Skip to content

Commit 4a09f06

Browse files
committed
updates for customer IP address
1 parent 134ab80 commit 4a09f06

File tree

7 files changed

+62
-3
lines changed

7 files changed

+62
-3
lines changed
229 KB
Loading

articles/firewall-manager/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Azure Firewall Manager has the following known issues:
8787
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic can be inspected by Azure Firewall in secured hub scenarios if Routing Intent is enabled. |Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature. The only Virtual WAN routing configuration that enables branch to branch private traffic is routing intent. |
8888
|All Secured Virtual Hubs sharing the same virtual WAN must be in the same resource group.|This behavior is aligned with Virtual WAN Hubs today.|Create multiple Virtual WANs to allow Secured Virtual Hubs to be created in different resource groups.|
8989
|Bulk IP address addition fails|The secure hub firewall goes into a failed state if you add multiple public IP addresses.|Add smaller public IP address increments. For example, add 10 at a time.|
90-
|DDoS Protection not supported with secured virtual hubs|DDoS Protection isn't integrated with vWANs.|Investigating|
90+
|DDoS Protection not supported with secured virtual hubs|DDoS Protection isn't integrated with vWANs.|Investigating<br><br>You can now associate a public IP address created in your tenants to secured hubs. The public IP addressess can be configured with Azure DDoS Protection. For more information, see [Customer provided public IP address support in secured hubs (preview)](../firewall/secured-hub-customer-public-ip.md).|
9191
|Activity logs not fully supported|Firewall policy doesn't currently support Activity logs.|Investigating|
9292
|Description of rules not fully supported|Firewall policy doesn't display the description of rules in an ARM export.|Investigating|
9393
|Azure Firewall Manager overwrites static and custom routes causing downtime in virtual WAN hub.|You shouldn't use Azure Firewall Manager to manage your settings in deployments configured with custom or static routes. Updates from Firewall Manager can potentially overwrite static or custom route settings.|If you use static or custom routes, use the Virtual WAN page to manage security settings and avoid configuration via Azure Firewall Manager.<br><br>For more information, see [Scenario: Azure Firewall - custom](../virtual-wan/scenario-route-between-vnets-firewall.md).|

articles/firewall-manager/secure-cloud-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Create your secured virtual hub using Firewall Manager.
103103
:::image type="content" source="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png" alt-text="Screenshot of configuring Azure Firewall parameters." lightbox="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png":::
104104

105105

106-
16. Type **1** in the **Specify number of Public IP addressees** text box.
106+
16. Type **1** in the **Specify number of Public IP addressees** text box or associate an existing public IP address (preview) with this firewall.
107107
16. Under **Firewall Policy** ensure the **Default Deny Policy** is selected. You refine your settings later in this article.
108108
17. Select **Next: Security Partner Provider**.
109109

articles/firewall/firewall-preview.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 10/10/2023
8+
ms.date: 01/15/2025
99
ms.author: victorh
1010
---
1111

@@ -57,6 +57,13 @@ This is also relevant for hybrid scenarios, connecting on-premises datacenters t
5757

5858
For more information, see [Private IP DNAT Support and Scenarios with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/private-ip-dnat-support-and-scenarios-with-azure-firewall/ba-p/4230073).
5959

60+
## Customer provided public IP address support in secured hubs (preview)
61+
62+
Virtual WAN hub deployments can now associate customer tenant public IP addresses with Secured Hub Azure Firewall. The capability is available to new deployments of Secured Hub Firewalls (preview).
63+
64+
For existing secured virtual WAN hubs, delete the hub firewall and redeploy a new Firewall during scheduled maintenance hours. You can use the Azure portal or Azure PowerShell to configure this. 
65+
66+
For more information, see [Customer provided public IP address support in secured hubs (preview)](secured-hub-customer-public-ip.md).
6067

6168
## Next steps
6269

222 KB
Loading
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Customer provided public IP address support in secured hubs (preview)
3+
description: Learn about customer provided public IP address support in secured hubs.
4+
services: firewall
5+
author: vhorne
6+
ms.service: azure-firewall
7+
ms.topic: concept-article
8+
ms.date: 01/15/2025
9+
ms.author: victorh
10+
---
11+
12+
# Customer provided public IP address support in secured hubs (preview)
13+
14+
> [!IMPORTANT]
15+
> Customer provided public IP address support in secured hubs is currently in PREVIEW.
16+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17+
18+
Virtual WAN hub deployments can now associate customer tenant public IP addresses with secured hub Azure Firewalls.
19+
20+
The capability is available only to new deployments of secured hub Firewalls. For existing secured virtual WAN hubs, delete the hub firewall and redeploy a new Firewall during scheduled maintenance hours. You can use the Azure portal or Azure PowerShell to configure it.  
21+
22+
The capability has the following benefits:
23+
24+
- You own and control the lifecycle of the Azure Firewall public IP addresses.
25+
26+
- Secured hub firewalls can enable enhanced DDoS mitigation features to defend against DDoS attacks.
27+
28+
- You can allocate Azure Firewall public IP addresses from an IP address prefix pool.
29+
30+
## Configuration
31+
32+
You can configure this feature using either the Azure portal or Azure PowerShell.
33+
34+
### Azure portal
35+
36+
You can associate a preexisting public IP address with a secured hub firewall. You should allocate public IP addresses from an IP prefix pool to simplify downstream security access control lists (ACLs).
37+
38+
:::image type="content" source="media/secured-hub-customer-public-ip/new-secured-hub-customer-public-ip.png" alt-text="Screenshot showing new secured virtual hub.":::
39+
40+
### Azure PowerShell
41+
42+
```azurepowershell
43+
$publicip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name $PIPName
44+
$virtualhub = get-azvirtualhub -ResourceGroupName $rgName -name $vwanhub
45+
New-AzFirewall -Name $azfwname -ResourceGroupName $rgName -Location westcentralus -SkuName AZFW_Hub -SkuTier $Tier -PublicIpAddress $publicip -VirtualHubId $virtualhub.Id
46+
```
47+
48+
## Next steps
49+
50+
- [Tutorial: Secure your virtual hub using Azure Firewall Manager](../firewall-manager/secure-cloud-network.md)

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,8 @@ items:
167167
href: premium-deploy-certificates-enterprise-ca.md
168168
- name: Use Azure Policy
169169
href: firewall-azure-policy.md
170+
- name: Secured hub customer public IP
171+
href: secured-hub-customer-public-ip.md
170172
- name: Protect
171173
items:
172174
- name: Protect Azure Virtual Desktop

0 commit comments

Comments
 (0)