Skip to content

Commit 7861e2d

Browse files
committed
added DDos info and edited TOC
1 parent 46f47ab commit 7861e2d

File tree

2 files changed

+35
-15
lines changed

2 files changed

+35
-15
lines changed

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ items:
3636
href: tutorial-hybrid-portal-policy.md
3737
- name: Filter inbound traffic with DNAT
3838
href: tutorial-firewall-dnat-policy.md
39+
- name: Deploy firewall with DDoS protection
40+
href: tutorial-protect-firewall.md
3941

4042
- name: Samples
4143
items:

articles/firewall/tutorial-protect-firewall.md

Lines changed: 33 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,27 +2,23 @@
22
title: 'Tutorial: Deploy & configure Azure Firewall and policy using the Azure portal'
33
description: In this tutorial, you learn how to deploy and configure Azure Firewall and policy rules using the Azure portal.
44
services: firewall
5-
author: vhorne
5+
author: asudbring
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 10/28/2022
9-
ms.author: victorh
10-
ms.custom: template-tutorial, mvc, engagement-fy23
8+
ms.date: 01/24/2022
9+
ms.author: allensu
10+
ms.custom: template-tutorial
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
1212
---
1313

1414
# Tutorial: Deploy and configure Azure Firewall and policy using the Azure portal
1515

16-
Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that can be accessed.
16+
This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection Standard enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and monitoring to protect your firewall from large scale DDoS attacks.
1717

18-
One way you can control outbound network access from an Azure subnet is with Azure Firewall and Firewall Policy. With Azure Firewall and Firewall Policy, you can configure:
18+
> [!IMPORTANT]
19+
> Azure DDoS Protection incurs a cost when you use the Standard SKU. Overages charges only apply if more than 100 public IPs are protected in the tenant. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing]( https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](../ddos-protection/ddos-protection-overview.md).
1920
20-
* Application rules that define fully qualified domain names (FQDNs) that can be accessed from a subnet.
21-
* Network rules that define source address, protocol, destination port, and destination address.
22-
23-
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
24-
25-
For this tutorial, you create a simplified single VNet with two subnets for easy deployment.
21+
For this tutorial, you create a simplified single VNet with two subnets for easy deployment. Azure DDoS Protection Standard is enabled for the virtual network.
2622

2723
* **AzureFirewallSubnet** - the firewall is in this subnet.
2824
* **Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
@@ -68,6 +64,25 @@ The resource group contains all the resources for the tutorial.
6864
1. Select **Review + create**.
6965
1. Select **Create**.
7066

67+
### Create a DDoS protection plan
68+
69+
1. In the search box at the top of the portal, enter **DDoS protection**. Select **DDoS protection plans** in the search results and then select **+ Create**.
70+
71+
1. In the **Basics** tab of **Create a DDoS protection plan** page, enter or select the following information:
72+
73+
:::image type="content" source="./media/tutorial-protect-application-gateway/create-ddos-plan.png" alt-text="Screenshot of basics tab for creating a DDoS protection plan.":::
74+
75+
| Setting | Value |
76+
|--|--|
77+
| **Project details** | |
78+
| Subscription | Select your Azure subscription. |
79+
| Resource group | Select **Test-FW-RG**. |
80+
| **Instance details** | |
81+
| Name | Enter **myDDoSProtectionPlan**. |
82+
| Region | Select the region. |
83+
84+
1. Select **Review + create** and then select **Create** to deploy the DDoS protection plan.
85+
7186
### Create a VNet
7287

7388
This VNet will have two subnets.
@@ -88,18 +103,21 @@ This VNet will have two subnets.
88103
| Region | Select the same location that you used previously. |
89104

90105
1. Select **Next: IP addresses**.
91-
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
106+
1. For **IPv4 Address space**, accept the default **10.1.0.0/16**.
92107
1. Under **Subnet**, select **default**.
93108
1. For **Subnet name** change the name to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
94-
1. For **Address range**, type **10.0.1.0/26**.
109+
1. For **Address range**, type **10.1.1.0/26**.
95110
1. Select **Save**.
96111

97112
Next, create a subnet for the workload server.
98113

99114
1. Select **Add subnet**.
100115
1. For **Subnet name**, type **Workload-SN**.
101-
1. For **Subnet address range**, type **10.0.2.0/24**.
116+
1. For **Subnet address range**, type **10.1.2.0/24**.
102117
1. Select **Add**.
118+
1. Select **Next: Security**.
119+
1. In **DDoS Protection Standard** select **Enable**.
120+
1. Select **myDDoSProtectionPlan** in **DDoS protection plan**.
103121
1. Select **Review + create**.
104122
1. Select **Create**.
105123

0 commit comments

Comments
 (0)