Skip to content

Commit 614ffa8

Browse files
Merge pull request #249999 from vhorne/fw-dnat
freshness review
2 parents 176d73c + bc4a097 commit 614ffa8

File tree

1 file changed

+27
-28
lines changed

1 file changed

+27
-28
lines changed

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 06/06/2022
8+
ms.date: 08/31/2023
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -15,15 +15,6 @@ ms.custom: mvc
1515

1616
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets. When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
1717

18-
In this article, you learn how to:
19-
20-
> [!div class="checklist"]
21-
> * Set up a test network environment
22-
> * Deploy a firewall
23-
> * Create a default route
24-
> * Configure a DNAT rule
25-
> * Test the firewall
26-
2718
> [!NOTE]
2819
> This article uses classic Firewall rules to manage the firewall. The preferred method is to use [Firewall Policy](../firewall-manager/policy-overview.md). To complete this procedure using Firewall Policy, see [Tutorial: Filter inbound Internet traffic with Azure Firewall policy DNAT using the Azure portal](tutorial-firewall-dnat-policy.md)
2920
@@ -60,16 +51,16 @@ First, create the VNets and then peer them.
6051
7. For **Resource group**, select **RG-DNAT-Test**.
6152
1. For **Name**, type **VN-Hub**.
6253
1. For **Region**, select the same region that you used before.
63-
1. Select **Next: IP Addresses**.
54+
1. Select **Next**.
55+
1. On the **Security** tab, select **Next**.
6456
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
65-
1. Under **Subnet name**, select **default**.
66-
1. Edit the **Subnet name** and type **AzureFirewallSubnet**.
57+
1. Under **Subnets**, select **default**.
58+
1. For **Subnet template**, select **Azure Firewall**.
6759

6860
The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
6961
> [!NOTE]
7062
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
7163
72-
10. For **Subnet address range**, type **10.0.1.0/26**.
7364
11. Select **Save**.
7465
1. Select **Review + create**.
7566
1. Select **Create**.
@@ -82,12 +73,14 @@ First, create the VNets and then peer them.
8273
1. For **Resource group**, select **RG-DNAT-Test**.
8374
1. For **Name**, type **VN-Spoke**.
8475
1. For **Region**, select the same region that you used before.
85-
1. Select **Next: IP Addresses**.
76+
1. Select **Next**.
77+
1. On the **Security** tab, select **Next**.
8678
1. For **IPv4 Address space**, edit the default and type **192.168.0.0/16**.
87-
1. Select **Add subnet**.
88-
1. For the **Subnet name** type **SN-Workload**.
89-
10. For **Subnet address range**, type **192.168.1.0/24**.
90-
11. Select **Add**.
79+
1. Under **Subnets**, select **default**.
80+
1. For the subnet **Name** type **SN-Workload**.
81+
1. For **Starting address**, type **192.168.1.0**.
82+
1. For **Subnet size**, select **/24**.
83+
1. Select **Save**.
9184
1. Select **Review + create**.
9285
1. Select **Create**.
9386

@@ -108,7 +101,7 @@ Now peer the two VNets.
108101
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
109102

110103
1. From the Azure portal menu, select **Create a resource**.
111-
2. Under **Popular**, select **Windows Server 2019 Datacenter**.
104+
2. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
112105

113106
**Basics**
114107

@@ -132,14 +125,18 @@ Create a workload virtual machine, and place it in the **SN-Workload** subnet.
132125

133126
**Management**
134127

128+
1. Select **Next: Monitoring**.
129+
130+
**Monitoring**
131+
135132
1. For **Boot diagnostics**, select **Disable**.
136133
1. Select **Review + Create**.
137134

138135
**Review + Create**
139136

140-
Review the summary, and then select **Create**. This will take a few minutes to complete.
137+
Review the summary, and then select **Create**. This takes a few minutes to complete.
141138

142-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select **Networking** to find the private IP address.
139+
After deployment finishes, note the private IP address for the virtual machine. It is used later when you configure the firewall. Select the virtual machine name. Select **Overview**, and under **Networking** note the private IP address.
143140

144141
[!INCLUDE [ephemeral-ip-note.md](../../includes/ephemeral-ip-note.md)]
145142

@@ -156,15 +153,15 @@ After deployment finishes, note the private IP address for the virtual machine.
156153
|Resource group |Select **RG-DNAT-Test** |
157154
|Name |**FW-DNAT-test**|
158155
|Region |Select the same location that you used previously|
159-
|Firewall tier|**Standard**|
156+
|Firewall SKU|**Standard**|
160157
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
161158
|Choose a virtual network |**Use existing**: VN-Hub|
162159
|Public IP address |**Add new**, Name: **fw-pip**.|
163160

164161
5. Accept the other defaults, and then select **Review + create**.
165162
6. Review the summary, and then select **Create** to create the firewall.
166163

167-
This will take a few minutes to deploy.
164+
This takes a few minutes to deploy.
168165
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
169166
8. Note the firewall's private and public IP addresses. You'll use them later when you create the default route and NAT rule.
170167

@@ -175,8 +172,8 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
175172
> [!IMPORTANT]
176173
> You do not need to configure an explicit route back to the firewall at the destination subnet. Azure Firewall is a stateful service and handles the packets and sessions automatically. If you create this route, you'll create an asymmetrical routing environment that interrupts the stateful session logic and results in dropped packets and connections.
177174
178-
1. From the Azure portal home page, select **All services**.
179-
2. Under **Networking**, select **Route tables**.
175+
1. From the Azure portal home page, select **Create a resource**.
176+
2. Search for **Route table** and select it.
180177
3. Select **Create**.
181178
5. For **Subscription**, select your subscription.
182179
1. For **Resource group**, select **RG-DNAT-Test**.
@@ -191,7 +188,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
191188
1. Select **OK**.
192189
1. Select **Routes**, and then select **Add**.
193190
1. For **Route name**, type **FW-DG**.
194-
1. For **Address prefix destination**, select **IP Addresses**.
191+
1. For **Destination type**, select **IP Addresses**.
195192
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
196193
1. For **Next hop type**, select **Virtual appliance**.
197194

@@ -214,7 +211,9 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
214211
1. For **Destination ports**, type **3389**.
215212
1. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
216213
1. For **Translated port**, type **3389**.
217-
1. Select **Add**. This will take a few minutes to complete.
214+
1. Select **Add**.
215+
216+
This takes a few minutes to complete.
218217

219218
## Test the firewall
220219

0 commit comments

Comments
 (0)