Skip to content

Commit a9c6940

Browse files
authored
Merge pull request #88649 from vhorne/fw-force-tunnel
forced tunneling mods
2 parents 22b6439 + 03420cd commit a9c6940

File tree

2 files changed

+8
-9
lines changed

2 files changed

+8
-9
lines changed

articles/firewall/firewall-faq.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 08/29/2019
8+
ms.date: 09/17/2019
99
ms.author: victorh
1010
---
1111

@@ -124,11 +124,9 @@ Azure Firewall doesn’t SNAT when the destination IP address is a private IP ra
124124

125125
## Is forced tunneling/chaining to a Network Virtual Appliance supported?
126126

127-
Forced tunneling isn't supported by default, but it can be enabled with help from Support.
127+
Forced tunneling isn't currently supported. Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
128128

129-
Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.
130-
131-
However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.
129+
If your configuration requires forced tunneling to an on-premises network and you can determine the target IP prefixes for your Internet destinations, you can configure these ranges with the on-premises network as the next hop via a user defined route on the AzureFirewallSubnet. Or, you can use BGP to define these routes.
132130

133131
## Are there any firewall resource group restrictions?
134132

articles/firewall/tutorial-hybrid-portal.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,11 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 08/29/2019
8+
ms.date: 09/17/2019
99
ms.author: victorh
1010
customer intent: As an administrator, I want to control network access from an on-premises network to an Azure virtual network.
1111
---
12+
1213
# Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure portal
1314

1415
When you connect your on-premises network to an Azure virtual network to create a hybrid network, the ability to control access to your Azure network resources is an important part of an overall security plan.
@@ -52,9 +53,9 @@ There are three key requirements for this scenario to work correctly:
5253
See the [Create Routes](#create-the-routes) section in this tutorial to see how these routes are created.
5354

5455
>[!NOTE]
55-
>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.
56+
>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
5657
>
57-
>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.
58+
>Azure Firewall doesn't currently support forced tunneling. If your configuration requires forced tunneling to an on-premises network and you can determine the target IP prefixes for your Internet destinations, you can configure these ranges with the on-premises network as the next hop via a user defined route on the AzureFirewallSubnet. Or, you can use BGP to define these routes.
5859
5960
>[!NOTE]
6061
>Traffic between directly peered VNets is routed directly even if a UDR points to Azure Firewall as the default gateway. To send subnet to subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.
@@ -367,7 +368,7 @@ Create a virtual machine in the spoke virtual network, running IIS, with no publ
367368
- **User name**: *azureuser*.
368369
- **Password**: *Azure123456!*
369370
4. Select **Next:Disks**.
370-
5. Accept the defaults and select **Next:Networking**.
371+
5. Accept the defaults and select **Next: Networking**.
371372
6. Select **VNet-Spoke** for the virtual network and the subnet is **SN-Workload**.
372373
7. For **Public IP**, select **None**.
373374
8. For **Public inbound ports**, select **Allow selected ports**, and then select **HTTP (80)**, and **RDP (3389)**

0 commit comments

Comments
 (0)