You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/management-nic.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,13 @@ ms.author: victorh
12
12
# Azure Firewall Management NIC
13
13
14
14
> [!NOTE]
15
-
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
15
+
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
16
16
17
-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
17
+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Certain upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall to avoid service disruption.
18
18
19
19
## What happens when you enable the Management NIC
20
20
21
-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
21
+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
22
22
23
23
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
24
24
@@ -91,33 +91,33 @@ Now when you view the firewall in the Azure portal, you see the assigned Managem
91
91
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
92
92
93
93
**Important Note**
94
-
***Single Firewall per Virtual Network (VNET)**: Since two firewalls cannot exist within the same virtual network, it is recommended to delete the old firewall before starting the new deployment if you plan to reuse the same VNET.
95
-
***Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing VNET.
94
+
***Single Firewall per Virtual Network (VNET)**: Since two firewalls can't exist within the same virtual network, it's recommended to delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
95
+
***Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
96
96
97
97
**Prerequisites**
98
98
* Create the **AzureFirewallManagementSubnet**:
99
99
* Minimum subnet size: /26
100
100
* Example: 10.0.1.0/26
101
101
102
102
**Deployment Steps**
103
-
1. Go to **Create a Resource** in the Azure Portal.
103
+
1. Go to **Create a Resource** in the Azure portal.
104
104
1. Search for **Firewall** and select **Create**.
105
-
1. On the Create a Firewall page, configure the following:
105
+
1. On the Create a Firewall page, configure the following settings:
106
106
* **Subscription**: Select your subscription.
107
107
* **Resource Group**: Select or create a new resource group.
108
108
* **Name**: Enter a name for the firewall.
109
109
* **Region**: Choose your region.
110
110
* **Firewall SKU**: Select Basic, Standard, or Premium.
111
111
* **Virtual Network**: Create a new virtual network or use an existing one.
112
-
* Address space: e.g., 10.0.0.0/16
113
-
* Subnet for AzureFirewallSubnet: e.g., 10.0.0.0/26
112
+
* Address space: for example, 10.0.0.0/16
113
+
* Subnet for AzureFirewallSubnet: for example, 10.0.0.0/26
114
114
* **Public IP Address**: Add new Public IP
115
-
* Name: e.g., FW-PIP
115
+
* Name: for example, FW-PIP
116
116
1. Firewall Management NIC
117
117
* Select **Enable Firewall Management NIC**
118
-
* Subnet for AzureFirewallManagementSubnet: e.g., 10.0.1.0/24
119
-
* Create Management public IP address: e.g., Mgmt-PIP
120
-
1. Select **Review + Create** to validate and deploy the firewall. This will take a few minutes to deploy.
118
+
* Subnet for AzureFirewallManagementSubnet: for example, 10.0.1.0/24
119
+
* Create Management public IP address: for example, Mgmt-PIP
120
+
1. Select **Review + Create** to validate and deploy the firewall. This takes a few minutes to deploy.
0 commit comments