You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/inspect-traffic-with-azure-firewall.md
+29-26Lines changed: 29 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,10 @@
2
2
title: 'Use Azure Firewall to inspect traffic destined to a private endpoint'
3
3
titleSuffix: Azure Private Link
4
4
description: Learn how you can inspect traffic destined to a private endpoint using Azure Firewall.
5
-
services: private-link
6
-
author: jocortems
5
+
author: asudbring
7
6
ms.service: private-link
8
7
ms.topic: how-to
9
-
ms.date: 09/02/2020
8
+
ms.date: 04/27/2023
10
9
ms.author: allensu
11
10
ms.custom: template-how-to
12
11
---
@@ -24,14 +23,18 @@ You may need to inspect or block traffic from clients to the services exposed vi
24
23
25
24
The following limitations apply:
26
25
27
-
* Network security groups (NSG) are bypassed by traffic coming from private endpoints
28
-
* User-defined routes (UDR) are bypassed by traffic coming from private endpoints. User-defined routes can be used to override traffic destined for the private endpoint.
26
+
* Network security groups (NSG) traffic is bypassed from private endpoints
27
+
28
+
* User-defined routes (UDR) traffic is bypassed from private endpoints. User-defined routes can be used to override traffic destined for the private endpoint.
29
+
29
30
* A single route table can be attached to a subnet
31
+
30
32
* A route table supports up to 400 routes
31
33
32
34
Azure Firewall filters traffic using either:
33
35
34
36
*[FQDN in network rules](../firewall/fqdn-filtering-network-rules.md) for TCP and UDP protocols
37
+
35
38
*[FQDN in application rules](../firewall/features.md#application-fqdn-filtering-rules) for HTTP, HTTPS, and MSSQL.
36
39
37
40
> [!IMPORTANT]
@@ -46,7 +49,7 @@ Azure Firewall filters traffic using either:
46
49
47
50
This scenario is the most expandable architecture to connect privately to multiple Azure services using private endpoints. A route pointing to the network address space where the private endpoints are deployed is created. This configuration reduces administrative overhead and prevents running into the limit of 400 routes.
48
51
49
-
Connections from a client virtual network to the Azure Firewall in a hub virtual network will incur charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network are not charged.
52
+
Connections from a client virtual network to the Azure Firewall in a hub virtual network incurs charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network aren't charged.
50
53
51
54
For more information on charges related to connections with peered virtual networks, see the FAQ section of the [pricing](https://azure.microsoft.com/pricing/details/private-link/) page.
52
55
@@ -60,13 +63,13 @@ This scenario is implemented when:
60
63
61
64
* When only a few services are exposed in the virtual network using private endpoints
62
65
63
-
The virtual machines will have /32 system routes pointing to each private endpoint. One route per private endpoint is configured to route traffic through Azure Firewall.
66
+
The virtual machines have /32 system routes pointing to each private endpoint. One route per private endpoint is configured to route traffic through Azure Firewall.
64
67
65
68
The administrative overhead of maintaining the route table increases as services are exposed in the virtual network. The possibility of hitting the route limit also increases.
66
69
67
70
Depending on your overall architecture, it's possible to run into the 400 routes limit. It's recommended to use scenario 1 whenever possible.
68
71
69
-
Connections from a client virtual network to the Azure Firewall in a hub virtual network will incur charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network are not charged.
72
+
Connections from a client virtual network to the Azure Firewall in a hub virtual network incurs charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network aren't charged.
70
73
71
74
For more information on charges related to connections with peered virtual networks, see the FAQ section of the [pricing](https://azure.microsoft.com/pricing/details/private-link/) page.
72
75
@@ -83,37 +86,40 @@ Use this pattern when a migration to a hub and spoke architecture isn't possible
83
86
This architecture can be implemented if you have configured connectivity with your on-premises network using either:
*[Site to Site VPN](../vpn-gateway/tutorial-site-to-site-portal.md)
87
91
88
92
If your security requirements require client traffic to services exposed via private endpoints to be routed through a security appliance, deploy this scenario.
89
93
90
-
The same considerations as in scenario 2 above apply. In this scenario, there aren't virtual network peering charges. For more information about how to configure your DNS servers to allow on-premises workloads to access private endpoints, see [On-Premises workloads using a DNS forwarder](./private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder).
94
+
The same considerations as in scenario 2 above apply. In this scenario, there aren't virtual network peering charges. For more information about how to configure your DNS servers to allow on-premises workloads to access private endpoints, see [on-premises workloads using a DNS forwarder](./private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder).
91
95
92
96
## Prerequisites
93
97
94
98
* An Azure subscription.
99
+
95
100
* A Log Analytics workspace.
96
101
97
102
See, [Create a Log Analytics workspace in the Azure portal](../azure-monitor/logs/quick-create-workspace.md) to create a workspace if you don't have one in your subscription.
98
103
99
-
100
104
## Sign in to Azure
101
105
102
106
Sign in to the Azure portal at https://portal.azure.com.
103
107
104
108
## Create a VM
105
109
106
-
In this section, you'll create a virtual network and subnet to host the VM used to access your private link resource. An Azure SQL database is used as the example service.
110
+
In this section, you create a virtual network and subnet to host the VM used to access your private link resource. An Azure SQL database is used as the example service.
107
111
108
112
## Virtual networks and parameters
109
113
110
114
Create three virtual networks and their corresponding subnets to:
111
115
112
116
* Contain the Azure Firewall used to restrict communication between the VM and the private endpoint.
