Skip to content

Commit 72980f9

Browse files
authored
Merge pull request #100788 from vhorne/fwm-vnet-support
Start Firewall Manager VNet support articles
2 parents ecd1604 + 59c407e commit 72980f9

13 files changed

+560
-50
lines changed

articles/firewall-manager/deployment-overview.md

Lines changed: 23 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall-manager
66
services: firewall-manager
77
ms.topic: overview
8-
ms.date: 10/25/2019
8+
ms.date: 02/18/2020
99
ms.author: victorh
1010
---
1111

@@ -15,23 +15,32 @@ ms.author: victorh
1515

1616
There's more than one way to deploy Azure Firewall Manager Preview, but the following general process is recommended.
1717

18-
## Prerequisites
18+
## General deployment process
19+
20+
### Hub virtual networks
1921

20-
> [!IMPORTANT]
21-
> Azure Firewall Manager Preview must be explicitly enabled using the `Register-AzProviderFeature` PowerShell command.
22-
>From a PowerShell command prompt, run the following commands:
23-
>
24-
>```azure-powershell
25-
>connect-azaccount
26-
>Register-AzProviderFeature -FeatureName AllowCortexSecurity -ProviderNamespace Microsoft.Network
27-
>```
28-
>It takes up to 30 minutes for the feature registration to complete. Run the following command to check your >registration status:
29-
>
30-
>`Get-AzProviderFeature -FeatureName AllowCortexSecurity -ProviderNamespace Microsoft.Network`
22+
1. Create a firewall policy
3123

24+
- Create a new policy
25+
<br>*or*<br>
26+
- Derive a base policy and customize a local policy
27+
<br>*or*<br>
28+
- Import rules from an existing Azure Firewall. Make sure to remove NAT rules from policies that should be applied across multiple firewalls
29+
1. Create your hub and spoke architecture
30+
- Create a Hub Virtual Network using Azure Firewall Manager and peer spoke virtual networks to it using virtual network peering
31+
<br>*or*<br>
32+
- Create a virtual network and add virtual network connections and peer spoke virtual networks to it using virtual network peering
3233

34+
3. Select security providers and associate firewall policy. Currently, only Azure Firewall is a supported provider.
3335

34-
## General deployment process
36+
- This is done while you create a Hub Virtual Network
37+
<br>*or*<br>
38+
- Convert an existing virtual network to a Hub Virtual Network. It is also possible to convert multiple virtual networks.
39+
40+
4. Configure User Define Routes to route traffic to your Hub Virtual Network firewall.
41+
42+
43+
### Secured virtual hubs
3544

3645
1. Create your hub and spoke architecture
3746

71.3 KB
Loading
58.7 KB
Loading
68.7 KB
Loading
17.2 KB
Loading
113 KB
Loading
13.9 KB
Loading

articles/firewall-manager/migrate-to-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: How to migrate Azure Firewall configurations to Azure Firewall policy (preview)
2+
title: Migrate Azure Firewall configurations to Azure Firewall policy (preview) using PowerShell
33
description: Learn How to migrate Azure Firewall configurations to Azure Firewall policy (preview)
44
author: vhorne
55
ms.service: firewall-manager
66
services: firewall-manager
77
ms.topic: conceptual
8-
ms.date: 10/25/2019
8+
ms.date: 02/18/2020
99
ms.author: victorh
1010
---
1111

12-
# How to migrate Azure Firewall configurations to Azure Firewall policy (preview)
12+
# Migrate Azure Firewall configurations to Azure Firewall policy (preview) using Powershell
1313

1414
[!INCLUDE [Preview](../../includes/firewall-manager-preview-notice.md)]
1515

articles/firewall-manager/overview.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,28 @@ author: vhorne
55
ms.service: firewall-manager
66
services: firewall-manager
77
ms.topic: overview
8-
ms.date: 12/06/2019
8+
ms.date: 02/18/2020
99
ms.author: victorh
1010
---
1111

1212
# What is Azure Firewall Manager Preview?
1313

1414
[!INCLUDE [Preview](../../includes/firewall-manager-preview-notice.md)]
1515

16-
Azure Firewall Manager Preview is a security management service that provides central security policy and route management for cloud-based security perimeters. It works with [Azure Virtual WAN Hub](../virtual-wan/virtual-wan-about.md#resources), a Microsoft-managed resource that lets you easily create hub and spoke architectures. When security and routing policies are associated with such a hub, it is referred to as a *[secured virtual hub](secured-virtual-hub.md)*.
16+
Azure Firewall Manager Preview is a security management service that provides central security policy and route management for cloud-based security perimeters.
1717

