Skip to content

Commit 9737f15

Browse files
Merge pull request #106225 from vhorne/fw-dnat
Update the peering steps
2 parents 482c5ff + 795f0b6 commit 9737f15

File tree

1 file changed

+62
-70
lines changed

1 file changed

+62
-70
lines changed

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 62 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 02/26/2020
8+
ms.date: 03/02/2020
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -34,21 +34,21 @@ For this tutorial, you create a two peered VNets:
3434
## Create a resource group
3535

3636
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
37-
2. On the Azure portal home page, click **Resource groups**, then click **Add**.
37+
2. On the Azure portal home page, select **Resource groups**, then select **Add**.
3838
3. For **Resource group name**, type **RG-DNAT-Test**.
3939
4. For **Subscription**, select your subscription.
4040
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
41-
6. Click **Create**.
41+
6. Select **Create**.
4242

4343
## Set up the network environment
4444

4545
First, create the VNets and then peer them.
4646

4747
### Create the Hub VNet
4848

49-
1. From the Azure portal home page, click **All services**.
50-
2. Under **Networking**, click **Virtual networks**.
51-
3. Click **Add**.
49+
1. From the Azure portal home page, select **All services**.
50+
2. Under **Networking**, select **Virtual networks**.
51+
3. Select **Add**.
5252
4. For **Name**, type **VN-Hub**.
5353
5. For **Address space**, type **10.0.0.0/16**.
5454
6. For **Subscription**, select your subscription.
@@ -61,13 +61,13 @@ First, create the VNets and then peer them.
6161
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.md#why-does-azure-firewall-need-a-26-subnet-size).
6262
6363
10. For **Address range**, type **10.0.1.0/26**.
64-
11. Use the other default settings, and then click **Create**.
64+
11. Use the other default settings, and then select **Create**.
6565

6666
### Create a spoke VNet
6767

68-
1. From the Azure portal home page, click **All services**.
69-
2. Under **Networking**, click **Virtual networks**.
70-
3. Click **Add**.
68+
1. From the Azure portal home page, select **All services**.
69+
2. Under **Networking**, select **Virtual networks**.
70+
3. Select **Add**.
7171
4. For **Name**, type **VN-Spoke**.
7272
5. For **Address space**, type **192.168.0.0/16**.
7373
6. For **Subscription**, select your subscription.
@@ -77,72 +77,64 @@ First, create the VNets and then peer them.
7777

7878
The server will be in this subnet.
7979
10. For **Address range**, type **192.168.1.0/24**.
80-
11. Use the other default settings, and then click **Create**.
80+
11. Use the other default settings, and then select **Create**.
8181

8282
### Peer the VNets
8383

8484
Now peer the two VNets.
8585

86-
#### Hub to spoke
87-
88-
1. Click the **VN-Hub** virtual network.
89-
2. Under **Settings**, click **Peerings**.
90-
3. Click **Add**.
91-
4. Type **Peer-HubSpoke** for the name.
86+
1. Select the **VN-Hub** virtual network.
87+
2. Under **Settings**, select **Peerings**.
88+
3. Select **Add**.
89+
4. Type **Peer-HubSpoke** for the **Name of the peering from VN-Hub to VN-Spoke**.
9290
5. Select **VN-Spoke** for the virtual network.
93-
6. Click **OK**.
94-
95-
#### Spoke to hub
96-
97-
1. Click the **VN-Spoke** virtual network.
98-
2. Under **Settings**, click **Peerings**.
99-
3. Click **Add**.
100-
4. Type **Peer-SpokeHub** for the name.
101-
5. Select **VN-Hub** for the virtual network.
102-
6. Click **Allow forwarded traffic**.
103-
7. Click **OK**.
91+
6. Type **Peer-SpokeHub** for **Name of peering from VN-Spoke to VN-Hub**.
92+
7. For **Allow forwarded traffic from VN-Spoke to VN-Hub** select **Enabled**.
93+
8. Select **OK**.
10494

10595
## Create a virtual machine
10696

10797
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
10898

109-
1. From the Azure portal home page, click **All services**.
110-
2. Under **Compute**, click **Virtual machines**.
111-
3. Click **Add**, and click **Windows Server**, click **Windows Server 2016 Datacenter**, and then click **Create**.
99+
1. From the Azure portal menu, select **Create a resource**.
100+
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
112101

113102
**Basics**
114103

115-
1. For **Name**, type **Srv-Workload**.
116-
5. Type a username and password.
117-
6. For **Subscription**, select your subscription.
118-
7. For **Resource group**, click **Use existing**, and then select **RG-DNAT-Test**.
119-
8. For **Location**, select the same location that you used previously.
120-
9. Click **OK**.
121-
122-
**Size**
104+
1. For **Subscription**, select your subscription.
105+
1. For **Resource group**, select **Use existing**, and then select **RG-DNAT-Test**.
106+
1. For **Virtual machine name**, type **Srv-Workload**.
107+
1. For **Region**, select the same location that you used previously.
108+
1. Type a username and password.
109+
1. Select **Next: Disks**.
123110

