You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+25-49Lines changed: 25 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,15 +5,15 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 01/11/2023
8
+
ms.date: 11/14/2023
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
12
12
---
13
13
14
14
# Deploy and configure Azure Firewall using the Azure portal
15
15
16
-
Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that can be accessed.
16
+
Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to web sites. Or, you might want to limit the outbound IP addresses and ports that can be accessed.
17
17
18
18
One way you can control outbound network access from an Azure subnet is with Azure Firewall. With Azure Firewall, you can configure:
19
19
@@ -22,9 +22,9 @@ One way you can control outbound network access from an Azure subnet is with Azu
22
22
23
23
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
24
24
25
-
For this article, you create a simplified single VNet with two subnets for easy deployment.
25
+
For this article, you create a simplified single virtual network with two subnets for easy deployment.
26
26
27
-
For production deployments, a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
27
+
For production deployments, a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own virtual network. The workload servers are in peered virtual networks in the same region with one or more subnets.
28
28
29
29
***AzureFirewallSubnet** - the firewall is in this subnet.
30
30
***Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
@@ -53,7 +53,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
53
53
54
54
## Set up the network
55
55
56
-
First, create a resource group to contain the resources needed to deploy the firewall. Then create a VNet, subnets, and a test server.
56
+
First, create a resource group to contain the resources needed to deploy the firewall. Then create a virtual network, subnets, and a test server.
57
57
58
58
### Create a resource group
59
59
@@ -67,9 +67,9 @@ The resource group contains all the resources used in this procedure.
67
67
1. Select **Review + create**.
68
68
1. Select **Create**.
69
69
70
-
### Create a VNet
70
+
### Create a virtual network
71
71
72
-
This VNet will have two subnets.
72
+
This virtual network has two subnets.
73
73
74
74
> [!NOTE]
75
75
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
@@ -79,20 +79,18 @@ This VNet will have two subnets.
79
79
1. Select **Create**.
80
80
1. For **Subscription**, select your subscription.
81
81
1. For **Resource group**, select **Test-FW-RG**.
82
-
1. For **Name**, type **Test-FW-VN**.
83
-
1. Select **Next: IP addresses**.
82
+
1. For **Virtual network name**, type **Test-FW-VN**.
83
+
1. For **Region**, select the same region that you used previously.
84
+
1. Select **Next**.
85
+
1. On the **Security** tab, select **Enable Azure Firewall**.
86
+
1. For **Azure Firewall name**, type **Test-FW01**.
87
+
1. For **Azure Firewall public IP address**, select **Create a public IP address**.
88
+
1. For **Name**, type **fw-pip** and select **OK**.
89
+
1. Select **Next**.
84
90
1. For **Address space**, accept the default **10.0.0.0/16**.
85
-
1. Under **Subnet name**, select **default** and change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
86
-
1. For **Subnet address range**, change it to **10.0.1.0/26**.
91
+
1. Under **Subnet**, select **default** and change the **Name** to **Workload-SN**.
92
+
1. For **Starting address**, change it to **10.0.2.0/24**.
87
93
1. Select **Save**.
88
-
89
-
90
-
Next, create a subnet for the workload server.
91
-
92
-
1. Select **Add subnet**.
93
-
1. For **Subnet name**, type **Workload-SN**.
94
-
1. For **Subnet address range**, type **10.0.2.0/24**.
95
-
1. Select **Add**.
96
94
1. Select **Review + create**.
97
95
1. Select **Create**.
98
96
@@ -127,38 +125,16 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
135
-
2. Type **firewall** in the search box and press **Enter**.
136
-
3. Select **Firewall** and then select **Create**.
137
-
4. On the **Create a Firewall** page, use the following table to configure the firewall:
138
-
139
-
|Setting |Value |
140
-
|---------|---------|
141
-
|Subscription |\<your subscription\>|
142
-
|Resource group |**Test-FW-RG**|
143
-
|Name |**Test-FW01**|
144
-
|Region |Select the same location that you used previously|
145
-
|Firewall SKU|**Standard**|
146
-
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
147
-
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
148
-
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
149
-
150
-
5. Accept the other default values, then select **Review + create**.
151
-
6. Review the summary, and then select **Create** to create the firewall.
152
-
153
-
This will take a few minutes to deploy.
154
-
7. After deployment completes, select the **Go to resource**.
155
-
8. Note the firewall private and public IP addresses. You'll use these addresses later.
130
+
7. Go to the resource group and select the firewall.
131
+
8. Note the firewall private and public IP addresses. You use these addresses later.
156
132
157
133
## Create a default route
158
134
159
-
When creating a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This will take care of any outgoing and incoming connections to go through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
135
+
When you create a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This directs any outgoing and incoming connections through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
160
136
161
-
As a result, there is no need create an additional user defined route to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
137
+
As a result, there's no need create another user defined route to include the AzureFirewallSubnet IP range. This might result in dropped connections. The original default route is sufficient.
162
138
163
139
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
164
140
@@ -181,7 +157,7 @@ After deployment completes, select **Go to resource**.
