Skip to content

Commit 8e2f8e5

Browse files
Merge pull request #223821 from vhorne/fwm-sec-vhub
updates
2 parents 168c041 + 3f9f192 commit 8e2f8e5

File tree

1 file changed

+24
-20
lines changed

1 file changed

+24
-20
lines changed

articles/firewall-manager/secure-cloud-network.md

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: tutorial
8-
ms.date: 01/26/2022
8+
ms.date: 01/12/2023
99
ms.author: victorh
1010
---
1111

@@ -32,7 +32,7 @@ In this tutorial, you learn how to:
3232
> The procedure in this tutorial uses Azure Firewall Manager to create a new Azure Virtual WAN secured hub.
3333
> You can use Firewall Manager to upgrade an existing hub, but you can't configure Azure **Availability Zones** for Azure Firewall.
3434
> It is also possible to convert an existing hub to a secured hub using the Azure portal, as described in [Configure Azure Firewall in a Virtual WAN hub](../virtual-wan/howto-firewall.md). But like Azure Firewall Manager, you can't configure **Availability Zones**.
35-
> To upgrade an existing hub and specify **Availability Zones** for Azure Firewall (recommended) you must follow the upgrade procedure in [Tutorial: Secure your virtual hub using Azure PowerShell](secure-cloud-network-powershell.md). secure-cloud-network-powershell).
35+
> To upgrade an existing hub and specify **Availability Zones** for Azure Firewall (recommended) you must follow the upgrade procedure in [Tutorial: Secure your virtual hub using Azure PowerShell](secure-cloud-network-powershell.md).
3636
3737
## Prerequisites
3838

@@ -51,17 +51,17 @@ The two virtual networks will each have a workload server in them and will be pr
5151
3. For **Subscription**, select your subscription.
5252
4. For **Resource group**, select **Create new**, and type **fw-manager-rg** for the name and select **OK**.
5353
5. For **Name**, type **Spoke-01**.
54-
6. For **Region**, select **(US) East US**.
54+
6. For **Region**, select **East US**.
5555
7. Select **Next: IP Addresses**.
56-
8. For **Address space**, type **10.0.0.0/16**.
56+
8. For **Address space**, accept the default **10.0.0.0/16**.
5757
9. Select **Add subnet**.
5858
10. For **Subnet name**, type **Workload-01-SN**.
5959
11. For **Subnet address range**, type **10.0.1.0/24**.
6060
12. Select **Add**.
6161
13. Select **Review + create**.
6262
14. Select **Create**.
6363

64-
Repeat this procedure to create another similar virtual network:
64+
Repeat this procedure to create another similar virtual network in the **fw-manager-rg** resource group:
6565

6666
Name: **Spoke-02**<br>
6767
Address space: **10.1.0.0/16**<br>
@@ -79,13 +79,15 @@ Create your secured virtual hub using Firewall Manager.
7979

8080
:::image type="content" source="./media/secure-cloud-network/1-create-new-secured-virtual-hub.jpg" alt-text="Screenshot of creating a new secured virtual hub." lightbox="./media/secure-cloud-network/1-create-new-secured-virtual-hub.jpg":::
8181

82+
1. Select your **Subscription**.
8283
5. For **Resource group**, select **fw-manager-rg**.
8384
6. For **Region**, select **East US**.
8485
7. For the **Secured virtual hub name**, type **Hub-01**.
8586
8. For **Hub address space**, type **10.2.0.0/16**.
87+
10. Select **New vWAN**.
8688
9. For the new virtual WAN name, type **Vwan-01**.
87-
10. Select **New vWAN** and select **Standard** for "Type"
88-
11. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
89+
1. For **Type** Select **Standard**.
90+
1. Leave the **Include VPN gateway to enable Trusted Security Partners** check box cleared.
8991

9092
:::image type="content" source="./media/secure-cloud-network/2-create-new-secured-virtual-hub.png" alt-text="Screenshot of creating a new virtual hub with properties." lightbox="./media/secure-cloud-network/2-create-new-secured-virtual-hub.png":::
9193

@@ -99,8 +101,8 @@ Create your secured virtual hub using Firewall Manager.
99101
100102
:::image type="content" source="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png" alt-text="Screenshot of configuring Azure Firewall parameters." lightbox="./media/secure-cloud-network/3-azure-firewall-parameters-with-zones.png":::
101103

