You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-cloud-network.md
+24-20Lines changed: 24 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall-manager
5
5
author: vhorne
6
6
ms.service: firewall-manager
7
7
ms.topic: tutorial
8
-
ms.date: 01/26/2022
8
+
ms.date: 01/12/2023
9
9
ms.author: victorh
10
10
---
11
11
@@ -32,7 +32,7 @@ In this tutorial, you learn how to:
32
32
> The procedure in this tutorial uses Azure Firewall Manager to create a new Azure Virtual WAN secured hub.
33
33
> You can use Firewall Manager to upgrade an existing hub, but you can't configure Azure **Availability Zones** for Azure Firewall.
34
34
> It is also possible to convert an existing hub to a secured hub using the Azure portal, as described in [Configure Azure Firewall in a Virtual WAN hub](../virtual-wan/howto-firewall.md). But like Azure Firewall Manager, you can't configure **Availability Zones**.
35
-
> To upgrade an existing hub and specify **Availability Zones** for Azure Firewall (recommended) you must follow the upgrade procedure in [Tutorial: Secure your virtual hub using Azure PowerShell](secure-cloud-network-powershell.md). secure-cloud-network-powershell).
35
+
> To upgrade an existing hub and specify **Availability Zones** for Azure Firewall (recommended) you must follow the upgrade procedure in [Tutorial: Secure your virtual hub using Azure PowerShell](secure-cloud-network-powershell.md).
36
36
37
37
## Prerequisites
38
38
@@ -51,17 +51,17 @@ The two virtual networks will each have a workload server in them and will be pr
51
51
3. For **Subscription**, select your subscription.
52
52
4. For **Resource group**, select **Create new**, and type **fw-manager-rg** for the name and select **OK**.
53
53
5. For **Name**, type **Spoke-01**.
54
-
6. For **Region**, select **(US) East US**.
54
+
6. For **Region**, select **East US**.
55
55
7. Select **Next: IP Addresses**.
56
-
8. For **Address space**, type**10.0.0.0/16**.
56
+
8. For **Address space**, accept the default**10.0.0.0/16**.
57
57
9. Select **Add subnet**.
58
58
10. For **Subnet name**, type **Workload-01-SN**.
59
59
11. For **Subnet address range**, type **10.0.1.0/24**.
60
60
12. Select **Add**.
61
61
13. Select **Review + create**.
62
62
14. Select **Create**.
63
63
64
-
Repeat this procedure to create another similar virtual network:
64
+
Repeat this procedure to create another similar virtual network in the **fw-manager-rg** resource group:
65
65
66
66
Name: **Spoke-02**<br>
67
67
Address space: **10.1.0.0/16**<br>
@@ -79,13 +79,15 @@ Create your secured virtual hub using Firewall Manager.
79
79
80
80
:::image type="content" source="./media/secure-cloud-network/1-create-new-secured-virtual-hub.jpg" alt-text="Screenshot of creating a new secured virtual hub." lightbox="./media/secure-cloud-network/1-create-new-secured-virtual-hub.jpg":::
81
81
82
+
1. Select your **Subscription**.
82
83
5. For **Resource group**, select **fw-manager-rg**.
83
84
6. For **Region**, select **East US**.
84
85
7. For the **Secured virtual hub name**, type **Hub-01**.
85
86
8. For **Hub address space**, type **10.2.0.0/16**.
87
+
10. Select **New vWAN**.
86
88
9. For the new virtual WAN name, type **Vwan-01**.
87
-
10. Select**New vWAN**and select **Standard** for "Type"
88
-
11. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
89
+
1. For**Type**Select **Standard**.
90
+
1. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
89
91
90
92
:::image type="content" source="./media/secure-cloud-network/2-create-new-secured-virtual-hub.png" alt-text="Screenshot of creating a new virtual hub with properties." lightbox="./media/secure-cloud-network/2-create-new-secured-virtual-hub.png":::
91
93
@@ -99,8 +101,8 @@ Create your secured virtual hub using Firewall Manager.
99
101
100
102
:::image type="content" source="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png" alt-text="Screenshot of configuring Azure Firewall parameters." lightbox="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png":::
101
103
102
-
16. Select the **Firewall Policy** to apply at the new Azure Firewall instance. Select **Default Deny Policy**, you will refine your settings later in this article.
