You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/nat-gateway/tutorial-hub-spoke-nat-firewall.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: 'Tutorial: Integrate NAT gateway with Azure Firewall in a hub and spoke network'
2
+
title: 'Integrate NAT Gateway with Azure Firewall in Hub and Spoke Network'
3
3
titleSuffix: Azure NAT Gateway
4
-
description: Learn how to integrate a NAT gateway and Azure Firewall in a hub and spoke network.
4
+
description: Learn to integrate NAT gateway with Azure Firewall in a hub and spoke network for scalable outbound connectivity. Step-by-step tutorial with Portal, PowerShell, and CLI examples.
5
5
author: asudbring
6
6
ms.author: allensu
7
7
ms.service: azure-nat-gateway
@@ -10,18 +10,18 @@ ms.date: 05/29/2025
10
10
ms.custom: template-tutorial
11
11
---
12
12
13
-
# Tutorial: Integrate NAT gateway with Azure Firewall in a hub and spoke network for outbound connectivity
13
+
# Integrate NAT gateway with Azure Firewall in a hub and spoke network for outbound connectivity
14
14
15
-
In this tutorial, you learn how to integrate a NAT gateway with an Azure Firewall in a hub and spoke network
15
+
In this tutorial, you learn how to integrate a NAT gateway with Azure Firewall in a hub and spoke network for enhanced outbound connectivity and scalability.
16
16
17
-
Azure Firewall provides [2,496 SNAT ports per public IP address](../firewall/integrate-with-nat-gateway.md) configured per backend Virtual Machine Scale Set instance (minimum of two instances). You can associate up to 250 public IP addresses to Azure Firewall. Depending on your architecture requirements and traffic patterns, you may require more SNAT ports than what Azure Firewall can provide. You may also require the use of fewer public IPs while also requiring more SNAT ports. A better method for outbound connectivity is to use NAT gateway. NAT gateway provides 64,512 SNAT ports per public IP address and can be used with up to 16 public IP addresses.
17
+
Azure Firewall provides [2,496 SNAT ports per public IP address](../firewall/integrate-with-nat-gateway.md) configured per backend Virtual Machine Scale Set instance (minimum of two instances). You can associate up to 250 public IP addresses to Azure Firewall. Depending on your architecture requirements and traffic patterns, you might require more SNAT ports than what Azure Firewall can provide. You might also require the use of fewer public IPs while also requiring more SNAT ports. A better method for outbound connectivity is to use NAT gateway. NAT gateway provides 64,512 SNAT ports per public IP address and can be used with up to 16 public IP addresses.
18
18
19
-
NAT gateway can be integrated with Azure Firewall by configuring NAT gateway directly to the Azure Firewall subnet in order to provide a more scalable method of outbound connectivity. For production deployments, a hub and spoke network is recommended, where the firewall is in its own virtual network. The workload servers are peered virtual networks in the same region as the hub virtual network where the firewall resides. In this architectural setup, NAT gateway can provide outbound connectivity from the hub virtual network for all spoke virtual networks peered.
19
+
NAT gateway can be integrated with Azure Firewall by configuring NAT gateway directly to the Azure Firewall subnet. This association provides a more scalable method of outbound connectivity. For production deployments, a hub and spoke network is recommended, where the firewall is in its own virtual network. The workload servers are peered virtual networks in the same region as the hub virtual network where the firewall resides. In this architectural setup, NAT gateway can provide outbound connectivity from the hub virtual network for all spoke virtual networks peered.
20
20
21
21
:::image type="content" source="./media/tutorial-hub-spoke-nat-firewall/resources-diagram.png" alt-text="Diagram of Azure resources created in tutorial." lightbox="./media/tutorial-hub-spoke-nat-firewall/resources-diagram.png":::
22
22
23
23
>[!NOTE]
24
-
>Azure NAT Gateway is not currently supported in secured virtual hub network (vWAN) architectures. You must deploy using a hub virtual network architecture as described in this tutorial. For more information about Azure Firewall architecture options, see [What are the Azure Firewall Manager architecture options?](/azure/firewall-manager/vhubs-and-vnets).
24
+
>Azure NAT Gateway isn't currently supported in secured virtual hub network (vWAN) architectures. You must deploy using a hub virtual network architecture as described in this tutorial. For more information about Azure Firewall architecture options, see [What are the Azure Firewall Manager architecture options?](/azure/firewall-manager/vhubs-and-vnets).
