Skip to content

Commit dfd2287

Browse files
authored
Merge pull request #281723 from vhorne/fwm-secure-hub-vnet
freshness changes to peering, etc.
2 parents f617cdd + a9876f3 commit dfd2287

File tree

2 files changed

+34
-36
lines changed

2 files changed

+34
-36
lines changed
133 KB
Loading

articles/firewall-manager/secure-hybrid-network.md

Lines changed: 34 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: tutorial
8-
ms.date: 09/26/2023
8+
ms.date: 07/24/2024
99
ms.author: victorh
1010
---
1111

@@ -23,7 +23,7 @@ For this tutorial, you create three virtual networks:
2323
- **VNet-Spoke** - the spoke virtual network represents the workload located on Azure.
2424
- **VNet-Onprem** - The on-premises virtual network represents an on-premises network. In an actual deployment, it can be connected using either a VPN or ExpressRoute connection. For simplicity, this tutorial uses a VPN gateway connection, and an Azure-located virtual network is used to represent an on-premises network.
2525

26-
:::image type="content" source="media/tutorial-hybrid-portal/hybrid-network-firewall.png" alt-text="Diagram of a Azure Firewall Manager hub hybrid network." lightbox="media/tutorial-hybrid-portal/hybrid-network-firewall.png":::
26+
:::image type="content" source="media/tutorial-hybrid-portal/hybrid-network-firewall.png" alt-text="Diagram of an Azure Firewall Manager hub hybrid network." lightbox="media/tutorial-hybrid-portal/hybrid-network-firewall.png":::
2727

2828
In this tutorial, you learn how to:
2929

@@ -42,11 +42,6 @@ In this tutorial, you learn how to:
4242

4343
A hybrid network uses the hub-and-spoke architecture model to route traffic between Azure VNets and on-premises networks. The hub-and-spoke architecture has the following requirements:
4444

45-
- Set **AllowGatewayTransit** when peering VNet-Hub to VNet-Spoke. In a hub-and-spoke network architecture, a gateway transit allows the spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network.
46-
47-
Additionally, routes to the gateway-connected virtual networks or on-premises networks are automatically propagated to the routing tables for the peered virtual networks using the gateway transit. For more information, see [Configure VPN gateway transit for virtual network peering](../vpn-gateway/vpn-gateway-peering-gateway-transit.md).
48-
49-
- Set **UseRemoteGateways** when you peer VNet-Spoke to VNet-Hub. If **UseRemoteGateways** is set and **AllowGatewayTransit** on remote peering is also set, the spoke virtual network uses gateways of the remote virtual network for transit.
5045
- To route the spoke subnet traffic through the hub firewall, you need a User Defined route (UDR) that points to the firewall with the **Virtual network gateway route propagation** setting disabled. This option prevents route distribution to the spoke subnets. This prevents learned routes from conflicting with your UDR.
5146
- Configure a UDR on the hub gateway subnet that points to the firewall IP address as the next hop to the spoke networks. No UDR is required on the Azure Firewall subnet, as it learns routes from BGP.
5247

@@ -66,7 +61,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
6661

6762
1. Sign in to the [Azure portal](https://portal.azure.com).
6863
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
69-
3. On the Azure Firewall Manager page, under **Security**, select **Azure firewall policies**.
64+
3. On the Azure Firewall Manager page, under **Security**, select **Azure Firewall Policies**.
7065

7166
:::image type="content" source="media/secure-hybrid-network/firewall-manager-policy.png" alt-text="Screenshot showing Firewall Manager main page."lightbox="media/secure-hybrid-network/firewall-manager-policy.png":::
7267

@@ -118,13 +113,13 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
118113

119114
1. For **IPv4 address space**, type **10.5.0.0/16**.
120115
1. Under **Subnets**, select **default**.
121-
1. For Subnet template, select **Azure Firewall**.
116+
1. For **Subnet purpose**, select **Azure Firewall**.
122117
1. For **Starting address**, type **10.5.0.0/26**.
123118
1. Accept the other default settings, and then select **Save**.
124119
1. Select **Review + create**.
125120
1. Select **Create**.
126121

127-
Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27. This subnet is used for the VPN gateway.
122+
Add another subnet with a subnet purpose set to **Virtual Network Gateway** with a starting address of **10.5.1.0/27**. This subnet is used for the VPN gateway.
128123

129124
## Create the spoke virtual network
130125

@@ -165,7 +160,7 @@ Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27.
165160
1. For **Starting address**, type **192.168.1.0/24**.
166161
1. Accept the other default settings, and then select **Save**.
167162
2. Select **Add a subnet**.
168-
1. For **Subnet template**, select **Virtual Network Gateway**.
163+
1. For **Subnet purpose**, select **Virtual Network Gateway**.
169164
1. For **Starting address** type **192.168.2.0/27**.
170165
1. Select **Add**.
171166
1. Select **Review + create**.
@@ -192,7 +187,7 @@ Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure
192187

193188
This takes a few minutes to deploy.
194189
7. After deployment completes, go to the **FW-Hybrid-Test** resource group, and select the firewall.
195-
9. Note the **Firewall private IP** address on the **Overview** page. You use it later when you create the default route.
190+
9. Note the firewall **Private IP** address on the **Overview** page. You use it later when you create the default route.
196191

