Skip to content

Commit be30e7a

Browse files
committed
freshness changes
1 parent d491f82 commit be30e7a

File tree

1 file changed

+25
-22
lines changed

1 file changed

+25
-22
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 25 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 05/25/2022
8+
ms.date: 08/01/2022
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -60,32 +60,31 @@ First, create a resource group to contain the resources needed to deploy the fir
6060
The resource group contains all the resources used in this procedure.
6161

6262
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
63-
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Add**.
63+
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Create**.
6464
4. For **Subscription**, select your subscription.
65-
1. For **Resource group name**, enter *Test-FW-RG*.
65+
1. For **Resource group name**, type **Test-FW-RG**.
6666
1. For **Resource group location**, select a location. All other resources that you create must be in the same location.
6767
1. Select **Review + create**.
6868
1. Select **Create**.
6969

7070
### Create a VNet
7171

72-
This VNet will have three subnets.
72+
This VNet will have two subnets.
7373

7474
> [!NOTE]
7575
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
7676
7777
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
7878
1. Select **Networking** > **Virtual network**.
79-
1. Select **Create**.
8079
1. For **Subscription**, select your subscription.
8180
1. For **Resource group**, select **Test-FW-RG**.
8281
1. For **Name**, type **Test-FW-VN**.
8382
1. For **Region**, select the same location that you used previously.
8483
1. Select **Next: IP addresses**.
85-
1. For **IPv4 Address space**, type **10.0.0.0/16**.
86-
1. Under **Subnet**, select **default**.
87-
1. For **Subnet name** type **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
88-
1. For **Address range**, type **10.0.1.0/26**.
84+
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
85+
1. Under **Subnet name**, select **default**.
86+
1. For **Subnet name** change it to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
87+
1. For **Address range**, change it to **10.0.1.0/26**.
8988
1. Select **Save**.
9089

9190
Next, create a subnet for the workload server.
@@ -102,15 +101,15 @@ This VNet will have three subnets.
102101
Now create the workload virtual machine, and place it in the **Workload-SN** subnet.
103102

104103
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
105-
2. Select **Windows Server 2016 Datacenter**.
104+
2. Select **Windows Server 2019 Datacenter**.
106105
4. Enter these values for the virtual machine:
107106

108107
|Setting |Value |
109108
|---------|---------|
110109
|Resource group |**Test-FW-RG**|
111110
|Virtual machine name |**Srv-Work**|
112111
|Region |Same as previous|
113-
|Image|Windows Server 2016 Datacenter|
112+
|Image|Windows Server 2019 Datacenter|
114113
|Administrator user name |Type a user name|
115114
|Password |Type a password|
116115

@@ -120,11 +119,13 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
120119
8. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
121120
9. For **Public IP**, select **None**.
122121
11. Accept the other defaults and select **Next: Management**.
123-
12. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
122+
12. For **Boot diagnostics**, select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
124123
13. Review the settings on the summary page, and then select **Create**.
124+
1. After the deployment is complete, select **Srv-Work** and note the private IP address that you'll need to use later.
125125

126126
[!INCLUDE [ephemeral-ip-note.md](../../includes/ephemeral-ip-note.md)]
127127

128+
128129
## Deploy the firewall
129130

130131
Deploy the firewall into the VNet.
@@ -140,6 +141,7 @@ Deploy the firewall into the VNet.
140141
|Resource group |**Test-FW-RG** |
141142
|Name |**Test-FW01**|
142143
|Region |Select the same location that you used previously|
144+
|Firewall tier|**Standard**|
143145
|Firewall management|**Use Firewall rules (classic) to manage this firewall**|
144146
|Choose a virtual network |**Use existing**: **Test-FW-VN**|
145147
|Public IP address |**Add new**<br>**Name**: **fw-pip**|
@@ -159,9 +161,8 @@ As a result, there is no need create an additional UDR to include the AzureFirew
159161

160162
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
161163

162-
1. On the Azure portal menu, select **All services** or search for and select *All services* from any page.
163-
2. Under **Networking**, select **Route tables**.
164-
3. Select **Add**.
164+
1. On the Azure portal menu, select **Create a resource**.
165+
2. Under **Networking**, select **Route table**.
165166
5. For **Subscription**, select your subscription.
166167
6. For **Resource group**, select **Test-FW-RG**.
167168
7. For **Region**, select the same location that you used previously.
@@ -171,15 +172,16 @@ For the **Workload-SN** subnet, configure the outbound default route to go throu
171172

172173
After deployment completes, select **Go to resource**.
173174

174-
1. On the Firewall-route page, select **Subnets** and then select **Associate**.
175+
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
175176
1. Select **Virtual network** > **Test-FW-VN**.
176177
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
177178

178179
13. Select **OK**.
179180
14. Select **Routes** and then select **Add**.
180181
15. For **Route name**, type **fw-dg**.
181-
16. For **Address prefix**, type **0.0.0.0/0**.
182-
17. For **Next hop type**, select **Virtual appliance**.
182+
1. For **Address prefix destination**, select **IP Addresses**.
183+
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
184+
1. For **Next hop type**, select **Virtual appliance**.
183185

184186
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
185187
18. For **Next hop address**, type the private IP address for the firewall that you noted previously.
@@ -221,7 +223,7 @@ This is the network rule that allows outbound access to two IP addresses at port
221223
2. For **Destination type** select **IP address**.
222224
3. For **Destination address**, type **209.244.0.3,209.244.0.4**
223225

224-
These are public DNS servers operated by CenturyLink.
226+
These are public DNS servers operated by Level3.
225227
1. For **Destination Ports**, type **53**.
226228
2. Select **Add**.
227229

@@ -239,7 +241,7 @@ This rule allows you to connect a remote desktop to the Srv-Work virtual machine
239241
8. For **Source**, type **\***.
240242
9. For **Destination address**, type the firewall public IP address.
241243
10. For **Destination Ports**, type **3389**.
242-
11. For **Translated address**, type the **Srv-work** private IP address.
244+
11. For **Translated address**, type the Srv-work private IP address.
243245
12. For **Translated port**, type **3389**.
244246
13. Select **Add**.
245247

@@ -260,8 +262,8 @@ For testing purposes, configure the server's primary and secondary DNS addresses
260262

261263
Now, test the firewall to confirm that it works as expected.
262264

263-
1. Connect a remote desktop to firewall public IP address and sign in to the **Srv-Work** virtual machine.
264-
3. Open Internet Explorer and browse to `https://www.google.com`.
265+
1. Connect a remote desktop to the firewall public IP address and sign in to the Srv-Work virtual machine.
266+
1. Open Internet Explorer and browse to `https://www.google.com`.
265267
4. Select **OK** > **Close** on the Internet Explorer security alerts.
266268

267269
You should see the Google home page.
@@ -272,6 +274,7 @@ Now, test the firewall to confirm that it works as expected.
272274

273275
So now you've verified that the firewall rules are working:
274276

277+
* You can connect to the virtual machine using RDP.
275278
* You can browse to the one allowed FQDN, but not to any others.
276279
* You can resolve DNS names using the configured external DNS server.
277280

0 commit comments

Comments
 (0)