You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-dnat.md
+27-28Lines changed: 27 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 06/06/2022
8
+
ms.date: 08/31/2023
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -15,15 +15,6 @@ ms.custom: mvc
15
15
16
16
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets. When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
17
17
18
-
In this article, you learn how to:
19
-
20
-
> [!div class="checklist"]
21
-
> * Set up a test network environment
22
-
> * Deploy a firewall
23
-
> * Create a default route
24
-
> * Configure a DNAT rule
25
-
> * Test the firewall
26
-
27
18
> [!NOTE]
28
19
> This article uses classic Firewall rules to manage the firewall. The preferred method is to use [Firewall Policy](../firewall-manager/policy-overview.md). To complete this procedure using Firewall Policy, see [Tutorial: Filter inbound Internet traffic with Azure Firewall policy DNAT using the Azure portal](tutorial-firewall-dnat-policy.md)
29
20
@@ -60,16 +51,16 @@ First, create the VNets and then peer them.
60
51
7. For **Resource group**, select **RG-DNAT-Test**.
61
52
1. For **Name**, type **VN-Hub**.
62
53
1. For **Region**, select the same region that you used before.
63
-
1. Select **Next: IP Addresses**.
54
+
1. Select **Next**.
55
+
1. On the **Security** tab, select **Next**.
64
56
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
65
-
1. Under **Subnet name**, select **default**.
66
-
1.Edit the **Subnet name** and type**AzureFirewallSubnet**.
The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
69
61
> [!NOTE]
70
62
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
71
63
72
-
10. For **Subnet address range**, type **10.0.1.0/26**.
73
64
11. Select **Save**.
74
65
1. Select **Review + create**.
75
66
1. Select **Create**.
@@ -82,12 +73,14 @@ First, create the VNets and then peer them.
82
73
1. For **Resource group**, select **RG-DNAT-Test**.
83
74
1. For **Name**, type **VN-Spoke**.
84
75
1. For **Region**, select the same region that you used before.
85
-
1. Select **Next: IP Addresses**.
76
+
1. Select **Next**.
77
+
1. On the **Security** tab, select **Next**.
86
78
1. For **IPv4 Address space**, edit the default and type **192.168.0.0/16**.
87
-
1. Select **Add subnet**.
88
-
1. For the **Subnet name** type **SN-Workload**.
89
-
10. For **Subnet address range**, type **192.168.1.0/24**.
90
-
11. Select **Add**.
79
+
1. Under **Subnets**, select **default**.
80
+
1. For the subnet **Name** type **SN-Workload**.
81
+
1. For **Starting address**, type **192.168.1.0**.
82
+
1. For **Subnet size**, select **/24**.
83
+
1. Select **Save**.
91
84
1. Select **Review + create**.
92
85
1. Select **Create**.
93
86
@@ -108,7 +101,7 @@ Now peer the two VNets.
108
101
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
109
102
110
103
1. From the Azure portal menu, select **Create a resource**.
111
-
2. Under **Popular**, select **Windows Server 2019 Datacenter**.
104
+
2. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
112
105
113
106
**Basics**
114
107
@@ -132,14 +125,18 @@ Create a workload virtual machine, and place it in the **SN-Workload** subnet.
132
125
133
126
**Management**
134
127
128
+
1. Select **Next: Monitoring**.
129
+
130
+
**Monitoring**
131
+
135
132
1. For **Boot diagnostics**, select **Disable**.
136
133
1. Select **Review + Create**.
137
134
138
135
**Review + Create**
139
136
140
-
Review the summary, and then select **Create**. This will take a few minutes to complete.
137
+
Review the summary, and then select **Create**. This takes a few minutes to complete.
141
138
142
-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select **Networking**to find the private IP address.
139
+
After deployment finishes, note the private IP address for the virtual machine. It is used later when you configure the firewall. Select the virtual machine name. Select **Overview**, and under **Networking**note the private IP address.
@@ -156,15 +153,15 @@ After deployment finishes, note the private IP address for the virtual machine.
156
153
|Resource group |Select **RG-DNAT-Test**|
157
154
|Name |**FW-DNAT-test**|
158
155
|Region |Select the same location that you used previously|
159
-
|Firewall tier|**Standard**|
156
+
|Firewall SKU|**Standard**|
160
157
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
161
158
|Choose a virtual network |**Use existing**: VN-Hub|
162
159
|Public IP address |**Add new**, Name: **fw-pip**.|
163
160
164
161
5. Accept the other defaults, and then select **Review + create**.
165
162
6. Review the summary, and then select **Create** to create the firewall.
166
163
167
-
This will take a few minutes to deploy.
164
+
This takes a few minutes to deploy.
168
165
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
169
166
8. Note the firewall's private and public IP addresses. You'll use them later when you create the default route and NAT rule.
170
167
@@ -175,8 +172,8 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
175
172
> [!IMPORTANT]
176
173
> You do not need to configure an explicit route back to the firewall at the destination subnet. Azure Firewall is a stateful service and handles the packets and sessions automatically. If you create this route, you'll create an asymmetrical routing environment that interrupts the stateful session logic and results in dropped packets and connections.
177
174
178
-
1. From the Azure portal home page, select **All services**.
179
-
2.Under **Networking**, select **Route tables**.
175
+
1. From the Azure portal home page, select **Create a resource**.
176
+
2.Search for **Route table** and select it.
180
177
3. Select **Create**.
181
178
5. For **Subscription**, select your subscription.
182
179
1. For **Resource group**, select **RG-DNAT-Test**.
@@ -191,7 +188,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
191
188
1. Select **OK**.
192
189
1. Select **Routes**, and then select **Add**.
193
190
1. For **Route name**, type **FW-DG**.
194
-
1. For **Address prefix destination**, select **IP Addresses**.
191
+
1. For **Destination type**, select **IP Addresses**.
195
192
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
196
193
1. For **Next hop type**, select **Virtual appliance**.
197
194
@@ -214,7 +211,9 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
214
211
1. For **Destination ports**, type **3389**.
215
212
1. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
216
213
1. For **Translated port**, type **3389**.
217
-
1. Select **Add**. This will take a few minutes to complete.
0 commit comments