Skip to content

Commit c8a660a

Browse files
committed
fixes
1 parent 43f9c78 commit c8a660a

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/nat-gateway/tutorial-hub-spoke-nat-firewall.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: 'Tutorial: Integrate NAT gateway with Azure Firewall in a hub and spoke network'
2+
title: 'Integrate NAT Gateway with Azure Firewall in Hub and Spoke Network'
33
titleSuffix: Azure NAT Gateway
4-
description: Learn how to integrate a NAT gateway and Azure Firewall in a hub and spoke network.
4+
description: Learn to integrate NAT gateway with Azure Firewall in a hub and spoke network for scalable outbound connectivity. Step-by-step tutorial with Portal, PowerShell, and CLI examples.
55
author: asudbring
66
ms.author: allensu
77
ms.service: azure-nat-gateway
@@ -10,18 +10,18 @@ ms.date: 05/29/2025
1010
ms.custom: template-tutorial
1111
---
1212

13-
# Tutorial: Integrate NAT gateway with Azure Firewall in a hub and spoke network for outbound connectivity
13+
# Integrate NAT gateway with Azure Firewall in a hub and spoke network for outbound connectivity
1414

15-
In this tutorial, you learn how to integrate a NAT gateway with an Azure Firewall in a hub and spoke network
15+
In this tutorial, you learn how to integrate a NAT gateway with Azure Firewall in a hub and spoke network for enhanced outbound connectivity and scalability.
1616

17-
Azure Firewall provides [2,496 SNAT ports per public IP address](../firewall/integrate-with-nat-gateway.md) configured per backend Virtual Machine Scale Set instance (minimum of two instances). You can associate up to 250 public IP addresses to Azure Firewall. Depending on your architecture requirements and traffic patterns, you may require more SNAT ports than what Azure Firewall can provide. You may also require the use of fewer public IPs while also requiring more SNAT ports. A better method for outbound connectivity is to use NAT gateway. NAT gateway provides 64,512 SNAT ports per public IP address and can be used with up to 16 public IP addresses.
17+
Azure Firewall provides [2,496 SNAT ports per public IP address](../firewall/integrate-with-nat-gateway.md) configured per backend Virtual Machine Scale Set instance (minimum of two instances). You can associate up to 250 public IP addresses to Azure Firewall. Depending on your architecture requirements and traffic patterns, you might require more SNAT ports than what Azure Firewall can provide. You might also require the use of fewer public IPs while also requiring more SNAT ports. A better method for outbound connectivity is to use NAT gateway. NAT gateway provides 64,512 SNAT ports per public IP address and can be used with up to 16 public IP addresses.
1818

19-
NAT gateway can be integrated with Azure Firewall by configuring NAT gateway directly to the Azure Firewall subnet in order to provide a more scalable method of outbound connectivity. For production deployments, a hub and spoke network is recommended, where the firewall is in its own virtual network. The workload servers are peered virtual networks in the same region as the hub virtual network where the firewall resides. In this architectural setup, NAT gateway can provide outbound connectivity from the hub virtual network for all spoke virtual networks peered.
19+
NAT gateway can be integrated with Azure Firewall by configuring NAT gateway directly to the Azure Firewall subnet. This association provides a more scalable method of outbound connectivity. For production deployments, a hub and spoke network is recommended, where the firewall is in its own virtual network. The workload servers are peered virtual networks in the same region as the hub virtual network where the firewall resides. In this architectural setup, NAT gateway can provide outbound connectivity from the hub virtual network for all spoke virtual networks peered.
2020

2121
:::image type="content" source="./media/tutorial-hub-spoke-nat-firewall/resources-diagram.png" alt-text="Diagram of Azure resources created in tutorial." lightbox="./media/tutorial-hub-spoke-nat-firewall/resources-diagram.png":::
2222

2323
>[!NOTE]
24-
>Azure NAT Gateway is not currently supported in secured virtual hub network (vWAN) architectures. You must deploy using a hub virtual network architecture as described in this tutorial. For more information about Azure Firewall architecture options, see [What are the Azure Firewall Manager architecture options?](/azure/firewall-manager/vhubs-and-vnets).
24+
>Azure NAT Gateway isn't currently supported in secured virtual hub network (vWAN) architectures. You must deploy using a hub virtual network architecture as described in this tutorial. For more information about Azure Firewall architecture options, see [What are the Azure Firewall Manager architecture options?](/azure/firewall-manager/vhubs-and-vnets).
2525
2626
In this tutorial, you learn how to:
2727

@@ -72,13 +72,13 @@ The hub virtual network contains the firewall subnet that is associated with the
7272

7373
1. Select **+ Create**.
7474

75-
1. In the **Basics** tab of **Create virtual network**, enter or select the following information:
75+
1. In the **Basics** tab of **Create virtual network**, enter, or select the following information:
7676

