Skip to content

Commit 4a958a3

Browse files
Merge pull request #253231 from vhorne/fwm-sec-partner
freshness
2 parents f5c18ff + 05384d8 commit 4a958a3

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/firewall-manager/deploy-trusted-security-partner.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: how-to
8-
ms.date: 11/10/2021
8+
ms.date: 09/28/2023
99
ms.author: victorh
1010
---
1111

@@ -24,13 +24,13 @@ Integrated third-party Security as a service (SECaaS) partners are now available
2424

2525
## Deploy a third-party security provider in a new hub
2626

27-
Skip this section if you are deploying a third-party provider into an existing hub.
27+
Skip this section if you're deploying a third-party provider into an existing hub.
2828

2929
1. Sign in to the [Azure portal](https://portal.azure.com).
3030
2. In **Search**, type **Firewall Manager** and select it under **Services**.
31-
3. Navigate to **Getting Started**. Select **View secured virtual hubs**.
31+
3. Navigate to **Overview**. Select **View secured virtual hubs**.
3232
4. Select **Create new secured virtual hub**.
33-
5. Enter you subscription and resource group, select a supported region, and add your hub and virtual WAN information.
33+
5. Enter your subscription and resource group, select a supported region, and add your hub and virtual WAN information.
3434
6. Select **Include VPN gateway to enable Security Partner Providers**.
3535
7. Select the **Gateway scale units** appropriate for your requirements.
3636
8. Select **Next: Azure Firewall**
@@ -46,15 +46,15 @@ Skip this section if you are deploying a third-party provider into an existing h
4646

4747
The VPN gateway deployment can take more than 30 minutes.
4848

49-
To verify that the hub has been created, navigate to Azure Firewall Manager->Secured Hubs. Select the hub->Overview page to show the partner name and the status as **Security Connection Pending**.
49+
To verify that the hub has been created, navigate to Azure Firewall Manager->Overview->View secured virtual hubs. You see the security partner provider name and the security partner status as **Security Connection Pending**.
5050

5151
Once the hub is created and the security partner is set up, continue on to connect the security provider to the hub.
5252

5353
## Deploy a third-party security provider in an existing hub
5454

5555
You can also select an existing hub in a Virtual WAN and convert that to a *secured virtual hub*.
5656

57-
1. In **Getting Started**, select **View secured virtual hubs**.
57+
1. In **Getting Started**, **Overview**, select **View secured virtual hubs**.
5858
2. Select **Convert existing hubs**.
5959
3. Select a subscription and an existing hub. Follow rest of the steps to deploy a third-party provider in a new hub.
6060

@@ -96,7 +96,7 @@ To set up tunnels to your virtual hub’s VPN Gateway, third-party providers nee
9696
Ensure the third-party provider can connect to the hub. The tunnels on the VPN gateway should be in a **Connected** state. This state is more reflective of the connection health between the hub and the third-party partner, compared to previous status.
9797
3. Select the hub, and navigate to **Security Configurations**.
9898

99-
When you deploy a third-party provider into the hub, it converts the hub into a *secured virtual hub*. This ensures that the third-party provider is advertising a 0.0.0.0/0 (default) route to the hub. However, VNet connections and sites connected to the hub don’t get this route unless you opt-in on which connections should get this default route.
99+
When you deploy a third-party provider into the hub, it converts the hub into a *secured virtual hub*. This ensures that the third-party provider is advertising a 0.0.0.0/0 (default) route to the hub. However, virtual network connections and sites connected to the hub don’t get this route unless you opt-in on which connections should get this default route.
100100

101101
> [!NOTE]
102102
> Do not manually create a 0.0.0.0/0 (default) route over BGP for branch advertisements. This is automatically done for secure virtual hub deployments with 3rd party security providers. Doing so may break the deployment process.
@@ -108,17 +108,17 @@ To set up tunnels to your virtual hub’s VPN Gateway, third-party providers nee
108108

109109
If you use non-RFC1918 addresses for your private traffic prefixes, you may need to configure SNAT policies for your firewall to disable SNAT for non-RFC1918 private traffic. By default, Azure Firewall SNATs all non-RFC1918 traffic.
110110

111-
## Branch or VNet Internet traffic via third-party service
111+
## Branch or virtual network Internet traffic via third-party service
112112

113-
Next, you can check if VNet virtual machines or the branch site can access the Internet and validate that the traffic is flowing to the third-party service.
113+
Next, you can check if virtual network virtual machines or the branch site can access the Internet and validate that the traffic is flowing to the third-party service.
114114

115-
After finishing the route setting steps, the VNet virtual machines as well as the branch sites are sent a 0/0 to the third-party service route. You can't RDP or SSH into these virtual machines. To sign in, you can deploy the [Azure Bastion](../bastion/bastion-overview.md) service in a peered VNet.
115+
After you finish the route setting steps, the virtual network virtual machines and the branch sites are sent a 0/0 to the third-party service route. You can't RDP or SSH into these virtual machines. To sign in, you can deploy the [Azure Bastion](../bastion/bastion-overview.md) service in a peered virtual network.
116116

117117
## Rule configuration
118118

119119
Use the partner portal to configure firewall rules. Azure Firewall passes the traffic through.
120120

121-
For example, you may observe allowed traffic through the Azure Firewall, even though there is no explicit rule to allow the traffic. This is because Azure Firewall passes the traffic to the next hop security partner provider (ZScalar, CheckPoint, or iBoss). Azure Firewall still has rules to allow outbound traffic, but the rule name is not logged.
121+
For example, you may observe allowed traffic through the Azure Firewall, even though there's no explicit rule to allow the traffic. This is because Azure Firewall passes the traffic to the next hop security partner provider (ZScalar, CheckPoint, or iBoss). Azure Firewall still has rules to allow outbound traffic, but the rule name isn't logged.
122122

123123
For more information, see the partner documentation.
124124

0 commit comments

Comments
 (0)