You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-dnat.md
+62-70Lines changed: 62 additions & 70 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: tutorial
8
-
ms.date: 02/26/2020
8
+
ms.date: 03/02/2020
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
@@ -34,21 +34,21 @@ For this tutorial, you create a two peered VNets:
34
34
## Create a resource group
35
35
36
36
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
37
-
2. On the Azure portal home page, click**Resource groups**, then click**Add**.
37
+
2. On the Azure portal home page, select**Resource groups**, then select**Add**.
38
38
3. For **Resource group name**, type **RG-DNAT-Test**.
39
39
4. For **Subscription**, select your subscription.
40
40
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
41
-
6.Click**Create**.
41
+
6.Select**Create**.
42
42
43
43
## Set up the network environment
44
44
45
45
First, create the VNets and then peer them.
46
46
47
47
### Create the Hub VNet
48
48
49
-
1. From the Azure portal home page, click**All services**.
50
-
2. Under **Networking**, click**Virtual networks**.
51
-
3.Click**Add**.
49
+
1. From the Azure portal home page, select**All services**.
50
+
2. Under **Networking**, select**Virtual networks**.
51
+
3.Select**Add**.
52
52
4. For **Name**, type **VN-Hub**.
53
53
5. For **Address space**, type **10.0.0.0/16**.
54
54
6. For **Subscription**, select your subscription.
@@ -61,13 +61,13 @@ First, create the VNets and then peer them.
61
61
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.md#why-does-azure-firewall-need-a-26-subnet-size).
62
62
63
63
10. For **Address range**, type **10.0.1.0/26**.
64
-
11. Use the other default settings, and then click**Create**.
64
+
11. Use the other default settings, and then select**Create**.
65
65
66
66
### Create a spoke VNet
67
67
68
-
1. From the Azure portal home page, click**All services**.
69
-
2. Under **Networking**, click**Virtual networks**.
70
-
3.Click**Add**.
68
+
1. From the Azure portal home page, select**All services**.
69
+
2. Under **Networking**, select**Virtual networks**.
70
+
3.Select**Add**.
71
71
4. For **Name**, type **VN-Spoke**.
72
72
5. For **Address space**, type **192.168.0.0/16**.
73
73
6. For **Subscription**, select your subscription.
@@ -77,72 +77,64 @@ First, create the VNets and then peer them.
77
77
78
78
The server will be in this subnet.
79
79
10. For **Address range**, type **192.168.1.0/24**.
80
-
11. Use the other default settings, and then click**Create**.
80
+
11. Use the other default settings, and then select**Create**.
81
81
82
82
### Peer the VNets
83
83
84
84
Now peer the two VNets.
85
85
86
-
#### Hub to spoke
87
-
88
-
1. Click the **VN-Hub** virtual network.
89
-
2. Under **Settings**, click **Peerings**.
90
-
3. Click **Add**.
91
-
4. Type **Peer-HubSpoke** for the name.
86
+
1. Select the **VN-Hub** virtual network.
87
+
2. Under **Settings**, select **Peerings**.
88
+
3. Select **Add**.
89
+
4. Type **Peer-HubSpoke** for the **Name of the peering from VN-Hub to VN-Spoke**.
92
90
5. Select **VN-Spoke** for the virtual network.
93
-
6. Click **OK**.
94
-
95
-
#### Spoke to hub
96
-
97
-
1. Click the **VN-Spoke** virtual network.
98
-
2. Under **Settings**, click **Peerings**.
99
-
3. Click **Add**.
100
-
4. Type **Peer-SpokeHub** for the name.
101
-
5. Select **VN-Hub** for the virtual network.
102
-
6. Click **Allow forwarded traffic**.
103
-
7. Click **OK**.
91
+
6. Type **Peer-SpokeHub** for **Name of peering from VN-Spoke to VN-Hub**.
92
+
7. For **Allow forwarded traffic from VN-Spoke to VN-Hub** select **Enabled**.
93
+
8. Select **OK**.
104
94
105
95
## Create a virtual machine
106
96
107
97
Create a workload virtual machine, and place it in the **SN-Workload** subnet.
108
98
109
-
1. From the Azure portal home page, click **All services**.
110
-
2. Under **Compute**, click **Virtual machines**.
111
-
3. Click **Add**, and click **Windows Server**, click **Windows Server 2016 Datacenter**, and then click **Create**.
99
+
1. From the Azure portal menu, select **Create a resource**.
100
+
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
112
101
113
102
**Basics**
114
103
115
-
1. For **Name**, type **Srv-Workload**.
116
-
5. Type a username and password.
117
-
6. For **Subscription**, select your subscription.
118
-
7. For **Resource group**, click **Use existing**, and then select **RG-DNAT-Test**.
119
-
8. For **Location**, select the same location that you used previously.
120
-
9. Click **OK**.
121
-
122
-
**Size**
104
+
1. For **Subscription**, select your subscription.
105
+
1. For **Resource group**, select **Use existing**, and then select **RG-DNAT-Test**.
106
+
1. For **Virtual machine name**, type **Srv-Workload**.
107
+
1. For **Region**, select the same location that you used previously.
108
+
1. Type a username and password.
109
+
1. Select **Next: Disks**.
123
110
124
-
1. Choose an appropriate size for a test virtual machine running Windows Server. For example, **B2ms** (8 GB RAM, 16 GB storage).
