Skip to content

Commit 7c201cb

Browse files
authored
Merge pull request #5 from abhinavsriram/docs-editor/management-nic-1728059764
some small updates to the article
2 parents f49cac4 + e5a4960 commit 7c201cb

File tree

1 file changed

+22
-45
lines changed

1 file changed

+22
-45
lines changed

articles/firewall/management-nic.md

Lines changed: 22 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -14,71 +14,46 @@ ms.author: victorh
1414
> [!NOTE]
1515
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, now Packet capture (preview) also requires a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
1616
17-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. The Firewall Management NIC helps support two features today: Forced Tunneling and Packet Capture (preview). To support either of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled. This is a mandatory requirement to avoid service disruption.
17+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. The Firewall Management NIC helps support two features today: Forced Tunneling and Packet Capture (preview). To support either of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
1818

1919
## What happens when you enable the Management NIC
2020

21-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the Management subnet. By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
21+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
2222

23-
:::image type="content" source="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall management NIC dialog.":::
24-
25-
## Enable the Management NIC
23+
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
2624

27-
The Firewall Management NIC can be enabled during the firewall create process. For Standard and Premium firewall versions, the Firewall Management NIC must be enabled during the create process, but all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled. For a pre-existing firewall, you must stop the firewall and then restart it with the Firewall Management NIC enabled to support Forced tunneling and Packet capture (preview). Stopping/starting the firewall can be used to enable the Firewall Management NIC without the need to redeploy a new firewall. You should always start/stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
28-
29-
Use the following steps:
25+
:::image type="content" source="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall management NIC dialog.":::
3026

31-
1. Stop the existing firewall:
32-
```azurepowershell
33-
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
34-
$azfw.Deallocate()
35-
Set-AzFirewall -AzureFirewall $azfw
36-
```
37-
1. Create a new subnet with AzureFirewallManagementSubnet and create a management Public IP address.
38-
- Use the portal to create a virtual network subnet named **AzureFirewallManagementSubnet**.
39-
- Create a separate public IP address for the new Management public IP address.
40-
1. Start the firewall with the Management IP address and subnet:
41-
```azurepowershell
42-
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
43-
$vnet = Get-AzVirtualNetwork -ResourceGroupName "RG Name" -Name "VNet Name"
44-
$pip= Get-AzPublicIpAddress -ResourceGroupName "RG Name" -Name "azfwpublicip"
45-
$mgmtPip2 = Get-AzPublicIpAddress -ResourceGroupName "RG Name" -Name "mgmtpip"
46-
$azfw.Allocate($vnet, $pip, $mgmtPip2)
47-
$azfw | Set-AzFirewall
48-
```
49-
27+
## Enabling the Management NIC on existing firewalls
5028

51-
> [!NOTE]
52-
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
29+
For Standard and Premium firewall versions, the Firewall Management NIC must be manually enabled during the create process as shown above, but all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled.
5330

54-
## Convert a regular firewall to a forced tunnel mode firewall
31+
For a pre-existing firewall, you must stop the firewall and then restart it with the Firewall Management NIC enabled to support Forced tunneling and Packet capture (preview). Stopping/starting the firewall can be used to enable the Firewall Management NIC without the need to delete an existing firewall and redeploy a new one. You should always start/stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
5532

56-
The following procedure shows you how to convert a regular firewall to a forced tunnel mode firewall with a Management subnet. This is done without deleting the original firewall. To avoid deleting it, you can use the following procedure to stop it, and then reallocate it with a Management IP address and subnet.
33+
Use the following steps:
5734

58-
1. Create the new `AzureFirewallManagementSubnet` subnet
35+
1. Create the `AzureFirewallManagementSubnet` on the Azure portal and use the appropriate IP address range for the virtual network.
5936

60-
1. Use the Azure portal to create the new subnet.
6137
:::image type="content" source="media/management-nic/firewall-management-subnet.png" alt-text="Screenshot showing add a subnet.":::
62-
1. Use the appropriate IP address range for the virtual network.
63-
1. Create the new management public IP address
64-
1. Create it with the same properties as the existing firewall public IP address: SKU, Tier, and Location.
38+
1. Create the new management public IP address with the same properties as the existing firewall public IP address: SKU, Tier, and Location.
39+
6540
:::image type="content" source="media/management-nic/firewall-management-ip.png" lightbox="media/management-nic/firewall-management-ip.png" alt-text="Screenshot showing the public IP address creation.":::
6641

6742
1. Stop the firewall
6843

6944
Use the information in [Azure Firewall FAQ](firewall-faq.yml#how-can-i-stop-and-start-azure-firewall) to stop the firewall:
70-
45+
7146
```azurepowershell
7247
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
7348
$azfw.Deallocate()
7449
Set-AzFirewall -AzureFirewall $azfw
7550
```
7651

52+
53+
1. Start the firewall with the management public IP address and subnet.
7754

78-
1. Start the firewall with the management IP address and subnet
79-
80-
For example, start the firewall with one public IP address and a Management public IP address:
81-
55+
Start a firewall with one public IP address and a Management public IP address:
56+
8257
```azurepowershell
8358
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
8459
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
@@ -87,9 +62,9 @@ The following procedure shows you how to convert a regular firewall to a forced
8762
$azfw.Allocate($vnet, $pip, $mgmtPip)
8863
$azfw | Set-AzFirewall
8964
```
90-
91-
Example to start a firewall with two public IP addresses and a Management public IP address:
92-
65+
66+
Start a firewall with two public IP addresses and a Management public IP address:
67+
9368
```azurepowershell
9469
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
9570
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
@@ -103,8 +78,10 @@ The following procedure shows you how to convert a regular firewall to a forced
10378
Now when you view the firewall in the Azure portal, you see the assigned Management public IP address:
10479

10580
:::image type="content" source="media/management-nic/firewall-with-management-ip.png" lightbox="media/management-nic/firewall-with-management-ip.png" alt-text="Screenshot showing the firewall with a management IP address.":::
106-
10781

82+
83+
> [!NOTE]
84+
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
10885
## Related content
10986

11087
- [Azure Firewall forced tunneling](forced-tunneling.md)

0 commit comments

Comments
 (0)