Skip to content

Commit 06aeed9

Browse files
committed
Update the peering steps
1 parent 38e3397 commit 06aeed9

File tree

1 file changed

+49
-59
lines changed

1 file changed

+49
-59
lines changed

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 49 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 02/26/2020
8+
ms.date: 03/02/2020
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -34,21 +34,21 @@ For this tutorial, you create a two peered VNets:
3434
## Create a resource group
3535

3636
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
37-
2. On the Azure portal home page, click **Resource groups**, then click **Add**.
37+
2. On the Azure portal home page, select **Resource groups**, then select **Add**.
3838
3. For **Resource group name**, type **RG-DNAT-Test**.
3939
4. For **Subscription**, select your subscription.
4040
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
41-
6. Click **Create**.
41+
6. Select **Create**.
4242

4343
## Set up the network environment
4444

4545
First, create the VNets and then peer them.
4646

4747
### Create the Hub VNet
4848

49-
1. From the Azure portal home page, click **All services**.
50-
2. Under **Networking**, click **Virtual networks**.
51-
3. Click **Add**.
49+
1. From the Azure portal home page, select **All services**.
50+
2. Under **Networking**, select **Virtual networks**.
51+
3. Select **Add**.
5252
4. For **Name**, type **VN-Hub**.
5353
5. For **Address space**, type **10.0.0.0/16**.
5454
6. For **Subscription**, select your subscription.
@@ -61,13 +61,13 @@ First, create the VNets and then peer them.
6161
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.md#why-does-azure-firewall-need-a-26-subnet-size).
6262
6363
10. For **Address range**, type **10.0.1.0/26**.
64-
11. Use the other default settings, and then click **Create**.
64+
11. Use the other default settings, and then select **Create**.
6565

6666
### Create a spoke VNet
6767

68-
1. From the Azure portal home page, click **All services**.
69-
2. Under **Networking**, click **Virtual networks**.
70-
3. Click **Add**.
68+
1. From the Azure portal home page, select **All services**.
69+
2. Under **Networking**, select **Virtual networks**.
70+
3. Select **Add**.
7171
4. For **Name**, type **VN-Spoke**.
7272
5. For **Address space**, type **192.168.0.0/16**.
7373
6. For **Subscription**, select your subscription.
@@ -77,72 +77,62 @@ First, create the VNets and then peer them.
7777

7878
The server will be in this subnet.
7979
10. For **Address range**, type **192.168.1.0/24**.
80-
11. Use the other default settings, and then click **Create**.
80+
11. Use the other default settings, and then select **Create**.
8181

8282
### Peer the VNets
8383

8484
Now peer the two VNets.
8585

86-
#### Hub to spoke
87-
88-
1. Click the **VN-Hub** virtual network.
89-
2. Under **Settings**, click **Peerings**.
90-
3. Click **Add**.
91-
4. Type **Peer-HubSpoke** for the name.
86+
1. Select the **VN-Hub** virtual network.
87+
2. Under **Settings**, select **Peerings**.
88+
3. Select **Add**.
89+
4. Type **Peer-HubSpoke** for the **Name of the peering from VN-Hub to VN-Spoke**.
9290
5. Select **VN-Spoke** for the virtual network.
93-
6. Click **OK**.
94-
95-
#### Spoke to hub
96-
97-
1. Click the **VN-Spoke** virtual network.
98-
2. Under **Settings**, click **Peerings**.
99-
3. Click **Add**.
100-
4. Type **Peer-SpokeHub** for the name.
101-
5. Select **VN-Hub** for the virtual network.
102-
6. Click **Allow forwarded traffic**.
103-
7. Click **OK**.
91+
6. Type **Peer-SpokeHub** for **Name of peering from VN-Spoke to VN-Hub**.
92+
7. For **Allow forwarded traffic from VN-Spoke to VN-Hub** select **Enabled**.
93+
8. Select **OK**.
10494

10595
## Create a virtual machine
10696

10797
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
10898

109-
1. From the Azure portal home page, click **All services**.
110-
2. Under **Compute**, click **Virtual machines**.
111-
3. Click **Add**, and click **Windows Server**, click **Windows Server 2016 Datacenter**, and then click **Create**.
99+
1. From the Azure portal home page, select **All services**.
100+
2. Under **Compute**, select **Virtual machines**.
101+
3. Select **Add**, and select **Windows Server**, select **Windows Server 2016 Datacenter**, and then select **Create**.
112102

113103
**Basics**
114104

115105
1. For **Name**, type **Srv-Workload**.
116106
5. Type a username and password.
117107
6. For **Subscription**, select your subscription.
118-
7. For **Resource group**, click **Use existing**, and then select **RG-DNAT-Test**.
108+
7. For **Resource group**, select **Use existing**, and then select **RG-DNAT-Test**.
119109
8. For **Location**, select the same location that you used previously.
120-
9. Click **OK**.
110+
9. Select **OK**.
121111

