You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-cloud-network.md
+48-42Lines changed: 48 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall-manager
5
5
author: vhorne
6
6
ms.service: firewall-manager
7
7
ms.topic: tutorial
8
-
ms.date: 02/18/2020
8
+
ms.date: 05/01/2020
9
9
ms.author: victorh
10
10
---
11
11
@@ -31,66 +31,73 @@ In this tutorial, you learn how to:
31
31
32
32
## Create a hub and spoke architecture
33
33
34
-
First, create a spoke VNet where you can place your servers.
34
+
First, create a spoke virtual network where you can place your servers.
35
35
36
-
### Create a spoke VNet and subnets
36
+
### Create a spoke virtual network and subnets
37
37
38
38
1. From the Azure portal home page, select **Create a resource**.
39
39
2. Under **Networking**, select **Virtual network**.
40
-
4. For **Name**, type **Spoke-01**.
41
-
5. For **Address space**, type **10.0.0.0/16**.
42
-
6. For **Subscription**, select your subscription.
43
-
7. For **Resource group**, select **Create new**, and type **FW-Manager** for the name and select **OK**.
44
-
8. For **Location**, select **(US) East US**.
45
-
9. Under **Subnet**, for **Name** type **Workload-SN**.
46
-
10. For **Address range**, type **10.0.1.0/24**.
47
-
11. Accept the other default settings, and then select **Create**.
40
+
2. For **Subscription**, select your subscription.
41
+
1. For **Resource group**, select **Create new**, and type **FW-Manager** for the name and select **OK**.
42
+
2. For **Name**, type **Spoke-01**.
43
+
3. For **Region**, select **(US) East US**.
44
+
4. Select **Next: IP Addresses**.
45
+
1. For **Address space**, accept the default **10.0.0.0/16**.
46
+
3. Under **Subnet name**, select **default**.
47
+
4. Change the subnet name to **Workload-SN**.
48
+
5. For **Subnet address range**, type **10.0.1.0/24**.
49
+
6. Select **Save**..
48
50
49
51
Next, create a subnet for a jump server.
50
52
51
-
1. On the Azure portal home page, select **Resource groups** > **FW-Manager**.
52
-
2. Select the **Spoke-01** virtual network.
53
-
3. Select **Subnets** > **+Subnet**.
54
-
4. For **Name**, type **Jump-SN**.
55
-
5. For **Address range**, type **10.0.2.0/24**.
56
-
6. Select **OK**.
53
+
1. Select **Add subnet**.
54
+
4. For **Subnet name**, type **Jump-SN**.
55
+
5. For **Subnet address range**, type **10.0.2.0/24**.
56
+
6. Select **Add**.
57
+
58
+
Now create the virtual network.
59
+
60
+
1. Select **Review + create**.
61
+
2. Select **Create**.
57
62
58
63
### Create the secured virtual hub
59
64
60
65
Create your secured virtual hub using Firewall Manager.
61
66
62
67
1. From the Azure portal home page, select **All services**.
63
68
2. In the search box, type **Firewall Manager** and select **Firewall Manager**.
64
-
3. On the **Firewall Manager** page, select **Create a Secured Virtual Hub**.
65
-
4. On the **Create new Secured virtual hub** page, select your subscription and the **FW-Manager** resource group.
66
-
5. For the **Secured virtual hub name**, type **Hub-01**.
67
-
6. For **Location**, select **East US**.
68
-
7. For **Hub address space**, type **10.1.0.0/16**.
69
-
8. For the new vWAN name, type **vwan-01**.
70
-
9. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
71
-
10. Select **Next:Azure Firewall**.
72
-
11. Accept the default **Azure Firewall****Enabled** setting and then select **Next: Trusted Security Partner**.
73
-
12. Accept the default **Trusted Security Partner****Disabled** setting, and select **Next: Review + create**.
74
-
13. Select **Create**. It will take about 30 minutes to deploy.
69
+
3. On the **Firewall Manager** page, select **View secured virtual hubs**.
70
+
4. On the **Firewall Manager | Secured virtual hubs** page, select **Create new secured virtual hub**.
71
+
5. For **Resource group**, select **FW-Manager**.
72
+
7. For **Region**, select **East US**.
73
+
1. For the **Secured virtual hub name**, type **Hub-01**.
74
+
2. For **Hub address space**, type **10.1.0.0/16**.
75
+
3. For the new vWAN name, type **Vwan-01**.
76
+
4. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
77
+
5. Select **Next:Azure Firewall**.
78
+
6. Accept the default **Azure Firewall****Enabled** setting and then select **Next: Trusted Security Partner**.
79
+
7. Accept the default **Trusted Security Partner****Disabled** setting, and select **Next: Review + create**.
80
+
8. Select **Create**. It will take about 30 minutes to deploy.
75
81
76
82
### Connect the hub and spoke VNets
77
83
78
84
Now you can peer the hub and spoke VNets.
