Skip to content

Commit 1699727

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into linux-fixes
2 parents 0d748ab + ac87ed8 commit 1699727

File tree

1 file changed

+29
-26
lines changed

1 file changed

+29
-26
lines changed

articles/private-link/inspect-traffic-with-azure-firewall.md

Lines changed: 29 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22
title: 'Use Azure Firewall to inspect traffic destined to a private endpoint'
33
titleSuffix: Azure Private Link
44
description: Learn how you can inspect traffic destined to a private endpoint using Azure Firewall.
5-
services: private-link
6-
author: jocortems
5+
author: asudbring
76
ms.service: private-link
87
ms.topic: how-to
9-
ms.date: 09/02/2020
8+
ms.date: 04/27/2023
109
ms.author: allensu
1110
ms.custom: template-how-to
1211
---
@@ -24,14 +23,18 @@ You may need to inspect or block traffic from clients to the services exposed vi
2423

2524
The following limitations apply:
2625

27-
* Network security groups (NSG) are bypassed by traffic coming from private endpoints
28-
* User-defined routes (UDR) are bypassed by traffic coming from private endpoints. User-defined routes can be used to override traffic destined for the private endpoint.
26+
* Network security groups (NSG) traffic is bypassed from private endpoints
27+
28+
* User-defined routes (UDR) traffic is bypassed from private endpoints. User-defined routes can be used to override traffic destined for the private endpoint.
29+
2930
* A single route table can be attached to a subnet
31+
3032
* A route table supports up to 400 routes
3133

3234
Azure Firewall filters traffic using either:
3335

3436
* [FQDN in network rules](../firewall/fqdn-filtering-network-rules.md) for TCP and UDP protocols
37+
3538
* [FQDN in application rules](../firewall/features.md#application-fqdn-filtering-rules) for HTTP, HTTPS, and MSSQL.
3639

3740
> [!IMPORTANT]
@@ -46,7 +49,7 @@ Azure Firewall filters traffic using either:
4649

4750
This scenario is the most expandable architecture to connect privately to multiple Azure services using private endpoints. A route pointing to the network address space where the private endpoints are deployed is created. This configuration reduces administrative overhead and prevents running into the limit of 400 routes.
4851

49-
Connections from a client virtual network to the Azure Firewall in a hub virtual network will incur charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network are not charged.
52+
Connections from a client virtual network to the Azure Firewall in a hub virtual network incurs charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network aren't charged.
5053

5154
For more information on charges related to connections with peered virtual networks, see the FAQ section of the [pricing](https://azure.microsoft.com/pricing/details/private-link/) page.
5255

@@ -60,13 +63,13 @@ This scenario is implemented when:
6063

6164
* When only a few services are exposed in the virtual network using private endpoints
6265

63-
The virtual machines will have /32 system routes pointing to each private endpoint. One route per private endpoint is configured to route traffic through Azure Firewall.
66+
The virtual machines have /32 system routes pointing to each private endpoint. One route per private endpoint is configured to route traffic through Azure Firewall.
6467

6568
The administrative overhead of maintaining the route table increases as services are exposed in the virtual network. The possibility of hitting the route limit also increases.
6669

6770
Depending on your overall architecture, it's possible to run into the 400 routes limit. It's recommended to use scenario 1 whenever possible.
6871

69-
Connections from a client virtual network to the Azure Firewall in a hub virtual network will incur charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network are not charged.
72+
Connections from a client virtual network to the Azure Firewall in a hub virtual network incurs charges if the virtual networks are peered. Connections from Azure Firewall in a hub virtual network to private endpoints in a peered virtual network aren't charged.
7073

7174
For more information on charges related to connections with peered virtual networks, see the FAQ section of the [pricing](https://azure.microsoft.com/pricing/details/private-link/) page.
7275

@@ -83,37 +86,40 @@ Use this pattern when a migration to a hub and spoke architecture isn't possible
8386
This architecture can be implemented if you have configured connectivity with your on-premises network using either:
8487

8588
* [ExpressRoute](..\expressroute\expressroute-introduction.md)
89+
8690
* [Site to Site VPN](../vpn-gateway/tutorial-site-to-site-portal.md)
8791

8892
If your security requirements require client traffic to services exposed via private endpoints to be routed through a security appliance, deploy this scenario.
8993

90-
The same considerations as in scenario 2 above apply. In this scenario, there aren't virtual network peering charges. For more information about how to configure your DNS servers to allow on-premises workloads to access private endpoints, see [On-Premises workloads using a DNS forwarder](./private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder).
94+
The same considerations as in scenario 2 above apply. In this scenario, there aren't virtual network peering charges. For more information about how to configure your DNS servers to allow on-premises workloads to access private endpoints, see [on-premises workloads using a DNS forwarder](./private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder).
9195

9296
## Prerequisites
9397

9498
* An Azure subscription.
99+
95100
* A Log Analytics workspace.
96101

97102
See, [Create a Log Analytics workspace in the Azure portal](../azure-monitor/logs/quick-create-workspace.md) to create a workspace if you don't have one in your subscription.
98103

99-
100104
## Sign in to Azure
101105

102106
Sign in to the Azure portal at https://portal.azure.com.
103107

104108
## Create a VM
105109

106-
In this section, you'll create a virtual network and subnet to host the VM used to access your private link resource. An Azure SQL database is used as the example service.
110+
In this section, you create a virtual network and subnet to host the VM used to access your private link resource. An Azure SQL database is used as the example service.
107111

108112
## Virtual networks and parameters
109113

110114
Create three virtual networks and their corresponding subnets to:
111115

112116
* Contain the Azure Firewall used to restrict communication between the VM and the private endpoint.
117+
113118
* Host the VM that is used to access your private link resource.
119+
114120
* Host the private endpoint.
115121

