Skip to content

Commit d739148

Browse files
committed
freshness changes to peering, etc.
1 parent bd521b8 commit d739148

File tree

2 files changed

+32
-29
lines changed

2 files changed

+32
-29
lines changed
133 KB
Loading

articles/firewall-manager/secure-hybrid-network.md

Lines changed: 32 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: tutorial
8-
ms.date: 09/26/2023
8+
ms.date: 07/24/2024
99
ms.author: victorh
1010
---
1111

@@ -66,7 +66,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
6868
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
69-
3. On the Azure Firewall Manager page, under **Security**, select **Azure firewall policies**.
69+
3. On the Azure Firewall Manager page, under **Security**, select **Azure Firewall Policies**.
7070

7171
:::image type="content" source="media/secure-hybrid-network/firewall-manager-policy.png" alt-text="Screenshot showing Firewall Manager main page."lightbox="media/secure-hybrid-network/firewall-manager-policy.png":::
7272

@@ -118,13 +118,13 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
118118

119119
1. For **IPv4 address space**, type **10.5.0.0/16**.
120120
1. Under **Subnets**, select **default**.
121-
1. For Subnet template, select **Azure Firewall**.
121+
1. For **Subnet purpose**, select **Azure Firewall**.
122122
1. For **Starting address**, type **10.5.0.0/26**.
123123
1. Accept the other default settings, and then select **Save**.
124124
1. Select **Review + create**.
125125
1. Select **Create**.
126126

127-
Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27. This subnet is used for the VPN gateway.
127+
Add another subnet with a subnet purpose set to **Virtual Network Gateway** with an starting address of **10.5.1.0/27**. This subnet is used for the VPN gateway.
128128

129129
## Create the spoke virtual network
130130

@@ -165,7 +165,7 @@ Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27.
165165
1. For **Starting address**, type **192.168.1.0/24**.
166166
1. Accept the other default settings, and then select **Save**.
167167
2. Select **Add a subnet**.
168-
1. For **Subnet template**, select **Virtual Network Gateway**.
168+
1. For **Subnet purpose**, select **Virtual Network Gateway**.
169169
1. For **Starting address** type **192.168.2.0/27**.
170170
1. Select **Add**.
171171
1. Select **Review + create**.
@@ -192,7 +192,7 @@ Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure
192192

193193
This takes a few minutes to deploy.
194194
7. After deployment completes, go to the **FW-Hybrid-Test** resource group, and select the firewall.
195-
9. Note the **Firewall private IP** address on the **Overview** page. You use it later when you create the default route.
195+
9. Note the firewall **Private IP** address on the **Overview** page. You use it later when you create the default route.
196196

197197
## Create and connect the VPN gateways
198198

@@ -208,7 +208,6 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
208208
4. For **Name**, type **GW-hub**.
209209
5. For **Region**, select **(US) East US**.
210210
6. For **Gateway type**, select **VPN**.
211-
7. For **VPN type**, select **Route-based**.
212211
8. For **SKU**, select **VpnGw2**.
213212
1. For **Generation**, select **Generation2**.
214213
1. For **Virtual network**, select **VNet-hub**.
@@ -227,7 +226,6 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
227226
4. For **Name**, type **GW-Onprem**.
228227
5. For **Region**, select **(US) East US**.
229228
6. For **Gateway type**, select **VPN**.
230-
7. For **VPN type**, select **Route-based**.
231229
8. For **SKU**, select **VpnGw2**.
232230
1. For **Generation**, select **Generation2**.
233231
1. For **Virtual network**, select **VNet-Onprem**.
@@ -243,7 +241,7 @@ Now you can create the VPN connections between the hub and on-premises gateways.
243241
In this step, you create the connection from the hub virtual network to the on-premises virtual network. A shared key is referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
244242

