Skip to content

Commit 20dc3a3

Browse files
committed
update
1 parent 304b273 commit 20dc3a3

File tree

4 files changed

+17
-19
lines changed

4 files changed

+17
-19
lines changed

articles/payment-hsm/deployment-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This scenario caters to regional-level failure. The usual strategy is to complet
4242

4343
- [What is Azure Payment HSM?](overview.md)
4444
- [Azure Payment HSM solution design](solution-design.md)
45-
- [Azure Payment HSM traffic inspection](traffic-inspection.md)
45+
- [Azure Payment HSM traffic inspection](inspect-traffic.md)
4646
- [Get started with Azure Payment HSM](getting-started.md)
4747
- [Create a payment HSM](create-payment-hsm.md)
4848
- [Frequently asked questions](faq.yml)

articles/payment-hsm/fastpathenabled.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,12 @@
22
title: Azure Payment HSM "fastpathenabled" feature flag and tag
33
description: The "fastpathenabled" feature flag and tag, as it relates to Azure Payment HSM and affiliated subscriptions and virtual networks
44
services: payment-hsm
5-
author: msmbaldwin
6-
7-
tags: azure-resource-manager
5+
author: cynthiatreger
86
ms.service: payment-hsm
97
ms.workload: security
108
ms.topic: article
119
ms.date: 03/25/2023
12-
ms.author: mbaldwin
10+
ms.author: ctreger
1311

1412
---
1513

articles/payment-hsm/inspect-traffic.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Azure Payment HSM traffic inspection
33
description: Azure Payment HSM traffic inspection
44
services: payment-hsm
55
ms.service: payment-hsm
6-
author: msmbaldwin
7-
ms.author: mbaldwin
6+
author: dawlysd
7+
ms.author: dasantiago
88
ms.topic: quickstart
99
ms.date: 04/06/2023
1010
---
@@ -26,39 +26,39 @@ In all of the above scenarios, Payment HSM is a VNet-injected service in a deleg
2626
>
2727
> For the `fastpathenabled` VNet tag to be valid, the `FastPathEnabled` feature must be enabled on the subscription where that VNet is deployed. Both steps must be completed to enable resources to connect to the Payment HSM devices. For more information, see [FastPathEnabled](fastpathenabled.md).
2828
29-
PHSM is not compatible with vWAN topologies or cross region VNet peering, as listed in the [topology supported](solution-design.md#supported-topologies). Payment HSM comes with some policy [restrictions](solution-design.md#constraints) on these subnets: **Network Security Groups (NSGs) and User-Defined Routes (UDRs) are currently not supported**.
29+
PHSM isn't compatible with vWAN topologies or cross region VNet peering, as listed in the [topology supported](solution-design.md#supported-topologies). Payment HSM comes with some policy [restrictions](solution-design.md#constraints) on these subnets: **Network Security Groups (NSGs) and User-Defined Routes (UDRs) are currently not supported**.
3030

31-
It is possible to bypass the current UDR restriction and inspect traffic destined to a Payment HSM. This article presents two ways: a firewall with source network address translation (SNAT), and a firewall with reverse proxy.
31+
It's possible to bypass the current UDR restriction and inspect traffic destined to a Payment HSM. This article presents two ways: a firewall with source network address translation (SNAT), and a firewall with reverse proxy.
3232

3333
## Firewall with source network address translation (SNAT)
3434

3535
This design is inspired by the [Dedicated HSM solution architecture](../dedicated-hsm/networking.md#solution-architecture).
3636

37-
The firewall **SNATs the client IP address** before forwarding traffic to the PHSM NIC, guaranteeing that the return traffic will automatically be directed back to the Firewall. Either an Azure Firewall or a 3rd party FW NVA can be used in this design.
37+
The firewall **SNATs the client IP address** before forwarding traffic to the PHSM NIC, guaranteeing that the return traffic will automatically be directed back to the Firewall. Either an Azure Firewall or a third party FW NVA can be used in this design.
3838

3939
:::image type="content" source="./media/firewall-snat-architecture-diagram.png" alt-text="Architecture diagram of the firewall with SNAT" lightbox="./media/firewall-snat-architecture-diagram.png":::
4040

4141
Route tables required:
42-
- On-Prem to PHSM: a Route Table containing a UDR for the Payment HSM VNet range and pointing to the central hub Firewall is applied to the GatewaySubnet.
42+
- On-premises to PHSM: a Route Table containing a UDR for the Payment HSM VNet range and pointing to the central hub Firewall is applied to the GatewaySubnet.
4343
- Spoke VNet(s) to PHSM: a Route Table containing the usual default route pointing to the central hub Firewall is applied to the Spoke VNet(s) subnets.
4444

