Skip to content

Commit 9c3e3e1

Browse files
Merge pull request #258506 from vhorne/fw-tut-fresh
UI updates and some editing
2 parents 977da5b + 87e3cb1 commit 9c3e3e1

File tree

4 files changed

+28
-52
lines changed

4 files changed

+28
-52
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 25 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 01/11/2023
8+
ms.date: 11/14/2023
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
1212
---
1313

1414
# Deploy and configure Azure Firewall using the Azure portal
1515

16-
Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that can be accessed.
16+
Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to web sites. Or, you might want to limit the outbound IP addresses and ports that can be accessed.
1717

1818
One way you can control outbound network access from an Azure subnet is with Azure Firewall. With Azure Firewall, you can configure:
1919

@@ -22,9 +22,9 @@ One way you can control outbound network access from an Azure subnet is with Azu
2222

2323
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
2424

25-
For this article, you create a simplified single VNet with two subnets for easy deployment.
25+
For this article, you create a simplified single virtual network with two subnets for easy deployment.
2626

27-
For production deployments, a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
27+
For production deployments, a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own virtual network. The workload servers are in peered virtual networks in the same region with one or more subnets.
2828

2929
* **AzureFirewallSubnet** - the firewall is in this subnet.
3030
* **Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
@@ -53,7 +53,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
5353

5454
## Set up the network
5555

56-
First, create a resource group to contain the resources needed to deploy the firewall. Then create a VNet, subnets, and a test server.
56+
First, create a resource group to contain the resources needed to deploy the firewall. Then create a virtual network, subnets, and a test server.
5757

5858
### Create a resource group
5959

@@ -67,9 +67,9 @@ The resource group contains all the resources used in this procedure.
6767
1. Select **Review + create**.
6868
1. Select **Create**.
6969

70-
### Create a VNet
70+
### Create a virtual network
7171

72-
This VNet will have two subnets.
72+
This virtual network has two subnets.
7373

7474
> [!NOTE]
7575
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
@@ -79,20 +79,18 @@ This VNet will have two subnets.
7979
1. Select **Create**.
8080
1. For **Subscription**, select your subscription.
8181
1. For **Resource group**, select **Test-FW-RG**.
82-
1. For **Name**, type **Test-FW-VN**.
83-
1. Select **Next: IP addresses**.
82+
1. For **Virtual network name**, type **Test-FW-VN**.
83+
1. For **Region**, select the same region that you used previously.
84+
1. Select **Next**.
85+
1. On the **Security** tab, select **Enable Azure Firewall**.
86+
1. For **Azure Firewall name**, type **Test-FW01**.
87+
1. For **Azure Firewall public IP address**, select **Create a public IP address**.
88+
1. For **Name**, type **fw-pip** and select **OK**.
89+
1. Select **Next**.
8490
1. For **Address space**, accept the default **10.0.0.0/16**.
85-
1. Under **Subnet name**, select **default** and change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
86-
1. For **Subnet address range**, change it to **10.0.1.0/26**.
91+
1. Under **Subnet**, select **default** and change the **Name** to **Workload-SN**.
92+
1. For **Starting address**, change it to **10.0.2.0/24**.
8793
1. Select **Save**.
88-
89-
90-
Next, create a subnet for the workload server.
91-
92-
1. Select **Add subnet**.
93-
1. For **Subnet name**, type **Workload-SN**.
94-
1. For **Subnet address range**, type **10.0.2.0/24**.
95-
1. Select **Add**.
9694
1. Select **Review + create**.
9795
1. Select **Create**.
9896

@@ -127,38 +125,16 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
127125
[!INCLUDE [ephemeral-ip-note.md](../../includes/ephemeral-ip-note.md)]
128126

129127

130-
## Deploy the firewall
131-
132-
Deploy the firewall into the VNet.
128+
## Examine the firewall
133129

134-
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
135-
2. Type **firewall** in the search box and press **Enter**.
136-
3. Select **Firewall** and then select **Create**.
137-
4. On the **Create a Firewall** page, use the following table to configure the firewall:
138-
139-
|Setting |Value |
140-
|---------|---------|
141-
|Subscription |\<your subscription\>|
142-
|Resource group |**Test-FW-RG** |
143-
|Name |**Test-FW01**|
144-
|Region |Select the same location that you used previously|
145-
|Firewall SKU|**Standard**|
146-
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
147-
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
148-
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
149-
150-
5. Accept the other default values, then select **Review + create**.
151-
6. Review the summary, and then select **Create** to create the firewall.
152-
153-
This will take a few minutes to deploy.
154-
7. After deployment completes, select the **Go to resource**.
155-
8. Note the firewall private and public IP addresses. You'll use these addresses later.
130+
7. Go to the resource group and select the firewall.
131+
8. Note the firewall private and public IP addresses. You use these addresses later.
156132

157133
## Create a default route
158134

159-
When creating a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This will take care of any outgoing and incoming connections to go through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
135+
When you create a route for outbound and inbound connectivity through the firewall, a default route to 0.0.0.0/0 with the virtual appliance private IP as a next hop is sufficient. This directs any outgoing and incoming connections through the firewall. As an example, if the firewall is fulfilling a TCP-handshake and responding to an incoming request, then the response is directed to the IP address who sent the traffic. This is by design.
160136

161-
As a result, there is no need create an additional user defined route to include the AzureFirewallSubnet IP range. This may result in dropped connections. The original default route is sufficient.
137+
As a result, there's no need create another user defined route to include the AzureFirewallSubnet IP range. This might result in dropped connections. The original default route is sufficient.
162138