122112
**Size**
123113

124114
1. Choose an appropriate size for a test virtual machine running Windows Server. For example, **B2ms** (8 GB RAM, 16 GB storage).
125-
2. Click **Select**.
115+
2. Select **Select**.
126116

127117
**Settings**
128118

129119
1. Under **Network**, for **Virtual network**, select **VN-Spoke**.
130120
2. For **Subnet**, select **SN-Workload**.
131-
3. Click **Public IP address** and then click **None**.
121+
3. Select **Public IP address** and then select **None**.
132122
4. For **Select public inbound ports**, select **No public inbound ports**.
133-
2. Leave the other default settings and click **OK**.
123+
2. Leave the other default settings and select **OK**.
134124

135125
**Summary**
136126

137-
Review the summary, and then click **Create**. This will take a few minutes to complete.
127+
Review the summary, and then select **Create**. This will take a few minutes to complete.
138128

139-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Click the virtual machine name, and under **Settings**, click **Networking** to find the private IP address.
129+
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select **Networking** to find the private IP address.
140130

141131
## Deploy the firewall
142132

143-
1. From the portal home page, click **Create a resource**.
144-
2. Click **Networking**, and after **Featured**, click **See all**.
145-
3. Click **Firewall**, and then click **Create**.
133+
1. From the portal home page, select **Create a resource**.
134+
2. Select **Networking**, and after **Featured**, select **See all**.
135+
3. Select **Firewall**, and then select **Create**.
146136
4. On the **Create a Firewall** page, use the following table to configure the firewall:
147137

148138
|Setting |Value |
@@ -154,44 +144,44 @@ After deployment finishes, note the private IP address for the virtual machine.
154144
|Choose a virtual network |**Use existing**: VN-Hub|
155145
|Public IP address |**Create new**. The Public IP address must be the Standard SKU type.|
156146

157-
5. Click **Review + create**.
158-
6. Review the summary, and then click **Create** to create the firewall.
147+
5. Select **Review + create**.
148+
6. Review the summary, and then select **Create** to create the firewall.
159149

160150
This will take a few minutes to deploy.
161-
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and click the **FW-DNAT-test** firewall.
151+
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
162152
8. Note the private IP address. You'll use it later when you create the default route.
163153

164154
## Create a default route
165155

166156
For the **SN-Workload** subnet, you configure the outbound default route to go through the firewall.
167157

168-
1. From the Azure portal home page, click **All services**.
169-
2. Under **Networking**, click **Route tables**.
170-
3. Click **Add**.
158+
1. From the Azure portal home page, select **All services**.
159+
2. Under **Networking**, select **Route tables**.
160+
3. Select **Add**.
171161
4. For **Name**, type **RT-FWroute**.
172162
5. For **Subscription**, select your subscription.
173163
6. For **Resource group**, select **Use existing**, and select **RG-DNAT-Test**.
174164
7. For **Location**, select the same location that you used previously.
175-
8. Click **Create**.
176-
9. Click **Refresh**, and then click the **RT-FWroute** route table.
177-
10. Click **Subnets**, and then click **Associate**.
178-
11. Click **Virtual network**, and then select **VN-Spoke**.
179-
12. For **Subnet**, click **SN-Workload**.
180-
13. Click **OK**.
181-
14. Click **Routes**, and then click **Add**.
165+
8. Select **Create**.
166+
9. Select **Refresh**, and then select the **RT-FWroute** route table.
167+
10. Select **Subnets**, and then select **Associate**.
168+
11. Select **Virtual network**, and then select **VN-Spoke**.
169+
12. For **Subnet**, select **SN-Workload**.
170+
13. Select **OK**.
171+
14. Select **Routes**, and then select **Add**.
182172
15. For **Route name**, type **FW-DG**.
183173
16. For **Address prefix**, type **0.0.0.0/0**.
184174
17. For **Next hop type**, select **Virtual appliance**.
185175

186176
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
187177
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
188-
19. Click **OK**.
178+
19. Select **OK**.
189179

190180
## Configure a NAT rule
191181

192-
1. Open the **RG-DNAT-Test**, and click the **FW-DNAT-test** firewall.
193-
2. On the **FW-DNAT-test** page, under **Settings**, click **Rules**.
194-
3. Click **Add NAT rule collection**.
182+
1. Open the **RG-DNAT-Test**, and select the **FW-DNAT-test** firewall.
183+
2. On the **FW-DNAT-test** page, under **Settings**, select **Rules**.
184+
3. Select **Add NAT rule collection**.
195185
4. For **Name**, type **RC-DNAT-01**.
196186
5. For **Priority**, type **200**.
197187
6. Under **Rules**, for **Name**, type **RL-01**.
@@ -201,7 +191,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
201191
10. For **Destination ports**, type **3389**.
202192
11. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
203193
12. For **Translated port**, type **3389**.
204-
13. Click **Add**.
194+
13. Select **Add**.
205195

206196
## Test the firewall
207197

0 commit comments

Comments
 (0)