You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: tutorial
8
-
ms.date: 10/28/2019
8
+
ms.date: 02/21/2020
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -22,7 +22,7 @@ One way you can control outbound network access from an Azure subnet is with Azu
22
22
23
23
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
24
24
25
-
For this tutorial, you create a simplified single VNet with three subnets for easy deployment. For production deployments, a [hub and spoke model](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
25
+
For this tutorial, you create a simplified single VNet with three subnets for easy deployment. For production deployments, a [hub and spoke model](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended. The firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
26
26
27
27
***AzureFirewallSubnet** - the firewall is in this subnet.
28
28
***Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
@@ -56,7 +56,7 @@ The resource group contains all the resources for the tutorial.
56
56
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Add**.
57
57
3. For **Resource group name**, enter *Test-FW-RG*.
58
58
4. For **Subscription**, select your subscription.
59
-
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
59
+
5. For **Resource group location**, select a location. All other resources that you create must be in the same location.
60
60
6. Select **Create**.
61
61
62
62
### Create a VNet
@@ -189,10 +189,11 @@ This is the application rule that allows outbound access to www.google.com.
189
189
6. For **Priority**, type **200**.
190
190
7. For **Action**, select **Allow**.
191
191
8. Under **Rules**, **Target FQDNs**, for **Name**, type **Allow-Google**.
192
-
9. For **Source Addresses**, type **10.0.2.0/24**.
193
-
10. For **Protocol:port**, type **http, https**.
194
-
11. For **Target FQDNS**, type **www.google.com**
195
-
12. Select **Add**.
192
+
9. For **Source type**, select **IP address**.
193
+
10. For **Source**, type **10.0.2.0/24**.
194
+
11. For **Protocol:port**, type **http, https**.
195
+
12. For **Target FQDNS**, type **www.google.com**
196
+
13. Select **Add**.
196
197
197
198
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see [Infrastructure FQDNs](infrastructure-fqdns.md).
198
199
@@ -205,10 +206,11 @@ This is the network rule that allows outbound access to two IP addresses at port
205
206
3. For **Name**, type **Net-Coll01**.
206
207
4. For **Priority**, type **200**.
207
208
5. For **Action**, select **Allow**.
208
-
6. Under **Rules**, for **Name**, type **Allow-DNS**.
209
+
6. Under **Rules**, **IP addresses**, for **Name**, type **Allow-DNS**.
209
210
7. For **Protocol**, select **UDP**.
210
-
8. For **Source Addresses**, type **10.0.2.0/24**.
211
-
9. For Destination address, type **209.244.0.3,209.244.0.4**
211
+
9. For **Source type**, select **IP address**.
212
+
1. For **Source**, type **10.0.2.0/24**.
213
+
2. For Destination address, type **209.244.0.3,209.244.0.4**
212
214
213
215
These are public DNS servers operated by CenturyLink.
0 commit comments