197192
## Create and connect the VPN gateways
198193

@@ -208,7 +203,6 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
208203
4. For **Name**, type **GW-hub**.
209204
5. For **Region**, select **(US) East US**.
210205
6. For **Gateway type**, select **VPN**.
211-
7. For **VPN type**, select **Route-based**.
212206
8. For **SKU**, select **VpnGw2**.
213207
1. For **Generation**, select **Generation2**.
214208
1. For **Virtual network**, select **VNet-hub**.
@@ -227,7 +221,6 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
227221
4. For **Name**, type **GW-Onprem**.
228222
5. For **Region**, select **(US) East US**.
229223
6. For **Gateway type**, select **VPN**.
230-
7. For **VPN type**, select **Route-based**.
231224
8. For **SKU**, select **VpnGw2**.
232225
1. For **Generation**, select **Generation2**.
233226
1. For **Virtual network**, select **VNet-Onprem**.
@@ -243,7 +236,7 @@ Now you can create the VPN connections between the hub and on-premises gateways.
243236
In this step, you create the connection from the hub virtual network to the on-premises virtual network. A shared key is referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
244237

245238
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
246-
2. Select **Connections** in the left column.
239+
2. In the left column, under **Settings**, select **Connections**.
247240
3. Select **Add**.
248241
4. For the connection name, type **Hub-to-Onprem**.
249242
5. Select **VNet-to-VNet** for **Connection type**.
@@ -261,16 +254,18 @@ Create the on-premises to hub virtual network connection. This step is similar t
261254
3. Select **Add**.
262255
4. For the connection name, type **Onprem-to-Hub**.
263256
5. Select **VNet-to-VNet** for **Connection type**.
264-
6. For the **Second virtual network gateway**, select **GW-hub**.
265-
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
266-
8. Select **OK**.
257+
1. Select **Next : Settings**.
258+
1. For the **First virtual network gateway**, select **GW-Onprem**.
259+
1. For the **Second virtual network gateway**, select **GW-hub**.
260+
1. For **Shared key (PSK)**, type **AzureA1b2C3**.
261+
1. Select **OK**.
267262

268263

269264
#### Verify the connection
270265

271-
After about five minutes or so, the status of both connections should be **Connected**.
266+
After about five minutes or so after the second network connection is deployed, the status of both connections should be **Connected**.
272267

273-
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
268+
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" lightbox="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
274269

275270
## Peer the hub and spoke virtual networks
276271

@@ -279,31 +274,34 @@ Now peer the hub and spoke virtual networks.
279274
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-hub** virtual network.
280275
2. In the left column, select **Peerings**.
281276
3. Select **Add**.
282-
4. Under **This virtual network**:
283-
277+
1. Under **Remote virtual network summary**:
284278

285279
|Setting name |Value |
286280
|---------|---------|
287-
|Peering link name| HubtoSpoke|
288-
|Allow traffic to remote virtual network| selected |
289-
|Allow traffic forwarded from the remote virtual network (allow gateway transit) | selected |
290-
|Use remote Virtual network gateway or route server | not selected |
281+
|Peering link name | SpoketoHub|
282+
|Virtual network deployment model| Resource Manager|
283+
|Subscription|\<your subscription\>|
284+
|Virtual network| VNet-Spoke|
285+
|Allow 'VNet-Spoke' to access 'VNet-hub'|selected|
286+
|Allow 'VNet-Spoke' to receive forwarded traffic from 'VNet-Hub'|selected|
287+
|Allow gateway or route server in 'VNet-Spoke' to forward traffic to 'VNet-Hub'| not selected|
288+
|Enable 'VNet-Spoke' to use 'VNet-hub's' remote gateway or route server|selected|
289+
290+
1. Under **Local virtual network summary**:
291291

292-
5. Under **Remote virtual network**:
293292

294293
|Setting name |Value |
295294
|---------|---------|
296-
|Peering link name | SpoketoHub|
297-
|Virtual network deployment model| Resource Manager|
298-
|Subscription|\<your subscription\>|
299-
|Virtual network| VNet-Spoke
300-
|Allow traffic to current virtual network | selected |
301-
|Allow traffic forwarded from current virtual network (allow gateway transit) | selected |
302-
|Use current virtual network gateway or route server | selected |
295+
|Peering link name| HubtoSpoke|
296+
|Allow 'VNet-hub' to access 'VNet-Spoke'|selected|
297+
|Allow 'VNet-hub' to receive forwarded traffic from 'VNet-Spoke'|selected|
298+
|Allow gateway or route server in 'VNet-Hub' to forward traffic to 'VNet-Spoke'|selected|
299+
|Enable 'VNet-hub' to use 'VNet-Spoke's' remote gateway or route server| not selected|
300+
303301

304302
5. Select **Add**.
305303

306-
:::image type="content" source="media/secure-hybrid-network/firewall-peering.png" alt-text="Screenshot showing Vnet peering.":::
304+
:::image type="content" source="media/secure-hybrid-network/firewall-peering.png" lightbox="media/secure-hybrid-network/firewall-peering.png" alt-text="Screenshot showing Vnet peering.":::
307305

308306
## Create the routes
309307

@@ -452,7 +450,7 @@ This is a virtual machine that you use to connect using Remote Desktop to the pu
452450

453451
Your connection should succeed, and you should be able to sign in.
454452

455-
So now you've verified that the firewall rules are working:
453+
So now you verified that the firewall rules are working:
456454

457455
<!---- You can ping the server on the spoke VNet.--->
458456
- You can browse web server on the spoke virtual network.

0 commit comments

Comments
 (0)