Skip to content

Commit 5cdf181

Browse files
authored
Merge pull request #292091 from wtnlee/nvasneakypaw
Nvasneakypaw
2 parents bbe7bac + d3f360d commit 5cdf181

File tree

4 files changed

+72
-40
lines changed

4 files changed

+72
-40
lines changed

articles/virtual-wan/how-to-nva-hub.md

Lines changed: 72 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -10,74 +10,106 @@ ms.author: cherylmc
1010
---
1111
# How to create a Network Virtual Appliance in an Azure Virtual WAN hub
1212

13-
This article shows you how to use Virtual WAN to connect to your resources in Azure through a **Network Virtual Appliance (NVA)** in Azure. This type of connection requires a VPN device located on-premises that has an externally facing public IP address assigned to it. For more information about Virtual WAN, see [What is Virtual WAN?](virtual-wan-about.md)
13+
This article shows you how to deploy an **Integrated Network Virtual Appliance (NVA)** in an Azure Virtual WAN hub.
1414

15-
The steps in this article help you create a **Barracuda CloudGen WAN** Network Virtual Appliance in the Virtual WAN hub. To complete this exercise, you must have a Barracuda Cloud Premise Device (CPE) and a license for the Barracuda CloudGen WAN appliance that you deploy into the hub before you begin.
15+
## Background
1616

17-
For deployment documentation of **Cisco SD-WAN** within Azure Virtual WAN, see [Cisco Cloud OnRamp for Multi-Cloud](https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/cloudonramp/ios-xe-17/cloud-onramp-book-xe/cloud-onramp-multi-cloud.html#Cisco_Concept.dita_c61e0e7a-fff8-4080-afee-47b81e8df701).
17+
NVAs deployed in the Virtual WAN hub are typically split into three categories:
1818

19-
For deployment documentation of **VMware SD-WAN** within Azure Virtual WAN, see [Deployment Guide for VMware SD-WAN in Virtual WAN Hub](https://docs.vmware.com/en/VMware-SD-WAN/index.html)
19+
* **Connectivity appliances**: Used to terminate VPN and SD-WAN connections from on-premises. Connectivity appliances use Border Gateway Protocol (BGP) to exchange routes with the Virtual WAN hub.
20+
* **Next-Generation Firewall (NGFW) appliances**: Used with [Routing Intent](how-to-routing-policies.md) to provide bump-in-the-wire inspection for traffic traversing the Virtual WAN hub.
21+
* **Dual-role connectivity and Firewall appliances**: Single device that both connects on-premises devices to Azure and inspects traffic traversing the Virtual WAN hub with [Routing Intent](how-to-routing-policies.md).
22+
23+
For the list of NVAs that can be deployed in the Virtual WAN hub and their respective capabilities, see [Virtual WAN NVA partners](about-nva-hub.md#partners).
24+
25+
## Deployment Mechanisms
26+
27+
Network Virtual Appliances can be deployed through a couple of different workflows. Different Network Virtual Appliance partners support different deployment mechanisms. Every Virtual WAN integrated NVA partner supports the **Azure Marketplace Managed Application** workflow. For information about other deployment methods, reference your NVA provider's documentation.
28+
29+
* **Azure Marketplace Managed Application**: All Virtual WAN NVA partners use Azure Managed Applications to deploy Integrated NVAs in the Virtual WAN hub. Azure Managed Applications offer you an easy way to deploy NVAs into the Virtual WAN hub via an Azure portal experience that is created by the NVA provider. The Azure portal experience collects critical deployment and configuration parameters needed to deploy and boot-strap the NVA. For more information on Azure Managed Applications, see [Managed Application documentation](../azure-resource-manager/managed-applications/overview.md). Reference your provider's documentation on the full deployment workflow via Azure Managed Application.
30+
* **NVA orchestrator deployments**: Certain NVA partners allow you to deploy NVAs into the Hub directly from the NVA orchestration or management software. NVA deployments from NVA orchestration software typically require you to provide an Azure service principal to the NVA orchestration software. The Azure service principal is used by the NVA orchestration software to interact with Azure APIs to deploy and manage NVAs in the hub. This workflow is specific to the NVA provider's implementation. Reference your provider's documentation for more information.
31+
* **Other deployment mechanisms**: NVA partners may also offer other mechanisms to deploy NVAs in the hub such as ARM templates and Terraform. Reference your provider's documentation for more information on other supported deployment mechanisms.
2032