3. Click **Public IP address** and then click **None**.
132
-
4. For **Select public inbound ports**, select **No public inbound ports**.
133
-
2. Leave the other default settings and click **OK**.
118
+
3. For **Public IP address** select **None**.
119
+
4. For **Public inbound ports**, select **None**.
120
+
2. Leave the other default settings and select **Next : Management**.
121
+
122
+
**Management**
123
+
124
+
1. For **Boot diagnostics**, select **Off**.
125
+
1. Select **Review + Create**.
134
126
135
-
**Summary**
127
+
**Review + Create**
136
128
137
-
Review the summary, and then click**Create**. This will take a few minutes to complete.
129
+
Review the summary, and then select**Create**. This will take a few minutes to complete.
138
130
139
-
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Click the virtual machine name, and under **Settings**, click**Networking** to find the private IP address.
131
+
After deployment finishes, note the private IP address for the virtual machine. It will be used later when you configure the firewall. Select the virtual machine name, and under **Settings**, select**Networking** to find the private IP address.
140
132
141
133
## Deploy the firewall
142
134
143
-
1. From the portal home page, click**Create a resource**.
144
-
2.Click**Networking**, and after **Featured**, click**See all**.
145
-
3.Click**Firewall**, and then click**Create**.
135
+
1. From the portal home page, select**Create a resource**.
136
+
2.Select**Networking**, and after **Featured**, select**See all**.
137
+
3.Select**Firewall**, and then select**Create**.
146
138
4. On the **Create a Firewall** page, use the following table to configure the firewall:
147
139
148
140
|Setting |Value |
@@ -154,44 +146,44 @@ After deployment finishes, note the private IP address for the virtual machine.
154
146
|Choose a virtual network |**Use existing**: VN-Hub|
155
147
|Public IP address |**Create new**. The Public IP address must be the Standard SKU type.|
156
148
157
-
5.Click**Review + create**.
158
-
6. Review the summary, and then click**Create** to create the firewall.
149
+
5.Select**Review + create**.
150
+
6. Review the summary, and then select**Create** to create the firewall.
159
151
160
152
This will take a few minutes to deploy.
161
-
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and click the **FW-DNAT-test** firewall.
153
+
7. After deployment completes, go to the **RG-DNAT-Test** resource group, and select the **FW-DNAT-test** firewall.
162
154
8. Note the private IP address. You'll use it later when you create the default route.
163
155
164
156
## Create a default route
165
157
166
158
For the **SN-Workload** subnet, you configure the outbound default route to go through the firewall.
167
159
168
-
1. From the Azure portal home page, click**All services**.
169
-
2. Under **Networking**, click**Route tables**.
170
-
3.Click**Add**.
160
+
1. From the Azure portal home page, select**All services**.
161
+
2. Under **Networking**, select**Route tables**.
162
+
3.Select**Add**.
171
163
4. For **Name**, type **RT-FWroute**.
172
164
5. For **Subscription**, select your subscription.
173
165
6. For **Resource group**, select **Use existing**, and select **RG-DNAT-Test**.
174
166
7. For **Location**, select the same location that you used previously.
175
-
8.Click**Create**.
176
-
9.Click**Refresh**, and then click the **RT-FWroute** route table.
177
-
10.Click**Subnets**, and then click**Associate**.
178
-
11.Click**Virtual network**, and then select **VN-Spoke**.
179
-
12. For **Subnet**, click**SN-Workload**.
180
-
13.Click**OK**.
181
-
14.Click**Routes**, and then click**Add**.
167
+
8.Select**Create**.
168
+
9.Select**Refresh**, and then select the **RT-FWroute** route table.
169
+
10.Select**Subnets**, and then select**Associate**.
170
+
11.Select**Virtual network**, and then select **VN-Spoke**.
171
+
12. For **Subnet**, select**SN-Workload**.
172
+
13.Select**OK**.
173
+
14.Select**Routes**, and then select**Add**.
182
174
15. For **Route name**, type **FW-DG**.
183
175
16. For **Address prefix**, type **0.0.0.0/0**.
184
176
17. For **Next hop type**, select **Virtual appliance**.
185
177
186
178
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
187
179
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
188
-
19.Click**OK**.
180
+
19.Select**OK**.
189
181
190
182
## Configure a NAT rule
191
183
192
-
1. Open the **RG-DNAT-Test**, and click the **FW-DNAT-test** firewall.
193
-
2. On the **FW-DNAT-test** page, under **Settings**, click**Rules**.
194
-
3.Click**Add NAT rule collection**.
184
+
1. Open the **RG-DNAT-Test**, and select the **FW-DNAT-test** firewall.
185
+
2. On the **FW-DNAT-test** page, under **Settings**, select**Rules**.
186
+
3.Select**Add NAT rule collection**.
195
187
4. For **Name**, type **RC-DNAT-01**.
196
188
5. For **Priority**, type **200**.
197
189
6. Under **Rules**, for **Name**, type **RL-01**.
@@ -201,7 +193,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
201
193
10. For **Destination ports**, type **3389**.
202
194
11. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
0 commit comments