You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/management-nic.md
+22-45Lines changed: 22 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,71 +14,46 @@ ms.author: victorh
14
14
> [!NOTE]
15
15
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, now Packet capture (preview) also requires a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
16
16
17
-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. The Firewall Management NIC helps support two features today: Forced Tunneling and Packet Capture (preview). To support either of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled. This is a mandatory requirement to avoid service disruption.
17
+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. The Firewall Management NIC helps support two features today: Forced Tunneling and Packet Capture (preview). To support either of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
18
18
19
19
## What happens when you enable the Management NIC
20
20
21
-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the Management subnet. By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
21
+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
22
22
23
-
:::image type="content" source="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall management NIC dialog.":::
24
-
25
-
## Enable the Management NIC
23
+
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
26
24
27
-
The Firewall Management NIC can be enabled during the firewall create process. For Standard and Premium firewall versions, the Firewall Management NIC must be enabled during the create process, but all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled. For a pre-existing firewall, you must stop the firewall and then restart it with the Firewall Management NIC enabled to support Forced tunneling and Packet capture (preview). Stopping/starting the firewall can be used to enable the Firewall Management NIC without the need to redeploy a new firewall. You should always start/stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
28
-
29
-
Use the following steps:
25
+
:::image type="content" source="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall management NIC dialog.":::
## Enabling the Management NIC on existing firewalls
50
28
51
-
> [!NOTE]
52
-
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
29
+
For Standard and Premium firewall versions, the Firewall Management NIC must be manually enabled during the create process as shown above, but all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled.
53
30
54
-
## Convert a regular firewallto a forced tunnel mode firewall
31
+
For a pre-existing firewall, you must stop the firewall and then restart it with the Firewall Management NIC enabled to support Forced tunneling and Packet capture (preview). Stopping/starting the firewall can be used to enable the Firewall Management NIC without the need to delete an existing firewall and redeploy a new one. You should always start/stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
55
32
56
-
The following procedure shows you how to convert a regular firewall to a forced tunnel mode firewall with a Management subnet. This is done without deleting the original firewall. To avoid deleting it, you can use the following procedure to stop it, and then reallocate it with a Management IP address and subnet.
33
+
Use the following steps:
57
34
58
-
1. Create the new `AzureFirewallManagementSubnet`subnet
35
+
1. Create the `AzureFirewallManagementSubnet`on the Azure portal and use the appropriate IP address range for the virtual network.
59
36
60
-
1. Use the Azure portal to create the new subnet.
61
37
:::image type="content" source="media/management-nic/firewall-management-subnet.png" alt-text="Screenshot showing add a subnet.":::
62
-
1. Use the appropriate IP address range for the virtual network.
63
-
1. Create the new management public IP address
64
-
1. Create it with the same properties as the existing firewall public IP address: SKU, Tier, and Location.
38
+
1. Create the new management public IP address with the same properties as the existing firewall public IP address: SKU, Tier, and Location.
39
+
65
40
:::image type="content" source="media/management-nic/firewall-management-ip.png" lightbox="media/management-nic/firewall-management-ip.png" alt-text="Screenshot showing the public IP address creation.":::
66
41
67
42
1. Stop the firewall
68
43
69
44
Use the information in [Azure Firewall FAQ](firewall-faq.yml#how-can-i-stop-and-start-azure-firewall) to stop the firewall:
@@ -103,8 +78,10 @@ The following procedure shows you how to convert a regular firewall to a forced
103
78
Now when you view the firewall in the Azure portal, you see the assigned Management public IP address:
104
79
105
80
:::image type="content" source="media/management-nic/firewall-with-management-ip.png" lightbox="media/management-nic/firewall-with-management-ip.png" alt-text="Screenshot showing the firewall with a management IP address.":::
106
-
107
81
82
+
83
+
> [!NOTE]
84
+
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
0 commit comments