Skip to content

Commit b7ac91b

Browse files
authored
Merge pull request #100457 from vhorne/fw-forced-tunneling
start forced tunneling concept article
2 parents 56bd329 + 4672bd0 commit b7ac91b

File tree

4 files changed

+41
-3
lines changed

4 files changed

+41
-3
lines changed

articles/firewall/forced-tunneling.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Azure Firewall forced tunneling
3+
description: You can configure forced tunneling to route Internet-bound traffic to an additional firewall or network virtual appliance for further processing.
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: article
8+
ms.date: 02/18/2020
9+
ms.author: victorh
10+
---
11+
12+
# Azure Firewall forced tunneling (preview)
13+
14+
You can configure Azure Firewall to route all Internet-bound traffic to a designated next hop instead of going directly to the Internet. For example, you may have an on-premises edge firewall or other network virtual appliance (NVA) to process network traffic before it's passed to the Internet.
15+
16+
> [!IMPORTANT]
17+
> Azure Firewall forced tunneling is currently in public preview.
18+
>
19+
> This public preview is provided without a service-level agreement and shouldn't be used for production workloads. Certain features might not be supported, might have constrained capabilities, or might not be available in all Azure locations. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20+
21+
By default, forced tunneling isn't allowed on Azure Firewall to ensure all its outbound Azure dependencies are met. User Defined Route (UDR) configurations on the *AzureFirewallSubnet* that
22+
have a default route not going directly to the Internet are disabled.
23+
24+
## Forced tunneling configuration
25+
26+
To support forced tunneling, service management traffic is separated from customer traffic. An additional dedicated subnet named *AzureFirewallManagementSubnet* is required with its own associated public IP address. The only route allowed on this subnet is a default route to the Internet, and BGP route propagation must be disabled.
27+
28+
If you have a default route advertised via BGP to force traffic to on-premises, you must create the *AzureFirewallSubnet* and *AzureFirewallManagementSubnet* before deploying your firewall and have a UDR with a default route to the Internet, and Virtual network gateway route propagation disabled.
29+
30+
Within this configuration, the *AzureFirewallSubnet* can now include routes to any on-premise firewall or NVA to process traffic before it's passed to the Internet. You can also publish these routes via BGP to *AzureFirewallSubnet* if Virtual network gateway route propagation is enabled on this subnet.
31+
32+
Once you configure Azure Firewall to support forced tunneling, you can't undo the configuration. If you remove all other IP configurations on your firewall, the management IP configuration is removed as well and the firewall is deallocated. The public IP address assigned to the management IP configuration can't be removed, but you can assign a different public IP address.
33+
34+
## Next steps
35+
36+
- [Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure portal](tutorial-hybrid-portal.md)

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@
3535
href: rule-processing.md
3636
- name: Service tags
3737
href: service-tags.md
38+
- name: Forced tunneling
39+
href: forced-tunneling.md
3840
- name: Compliance certifications
3941
href: compliance-certifications.md
4042
- name: How-to guides

articles/firewall/tutorial-hybrid-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ See the [Create Routes](#create-the-routes) section in this tutorial to see how
5757
>[!NOTE]
5858
>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
5959
>
60-
>Azure Firewall doesn't currently support forced tunneling. If your configuration requires forced tunneling to an on-premises network and you can determine the target IP prefixes for your Internet destinations, you can configure these ranges with the on-premises network as the next hop via a user defined route on the AzureFirewallSubnet. Or, you can use BGP to define these routes.
60+
>Azure Firewall can be configured to support forced tunneling. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
6161
6262
>[!NOTE]
6363
>Traffic between directly peered VNets is routed directly even if a UDR points to Azure Firewall as the default gateway. To send subnet to subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.

articles/firewall/tutorial-hybrid-ps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 10/18/2019
8+
ms.date: 01/08/2020
99
ms.author: victorh
1010
customer intent: As an administrator, I want to control network access from an on-premises network to an Azure virtual network.
1111
---
@@ -58,7 +58,7 @@ See the [Create Routes](#create-the-routes) section in this article to see how t
5858
>[!NOTE]
5959
>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
6060
>
61-
>Azure Firewall doesn't currently support forced tunneling. If your configuration requires forced tunneling to an on-premises network and you can determine the target IP prefixes for your Internet destinations, you can configure these ranges with the on-premises network as the next hop via a user defined route on the AzureFirewallSubnet. Or, you can use BGP to define these routes.
61+
>Azure Firewall can be configured to support forced tunneling. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
6262
6363
>[!NOTE]
6464
>Traffic between directly peered VNets is routed directly even if a UDR points to Azure Firewall as the default gateway. To send subnet to subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.

0 commit comments

Comments
 (0)