, 16 GB storage).
125
-
2.Click**Select**.
115
+
2.Select**Select**.
126
116
127
117
**Settings**
128
118
129
119
1. Under **Network**, for **Virtual network**, select **VN-Spoke**.
130
120
2. For **Subnet**, select **SN-Workload**.
131
-
3.Click**Public IP address** and then click**None**.
121
+
3.Select**Public IP address** and then select**None**.
132
122
4. For **Select public inbound ports**, select **No public inbound ports**.
133
-
2. Leave the other default settings and click**OK**.
123
+
2. Leave the other default settings and select**OK**.
134
124
135
125
**Summary**
136
126
137
-
Review the summary, and then click**Create**. This will take a few minutes to complete.
127
+
Review the summary, and then select**Create**. This will take a few minutes to complete.
138
128
139
-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Click the virtual machine name, and under **Settings**, click**Networking** to find the private IP address.
129
+
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select**Networking** to find the private IP address.
140
130
141
131
## Deploy the firewall
142
132
143
-
1. From the portal home page, click**Create a resource**.
144
-
2.Click**Networking**, and after **Featured**, click**See all**.
145
-
3.Click**Firewall**, and then click**Create**.
133
+
1. From the portal home page, select**Create a resource**.
134
+
2.Select**Networking**, and after **Featured**, select**See all**.
135
+
3.Select**Firewall**, and then select**Create**.
146
136
4. On the **Create a Firewall** page, use the following table to configure the firewall:
147
137
148
138
|Setting |Value |
@@ -154,44 +144,44 @@ After deployment finishes, note the private IP address for the virtual machine.
154
144
|Choose a virtual network |**Use existing**: VN-Hub|
155
145
|Public IP address |**Create new**. The Public IP address must be the Standard SKU type.|
156
146
157
-
5.Click**Review + create**.
158
-
6. Review the summary, and then click**Create** to create the firewall.
147
+
5.Select**Review + create**.
148
+
6. Review the summary, and then select**Create** to create the firewall.
159
149
160
150
This will take a few minutes to deploy.
161
-
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and click the **FW-DNAT-test** firewall.
151
+
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
162
152
8. Note the private IP address. You'll use it later when you create the default route.
163
153
164
154
## Create a default route
165
155
166
156
For the **SN-Workload** subnet, you configure the outbound default route to go through the firewall.
167
157
168
-
1. From the Azure portal home page, click**All services**.
169
-
2. Under **Networking**, click**Route tables**.
170
-
3.Click**Add**.
158
+
1. From the Azure portal home page, select**All services**.
159
+
2. Under **Networking**, select**Route tables**.
160
+
3.Select**Add**.
171
161
4. For **Name**, type **RT-FWroute**.
172
162
5. For **Subscription**, select your subscription.
173
163
6. For **Resource group**, select **Use existing**, and select **RG-DNAT-Test**.
174
164
7. For **Location**, select the same location that you used previously.
175
-
8.Click**Create**.
176
-
9.Click**Refresh**, and then click the **RT-FWroute** route table.
177
-
10.Click**Subnets**, and then click**Associate**.
178
-
11.Click**Virtual network**, and then select **VN-Spoke**.
179
-
12. For **Subnet**, click**SN-Workload**.
180
-
13.Click**OK**.
181
-
14.Click**Routes**, and then click**Add**.
165
+
8.Select**Create**.
166
+
9.Select**Refresh**, and then select the **RT-FWroute** route table.
167
+
10.Select**Subnets**, and then select**Associate**.
168
+
11.Select**Virtual network**, and then select **VN-Spoke**.
169
+
12. For **Subnet**, select**SN-Workload**.
170
+
13.Select**OK**.
171
+
14.Select**Routes**, and then select**Add**.
182
172
15. For **Route name**, type **FW-DG**.
183
173
16. For **Address prefix**, type **0.0.0.0/0**.
184
174
17. For **Next hop type**, select **Virtual appliance**.
185
175
186
176
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
187
177
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
188
-
19.Click**OK**.
178
+
19.Select**OK**.
189
179
190
180
## Configure a NAT rule
191
181
192
-
1. Open the **RG-DNAT-Test**, and click the **FW-DNAT-test** firewall.
193
-
2. On the **FW-DNAT-test** page, under **Settings**, click**Rules**.
194
-
3.Click**Add NAT rule collection**.
182
+
1. Open the **RG-DNAT-Test**, and select the **FW-DNAT-test** firewall.
183
+
2. On the **FW-DNAT-test** page, under **Settings**, select**Rules**.
184
+
3.Select**Add NAT rule collection**.
195
185
4. For **Name**, type **RC-DNAT-01**.
196
186
5. For **Priority**, type **200**.
197
187
6. Under **Rules**, for **Name**, type **RL-01**.
@@ -201,7 +191,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
201
191
10. For **Destination ports**, type **3389**.
202
192
11. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
0 commit comments