116-
Replace the following parameters in the steps with the information below:
122+
Replace the following parameters in the steps with the following information:
117123

118124
### Azure Firewall network
119125

@@ -176,7 +182,7 @@ Replace the following parameters in the steps with the information below:
176182
| Confirm Password | Reenter password. |
177183
| **Inbound port rules** | |
178184
| Public inbound ports | Select **None**. |
179-
|||
185+
180186

181187
3. Select **Next: Disks**.
182188

@@ -267,9 +273,9 @@ In this section, you create a private SQL Database.
267273
| Resource group | Select **myResourceGroup**. You created this resource group in the previous section.|
268274
| **Database details** | |
269275
| Database name | Enter **mydatabase**. |
270-
| Server | Select **Create new** and enter the information below. |
276+
| Server | Select **Create new** and enter the following information. |
271277
| Server name | Enter **mydbserver**. If this name is taken, enter a unique name. |
272-
| Server admin login | Enter a name of your choosing. |
278+
| Server admin sign in | Enter a name of your choosing. |
273279
| Password | Enter a password of your choosing. |
274280
| Confirm Password | Reenter password |
275281
| Location | Select **(US) South Central US**. |
@@ -314,7 +320,7 @@ In this section, you create a private endpoint for the Azure SQL database in the
314320
| Subscription | Select your subscription. |
315321
| Resource type | Select **Microsoft.Sql/servers**. |
316322
| Resource | Select **mydbserver** or the name of the server you created in the previous step.
317-
| Target sub-resource | Select **sqlServer**. |
323+
| Target subresource | Select **sqlServer**. |
318324

319325
8. Select the **Configuration** tab or select **Next: Configuration** at the bottom of the page.
320326

@@ -342,7 +348,7 @@ In this section, you create a private endpoint for the Azure SQL database in the
342348

343349
## Connect the virtual networks using virtual network peering
344350

345-
In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to **myAzFwVNet** using peering. There won't be direct connectivity between **myVMVNet** and **myPEVNet**.
351+
In this section, we connect virtual networks **myVMVNet** and **myPEVNet** to **myAzFwVNet** using peering. There isn't direct connectivity between **myVMVNet** and **myPEVNet**.
346352

347353
1. In the portal's search bar, enter **myAzFwVNet**.
348354

@@ -368,7 +374,6 @@ In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to
368374
| Allow forwarded traffic from myAzFwVNet to remote virtual network | Select **Enabled**. |
369375
| **Configure gateway transit settings** | |
370376
| Allow gateway transit | Leave unchecked |
371-
|||
372377

373378
4. Select **OK**.
374379

@@ -399,7 +404,7 @@ In this section, we'll connect virtual networks **myVMVNet** and **myPEVNet** to
399404

400405
## Link the virtual networks to the private DNS zone
401406

402-
In this section, we'll link virtual networks **myVMVNet** and **myAzFwVNet** to the **privatelink.database.windows.net** private DNS zone. This zone was created when we created the private endpoint.
407+
In this section, we link virtual networks **myVMVNet** and **myAzFwVNet** to the **privatelink.database.windows.net** private DNS zone. This zone was created when we created the private endpoint.
403408

404409
The link is required for the VM and firewall to resolve the FQDN of database to its private endpoint address. Virtual network **myPEVNet** was automatically linked when the private endpoint was created.
405410

@@ -426,7 +431,6 @@ The link is required for the VM and firewall to resolve the FQDN of database to
426431
| **CONFIGURATION** | |
427432
| Enable auto registration | Leave unchecked. |
428433

429-
430434
6. Select **OK**.
431435

432436
## Configure an application rule with SQL FQDN in Azure Firewall
@@ -464,15 +468,14 @@ This rule allows communication through the firewall that we created in the previ
464468
| Source | Enter **10.1.0.0/16**. |
465469
| Protocol: Port | Enter **mssql:1433**. |
466470
| Target FQDNs | Enter **mydbserver.database.windows.net**. |
467-
|||
468471

469472
7. Select **Add**.
470473

471474
## Route traffic between the virtual machine and private endpoint through Azure Firewall
472475

473476
We didn't create a virtual network peering directly between virtual networks **myVMVNet** and **myPEVNet**. The virtual machine **myVM** doesn't have a route to the private endpoint we created.
474477

475-
In this section, we'll create a route table with a custom route.
478+
In this section, we create a route table with a custom route.
476479

477480
The route sends traffic from the **myVM** subnet to the address space of virtual network **myPEVNet**, through the Azure Firewall.
478481

@@ -552,13 +555,13 @@ Connect to the VM **myVm** from the internet as follows:
552555

553556
## Access SQL Server privately from the virtual machine
554557

555-
In this section, you'll connect privately to the SQL Database using the private endpoint.
558+
In this section, you connect privately to the SQL Database using the private endpoint.
556559

557560
1. Enter `nslookup mydbserver.database.windows.net`
558561

559-
You'll receive a message similar to below:
562+
You receive a message similar to the following output:
560563

561-
```bash
564+
```output
562565
Server: 127.0.0.53
563566
Address: 127.0.0.53#53
564567
@@ -579,7 +582,7 @@ In this section, you'll connect privately to the SQL Database using the private
579582
```bash
580583
sqlcmd -S mydbserver.database.windows.net -U '<ServerAdmin>' -P '<YourPassword>'
581584
```
582-
4. A SQL command prompt will be displayed on successful login. Enter **exit** to exit the **sqlcmd** tool.
585+
4. A SQL command prompt is displayed on successful sign in. Enter **exit** to exit the **sqlcmd** tool.
583586

584587
5. Close the connection to **myVM** by entering **exit**.
585588

0 commit comments

Comments
 (0)