You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+25-22Lines changed: 25 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 05/25/2022
8
+
ms.date: 08/01/2022
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -60,32 +60,31 @@ First, create a resource group to contain the resources needed to deploy the fir
60
60
The resource group contains all the resources used in this procedure.
61
61
62
62
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
63
-
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Add**.
63
+
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Create**.
64
64
4. For **Subscription**, select your subscription.
65
-
1. For **Resource group name**, enter *Test-FW-RG*.
65
+
1. For **Resource group name**, type **Test-FW-RG**.
66
66
1. For **Resource group location**, select a location. All other resources that you create must be in the same location.
67
67
1. Select **Review + create**.
68
68
1. Select **Create**.
69
69
70
70
### Create a VNet
71
71
72
-
This VNet will have three subnets.
72
+
This VNet will have two subnets.
73
73
74
74
> [!NOTE]
75
75
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
76
76
77
77
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
78
78
1. Select **Networking** > **Virtual network**.
79
-
1. Select **Create**.
80
79
1. For **Subscription**, select your subscription.
81
80
1. For **Resource group**, select **Test-FW-RG**.
82
81
1. For **Name**, type **Test-FW-VN**.
83
82
1. For **Region**, select the same location that you used previously.
84
83
1. Select **Next: IP addresses**.
85
-
1. For **IPv4 Address space**, type**10.0.0.0/16**.
86
-
1. Under **Subnet**, select **default**.
87
-
1. For **Subnet name**type**AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
88
-
1. For **Address range**, type**10.0.1.0/26**.
84
+
1. For **IPv4 Address space**, accept the default**10.0.0.0/16**.
85
+
1. Under **Subnet name**, select **default**.
86
+
1. For **Subnet name**change it to**AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
87
+
1. For **Address range**, change it to**10.0.1.0/26**.
89
88
1. Select **Save**.
90
89
91
90
Next, create a subnet for the workload server.
@@ -102,15 +101,15 @@ This VNet will have three subnets.
102
101
Now create the workload virtual machine, and place it in the **Workload-SN** subnet.
103
102
104
103
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
105
-
2. Select **Windows Server 2016 Datacenter**.
104
+
2. Select **Windows Server 2019 Datacenter**.
106
105
4. Enter these values for the virtual machine:
107
106
108
107
|Setting |Value |
109
108
|---------|---------|
110
109
|Resource group |**Test-FW-RG**|
111
110
|Virtual machine name |**Srv-Work**|
112
111
|Region |Same as previous|
113
-
|Image|Windows Server 2016 Datacenter|
112
+
|Image|Windows Server 2019 Datacenter|
114
113
|Administrator user name |Type a user name|
115
114
|Password |Type a password|
116
115
@@ -120,11 +119,13 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
120
119
8. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
121
120
9. For **Public IP**, select **None**.
122
121
11. Accept the other defaults and select **Next: Management**.
123
-
12.Select**Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
122
+
12.For **Boot diagnostics**, select**Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
124
123
13. Review the settings on the summary page, and then select **Create**.
124
+
1. After the deployment is complete, select **Srv-Work** and note the private IP address that you'll need to use later.
@@ -140,6 +141,7 @@ Deploy the firewall into the VNet.
140
141
|Resource group |**Test-FW-RG**|
141
142
|Name |**Test-FW01**|
142
143
|Region |Select the same location that you used previously|
144
+
|Firewall tier|**Standard**|
143
145
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
144
146
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
145
147
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
@@ -159,9 +161,8 @@ As a result, there is no need create an additional UDR to include the AzureFirew
159
161
160
162
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
161
163
162
-
1. On the Azure portal menu, select **All services** or search for and select *All services* from any page.
163
-
2. Under **Networking**, select **Route tables**.
164
-
3. Select **Add**.
164
+
1. On the Azure portal menu, select **Create a resource**.
165
+
2. Under **Networking**, select **Route table**.
165
166
5. For **Subscription**, select your subscription.
166
167
6. For **Resource group**, select **Test-FW-RG**.
167
168
7. For **Region**, select the same location that you used previously.
@@ -171,15 +172,16 @@ For the **Workload-SN** subnet, configure the outbound default route to go throu
171
172
172
173
After deployment completes, select **Go to resource**.
173
174
174
-
1. On the Firewall-route page, select **Subnets** and then select **Associate**.
175
+
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
175
176
1. Select **Virtual network** > **Test-FW-VN**.
176
177
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
177
178
178
179
13. Select **OK**.
179
180
14. Select **Routes** and then select **Add**.
180
181
15. For **Route name**, type **fw-dg**.
181
-
16. For **Address prefix**, type **0.0.0.0/0**.
182
-
17. For **Next hop type**, select **Virtual appliance**.
182
+
1. For **Address prefix destination**, select **IP Addresses**.
183
+
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
184
+
1. For **Next hop type**, select **Virtual appliance**.
183
185
184
186
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
185
187
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
@@ -221,7 +223,7 @@ This is the network rule that allows outbound access to two IP addresses at port
221
223
2. For **Destination type** select **IP address**.
222
224
3. For **Destination address**, type **209.244.0.3,209.244.0.4**
223
225
224
-
These are public DNS servers operated by CenturyLink.
226
+
These are public DNS servers operated by Level3.
225
227
1. For **Destination Ports**, type **53**.
226
228
2. Select **Add**.
227
229
@@ -239,7 +241,7 @@ This rule allows you to connect a remote desktop to the Srv-Work virtual machine
239
241
8. For **Source**, type **\***.
240
242
9. For **Destination address**, type the firewall public IP address.
241
243
10. For **Destination Ports**, type **3389**.
242
-
11. For **Translated address**, type the **Srv-work** private IP address.
244
+
11. For **Translated address**, type the Srv-work private IP address.
243
245
12. For **Translated port**, type **3389**.
244
246
13. Select **Add**.
245
247
@@ -260,8 +262,8 @@ For testing purposes, configure the server's primary and secondary DNS addresses
260
262
261
263
Now, test the firewall to confirm that it works as expected.
262
264
263
-
1. Connect a remote desktop to firewall public IP address and sign in to the **Srv-Work** virtual machine.
264
-
3. Open Internet Explorer and browse to `https://www.google.com`.
265
+
1. Connect a remote desktop to the firewall public IP address and sign in to the Srv-Work virtual machine.
266
+
1. Open Internet Explorer and browse to `https://www.google.com`.
265
267
4. Select **OK** > **Close** on the Internet Explorer security alerts.
266
268
267
269
You should see the Google home page.
@@ -272,6 +274,7 @@ Now, test the firewall to confirm that it works as expected.
272
274
273
275
So now you've verified that the firewall rules are working:
274
276
277
+
* You can connect to the virtual machine using RDP.
275
278
* You can browse to the one allowed FQDN, but not to any others.
276
279
* You can resolve DNS names using the configured external DNS server.
0 commit comments