2133
## Prerequisites
2234

23-
Verify that you've met the following criteria before beginning your configuration:
35+
The following tutorial assumes that you have deployed a Virtual WAN resource with at least one Virtual WAN hub. The tutorial also assumes that you are deploying NVAs via Azure Marketplace Managed Application.
36+
37+
### <a name="requiredpermissions"></a> Required Permissions
38+
39+
To deploy a Network Virtual Appliance in a Virtual WAN Hub, the user or service principal that creates and manages the NVA must have at minimum the following permissions:
40+
41+
* Microsoft.Network/virtualHubs/read over the Virtual WAN hub in which the NVA is deployed into.
42+
* Microsoft.Network/networkVirtualAppliances/write over the resource group where the NVA is deployed into.
43+
* Microsoft.Network/publicIpAddresses/join over the public IP address resources that are deployed with the Network Virtual Appliance for [Internet Inbound](how-to-network-virtual-appliance-inbound.md) use cases.
2444

25-
* Obtain a license for your Barracuda CloudGen WAN gateway. To learn more about how to do this, see the [Barracuda CloudGen WAN Documentation](https://www.barracuda.com/products/cloudgenwan)
45+
These permissions need to be granted to the Azure Marketplace Managed Application to ensure deployments succeed. Other permissions may be required based on the implementation of the deployment workflow developed by your NVA partner.
2646

27-
* You have a virtual network that you want to connect to. Verify that none of the subnets of your on-premises networks overlap with the virtual networks that you want to connect to. To create a virtual network in the Azure portal, see the [Quickstart](../virtual-network/quick-create-portal.md).
47+
## Assigning Permissions to Azure Managed Application
2848

29-
* Your virtual network doesn't have any virtual network gateways. If your virtual network has a gateway (either VPN or ExpressRoute), you must remove all gateways. This configuration requires that virtual networks are connected instead, to the Virtual WAN hub gateway.
49+
Network Virtual Appliances that are deployed via Azure Marketplace Managed Application are deployed in a special resource group in your Azure tenant called the **managed resource group**. When you create a Managed Application in your subscription, a corresponding and separate **managed resource group** is created in your subscription. All Azure resources created by the Managed Application (including the Network Virtual Appliance) are deployed into the **managed resource group**.
3050

31-
* Obtain an IP address range for your hub region. The hub is a virtual network that is created and used by Virtual WAN. The address range that you specify for the hub can't overlap with any of your existing virtual networks that you connect to. It also can't overlap with your address ranges that you connect to your on-premises sites. If you're unfamiliar with the IP address ranges located in your on-premises network configuration, coordinate with someone who can provide those details for you.
51+
Azure Marketplace owns a first-party service principal that performs the deployment of resources into the **managed resource group**. This first-party principal has permissions to create resources in the **managed resource group**, but doesn't have permissions to read, update or create Azure resources outside of the **managed resource group**.
3252

33-
* If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
53+
To ensure that your NVA deployment is performed with the sufficient level of permissions, grant additional permissions to the Azure Marketplace deployment service principal by deploying your Managed Application with a user-assigned managed identity that has permissions over the Virtual WAN hub and public IP address that you want to use with your Network Virtual Appliance. This user-assigned Managed Identity is used only for initial deployment of resources in the managed resource group and is used solely in the context of that Managed Application deployment.
3454

