Skip to content

Commit d153c6d

Browse files
committed
add procedure to add a management IP
1 parent 3c6e8e4 commit d153c6d

File tree

4 files changed

+54
-0
lines changed

4 files changed

+54
-0
lines changed

articles/firewall/management-nic.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,60 @@ Use the following steps:
5151
> [!NOTE]
5252
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
5353
54+
## Convert a regular firewall to a forced tunnel mode firewall
55+
56+
The following procedure shows you how to convert a regular firewall to a forced tunnel mode firewall with a Management subnet. This is done without deleting the original firewall. To avoid deleting it, you can use the following procedure to stop it, and then realloacate it with a Management IP address and subnet.
57+
58+
1. Create the new `AzureFirewallManagementSubnet` subnet
59+
60+
1. Use the Azure portal to create the new subnet.
61+
:::image type="content" source="media/management-nic/firewall-management-subnet.png" alt-text="Screenshot showing add a subnet.":::
62+
1. Use the appropriate IP address range for the virtual network.
63+
1. Create the new management public IP address
64+
1. Create it with the same properties as the existing firewalll public IP address: SKU, Tier, and Location.
65+
:::image type="content" source="media/management-nic/firewall-management-ip.png" lightbox="media/management-nic/firewall-management-ip.png" alt-text="Screenshot showing the public IP address creation.":::
66+
67+
1. Stop the firewall
68+
69+
Use the information in [Azure Firewall FAQ](firewall-faq.yml#how-can-i-stop-and-start-azure-firewall) to stop the firewall:
70+
71+
```azurepowershell
72+
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
73+
$azfw.Deallocate()
74+
Set-AzFirewall -AzureFirewall $azfw
75+
```
76+
77+
78+
1. Start the firewal with the management IP address and subnet
79+
80+
For example, start the firewall with one public IP address and a Management public IP address:
81+
82+
```azurepowershell
83+
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
84+
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
85+
$pip = Get-AzPublicIpAddress -Name "azfwpublicip" -ResourceGroupName "RG Name"
86+
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
87+
$azfw.Allocate($vnet, $pip, $mgmtPip)
88+
$azfw | Set-AzFirewall
89+
```
90+
91+
Example to start a firewall with two public IP addresses and a Management public IP address:
92+
93+
```azurepowershell
94+
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
95+
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
96+
$pip1 = Get-AzPublicIpAddress -Name "azfwpublicip" -ResourceGroupName "RG Name"
97+
$pip2 = Get-AzPublicIpAddress -Name "azfwpublicip2" -ResourceGroupName "RG Name"
98+
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
99+
$azfw.Allocate($vnet,@($pip1,$pip2), $mgmtPip)
100+
$azfw | Set-AzFirewall
101+
```
102+
103+
Now when you view the firewall in the Azure portal, you'll see the assigned Management public IP address:
104+
105+
:::image type="content" source="media/management-nic/firewall-with-management-ip.png" lightbox="media/management-nic/firewall-with-management-ip.png" alt-text="Screenshot showing the firewall with a management IP address.":::
106+
107+
54108
## Related content
55109

56110
- [Azure Firewall forced tunneling](forced-tunneling.md)
49.6 KB
Loading
19.8 KB
Loading
47.3 KB
Loading

0 commit comments

Comments
 (0)