Skip to content

Commit cee2d89

Browse files
authored
Merge pull request #216669 from AbdullahBell/Firewall-Freshness
Azure Firewall: freshness | deploy-cli, sql-fqdn-filtering, create-ip-group, deploy-availability-zone-powershell
2 parents 5c21d45 + 15d962b commit cee2d89

File tree

4 files changed

+37
-35
lines changed

4 files changed

+37
-35
lines changed

articles/firewall/create-ip-group.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 06/23/2020
8+
ms.date: 10/31/2022
99
ms.author: victorh
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1111
ms.devlang: azurecli
@@ -24,7 +24,7 @@ To create an IP Group by using the Azure portal:
2424
1. Select **Create**.
2525
1. Select your subscription.
2626
1. Select a resource group or create a new one.
27-
1. Enter a unique name for you IP Group, and then select a region.
27+
1. Enter a unique name for your IP Group, and then select a region.
2828
1. Select **Next: IP addresses**.
2929
1. Type an IP address, multiple IP addresses, or IP address ranges.
3030

@@ -46,8 +46,8 @@ This example creates an IP Group with an address prefix and an IP address by usi
4646
```azurepowershell
4747
$ipGroup = @{
4848
Name = 'ipGroup'
49-
ResourceGroupName = 'ipGroupRG'
50-
Location = 'West US'
49+
ResourceGroupName = 'Test-FW-RG'
50+
Location = 'East US'
5151
IpAddress = @('10.0.0.0/24', '192.168.1.10')
5252
}
5353
@@ -60,9 +60,9 @@ This example creates an IP Group with an address prefix and an IP address by usi
6060

6161
```azurecli-interactive
6262
az network ip-group create \
63-
--name ipGroup \
64-
--resource-group ipGroupRG \
65-
--location westus \
63+
--name ipGroup \
64+
--resource-group Test-FW-RG \
65+
--location eastus \
6666
--ip-addresses '10.0.0.0/24' '192.168.1.10'
6767
```
6868

articles/firewall/deploy-availability-zone-powershell.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 11/19/2019
8+
ms.date: 10/31/2022
99
ms.author: victorh
1010
ms.custom: devx-track-azurepowershell
1111
---
@@ -32,23 +32,24 @@ When the standard public IP address is created, no specific zone is specified. T
3232
It's important to know, because you can't have a firewall in zone 1 and an IP address in zone 2. But you can have a firewall in zone 1 and IP address in all zones, or a firewall and an IP address in the same single zone for proximity purposes.
3333

3434
```azurepowershell
35-
$rgName = "resourceGroupName"
35+
$rgName = "Test-FW-RG"
3636
3737
$vnet = Get-AzVirtualNetwork `
38-
-Name "vnet" `
38+
-Name "Test-FW-VN" `
3939
-ResourceGroupName $rgName
4040
4141
$pip1 = New-AzPublicIpAddress `
4242
-Name "AzFwPublicIp1" `
43-
-ResourceGroupName "rg" `
43+
-ResourceGroupName "Test-FW-RG" `
4444
-Sku "Standard" `
45-
-Location "centralus" `
46-
-AllocationMethod Static
45+
-Location "eastus" `
46+
-AllocationMethod Static `
47+
-Zone 1,2,3
4748
4849
New-AzFirewall `
4950
-Name "azFw" `
5051
-ResourceGroupName $rgName `
51-
-Location centralus `
52+
-Location "eastus" `
5253
-VirtualNetwork $vnet `
5354
-PublicIpAddress @($pip1) `
5455
-Zone 1,2,3

articles/firewall/deploy-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: In this article, you learn how to deploy and configure Azure Firewa
44
services: firewall
55
author: vhorne
66
ms.service: firewall
7-
ms.date: 08/29/2019
7+
ms.date: 10/31/2022
88
ms.author: victorh
99
ms.topic: how-to
1010
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -27,7 +27,7 @@ For this article, you create a simplified single VNet with three subnets for eas
2727
* **Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
2828
* **Jump-SN** - The "jump" server is in this subnet. The jump server has a public IP address that you can connect to using Remote Desktop. From there, you can then connect to (using another Remote Desktop) the workload server.
2929

30-
![Tutorial network infrastructure](media/tutorial-firewall-rules-portal/Tutorial_network.png)
30+
:::image type="content" source="media/tutorial-firewall-rules-portal/Tutorial_network.png" alt-text="Diagram of network infrastructure." lightbox="media/tutorial-firewall-rules-portal/Tutorial_network.png":::
3131

3232
In this article, you learn how to:
3333

articles/firewall/sql-fqdn-filtering.md

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 06/18/2020
8+
ms.date: 10/31/2022
99
ms.author: victorh
1010
---
1111

@@ -25,40 +25,40 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
2525
## Configure using Azure CLI
2626

2727
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
28-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
28+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
2929

3030
> [!NOTE]
3131
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
3232
33-
3. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
33+
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
3434

3535
```azurecli
3636
az extension add -n azure-firewall
3737
3838
az network firewall application-rule create \
39-
-g FWRG \
40-
--f azfirewall \
41-
--c sqlRuleCollection \
42-
--priority 1000 \
43-
--action Allow \
44-
--name sqlRule \
45-
--protocols mssql=1433 \
46-
--source-addresses 10.0.0.0/24 \
47-
--target-fqdns sql-serv1.database.windows.net
39+
--resource-group Test-FW-RG \
40+
--firewall-name Test-FW01 \
41+
--collection-name sqlRuleCollection \
42+
--priority 1000 \
43+
--action Allow \
44+
--name sqlRule \
45+
--protocols mssql=1433 \
46+
--source-addresses 10.0.0.0/24 \
47+
--target-fqdns sql-serv1.database.windows.net
4848
```
4949

5050
## Configure using Azure PowerShell
5151

5252
1. Deploy an [Azure Firewall using Azure PowerShell](deploy-ps.md).
53-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
53+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
5454

5555
> [!NOTE]
5656
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
5757
58-
3. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
58+
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
5959

6060
```azurepowershell
61-
$AzFw = Get-AzFirewall -Name "azfirewall" -ResourceGroupName "FWRG"
61+
$AzFw = Get-AzFirewall -Name "Test-FW01" -ResourceGroupName "Test-FW-RG"
6262
6363
$sqlRule = @{
6464
Name = "sqlRule"
@@ -84,14 +84,15 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
8484

8585
## Configure using the Azure portal
8686
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
87-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
87+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
8888

8989
> [!NOTE]
9090
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
91-
3. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
91+
92+
1. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
9293
![application rule with SQL FQDN](media/sql-fqdn-filtering/application-rule-sql.png)
93-
4. Access SQL from a virtual machine in a VNet that filters the traffic through the firewall.
94-
5. Validate that [Azure Firewall logs](./firewall-workbook.md) show the traffic is allowed.
94+
1. Access SQL from a virtual machine in a VNet that filters the traffic through the firewall.
95+
1. Validate that [Azure Firewall logs](./firewall-workbook.md) show the traffic is allowed.
9596

9697
## Next steps
9798

0 commit comments

Comments
 (0)