124-
1. Choose an appropriate size for a test virtual machine running Windows Server. For example, **B2ms** (8 GB RAM, 16 GB storage).
125-
2. Click **Select**.
111+
**Disks**
112+
1. Select **Next: Networking**.
126113

127-
**Settings**
114+
**Networking**
128115

129-
1. Under **Network**, for **Virtual network**, select **VN-Spoke**.
116+
1. For **Virtual network**, select **VN-Spoke**.
130117
2. For **Subnet**, select **SN-Workload**.
131-
3. Click **Public IP address** and then click **None**.
132-
4. For **Select public inbound ports**, select **No public inbound ports**.
133-
2. Leave the other default settings and click **OK**.
118+
3. For **Public IP address** select **None**.
119+
4. For **Public inbound ports**, select **None**.
120+
2. Leave the other default settings and select **Next : Management**.
121+
122+
**Management**
123+
124+
1. For **Boot diagnostics**, select **Off**.
125+
1. Select **Review + Create**.
134126

135-
**Summary**
127+
**Review + Create**
136128

137-
Review the summary, and then click **Create**. This will take a few minutes to complete.
129+
Review the summary, and then select **Create**. This will take a few minutes to complete.
138130

139-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Click the virtual machine name, and under **Settings**, click **Networking** to find the private IP address.
131+
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select **Networking** to find the private IP address.
140132

141133
## Deploy the firewall
142134

143-
1. From the portal home page, click **Create a resource**.
144-
2. Click **Networking**, and after **Featured**, click **See all**.
145-
3. Click **Firewall**, and then click **Create**.
135+
1. From the portal home page, select **Create a resource**.
136+
2. Select **Networking**, and after **Featured**, select **See all**.
137+
3. Select **Firewall**, and then select **Create**.
146138
4. On the **Create a Firewall** page, use the following table to configure the firewall:
147139

148140
|Setting |Value |
@@ -154,44 +146,44 @@ After deployment finishes, note the private IP address for the virtual machine.
154146
|Choose a virtual network |**Use existing**: VN-Hub|
155147
|Public IP address |**Create new**. The Public IP address must be the Standard SKU type.|
156148

157-
5. Click **Review + create**.
158-
6. Review the summary, and then click **Create** to create the firewall.
149+
5. Select **Review + create**.
150+
6. Review the summary, and then select **Create** to create the firewall.
159151

160152
This will take a few minutes to deploy.
161-
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and click the **FW-DNAT-test** firewall.
153+
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
162154
8. Note the private IP address. You'll use it later when you create the default route.
163155

164156
## Create a default route
165157

166158
For the **SN-Workload** subnet, you configure the outbound default route to go through the firewall.
167159

168-
1. From the Azure portal home page, click **All services**.
169-
2. Under **Networking**, click **Route tables**.
170-
3. Click **Add**.
160+
1. From the Azure portal home page, select **All services**.
161+
2. Under **Networking**, select **Route tables**.
162+
3. Select **Add**.
171163
4. For **Name**, type **RT-FWroute**.
172164
5. For **Subscription**, select your subscription.
173165
6. For **Resource group**, select **Use existing**, and select **RG-DNAT-Test**.
174166
7. For **Location**, select the same location that you used previously.
175-
8. Click **Create**.
176-
9. Click **Refresh**, and then click the **RT-FWroute** route table.
177-
10. Click **Subnets**, and then click **Associate**.
178-
11. Click **Virtual network**, and then select **VN-Spoke**.
179-
12. For **Subnet**, click **SN-Workload**.
180-
13. Click **OK**.
181-
14. Click **Routes**, and then click **Add**.
167+
8. Select **Create**.
168+
9. Select **Refresh**, and then select the **RT-FWroute** route table.
169+
10. Select **Subnets**, and then select **Associate**.
170+
11. Select **Virtual network**, and then select **VN-Spoke**.
171+
12. For **Subnet**, select **SN-Workload**.
172+
13. Select **OK**.
173+
14. Select **Routes**, and then select **Add**.
182174
15. For **Route name**, type **FW-DG**.
183175
16. For **Address prefix**, type **0.0.0.0/0**.
184176
17. For **Next hop type**, select **Virtual appliance**.
185177

186178
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
187179
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
188-
19. Click **OK**.
180+
19. Select **OK**.
189181

190182
## Configure a NAT rule
191183

192-
1. Open the **RG-DNAT-Test**, and click the **FW-DNAT-test** firewall.
193-
2. On the **FW-DNAT-test** page, under **Settings**, click **Rules**.
194-
3. Click **Add NAT rule collection**.
184+
1. Open the **RG-DNAT-Test**, and select the **FW-DNAT-test** firewall.
185+
2. On the **FW-DNAT-test** page, under **Settings**, select **Rules**.
186+
3. Select **Add NAT rule collection**.
195187
4. For **Name**, type **RC-DNAT-01**.
196188
5. For **Priority**, type **200**.
197189
6. Under **Rules**, for **Name**, type **RL-01**.
@@ -201,7 +193,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
201193
10. For **Destination ports**, type **3389**.
202194
11. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
203195
12. For **Translated port**, type **3389**.
204-
13. Click **Add**.
196+
13. Select **Add**.
205197

206198
## Test the firewall
207199

0 commit comments

Comments
 (0)