18-
![firewall-manager](media/overview/firewallmanagerv3.png)
18+
Firewall Manager can provide security management for two network architecture types:
19+
20+
- **secured virtual hub**
21+
22+
An [Azure Virtual WAN Hub](../virtual-wan/virtual-wan-about.md#resources) is a Microsoft-managed resource that lets you easily create hub and spoke architectures. When security and routing policies are associated with such a hub, it is referred to as a *[secured virtual hub](secured-virtual-hub.md)*.
23+
- **hub virtual network**
24+
25+
This is a standard Azure virtual network that you create and manage yourself. When security policies are associated with such a hub, it is referred to as a *hub virtual network*. At this time, only Azure Firewall Policy is supported. You can peer spoke virtual networks that contain your workload servers and services. You can also manage firewalls in standalone virtual networks that are not peered to any spoke.
26+
27+
For a detailed comparison of *secured virtual hub* and *hub virtual network* architectures, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md).
28+
29+
![firewall-manager](media/overview/firewallmanagerv5.png)
1930

2031
## Azure Firewall Manager Preview features
2132

@@ -33,6 +44,8 @@ You can use Azure Firewall Manager Preview to centrally manage Azure Firewall po
3344

3445
In addition to Azure Firewall, you can integrate third-party security as a service (SECaaS) providers to provide additional network protection for your VNet and branch Internet connections.
3546

47+
This feature is available only with secured virtual hub deployments.
48+
3649
- VNet to Internet (V2I) traffic filtering
3750

3851
- Filter outbound virtual network traffic with your preferred third-party security provider.
@@ -46,32 +59,29 @@ For more information about trusted security providers, see [What are Azure Firew
4659

4760
### Centralized route management
4861

49-
Easily route traffic to your secured hub for filtering and logging without the need to manually set up User Defined Routes (UDR) on spoke virtual networks. You can use third-party providers for Branch to Internet (B2I) traffic filtering, side by side with Azure Firewall for Branch to VNet (B2V), VNet to VNet (V2V) and VNet to Internet (V2I). You can also use third-party providers for V2I traffic filtering as long as Azure Firewall is not required for B2V or V2V.
62+
Easily route traffic to your secured hub for filtering and logging without the need to manually set up User Defined Routes (UDR) on spoke virtual networks.
5063

51-
## Region availability
64+
This feature is available only with secured virtual hub deployments.
5265

53-
The following regions are supported for the public preview:
66+
You can use third-party providers for Branch to Internet (B2I) traffic filtering, side by side with Azure Firewall for Branch to VNet (B2V), VNet to VNet (V2V) and VNet to Internet (V2I). You can also use third-party providers for V2I traffic filtering as long as Azure Firewall is not required for B2V or V2V.
5467

55-
- West Europe, North Europe, France Central, France South, UK South, UK West
56-
- Australia East, Australia Central, Australia Central 2, Australia Southeast
57-
- Canada Central
58-
- East US, West US, East US 2, South Central US, West US 2, Central US, North Central US, West Central US
68+
## Region availability
5969

60-
Azure Firewall Policies can only be created in these regions, but they can be used across regions. For example, you can create a policy in West US, and use it in East US.
70+
Azure Firewall Policies can be used across regions. For example, you can create a policy in West US, and use it in East US.
6171