103
-
17. Select **Next: Trusted Security Partner**.
104
+
16. Select the **Firewall Policy** to apply at the new Azure Firewall instance. Select **Default Deny Policy**, you'll refine your settings later in this article.
105
+
17. Select **Next: Security Partner Provider**.
104
106
105
107
:::image type="content" source="./media/secure-cloud-network/4-trusted-security-partner.png" alt-text="Screenshot of configuring Trusted Partners parameters." lightbox="./media/secure-cloud-network/4-trusted-security-partner.png":::
106
108
@@ -117,7 +119,7 @@ You can get the firewall public IP address after the deployment completes.
117
119
1. Open **Firewall Manager**.
118
120
2. Select **Virtual hubs**.
119
121
3. Select **hub-01**.
120
-
4.Select**Public IP configuration**.
122
+
4.Under **Azure Firewall**, select**Public IP configuration**.
121
123
5. Note the public IP address to use later.
122
124
123
125
### Connect the hub and spoke virtual networks
@@ -157,8 +159,9 @@ Now you can peer the hub and spoke virtual networks.
157
159
7. Select **Spoke-01** for the virtual network and select **Workload-01-SN** for the subnet.
158
160
8. For **Public IP**, select **None**.
159
161
9. Accept the other defaults and select **Next: Management**.
160
-
10. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
161
-
11. Review the settings on the summary page, and then select **Create**.
162
+
1. Select **Next:Monitoring**.
163
+
1. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
164
+
1. Review the settings on the summary page, and then select **Create**.
162
165
163
166
Use the information in the following table to configure another virtual machine named **Srv-Workload-02**. The rest of the configuration is the same as the **Srv-workload-01** virtual machine.
164
167
@@ -222,9 +225,10 @@ A firewall policy defines collections of rules to direct traffic on one or more
222
225
9. For **Destination Ports**, type **3389**.
223
226
10. For **Destination Type**, select **IP Address**.
224
227
11. For **Destination**, type the firewall public IP address that you noted previously.
225
-
12. For **Translated address**, type the private IP address for **Srv-Workload-01** that you noted previously.
226
-
13. For **Translated port**, type **3389**.
227
-
14. Select **Add**.
228
+
1. For **Translated type**, select **IP Address**.
229
+
1. For **Translated address**, type the private IP address for **Srv-Workload-01** that you noted previously.
230
+
1. For **Translated port**, type **3389**.
231
+
1. Select **Add**.
228
232
229
233
22. Add a **Network rule** so you can connect a remote desktop from **Srv-Workload-01** to **Srv-Workload-02**.
230
234
@@ -241,18 +245,18 @@ A firewall policy defines collections of rules to direct traffic on one or more
241
245
11. For **Destination Type**, select **IP Address**.
242
246
12. For **Destination**, type the **Srv-Workload-02** private IP address that you noted previously.
243
247
13. Select **Add**.
244
-
14. Select **Review + create**.
245
-
15. Select **Create**.
246
248
247
-
23. In the **IDPS** page, click on **Next: Threat Intelligence**
249
+
250
+
1. Select **Next: IDPS**.
251
+
23. On the **IDPS** page, select **Next: Threat Intelligence**
248
252
249
253
:::image type="content" source="./media/secure-cloud-network/6-create-azure-firewall-policy-idps7.png" alt-text="Screenshot of configuring IDPS settings." lightbox="./media/secure-cloud-network/6-create-azure-firewall-policy-idps7.png":::
250
254
251
-
24. In the **Threat Intelligence** page, accept defaults and click on**Review and Create**:
255
+
24. In the **Threat Intelligence** page, accept defaults and select**Review and Create**:
252
256
253
257
:::image type="content" source="./media/secure-cloud-network/7a-create-azure-firewall-policy-threat-intelligence7.png" alt-text="Screenshot of configuring Threat Intelligence settings." lightbox="./media/secure-cloud-network/7a-create-azure-firewall-policy-threat-intelligence7.png":::
254
258
255
-
25. Review and confirm your selection clicking on **Create** button.
259
+
25. Review to confirm your selection and then select **Create**.
0 commit comments