4545
Results:
4646
- UDRs not being supported on the PHSM subnet is addressed by the Firewall doing SNAT on the client IP: when forwarding traffic to PHSM, the return traffic will automatically be directed back to the Firewall.
4747
- Filtering rules that cannot be enforced using NSGs on the PHSM subnet can be configured on the Firewall.
48-
- Both Spoke traffic and On-Prem traffic to the PHSM environment are secured.
48+
- Both Spoke traffic and on-premises traffic to the PHSM environment are secured.
4949

5050
## Firewall with reverse proxy
5151

52-
This design is a good option when performing SNAT on the Firewall is not approved by network security teams, requiring instead to keep the source and destination IPs unchanged for traffic crossing the Firewall.
52+
This design is a good option when performing SNAT on a Firewall that has not been approved by network security teams, requiring instead to keep the source and destination IPs unchanged for traffic crossing the Firewall.
5353

54-
This architecture leverages a reverse proxy, deployed in a dedicated subnet in the PHSM VNet directly or in a peered VNet. Instead of sending traffic to the PHSM devices, the destination is set to the reverse proxy IP, located in a subnet that does not have the restrictions of the PHSM delegated subnet: both NSGs and UDRs can be configured, and combined with a Firewall in the central hub.
54+
This architecture uses a reverse proxy, deployed in a dedicated subnet in the PHSM VNet directly or in a peered VNet. Instead of sending traffic to the PHSM devices, the destination is set to the reverse proxy IP, located in a subnet that does not have the restrictions of the PHSM delegated subnet: both NSGs and UDRs can be configured, and combined with a Firewall in the central hub.
5555

5656
:::image type="content" source="./media/firewall-reverse-proxy-architecture-diagram.png" alt-text="Architecture diagram of the firewall with reverse proxy" lightbox="./media/firewall-reverse-proxy-architecture-diagram.png":::
5757

5858
This solution requires a reverse proxy, such as:
5959

60-
- F5 (Azure Marketplace ; VM-based)
61-
- NGINXaaS (Azure Marketplace ; PaaS fully managed)
60+
- F5 (Azure Marketplace; VM-based)
61+
- NGINXaaS (Azure Marketplace; PaaS fully managed)
6262
- Reverse proxy Server using NGINX (VM-based)
6363
- Reverse proxy Server using HAProxy (VM-based)
6464

@@ -85,7 +85,7 @@ stream { 
8585
```
8686

8787
Route tables required:
88-
- On-Prem to PHSM: a Route Table containing a UDR for the Payment HSM VNet range and pointing to the central hub Firewall is applied to the GatewaySubnet.
88+
- On-premises to PHSM: a Route Table containing a UDR for the Payment HSM VNet range and pointing to the central hub Firewall is applied to the GatewaySubnet.
8989
- Spoke VNet(s) to PHSM: a Route Table containing the usual default route pointing to the central hub Firewall is applied to the Spoke VNet(s) subnets.
9090

9191
> [!IMPORTANT]
@@ -95,7 +95,7 @@ Results:
9595
- UDRs not being supported on the PHSM subnet can be configured on the reverse proxy subnet.
9696
- The reverse proxy SNATs the client IP: when forwarding traffic to PHSM, the return traffic will automatically be directed back to the reverse proxy.
9797
- Filtering rules that cannot be enforced using NSGs on the PHSM subnet can be configured on the Firewall and/or on NSGs applied to the reverse proxy subnet.
98-
- Both Spoke traffic and On-Prem traffic to the PHSM environment are secured.
98+
- Both Spoke traffic and on-premises traffic to the PHSM environment are secured.
9999

100100
## Next steps
101101

articles/payment-hsm/solution-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following table describes what's supported for each network features configu
5353

5454
- [What is Azure Payment HSM?](overview.md)
5555
- [Azure Payment HSM deployment scenarios](deployment-scenarios.md)
56-
- [Azure Payment HSM traffic inspection](traffic-inspection.md)
56+
- [Azure Payment HSM traffic inspection](inspect-traffic.md)
5757
- [Get started with Azure Payment HSM](getting-started.md)
5858
- [Create a payment HSM](create-payment-hsm.md)
5959
- [Frequently asked questions](faq.yml)

0 commit comments

Comments
 (0)