79
85
80
-
1. Select the **FW-Manager** resource group, then select the **vwan-01** virtual WAN.
86
+
1. Select the **FW-Manager** resource group, then select the **Vwan-01** virtual WAN.
81
87
2. Under **Connectivity**, select **Virtual network connections**.
82
88
3. Select **Add connection**.
83
89
4. For **Connection name**, type **hub-spoke**.
84
90
5. For **Hubs**, select **Hub-01**.
85
-
6. For **Virtual network**, select **Spoke-01**.
86
-
7. Select **OK**.
91
+
6. For **Resource group**, select **FW-Manager**.
92
+
7. For **Virtual network**, select **Spoke-01**.
93
+
8. Select **OK**.
87
94
88
95
## Create a firewall policy and secure your hub
89
96
90
97
A firewall policy defines collections of rules to direct traffic on one or more Secured virtual hubs. You'll create your firewall policy and then secure your hub.
91
98
92
-
1. From Firewall Manager, select **Create an Azure Firewall Policy**.
93
-
2. Select your subscription, and then select the **FW-Manager** resource group.
99
+
1. From Firewall Manager, select **View Azure Firewall policies**.
100
+
2. Select **Create Azure Firewall Policy**.
94
101
3. Under **Policy details**, for the **Name** type **Policy-01** and for **Region** select **East US**.
95
102
4. Select **Next:Rules**.
96
103
5. On the **Rules** tab, select **Add a rule collection**.
@@ -104,10 +111,11 @@ A firewall policy defines collections of rules to direct traffic on one or more
104
111
13. Ensure **Destination type is **FQDN**.
105
112
14. For **Destination**, type **\*.microsoft.com**.
106
113
15. Select **Add**.
107
-
16. Select **Next: Secured virtual hubs**.
108
-
17. On the **Secured virtual hubs** tab, select **Hub-01**.
109
-
19. Select **Review + create**.
110
-
20. Select **Create**.
114
+
16. Select **Next: Hubs**.
115
+
17. On the **Hubs** tab, select **Associate virtual hubs**.
116
+
18. Select **Hub-01** and then select **Add**.
117
+
1. Select **Review + create**.
118
+
2. Select **Create**.
111
119
112
120
This can take about five minutes or more to complete.
113
121
@@ -121,10 +129,9 @@ Now you must ensure that network traffic gets routed to through your firewall.
121
129
4. Under **Internet traffic**, **Traffic from Virtual Networks**, select **Send via Azure Firewall**.
122
130
5. Under **Azure private traffic**, **Traffic to Virtual Networks**, select **Send via Azure Firewall**.
123
131
6. Select **Edit IP address prefix(es)**.
124
-
7. Select **Add an IP address prefix**.
125
132
8. Type **10.0.1.0/24** as the address of the Workload subnet and select **Save**.
126
133
9. Under **Settings**, select **Connections**.
127
-
10.Select the **hub-spoke** connection, and then select **Secure internet traffic**and then select **OK**.
134
+
10.Verify that the **hub-spoke** connection shows **Internet Traffic**as **Secured**.
128
135
129
136
130
137
## Test your firewall
@@ -142,12 +149,11 @@ To test your firewall rules, you'll need to deploy a couple servers. You'll depl
142
149
|Resource group |**FW-Manager**|
143
150
|Virtual machine name |**Jump-Srv**|
144
151
|Region |**(US) East US)**|
145
-
|Administrator user name |**azureuser**|
146
-
|Password |type your password|
152
+
|Administrator user name |type a user name|
153
+
|Password |type a password|
147
154
148
155
4. Under **Inbound port rules**, for **Public inbound ports**, select **Allow selected ports**.
149
156
5. For **Select inbound ports**, select **RDP (3389)**.
150
-
151
157
6. Accept the other defaults and select **Next: Disks**.
152
158
7. Accept the disk defaults and select **Next: Networking**.
153
159
8. Make sure that **Spoke-01** is selected for the virtual network and the subnet is **Jump-SN**.
0 commit comments