You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-hybrid-network.md
+32-29Lines changed: 32 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall-manager
5
5
author: vhorne
6
6
ms.service: firewall-manager
7
7
ms.topic: tutorial
8
-
ms.date: 09/26/2023
8
+
ms.date: 07/24/2024
9
9
ms.author: victorh
10
10
---
11
11
@@ -66,7 +66,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
66
66
67
67
1. Sign in to the [Azure portal](https://portal.azure.com).
68
68
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
69
-
3. On the Azure Firewall Manager page, under **Security**, select **Azure firewall policies**.
69
+
3. On the Azure Firewall Manager page, under **Security**, select **Azure Firewall Policies**.
70
70
71
71
:::image type="content" source="media/secure-hybrid-network/firewall-manager-policy.png" alt-text="Screenshot showing Firewall Manager main page."lightbox="media/secure-hybrid-network/firewall-manager-policy.png":::
72
72
@@ -118,13 +118,13 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
118
118
119
119
1. For **IPv4 address space**, type **10.5.0.0/16**.
120
120
1. Under **Subnets**, select **default**.
121
-
1. For Subnet template, select **Azure Firewall**.
121
+
1. For **Subnet purpose**, select **Azure Firewall**.
122
122
1. For **Starting address**, type **10.5.0.0/26**.
123
123
1. Accept the other default settings, and then select **Save**.
124
124
1. Select **Review + create**.
125
125
1. Select **Create**.
126
126
127
-
Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27. This subnet is used for the VPN gateway.
127
+
Add another subnet with a subnet purpose set to **Virtual Network Gateway** with an starting address of **10.5.1.0/27**. This subnet is used for the VPN gateway.
128
128
129
129
## Create the spoke virtual network
130
130
@@ -165,7 +165,7 @@ Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27.
165
165
1. For **Starting address**, type **192.168.1.0/24**.
166
166
1. Accept the other default settings, and then select **Save**.
167
167
2. Select **Add a subnet**.
168
-
1. For **Subnet template**, select **Virtual Network Gateway**.
168
+
1. For **Subnet purpose**, select **Virtual Network Gateway**.
169
169
1. For **Starting address** type **192.168.2.0/27**.
170
170
1. Select **Add**.
171
171
1. Select **Review + create**.
@@ -192,7 +192,7 @@ Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure
192
192
193
193
This takes a few minutes to deploy.
194
194
7. After deployment completes, go to the **FW-Hybrid-Test** resource group, and select the firewall.
195
-
9. Note the **Firewall private IP** address on the **Overview** page. You use it later when you create the default route.
195
+
9. Note the firewall **Private IP** address on the **Overview** page. You use it later when you create the default route.
196
196
197
197
## Create and connect the VPN gateways
198
198
@@ -208,7 +208,6 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
208
208
4. For **Name**, type **GW-hub**.
209
209
5. For **Region**, select **(US) East US**.
210
210
6. For **Gateway type**, select **VPN**.
211
-
7. For **VPN type**, select **Route-based**.
212
211
8. For **SKU**, select **VpnGw2**.
213
212
1. For **Generation**, select **Generation2**.
214
213
1. For **Virtual network**, select **VNet-hub**.
@@ -227,7 +226,6 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
227
226
4. For **Name**, type **GW-Onprem**.
228
227
5. For **Region**, select **(US) East US**.
229
228
6. For **Gateway type**, select **VPN**.
230
-
7. For **VPN type**, select **Route-based**.
231
229
8. For **SKU**, select **VpnGw2**.
232
230
1. For **Generation**, select **Generation2**.
233
231
1. For **Virtual network**, select **VNet-Onprem**.
@@ -243,7 +241,7 @@ Now you can create the VPN connections between the hub and on-premises gateways.
243
241
In this step, you create the connection from the hub virtual network to the on-premises virtual network. A shared key is referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
244
242
245
243
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
246
-
2.Select **Connections** in the left column.
244
+
2.In the left column, under **Settings**, select **Connections**.
247
245
3. Select **Add**.
248
246
4. For the connection name, type **Hub-to-Onprem**.
249
247
5. Select **VNet-to-VNet** for **Connection type**.
@@ -261,16 +259,18 @@ Create the on-premises to hub virtual network connection. This step is similar t
261
259
3. Select **Add**.
262
260
4. For the connection name, type **Onprem-to-Hub**.
263
261
5. Select **VNet-to-VNet** for **Connection type**.
264
-
6. For the **Second virtual network gateway**, select **GW-hub**.
265
-
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
266
-
8. Select **OK**.
262
+
1. Select **Next : Settings**.
263
+
1. For the **First virtual network gateway**, select **GW-Onprem**.
264
+
1. For the **Second virtual network gateway**, select **GW-hub**.
265
+
1. For **Shared key (PSK)**, type **AzureA1b2C3**.
266
+
1. Select **OK**.
267
267
268
268
269
269
#### Verify the connection
270
270
271
-
After about five minutes or so, the status of both connections should be **Connected**.
271
+
After about five minutes or so after the second network connection is deployed, the status of both connections should be **Connected**.
272
272
273
-
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
273
+
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" lightbox="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
274
274
275
275
## Peer the hub and spoke virtual networks
276
276
@@ -279,31 +279,34 @@ Now peer the hub and spoke virtual networks.
279
279
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-hub** virtual network.
280
280
2. In the left column, select **Peerings**.
281
281
3. Select **Add**.
282
-
4. Under **This virtual network**:
283
-
282
+
1. Under **Remote virtual network summary**:
284
283
285
284
|Setting name |Value |
286
285
|---------|---------|
287
-
|Peering link name| HubtoSpoke|
288
-
|Allow traffic to remote virtual network| selected |
289
-
|Allow traffic forwarded from the remote virtual network (allow gateway transit) | selected |
290
-
|Use remote Virtual network gateway or route server | not selected |
0 commit comments