35-
## <a name="openvwan"></a>Create a virtual WAN
55+
>[!NOTE]
56+
> Only user-assigned system identities can be assigned to Azure Managed Applications to deploy Network Virtual Appliances in the Virtual WAN Hub. System-assigned identities are not supported.
3657
37-
[!INCLUDE [Create virtual WAN](../../includes/virtual-wan-create-vwan-include.md)]
58+
1. Create a new user-assigned identity. For steps on creating new user-assigned identities, see [managed identity documentation](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities). You can also use an existing user-assigned identity.
59+
2. Assign permissions to your user-assigned identity to have at minimum the permissions described in the [Required Permissions](#requiredpermissions) section alongside any permissions your NVA provider requires. You can also give the user-assigned identity a built-in Azure role like [Network Contributor](../role-based-access-control/built-in-roles/networking.md#network-contributor) that contains a superset of the needed permissions.
3860

39-
## <a name="hub"></a>Create a hub
61+
Alternatively, you can also create a [custom role](../role-based-access-control/custom-roles.md) with the following sample definition and assign the custom role to your user-assigned managed identity.
4062

41-
Create a virtual hub by filling out the **Basics** tab to create an empty virtual hub (a virtual hub that doesn't contain any gateways).
63+
```
64+
{
65+
"Name": "Virtual WAN NVA Operator",
66+
"IsCustom": true,
67+
"Description": "Can perform deploy and manage NVAs in the Virtual WAN hub.",
68+
"Actions": [
69+
"Microsoft.Network/virtualHubs/read",
70+
"Microsoft.Network/publicIPAddresses/join",
71+
"Microsoft.Network/networkVirtualAppliances/*",
72+
"Microsoft.Network/networkVirtualAppliances/inboundSecurityRules/*"
73+
],
74+
"NotActions": [],
75+
"DataActions": [],
76+
"NotDataActions": [],
77+
"AssignableScopes": [
78+
"/subscriptions/{subscription where Virtual Hub and NVA is deployed}",
79+
"/subscriptions/{subscription where Public IP used for NVA is deployed}",
80+
]
81+
}
82+
```
83+
## Deploying the NVA
4284

43-
[!INCLUDE [Create a virtual hub](../../includes/virtual-wan-hub-basics.md)]
85+
The following section describes the steps needed to deploy a Network Virtual Appliance into the Virtual WAN hub using Azure Marketplace Managed Application.
4486

45-
## Create the Network Virtual Appliance in the hub
87+
1. Navigate to your Virtual WAN hub and select **Network Virtual Appliance** under **Third party providers**.
4688

47-
In this step, you'll create a Network Virtual Appliance in the hub. The procedure for each NVA will be different for each NVA partner's product. For this example, we're creating a Barracuda CloudGen WAN gateway.
89+
:::image type="content" source="./media/network-virtual-appliance-creation/network-virtual-appliance-menu.png"alt-text="Screenshot showing how to navigate to NVA menu under Virtual WAN hub."lightbox="./media/network-virtual-appliance-creation/network-virtual-appliance-menu.png":::
4890

49-
1. Locate the Virtual WAN hub you created in the previous step and open it.
91+
2. Select **Create network virtual appliance**.
5092

51-
:::image type="content" source="./media/how-to-nva-hub/nva-hub.png" alt-text="Screenshot of the Network Virtual Appliance tile." lightbox="./media/how-to-nva-hub/nva-hub.png":::
93+
:::image type="content" source="./media/network-virtual-appliance-creation/network-virtual-appliance-create.png"alt-text="Screenshot showing how to create NVA."lightbox="./media/network-virtual-appliance-creation/network-virtual-appliance-create.png":::
5294

53-
1. Find the **Network Virtual Appliance** tile and select the **Create** link.
54-
1. On the **Network Virtual Appliance** page, from the dropdown, select **Barracuda CloudGen WAN**, then select the **Create** button and **Leave**. This takes you to the Azure Marketplace offer for the Barracuda CloudGen WAN gateway.
55-
1. Read the terms, select **Get it now**, then click **Continue** when you're ready. The page will automatically change to the page for the **Barracuda CloudGen WAN Gateway**. Select **Create** to open the **Basics** page for gateway settings.
95+
3. Choose the NVA vendor. In this example, "fortinet-ngfw" is selected and select **Create**. At this point, you're redirected to the NVA partner's Azure Marketplace managed application.
5696