102-
16. Select the **Firewall Policy** to apply at the new Azure Firewall instance. Select **Default Deny Policy**, you will refine your settings later in this article.
103-
17. Select **Next: Trusted Security Partner**.
104+
16. Select the **Firewall Policy** to apply at the new Azure Firewall instance. Select **Default Deny Policy**, you'll refine your settings later in this article.
105+
17. Select **Next: Security Partner Provider**.
104106

105107
:::image type="content" source="./media/secure-cloud-network/4-trusted-security-partner.png" alt-text="Screenshot of configuring Trusted Partners parameters." lightbox="./media/secure-cloud-network/4-trusted-security-partner.png":::
106108

@@ -117,7 +119,7 @@ You can get the firewall public IP address after the deployment completes.
117119
1. Open **Firewall Manager**.
118120
2. Select **Virtual hubs**.
119121
3. Select **hub-01**.
120-
4. Select **Public IP configuration**.
122+
4. Under **Azure Firewall**, select **Public IP configuration**.
121123
5. Note the public IP address to use later.
122124

123125
### Connect the hub and spoke virtual networks
@@ -157,8 +159,9 @@ Now you can peer the hub and spoke virtual networks.
157159
7. Select **Spoke-01** for the virtual network and select **Workload-01-SN** for the subnet.
158160
8. For **Public IP**, select **None**.
159161
9. Accept the other defaults and select **Next: Management**.
160-
10. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
161-
11. Review the settings on the summary page, and then select **Create**.
162+
1. Select **Next:Monitoring**.
163+
1. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
164+
1. Review the settings on the summary page, and then select **Create**.
162165

163166
Use the information in the following table to configure another virtual machine named **Srv-Workload-02**. The rest of the configuration is the same as the **Srv-workload-01** virtual machine.
164167

@@ -222,9 +225,10 @@ A firewall policy defines collections of rules to direct traffic on one or more
222225
9. For **Destination Ports**, type **3389**.
223226
10. For **Destination Type**, select **IP Address**.
224227
11. For **Destination**, type the firewall public IP address that you noted previously.
225-
12. For **Translated address**, type the private IP address for **Srv-Workload-01** that you noted previously.
226-
13. For **Translated port**, type **3389**.
227-
14. Select **Add**.
228+
1. For **Translated type**, select **IP Address**.
229+
1. For **Translated address**, type the private IP address for **Srv-Workload-01** that you noted previously.
230+
1. For **Translated port**, type **3389**.
231+
1. Select **Add**.
228232

229233
22. Add a **Network rule** so you can connect a remote desktop from **Srv-Workload-01** to **Srv-Workload-02**.
230234

@@ -241,18 +245,18 @@ A firewall policy defines collections of rules to direct traffic on one or more
241245
11. For **Destination Type**, select **IP Address**.
242246
12. For **Destination**, type the **Srv-Workload-02** private IP address that you noted previously.
243247
13. Select **Add**.
244-
14. Select **Review + create**.
245-
15. Select **Create**.
246248

247-
23. In the **IDPS** page, click on **Next: Threat Intelligence**
249+
250+
1. Select **Next: IDPS**.
251+
23. On the **IDPS** page, select **Next: Threat Intelligence**
248252

249253
:::image type="content" source="./media/secure-cloud-network/6-create-azure-firewall-policy-idps7.png" alt-text="Screenshot of configuring IDPS settings." lightbox="./media/secure-cloud-network/6-create-azure-firewall-policy-idps7.png":::
250254

251-
24. In the **Threat Intelligence** page, accept defaults and click on **Review and Create**:
255+
24. In the **Threat Intelligence** page, accept defaults and select **Review and Create**:
252256

253257
:::image type="content" source="./media/secure-cloud-network/7a-create-azure-firewall-policy-threat-intelligence7.png" alt-text="Screenshot of configuring Threat Intelligence settings." lightbox="./media/secure-cloud-network/7a-create-azure-firewall-policy-threat-intelligence7.png":::
254258

255-
25. Review and confirm your selection clicking on **Create** button.
259+
25. Review to confirm your selection and then select **Create**.
256260

257261
## Associate policy
258262

0 commit comments

Comments
 (0)