7777
| Setting | Value |
7878
| ------- | ----- |
7979
| **Project details** | |
8080
| Subscription | Select your subscription. |
81-
| Resource group | Select **Create new**. </br> Enter **test-rg**. </br> Select **OK**. |
81+
| Resource group | Select **Create new**.</br> Enter **test-rg**.</br> Select **OK**. |
8282
| **Instance details** | |
8383
| Name | Enter **vnet-hub**. |
8484
| Region | Select **(US) South Central US**. |
@@ -97,7 +97,7 @@ The hub virtual network contains the firewall subnet that is associated with the
9797
| Setting | Value |
9898
|---|---|
9999
| Azure Bastion host name | Enter **bastion**. |
100-
| Azure Bastion public IP address | Select **Create a public IP address**. </br> Enter **public-ip-bastion** in Name. </br> Select **OK**. |
100+
| Azure Bastion public IP address | Select **Create a public IP address**.</br> Enter **public-ip-bastion** in Name.</br> Select **OK**. |
101101

102102
1. Select **Enable Azure Firewall** in the **Azure Firewall** section of the **Security** tab.
103103

@@ -109,8 +109,8 @@ The hub virtual network contains the firewall subnet that is associated with the
109109
|---|---|
110110
| Azure Firewall name | Enter **firewall**. |
111111
| Tier | Select **Standard**. |
112-
| Policy | Select **Create new**. </br> Enter **firewall-policy** in Name. </br> Select **OK**. |
113-
| Azure Firewall public IP address | Select **Create a public IP address**. </br> Enter **public-ip-firewall** in Name. </br> Select **OK**. |
112+
| Policy | Select **Create new**.</br> Enter **firewall-policy** in Name.</br> Select **OK**. |
113+
| Azure Firewall public IP address | Select **Create a public IP address**.</br> Enter **public-ip-firewall** in Name.</br> Select **OK**. |
114114

115115
1. Select **Next** to proceed to the **IP addresses** tab.
116116

@@ -561,7 +561,7 @@ The spoke virtual network contains the test virtual machine used to test the rou
561561

562562
1. Select **+ Create**.
563563

564-
1. In the **Basics** tab of **Create virtual network**, enter or select the following information:
564+
1. In the **Basics** tab of **Create virtual network**, enter, or select the following information:
565565

566566
| Setting | Value |
567567
| ------- | ----- |
@@ -1124,7 +1124,7 @@ An Ubuntu virtual machine is used to test the outbound internet traffic through
11241124

11251125
1. In **Virtual machines**, select **+ Create**, then **Azure virtual machine**.
11261126

1127-
1. On the **Basics** tab of **Create a virtual machine**, enter or select the following information:
1127+
1. On the **Basics** tab of **Create a virtual machine**, enter, or select the following information:
11281128

11291129
| Setting | Value |
11301130
|---|---|
@@ -1158,7 +1158,7 @@ An Ubuntu virtual machine is used to test the outbound internet traffic through
11581158
| Subnet | Select **subnet-private (10.1.0.0/24)**. |
11591159
| Public IP | Select **None**. |
11601160
| NIC network security group | Select **Advanced**. |
1161-
| Configure network security group | Select **Create new**. </br> Enter **nsg-1** for the name. </br> Leave the rest at the defaults and select **OK**. |
1161+
| Configure network security group | Select **Create new**.</br> Enter **nsg-1** for the name.</br> Leave the rest at the defaults and select **OK**. |
11621162

11631163
1. Leave the rest of the settings at the defaults and select **Review + create**.
11641164

@@ -1202,7 +1202,7 @@ $cred = Get-Credential
12021202
```
12031203

12041204
> [!NOTE]
1205-
> A username is required for the VM. The password is optional and won't be used if set. SSH key configuration is recommended for Linux VMs.
1205+
> A username is required for the VM. The password is optional and isn't used if set. SSH key configuration is recommended for Linux VMs.
12061206
12071207
Use [New-AzVMConfig](/powershell/module/az.compute/new-azvmconfig) to define a VM.
12081208

@@ -1251,7 +1251,7 @@ $vmConfigParams = @{
12511251
$vmConfig = Add-AzVMNetworkInterface @vmConfigParams
12521252
```
12531253

1254-
Use [New-AzVM](/powershell/module/az.compute/new-azvm) to create the VM. The command will generate SSH keys for the virtual machine for login. Make note of the location of the private key. The private key is needed in later steps for connecting to the virtual machine with Azure Bastion.
1254+
Use [New-AzVM](/powershell/module/az.compute/new-azvm) to create the VM. The command generates SSH keys for the virtual machine for sign-in. Make note of the location of the private key. The private key is needed in later steps for connecting to the virtual machine with Azure Bastion.
12551255

12561256
```azurepowershell
12571257
$vmParams = @{

0 commit comments

Comments
 (0)