163139
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
164140

@@ -181,7 +157,7 @@ After deployment completes, select **Go to resource**.
181157
13. Select **OK**.
182158
14. Select **Routes** and then select **Add**.
183159
15. For **Route name**, type **fw-dg**.
184-
1. For **Address prefix destination**, select **IP Addresses**.
160+
1. For **Destination type**, select **IP Addresses**.
185161
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
186162
1. For **Next hop type**, select **Virtual appliance**.
187163

@@ -272,9 +248,9 @@ Now, test the firewall to confirm that it works as expected.
272248

273249
5. Browse to `https://www.microsoft.com`.
274250

275-
You should be blocked by the firewall.
251+
The firewall should block you.
276252

277-
So now you've verified that the firewall rules are working:
253+
So now you verified that the firewall rules are working:
278254

279255
* You can connect to the virtual machine using RDP.
280256
* You can browse to the one allowed FQDN, but not to any others.

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Create a subnet named **AzureFirewallSubnet** in the virtual network where your
3737

3838
### Create a new firewall for your cluster
3939

40-
Create a firewall named **Test-FW01** using the steps in **Deploy the firewall** from [Tutorial: Deploy and configure Azure Firewall using the Azure portal](../firewall/tutorial-firewall-deploy-portal.md#deploy-the-firewall).
40+
Create a firewall named **Test-FW01** using the steps in **Deploy the firewall** from [Tutorial: Deploy and configure Azure Firewall using the Azure portal](../firewall/tutorial-firewall-deploy-portal.md#create-a-virtual-network).
4141

4242
### Configure the firewall with application rules
4343

articles/logic-apps/connect-virtual-network-vnet-set-up-single-ip-address.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
3333

3434
## Prerequisites
3535

36-
* An Azure firewall that runs in the same virtual network as your ISE. If you don't have a firewall, first [add a subnet](../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) that's named `AzureFirewallSubnet` to your virtual network. You can then [create and deploy a firewall](../firewall/tutorial-firewall-deploy-portal.md#deploy-the-firewall) in your virtual network.
36+
* An Azure firewall that runs in the same virtual network as your ISE. If you don't have a firewall, first [add a subnet](../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) that's named `AzureFirewallSubnet` to your virtual network. You can then [create and deploy a firewall](../firewall/tutorial-firewall-deploy-portal.md#create-a-virtual-network) in your virtual network.
3737

3838
* An Azure [route table](../virtual-network/manage-route-table.md). If you don't have one, first [create a route table](../virtual-network/manage-route-table.md#create-a-route-table). For more information about routing, see [Virtual network traffic routing](../virtual-network/virtual-networks-udr-overview.md).
3939

articles/virtual-network/ip-services/public-ip-address-prefix.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ You can associate the following resources to a static public IP address from a p
5151
|---|---|---|
5252
|Virtual machines| Associating public IPs from a prefix to your virtual machines in Azure reduces management overhead when adding IP addresses to an allowlist in the firewall. You can add an entire prefix with a single firewall rule. As you scale with virtual machines in Azure, you can associate IPs from the same prefix saving cost, time, and management overhead.| To associate IPs from a prefix to your virtual machine: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. [Associate the IP to your virtual machine's network interface.](./virtual-network-network-interface-addresses.md#add-ip-addresses) </br> You can also [associate the IPs to a Virtual Machine Scale Set](https://azure.microsoft.com/resources/templates/vmss-with-public-ip-prefix/).
5353
| Standard load balancers | Associating public IPs from a prefix to your frontend IP configuration or outbound rule of a load balancer ensures simplification of your Azure public IP address space. Simplify your scenario by grooming outbound connections from a range of contiguous IP addresses. | To associate IPs from a prefix to your load balancer: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When creating the load balancer, select or update the IP created in step 2 above as the frontend IP of your load balancer. |
54-
| Azure Firewall | You can use a public IP from a prefix for outbound SNAT. All outbound virtual network traffic is translated to the [Azure Firewall](../../firewall/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) public IP. | To associate an IP from a prefix to your firewall: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you [deploy the Azure firewall](../../firewall/tutorial-firewall-deploy-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json#deploy-the-firewall), be sure to select the IP you previously gave from the prefix.|
54+
| Azure Firewall | You can use a public IP from a prefix for outbound SNAT. All outbound virtual network traffic is translated to the [Azure Firewall](../../firewall/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) public IP. | To associate an IP from a prefix to your firewall: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you [deploy the Azure firewall](../../firewall/tutorial-firewall-deploy-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json#create-a-virtual-network), be sure to select the IP you previously gave from the prefix.|
5555
| VPN Gateway (AZ SKU), Application Gateway v2, NAT Gateway | You can use a public IP from a prefix for your gateway | To associate an IP from a prefix to your gateway: </br> 1. [Create a prefix.](manage-public-ip-address-prefix.md) </br> 2. [Create an IP from the prefix.](manage-public-ip-address-prefix.md) </br> 3. When you deploy the [VPN Gateway](../../vpn-gateway/tutorial-create-gateway-portal.md), [Application Gateway](../../application-gateway/quick-create-portal.md#create-an-application-gateway), or [NAT Gateway](../nat-gateway/quickstart-create-nat-gateway-portal.md), be sure to select the IP you previously gave from the prefix.|
5656

5757
The following resources utilize a public IP address prefix:

0 commit comments

Comments
 (0)