Skip to content

Commit 8b2880b

Browse files
authored
Merge pull request #223638 from vhorne/fw-dep-conf
start Freshness updates
2 parents af63193 + 6011fee commit 8b2880b

File tree

1 file changed

+31
-29
lines changed

1 file changed

+31
-29
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 31 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 08/01/2022
8+
ms.date: 01/11/2023
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -62,8 +62,8 @@ The resource group contains all the resources used in this procedure.
6262
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
6363
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Create**.
6464
4. For **Subscription**, select your subscription.
65-
1. For **Resource group name**, type **Test-FW-RG**.
66-
1. For **Resource group location**, select a location. All other resources that you create must be in the same location.
65+
1. For **Resource group** name, type **Test-FW-RG**.
66+
1. For **Region**, select a region. All other resources that you create must be in the same region.
6767
1. Select **Review + create**.
6868
1. Select **Create**.
6969

@@ -74,27 +74,27 @@ This VNet will have two subnets.
7474
> [!NOTE]
7575
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
7676
77-
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
78-
1. Select **Networking** > **Virtual network**.
77+
1. On the Azure portal menu or from the **Home** page, search for **Virtual networks**.
78+
1. Select **Virtual networks** in the result pane.
79+
1. Select **Create**.
7980
1. For **Subscription**, select your subscription.
8081
1. For **Resource group**, select **Test-FW-RG**.
8182
1. For **Name**, type **Test-FW-VN**.
82-
1. For **Region**, select the same location that you used previously.
8383
1. Select **Next: IP addresses**.
84-
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
85-
1. Under **Subnet name**, select **default**.
86-
1. For **Subnet name** change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
87-
1. For **Address range**, change it to **10.0.1.0/26**.
84+
1. For **Address space**, accept the default **10.0.0.0/16**.
85+
1. Under **Subnet name**, select **default** and change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
86+
1. For **Subnet address range**, change it to **10.0.1.0/26**.
8887
1. Select **Save**.
8988

89+
9090
Next, create a subnet for the workload server.
9191

9292
1. Select **Add subnet**.
93-
4. For **Subnet name**, type **Workload-SN**.
94-
5. For **Subnet address range**, type **10.0.2.0/24**.
95-
6. Select **Add**.
96-
7. Select **Review + create**.
97-
8. Select **Create**.
93+
1. For **Subnet name**, type **Workload-SN**.
94+
1. For **Subnet address range**, type **10.0.2.0/24**.
95+
1. Select **Add**.
96+
1. Select **Review + create**.
97+
1. Select **Create**.
9898

9999
### Create a virtual machine
100100

@@ -119,9 +119,10 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
119119
8. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
120120
9. For **Public IP**, select **None**.
121121
11. Accept the other defaults and select **Next: Management**.
122-
12. For **Boot diagnostics**, select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
123-
13. Review the settings on the summary page, and then select **Create**.
124-
1. After the deployment is complete, select **Srv-Work** and note the private IP address that you'll need to use later.
122+
1. Accept the defaults and select **Next: Monitoring**.
123+
1. For **Boot diagnostics**, select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
124+
1. Review the settings on the summary page, and then select **Create**.
125+
1. After the deployment is complete, select **Go to resource** and note the **Srv-Work** private IP address that you'll need to use later.
125126

126127
[!INCLUDE [ephemeral-ip-note.md](../../includes/ephemeral-ip-note.md)]
127128

@@ -141,7 +142,7 @@ Deploy the firewall into the VNet.
141142
|Resource group |**Test-FW-RG** |
142143
|Name |**Test-FW01**|
143144
|Region |Select the same location that you used previously|
144-
|Firewall tier|**Standard**|
145+
|Firewall SKU|**Standard**|
145146
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
146147
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
147148
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
@@ -150,30 +151,31 @@ Deploy the firewall into the VNet.
150151
6. Review the summary, and then select **Create** to create the firewall.
151152

152153
This will take a few minutes to deploy.
153-
7. After deployment completes, go to the **Test-FW-RG** resource group, and select the **Test-FW01** firewall.
154+
7. After deployment completes, select the **Go to resource**.
154155
8. Note the firewall private and public IP addresses. You'll use these addresses later.
155156

156157
## Create a default route
157158

158159
When creating a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This will take care of any outgoing and incoming connections to go through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
159160

160-
As a result, there is no need create an additional UDR to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
161+
As a result, there is no need create an additional user defined route to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
161162

162163
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
163164

164-
1. On the Azure portal menu, select **Create a resource**.
165-
2. Under **Networking**, select **Route table**.
166-
5. For **Subscription**, select your subscription.
167-
6. For **Resource group**, select **Test-FW-RG**.
168-
7. For **Region**, select the same location that you used previously.
169-
4. For **Name**, type **Firewall-route**.
165+
1. On the Azure portal search for **Route tables**.
166+
1. Select **Route tables** in the results pane.
167+
1. Select **Create**.
168+
1. For **Subscription**, select your subscription.
169+
1. For **Resource group**, select **Test-FW-RG**.
170+
1. For **Region**, select the same location that you used previously.
171+
1. For **Name**, type **Firewall-route**.
170172
1. Select **Review + create**.
171173
1. Select **Create**.
172174

173175
After deployment completes, select **Go to resource**.
174176

175177
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
176-
1. Select **Virtual network** > **Test-FW-VN**.
178+
1. For **Virtual network**, select **Test-FW-VN**.
177179
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
178180

179181
13. Select **OK**.
@@ -254,7 +256,7 @@ For testing purposes, configure the server's primary and secondary DNS addresses
254256
2. Select the network interface for the **Srv-Work** virtual machine.
255257
3. Under **Settings**, select **DNS servers**.
256258
4. Under **DNS servers**, select **Custom**.
257-
5. Type **209.244.0.3** in the **Add DNS server** text box, and **209.244.0.4** in the next text box.
259+
5. Type **209.244.0.3** and press Enter in the **Add DNS server** text box, and **209.244.0.4** in the next text box.
258260
6. Select **Save**.
259261
7. Restart the **Srv-Work** virtual machine.
260262

0 commit comments

Comments
 (0)