6272
## Known issues
6373

6474
Azure Firewall Manager Preview has the following known issues:
6575

6676
|Issue |Description |Mitigation |
6777
|---------|---------|---------|
68-
|Manually created central VNets not supported|Currently, Azure Firewall Manager supports networks created with Virtual Hubs. Using your own manually created hub VNet is not yet supported.|For now, use Azure Firewall Manager with hub and spoke networks created with Virtual Hubs.<br>Fix in progress.
6978
|Third-party filtering limitations|V2I traffic filtering with third-party providers is not supported with Azure Firewall B2V and V2V.|Currently investigating.|
7079
|Traffic splitting not currently supported|Office 365 and Azure Public PaaS traffic splitting is not currently supported. As such, selecting a third-party provider for V2I or B2I also sends all Azure Public PaaS and Office 365 traffic via the partner service.|Currently investigating traffic splitting at the hub.
71-
|One hub per region|You can't have more than one hub per region|Create multiple virtual WANs in a region.|
80+
|One secured virtual hub per region|You can't have more than one secured virtual hub per region|Create multiple virtual WANs in a region.|
7281
|Base policies must be in same region as local policy|Create all your local policies in the same region as the base policy. You can still apply a policy that was created in one region on a secured hub from another region.|Currently investigating.|
7382
|Inter-hub communication not working with Secured Virtual Hub|Secured Virtual Hub to Secured Virtual Hub communication is not yet supported.|Currently investigating.|
7483
|All Secured Virtual Hubs sharing the same virtual WAN must be in the same resource group.|This behavior is aligned with Virtual WAN Hubs today.|Create multiple Virtual WANs to allow Secured Virtual Hubs to be created in different resource groups.|
84+
|IP Groups are not supported in Firewall Policy|IP Groups are in public preview and currently only supported with traditional firewall rules|Fix in progress
7585

7686
## Next steps
7787

articles/firewall-manager/secure-cloud-network.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,33 @@
11
---
2-
title: 'Tutorial: Use Azure Firewall Manager Preview to secure your cloud network using the Azure portal'
3-
description: In this tutorial, you learn how to secure your cloud network with Azure Firewall Manager using the Azure portal.
2+
title: 'Tutorial: Secure your virtual WAN using Azure Firewall Manager preview'
3+
description: In this tutorial, you learn how to secure your virtual WAN with Azure Firewall Manager using the Azure portal.
44
services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: tutorial
8-
ms.date: 10/27/2019
8+
ms.date: 02/18/2020
99
ms.author: victorh
1010
---
1111

12-
# Tutorial: Secure your cloud network with Azure Firewall Manager Preview using the Azure portal
12+
# Tutorial: Secure your virtual WAN using Azure Firewall Manager preview
1313

1414
[!INCLUDE [Preview](../../includes/firewall-manager-preview-notice.md)]
1515

16-
Using Azure Firewall Manager Preview, you can create secured hubs to secure your cloud network traffic destined to private IP addresses, Azure PaaS, and the Internet. Traffic routing to the firewall is automated, so there's no need to create user defined routes (UDRs).
16+
Using Azure Firewall Manager Preview, you can create secured virtual hubs to secure your cloud network traffic destined to private IP addresses, Azure PaaS, and the Internet. Traffic routing to the firewall is automated, so there's no need to create user defined routes (UDRs).
1717

1818
![secure the cloud network](media/secure-cloud-network/secure-cloud-network.png)
1919

20-
## Prerequisites
20+
Firewall Manager also supports a hub virtual network architecture. For a comparison of the secured virtual hub and hub virtual network architecture types, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md)
2121

22-
> [!IMPORTANT]
23-
> Azure Firewall Manager Preview must be explicitly enabled using the `Register-AzProviderFeature` PowerShell command.
22+
In this tutorial, you learn how to:
2423

25-
From a PowerShell command prompt, run the following commands:
26-
27-
```azure-powershell
28-
connect-azaccount
29-
Register-AzProviderFeature -FeatureName AllowCortexSecurity -ProviderNamespace Microsoft.Network
30-
```
31-
It takes up to 30 minutes for the feature registration to complete. Run the following command to check your registration status:
32-
33-
`Get-AzProviderFeature -FeatureName AllowCortexSecurity -ProviderNamespace Microsoft.Network`
24+
> [!div class="checklist"]
25+
> * Create the spoke virtual network
26+
> * Create a secured virtual hub
27+
> * Connect the hub and spoke VNets
28+
> * Create a firewall policy and secure your hub
29+
> * Route traffic to your hub
30+
> * Test the firewall
3431
3532
## Create a hub and spoke architecture
3633

@@ -146,7 +143,7 @@ To test your firewall rules, you'll need to deploy a couple servers. You'll depl
146143
|Virtual machine name |**Jump-Srv**|
147144
|Region |**(US) East US)**|
148145
|Administrator user name |**azureuser**|
149-
|Password |**Azure123456!**|
146+
|Password |type your password|
150147

151148
4. Under **Inbound port rules**, for **Public inbound ports**, select **Allow selected ports**.
152149
5. For **Select inbound ports**, select **RDP (3389)**.

0 commit comments

Comments
 (0)