181
157
13. Select **OK**.
182
158
14. Select **Routes** and then select **Add**.
183
159
15. For **Route name**, type **fw-dg**.
184
-
1. For **Address prefix destination**, select **IP Addresses**.
160
+
1. For **Destination type**, select **IP Addresses**.
185
161
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
186
162
1. For **Next hop type**, select **Virtual appliance**.
187
163
@@ -272,9 +248,9 @@ Now, test the firewall to confirm that it works as expected.
272
248
273
249
5. Browse to `https://www.microsoft.com`.
274
250
275
-
You should be blocked by the firewall.
251
+
The firewall should block you.
276
252
277
-
So now you've verified that the firewall rules are working:
253
+
So now you verified that the firewall rules are working:
278
254
279
255
* You can connect to the virtual machine using RDP.
280
256
* You can browse to the one allowed FQDN, but not to any others.
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-restrict-outbound-traffic.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Create a subnet named **AzureFirewallSubnet** in the virtual network where your
37
37
38
38
### Create a new firewall for your cluster
39
39
40
-
Create a firewall named **Test-FW01** using the steps in **Deploy the firewall** from [Tutorial: Deploy and configure Azure Firewall using the Azure portal](../firewall/tutorial-firewall-deploy-portal.md#deploy-the-firewall).
40
+
Create a firewall named **Test-FW01** using the steps in **Deploy the firewall** from [Tutorial: Deploy and configure Azure Firewall using the Azure portal](../firewall/tutorial-firewall-deploy-portal.md#create-a-virtual-network).
Copy file name to clipboardExpand all lines: articles/logic-apps/connect-virtual-network-vnet-set-up-single-ip-address.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
33
33
34
34
## Prerequisites
35
35
36
-
* An Azure firewall that runs in the same virtual network as your ISE. If you don't have a firewall, first [add a subnet](../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) that's named `AzureFirewallSubnet` to your virtual network. You can then [create and deploy a firewall](../firewall/tutorial-firewall-deploy-portal.md#deploy-the-firewall) in your virtual network.
36
+
* An Azure firewall that runs in the same virtual network as your ISE. If you don't have a firewall, first [add a subnet](../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) that's named `AzureFirewallSubnet` to your virtual network. You can then [create and deploy a firewall](../firewall/tutorial-firewall-deploy-portal.md#create-a-virtual-network) in your virtual network.
37
37
38
38
* An Azure [route table](../virtual-network/manage-route-table.md). If you don't have one, first [create a route table](../virtual-network/manage-route-table.md#create-a-route-table). For more information about routing, see [Virtual network traffic routing](../virtual-network/virtual-networks-udr-overview.md).
Copy file name to clipboardExpand all lines: articles/virtual-network/ip-services/public-ip-address-prefix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ You can associate the following resources to a static public IP address from a p
51
51
|---|---|---|
52
52
|Virtual machines| Associating public IPs from a prefix to your virtual machines in Azure reduces management overhead when adding IP addresses to an allowlist in the firewall. You can add an entire prefix with a single firewall rule. As you scale with virtual machines in Azure, you can associate IPs from the same prefix saving cost, time, and management overhead.| To associate IPs from a prefix to your virtual machine: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. [Associate the IP to your virtual machine's network interface.](./virtual-network-network-interface-addresses.md#add-ip-addresses) </br> You can also [associate the IPs to a Virtual Machine Scale Set](https://azure.microsoft.com/resources/templates/vmss-with-public-ip-prefix/).
53
53
| Standard load balancers | Associating public IPs from a prefix to your frontend IP configuration or outbound rule of a load balancer ensures simplification of your Azure public IP address space. Simplify your scenario by grooming outbound connections from a range of contiguous IP addresses. | To associate IPs from a prefix to your load balancer: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When creating the load balancer, select or update the IP created in step 2 above as the frontend IP of your load balancer. |
54
-
| Azure Firewall | You can use a public IP from a prefix for outbound SNAT. All outbound virtual network traffic is translated to the [Azure Firewall](../../firewall/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) public IP. | To associate an IP from a prefix to your firewall: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you [deploy the Azure firewall](../../firewall/tutorial-firewall-deploy-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json#deploy-the-firewall), be sure to select the IP you previously gave from the prefix.|
54
+
| Azure Firewall | You can use a public IP from a prefix for outbound SNAT. All outbound virtual network traffic is translated to the [Azure Firewall](../../firewall/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) public IP. | To associate an IP from a prefix to your firewall: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you [deploy the Azure firewall](../../firewall/tutorial-firewall-deploy-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json#create-a-virtual-network), be sure to select the IP you previously gave from the prefix.|
55
55
| VPN Gateway (AZ SKU), Application Gateway v2, NAT Gateway | You can use a public IP from a prefix for your gateway | To associate an IP from a prefix to your gateway: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you deploy the [VPN Gateway](../../vpn-gateway/tutorial-create-gateway-portal.md), [Application Gateway](../../application-gateway/quick-create-portal.md#create-an-application-gateway), or [NAT Gateway](../nat-gateway/quickstart-create-nat-gateway-portal.md), be sure to select the IP you previously gave from the prefix.|
56
56
57
57
The following resources utilize a public IP address prefix:
0 commit comments