245243
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
246-
2. Select **Connections** in the left column.
244+
2. In the left column, under **Settings**, select **Connections**.
247245
3. Select **Add**.
248246
4. For the connection name, type **Hub-to-Onprem**.
249247
5. Select **VNet-to-VNet** for **Connection type**.
@@ -261,16 +259,18 @@ Create the on-premises to hub virtual network connection. This step is similar t
261259
3. Select **Add**.
262260
4. For the connection name, type **Onprem-to-Hub**.
263261
5. Select **VNet-to-VNet** for **Connection type**.
264-
6. For the **Second virtual network gateway**, select **GW-hub**.
265-
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
266-
8. Select **OK**.
262+
1. Select **Next : Settings**.
263+
1. For the **First virtual network gateway**, select **GW-Onprem**.
264+
1. For the **Second virtual network gateway**, select **GW-hub**.
265+
1. For **Shared key (PSK)**, type **AzureA1b2C3**.
266+
1. Select **OK**.
267267

268268

269269
#### Verify the connection
270270

271-
After about five minutes or so, the status of both connections should be **Connected**.
271+
After about five minutes or so after the second network connection is deployed, the status of both connections should be **Connected**.
272272

273-
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
273+
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" lightbox="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
274274

275275
## Peer the hub and spoke virtual networks
276276

@@ -279,31 +279,34 @@ Now peer the hub and spoke virtual networks.
279279
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-hub** virtual network.
280280
2. In the left column, select **Peerings**.
281281
3. Select **Add**.
282-
4. Under **This virtual network**:
283-
282+
1. Under **Remote virtual network summary**:
284283

285284
|Setting name |Value |
286285
|---------|---------|
287-
|Peering link name| HubtoSpoke|
288-
|Allow traffic to remote virtual network| selected |
289-
|Allow traffic forwarded from the remote virtual network (allow gateway transit) | selected |
290-
|Use remote Virtual network gateway or route server | not selected |
286+
|Peering link name | SpoketoHub|
287+
|Virtual network deployment model| Resource Manager|
288+
|Subscription|\<your subscription\>|
289+
|Virtual network| VNet-Spoke|
290+
|Allow 'VNet-Spoke' to access 'VNet-hub'|selected|
291+
|Allow 'VNet-Spoke' to receive forwarded traffic from 'VNet-Hub'|selected|
292+
|Allow gateway or route server in 'VNet-Spoke' to forward traffic to 'VNet-Hub'| not selected|
293+
|Enable 'VNet-Spoke' to use 'VNet-hub's' remote gateway or route server|selected|
294+
295+
1. Under **Local virtual network summary**:
291296

292-
5. Under **Remote virtual network**:
293297

294298
|Setting name |Value |
295299
|---------|---------|
296-
|Peering link name | SpoketoHub|
297-
|Virtual network deployment model| Resource Manager|
298-
|Subscription|\<your subscription\>|
299-
|Virtual network| VNet-Spoke
300-
|Allow traffic to current virtual network | selected |
301-
|Allow traffic forwarded from current virtual network (allow gateway transit) | selected |
302-
|Use current virtual network gateway or route server | selected |
300+
|Peering link name| HubtoSpoke|
301+
|Allow 'VNet-hub' to access 'VNet-Spoke'|selected|
302+
|Allow 'VNet-hub' to receive forwarded traffic from 'VNet-Spoke'|selected|
303+
|Allow gateway or route server in 'VNet-Hub' to forward traffic to 'VNet-Spoke'|selected|
304+
|Enable 'VNet-hub' to use 'VNet-Spoke's' remote gateway or route server| not selected|
305+
303306

304307
5. Select **Add**.
305308

306-
:::image type="content" source="media/secure-hybrid-network/firewall-peering.png" alt-text="Screenshot showing Vnet peering.":::
309+
:::image type="content" source="media/secure-hybrid-network/firewall-peering.png" lightbox="media/secure-hybrid-network/firewall-peering.png" alt-text="Screenshot showing Vnet peering.":::
307310

308311
## Create the routes
309312

0 commit comments

Comments
 (0)