117
+
113
118
* Host the VM that is used to access your private link resource.
119
+
114
120
* Host the private endpoint.
115
121
116
-
Replace the following parameters in the steps with the information below:
122
+
Replace the following parameters in the steps with the following information:
117
123
118
124
### Azure Firewall network
119
125
@@ -176,7 +182,7 @@ Replace the following parameters in the steps with the information below:
176
182
| Confirm Password | Reenter password. |
177
183
|**Inbound port rules**||
178
184
| Public inbound ports | Select **None**. |
179
-
|||
185
+
180
186
181
187
3. Select **Next: Disks**.
182
188
@@ -267,9 +273,9 @@ In this section, you create a private SQL Database.
267
273
| Resource group | Select **myResourceGroup**. You created this resource group in the previous section.|
268
274
|**Database details**||
269
275
| Database name | Enter **mydatabase**. |
270
-
| Server | Select **Create new** and enter the information below. |
276
+
| Server | Select **Create new** and enter the following information. |
271
277
| Server name | Enter **mydbserver**. If this name is taken, enter a unique name. |
272
-
| Server admin login| Enter a name of your choosing. |
278
+
| Server admin sign in| Enter a name of your choosing. |
273
279
| Password | Enter a password of your choosing. |
274
280
| Confirm Password | Reenter password |
275
281
| Location | Select **(US) South Central US**. |
@@ -314,7 +320,7 @@ In this section, you create a private endpoint for the Azure SQL database in the
314
320
| Subscription | Select your subscription. |
315
321
| Resource type | Select **Microsoft.Sql/servers**. |
316
322
| Resource | Select **mydbserver** or the name of the server you created in the previous step.
317
-
| Target sub-resource| Select **sqlServer**. |
323
+
| Target subresource| Select **sqlServer**. |
318
324
319
325
8. Select the **Configuration** tab or select **Next: Configuration** at the bottom of the page.
320
326
@@ -342,7 +348,7 @@ In this section, you create a private endpoint for the Azure SQL database in the
342
348
343
349
## Connect the virtual networks using virtual network peering
344
350
345
-
In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to **myAzFwVNet** using peering. There won't be direct connectivity between **myVMVNet** and **myPEVNet**.
351
+
In this section, we connect virtual networks **myVMVNet** and **myPEVNet** to **myAzFwVNet** using peering. There isn't direct connectivity between **myVMVNet** and **myPEVNet**.
346
352
347
353
1. In the portal's search bar, enter **myAzFwVNet**.
348
354
@@ -368,7 +374,6 @@ In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to
368
374
| Allow forwarded traffic from myAzFwVNet to remote virtual network | Select **Enabled**. |
369
375
|**Configure gateway transit settings**||
370
376
| Allow gateway transit | Leave unchecked |
371
-
|||
372
377
373
378
4. Select **OK**.
374
379
@@ -399,7 +404,7 @@ In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to
399
404
400
405
## Link the virtual networks to the private DNS zone
401
406
402
-
In this section, we'll link virtual networks **myVMVNet** and **myAzFwVNet** to the **privatelink.database.windows.net** private DNS zone. This zone was created when we created the private endpoint.
407
+
In this section, we link virtual networks **myVMVNet** and **myAzFwVNet** to the **privatelink.database.windows.net** private DNS zone. This zone was created when we created the private endpoint.
403
408
404
409
The link is required for the VM and firewall to resolve the FQDN of database to its private endpoint address. Virtual network **myPEVNet** was automatically linked when the private endpoint was created.
405
410
@@ -426,7 +431,6 @@ The link is required for the VM and firewall to resolve the FQDN of database to
426
431
|**CONFIGURATION**||
427
432
| Enable auto registration | Leave unchecked. |
428
433
429
-
430
434
6. Select **OK**.
431
435
432
436
## Configure an application rule with SQL FQDN in Azure Firewall
@@ -464,15 +468,14 @@ This rule allows communication through the firewall that we created in the previ
464
468
| Source | Enter **10.1.0.0/16**. |
465
469
| Protocol: Port | Enter **mssql:1433**. |
466
470
| Target FQDNs | Enter **mydbserver.database.windows.net**. |
467
-
|||
468
471
469
472
7. Select **Add**.
470
473
471
474
## Route traffic between the virtual machine and private endpoint through Azure Firewall
472
475
473
476
We didn't create a virtual network peering directly between virtual networks **myVMVNet** and **myPEVNet**. The virtual machine **myVM** doesn't have a route to the private endpoint we created.
474
477
475
-
In this section, we'll create a route table with a custom route.
478
+
In this section, we create a route table with a custom route.
476
479
477
480
The route sends traffic from the **myVM** subnet to the address space of virtual network **myPEVNet**, through the Azure Firewall.
478
481
@@ -552,13 +555,13 @@ Connect to the VM **myVm** from the internet as follows:
552
555
553
556
## Access SQL Server privately from the virtual machine
554
557
555
-
In this section, you'll connect privately to the SQL Database using the private endpoint.
558
+
In this section, you connect privately to the SQL Database using the private endpoint.
556
559
557
560
1. Enter `nslookup mydbserver.database.windows.net`
558
561
559
-
You'll receive a message similar to below:
562
+
You receive a message similar to the following output:
560
563
561
-
```bash
564
+
```output
562
565
Server: 127.0.0.53
563
566
Address: 127.0.0.53#53
564
567
@@ -579,7 +582,7 @@ In this section, you'll connect privately to the SQL Database using the private
0 commit comments