25
25
26
26
In this tutorial, you learn how to:
27
27
@@ -72,13 +72,13 @@ The hub virtual network contains the firewall subnet that is associated with the
72
72
73
73
1. Select **+ Create**.
74
74
75
-
1. In the **Basics** tab of **Create virtual network**, enter or select the following information:
75
+
1. In the **Basics** tab of **Create virtual network**, enter, or select the following information:
76
76
77
77
| Setting | Value |
78
78
| ------- | ----- |
79
79
|**Project details**||
80
80
| Subscription | Select your subscription. |
81
-
| Resource group | Select **Create new**.</br> Enter **test-rg**.</br> Select **OK**. |
81
+
| Resource group | Select **Create new**.</br> Enter **test-rg**.</br> Select **OK**. |
82
82
|**Instance details**||
83
83
| Name | Enter **vnet-hub**. |
84
84
| Region | Select **(US) South Central US**. |
@@ -97,7 +97,7 @@ The hub virtual network contains the firewall subnet that is associated with the
97
97
| Setting | Value |
98
98
|---|---|
99
99
| Azure Bastion host name | Enter **bastion**. |
100
-
| Azure Bastion public IP address | Select **Create a public IP address**.</br> Enter **public-ip-bastion** in Name.</br> Select **OK**. |
100
+
| Azure Bastion public IP address | Select **Create a public IP address**.</br> Enter **public-ip-bastion** in Name.</br> Select **OK**. |
101
101
102
102
1. Select **Enable Azure Firewall** in the **Azure Firewall** section of the **Security** tab.
103
103
@@ -109,8 +109,8 @@ The hub virtual network contains the firewall subnet that is associated with the
109
109
|---|---|
110
110
| Azure Firewall name | Enter **firewall**. |
111
111
| Tier | Select **Standard**. |
112
-
| Policy | Select **Create new**.</br> Enter **firewall-policy** in Name.</br> Select **OK**. |
113
-
| Azure Firewall public IP address | Select **Create a public IP address**.</br> Enter **public-ip-firewall** in Name.</br> Select **OK**. |
112
+
| Policy | Select **Create new**.</br> Enter **firewall-policy** in Name.</br> Select **OK**. |
113
+
| Azure Firewall public IP address | Select **Create a public IP address**.</br> Enter **public-ip-firewall** in Name.</br> Select **OK**. |
114
114
115
115
1. Select **Next** to proceed to the **IP addresses** tab.
116
116
@@ -561,7 +561,7 @@ The spoke virtual network contains the test virtual machine used to test the rou
561
561
562
562
1. Select **+ Create**.
563
563
564
-
1. In the **Basics** tab of **Create virtual network**, enter or select the following information:
564
+
1. In the **Basics** tab of **Create virtual network**, enter, or select the following information:
565
565
566
566
| Setting | Value |
567
567
| ------- | ----- |
@@ -1124,7 +1124,7 @@ An Ubuntu virtual machine is used to test the outbound internet traffic through
1124
1124
1125
1125
1. In **Virtual machines**, select **+ Create**, then **Azure virtual machine**.
1126
1126
1127
-
1. On the **Basics** tab of **Create a virtual machine**, enter or select the following information:
1127
+
1. On the **Basics** tab of **Create a virtual machine**, enter, or select the following information:
1128
1128
1129
1129
| Setting | Value |
1130
1130
|---|---|
@@ -1158,7 +1158,7 @@ An Ubuntu virtual machine is used to test the outbound internet traffic through
| NIC network security group | Select **Advanced**. |
1161
-
| Configure network security group | Select **Create new**.</br> Enter **nsg-1** for the name.</br> Leave the rest at the defaults and select **OK**. |
1161
+
| Configure network security group | Select **Create new**.</br> Enter **nsg-1** for the name.</br> Leave the rest at the defaults and select **OK**. |
1162
1162
1163
1163
1. Leave the rest of the settings at the defaults and select **Review + create**.
1164
1164
@@ -1202,7 +1202,7 @@ $cred = Get-Credential
1202
1202
```
1203
1203
1204
1204
> [!NOTE]
1205
-
> A username is required for the VM. The password is optional and won't be used if set. SSH key configuration is recommended for Linux VMs.
1205
+
> A username is required for the VM. The password is optional and isn't used if set. SSH key configuration is recommended for Linux VMs.
1206
1206
1207
1207
Use [New-AzVMConfig](/powershell/module/az.compute/new-azvmconfig) to define a VM.
Use [New-AzVM](/powershell/module/az.compute/new-azvm) to create the VM. The command will generate SSH keys for the virtual machine for login. Make note of the location of the private key. The private key is needed in later steps for connecting to the virtual machine with Azure Bastion.
1254
+
Use [New-AzVM](/powershell/module/az.compute/new-azvm) to create the VM. The command generates SSH keys for the virtual machine for sign-in. Make note of the location of the private key. The private key is needed in later steps for connecting to the virtual machine with Azure Bastion.
0 commit comments