57-
:::image type="content" source="./media/how-to-nva-hub/barracuda-create-basics.png" alt-text="Screenshot of the Basics page."lightbox="./media/how-to-nva-hub/barracuda-create-basics.png":::
58-
1. On the Create Barracuda CloudGen WAN Gateway **Basics** page, provide the following information:
97+
:::image type="content" source="./media/network-virtual-appliance-creation/network-virtual-appliance-vendor.png"alt-text="Screenshot showing how to select NVA vendor."lightbox="./media/network-virtual-appliance-creation/network-virtual-appliance-vendor.png":::
5998

60-
* **Subscription** - Choose the subscription you used to deploy the Virtual WAN and hub.
61-
* **Resource Group** - Choose the same Resource Group you used to deploy the Virtual WAN and hub.
62-
* **Region** - Choose the same Region in which your Virtual hub resource is located.
63-
* **Application Name** - The Barracuda NextGen WAN is a Managed Application. Choose a name that makes it easy to identify this resource, as this is what it will be called when it appears in your subscription.
64-
* **Managed Resource Group** - This is the name of the Managed Resource Group in which Barracuda will deploy resources that are managed by them. The name should be pre-populated for this.
65-
1. Select **Next: CloudGen WAN gateway** to open the **Create Barracuda CloudGen WAN Gateway** page.
99+
4. Follow the managed application creation experience to deploy your NVA and reference your provider's documentation. Ensure that the user-assigned system identity created in the previous section is selected as part of the managed application creation workflow.
66100

67-
:::image type="content" source="./media/how-to-nva-hub/barracuda-cloudgen-wan.png" alt-text="Screenshot of the Create Barracuda CloudGen WAN Gateway page."lightbox="./media/how-to-nva-hub/barracuda-cloudgen-wan.png":::
68-
1. On the **Create Barracuda CloudGen WAN Gateway** page, provide the following information:
101+
## Common Deployment Errors
69102

70-
* **Virtual WAN Hub** - The Virtual WAN hub you want to deploy this NVA into.
71-
* **NVA Infrastructure Units** - Indicate the number of NVA Infrastructure Units you want to deploy this NVA with. Choose the amount of aggregate bandwidth capacity you want to provide across all of the branch sites that will be connecting to this hub through this NVA.
72-
* **Token** - Barracuda requires that you provide an authentication token here in order to identify yourself as a registered user of this product. You'll need to obtain this from Barracuda.
73-
1. Select the **Review and Create** button to proceed.
74-
1. On this page, you'll be asked to accept the terms of the Co-Admin Access agreement. This is standard with Managed Applications where the Publisher will have access to some resources in this deployment. Check the **I agree to the terms and conditions above** box, and then select **Create**.
103+
### Permission errors
75104

76-
## <a name="vnet"></a>Connect the VNet to the hub
105+
>[!NOTE]
106+
> The error message associated with a **LinkedAuthorizationFailed** only displays one missing permission. As a result, you may see a different missing permission after you update the permissions assigned to your service principal, managed identity or user.
77107
78-
In this section, you create a connection between your hub and VNet.
108+
* If you see an error message with error code **LinkedAuthorizationFailed**, the user-assigned identity supplied as part of the Managed Application deployment didn't have the proper permissions assigned. The exact permissions that are missing are described in the error message. In the following example, double-check that the user-assigned managed identity has READ permissions over the Virtual WAN hub you're trying to deploy the NVA into.
79109

80-
[!INCLUDE [Connect](../../includes/virtual-wan-connect-vnet-hub-include.md)]
110+
```
111+
The client with object id '<>' does not have authorization to perform action 'Microsoft.Network/virtualHubs/read' over scope '/subscriptions/<>/resourceGroups/<>/providers/Microsoft.Network/virtualHubs/<>' or the scope is invalid. If access was recently granted, please refresh your credentials
112+
```
81113

82114
## Next steps
83115

73.7 KB
Loading
73.5 KB
Loading
23.1 KB
Loading

0 commit comments

Comments
 (0)