You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+31-29Lines changed: 31 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 08/01/2022
8
+
ms.date: 01/11/2023
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -62,8 +62,8 @@ The resource group contains all the resources used in this procedure.
62
62
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
63
63
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Create**.
64
64
4. For **Subscription**, select your subscription.
65
-
1. For **Resource group name**, type **Test-FW-RG**.
66
-
1. For **Resource group location**, select a location. All other resources that you create must be in the same location.
65
+
1. For **Resource group** name, type **Test-FW-RG**.
66
+
1. For **Region**, select a region. All other resources that you create must be in the same region.
67
67
1. Select **Review + create**.
68
68
1. Select **Create**.
69
69
@@ -74,27 +74,27 @@ This VNet will have two subnets.
74
74
> [!NOTE]
75
75
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
76
76
77
-
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
78
-
1. Select **Networking** > **Virtual network**.
77
+
1. On the Azure portal menu or from the **Home** page, search for **Virtual networks**.
78
+
1. Select **Virtual networks** in the result pane.
79
+
1. Select **Create**.
79
80
1. For **Subscription**, select your subscription.
80
81
1. For **Resource group**, select **Test-FW-RG**.
81
82
1. For **Name**, type **Test-FW-VN**.
82
-
1. For **Region**, select the same location that you used previously.
83
83
1. Select **Next: IP addresses**.
84
-
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
85
-
1. Under **Subnet name**, select **default**.
86
-
1. For **Subnet name** change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
87
-
1. For **Address range**, change it to **10.0.1.0/26**.
84
+
1. For **Address space**, accept the default **10.0.0.0/16**.
85
+
1. Under **Subnet name**, select **default** and change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
86
+
1. For **Subnet address range**, change it to **10.0.1.0/26**.
88
87
1. Select **Save**.
89
88
89
+
90
90
Next, create a subnet for the workload server.
91
91
92
92
1. Select **Add subnet**.
93
-
4. For **Subnet name**, type **Workload-SN**.
94
-
5. For **Subnet address range**, type **10.0.2.0/24**.
95
-
6. Select **Add**.
96
-
7. Select **Review + create**.
97
-
8. Select **Create**.
93
+
1. For **Subnet name**, type **Workload-SN**.
94
+
1. For **Subnet address range**, type **10.0.2.0/24**.
95
+
1. Select **Add**.
96
+
1. Select **Review + create**.
97
+
1. Select **Create**.
98
98
99
99
### Create a virtual machine
100
100
@@ -119,9 +119,10 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
119
119
8. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
120
120
9. For **Public IP**, select **None**.
121
121
11. Accept the other defaults and select **Next: Management**.
122
-
12. For **Boot diagnostics**, select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
123
-
13. Review the settings on the summary page, and then select **Create**.
124
-
1. After the deployment is complete, select **Srv-Work** and note the private IP address that you'll need to use later.
122
+
1. Accept the defaults and select **Next: Monitoring**.
123
+
1. For **Boot diagnostics**, select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
124
+
1. Review the settings on the summary page, and then select **Create**.
125
+
1. After the deployment is complete, select **Go to resource** and note the **Srv-Work** private IP address that you'll need to use later.
@@ -141,7 +142,7 @@ Deploy the firewall into the VNet.
141
142
|Resource group |**Test-FW-RG**|
142
143
|Name |**Test-FW01**|
143
144
|Region |Select the same location that you used previously|
144
-
|Firewall tier|**Standard**|
145
+
|Firewall SKU|**Standard**|
145
146
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
146
147
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
147
148
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
@@ -150,30 +151,31 @@ Deploy the firewall into the VNet.
150
151
6. Review the summary, and then select **Create** to create the firewall.
151
152
152
153
This will take a few minutes to deploy.
153
-
7. After deployment completes, go to the **Test-FW-RG** resource group, and select the **Test-FW01** firewall.
154
+
7. After deployment completes, select the **Go to resource**.
154
155
8. Note the firewall private and public IP addresses. You'll use these addresses later.
155
156
156
157
## Create a default route
157
158
158
159
When creating a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This will take care of any outgoing and incoming connections to go through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
159
160
160
-
As a result, there is no need create an additional UDR to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
161
+
As a result, there is no need create an additional user defined route to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
161
162
162
163
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
163
164
164
-
1. On the Azure portal menu, select **Create a resource**.
165
-
2. Under **Networking**, select **Route table**.
166
-
5. For **Subscription**, select your subscription.
167
-
6. For **Resource group**, select **Test-FW-RG**.
168
-
7. For **Region**, select the same location that you used previously.
169
-
4. For **Name**, type **Firewall-route**.
165
+
1. On the Azure portal search for **Route tables**.
166
+
1. Select **Route tables** in the results pane.
167
+
1. Select **Create**.
168
+
1. For **Subscription**, select your subscription.
169
+
1. For **Resource group**, select **Test-FW-RG**.
170
+
1. For **Region**, select the same location that you used previously.
171
+
1. For **Name**, type **Firewall-route**.
170
172
1. Select **Review + create**.
171
173
1. Select **Create**.
172
174
173
175
After deployment completes, select **Go to resource**.
174
176
175
177
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
176
-
1.Select**Virtual network** >**Test-FW-VN**.
178
+
1.For**Virtual network**, select**Test-FW-VN**.
177
179
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
178
180
179
181
13. Select **OK**.
@@ -254,7 +256,7 @@ For testing purposes, configure the server's primary and secondary DNS addresses
254
256
2. Select the network interface for the **Srv-Work** virtual machine.
255
257
3. Under **Settings**, select **DNS servers**.
256
258
4. Under **DNS servers**, select **Custom**.
257
-
5. Type **209.244.0.3** in the **Add DNS server** text box, and **209.244.0.4** in the next text box.
259
+
5. Type **209.244.0.3**and press Enter in the **Add DNS server** text box, and **209.244.0.4** in the next text box.
0 commit comments