You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-hybrid-network.md
+34-36Lines changed: 34 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall-manager
5
5
author: vhorne
6
6
ms.service: firewall-manager
7
7
ms.topic: tutorial
8
-
ms.date: 09/26/2023
8
+
ms.date: 07/24/2024
9
9
ms.author: victorh
10
10
---
11
11
@@ -23,7 +23,7 @@ For this tutorial, you create three virtual networks:
23
23
-**VNet-Spoke** - the spoke virtual network represents the workload located on Azure.
24
24
-**VNet-Onprem** - The on-premises virtual network represents an on-premises network. In an actual deployment, it can be connected using either a VPN or ExpressRoute connection. For simplicity, this tutorial uses a VPN gateway connection, and an Azure-located virtual network is used to represent an on-premises network.
25
25
26
-
:::image type="content" source="media/tutorial-hybrid-portal/hybrid-network-firewall.png" alt-text="Diagram of a Azure Firewall Manager hub hybrid network." lightbox="media/tutorial-hybrid-portal/hybrid-network-firewall.png":::
26
+
:::image type="content" source="media/tutorial-hybrid-portal/hybrid-network-firewall.png" alt-text="Diagram of an Azure Firewall Manager hub hybrid network." lightbox="media/tutorial-hybrid-portal/hybrid-network-firewall.png":::
27
27
28
28
In this tutorial, you learn how to:
29
29
@@ -42,11 +42,6 @@ In this tutorial, you learn how to:
42
42
43
43
A hybrid network uses the hub-and-spoke architecture model to route traffic between Azure VNets and on-premises networks. The hub-and-spoke architecture has the following requirements:
44
44
45
-
- Set **AllowGatewayTransit** when peering VNet-Hub to VNet-Spoke. In a hub-and-spoke network architecture, a gateway transit allows the spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network.
46
-
47
-
Additionally, routes to the gateway-connected virtual networks or on-premises networks are automatically propagated to the routing tables for the peered virtual networks using the gateway transit. For more information, see [Configure VPN gateway transit for virtual network peering](../vpn-gateway/vpn-gateway-peering-gateway-transit.md).
48
-
49
-
- Set **UseRemoteGateways** when you peer VNet-Spoke to VNet-Hub. If **UseRemoteGateways** is set and **AllowGatewayTransit** on remote peering is also set, the spoke virtual network uses gateways of the remote virtual network for transit.
50
45
- To route the spoke subnet traffic through the hub firewall, you need a User Defined route (UDR) that points to the firewall with the **Virtual network gateway route propagation** setting disabled. This option prevents route distribution to the spoke subnets. This prevents learned routes from conflicting with your UDR.
51
46
- Configure a UDR on the hub gateway subnet that points to the firewall IP address as the next hop to the spoke networks. No UDR is required on the Azure Firewall subnet, as it learns routes from BGP.
52
47
@@ -66,7 +61,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
66
61
67
62
1. Sign in to the [Azure portal](https://portal.azure.com).
68
63
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
69
-
3. On the Azure Firewall Manager page, under **Security**, select **Azure firewall policies**.
64
+
3. On the Azure Firewall Manager page, under **Security**, select **Azure Firewall Policies**.
70
65
71
66
:::image type="content" source="media/secure-hybrid-network/firewall-manager-policy.png" alt-text="Screenshot showing Firewall Manager main page."lightbox="media/secure-hybrid-network/firewall-manager-policy.png":::
72
67
@@ -118,13 +113,13 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
118
113
119
114
1. For **IPv4 address space**, type **10.5.0.0/16**.
120
115
1. Under **Subnets**, select **default**.
121
-
1. For Subnet template, select **Azure Firewall**.
116
+
1. For **Subnet purpose**, select **Azure Firewall**.
122
117
1. For **Starting address**, type **10.5.0.0/26**.
123
118
1. Accept the other default settings, and then select **Save**.
124
119
1. Select **Review + create**.
125
120
1. Select **Create**.
126
121
127
-
Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27. This subnet is used for the VPN gateway.
122
+
Add another subnet with a subnet purpose set to **Virtual Network Gateway** with a starting address of **10.5.1.0/27**. This subnet is used for the VPN gateway.
128
123
129
124
## Create the spoke virtual network
130
125
@@ -165,7 +160,7 @@ Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27.
165
160
1. For **Starting address**, type **192.168.1.0/24**.
166
161
1. Accept the other default settings, and then select **Save**.
167
162
2. Select **Add a subnet**.
168
-
1. For **Subnet template**, select **Virtual Network Gateway**.
163
+
1. For **Subnet purpose**, select **Virtual Network Gateway**.
169
164
1. For **Starting address** type **192.168.2.0/27**.
170
165
1. Select **Add**.
171
166
1. Select **Review + create**.
@@ -192,7 +187,7 @@ Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure
192
187
193
188
This takes a few minutes to deploy.
194
189
7. After deployment completes, go to the **FW-Hybrid-Test** resource group, and select the firewall.
195
-
9. Note the **Firewall private IP** address on the **Overview** page. You use it later when you create the default route.
190
+
9. Note the firewall **Private IP** address on the **Overview** page. You use it later when you create the default route.
196
191
197
192
## Create and connect the VPN gateways
198
193
@@ -208,7 +203,6 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
208
203
4. For **Name**, type **GW-hub**.
209
204
5. For **Region**, select **(US) East US**.
210
205
6. For **Gateway type**, select **VPN**.
211
-
7. For **VPN type**, select **Route-based**.
212
206
8. For **SKU**, select **VpnGw2**.
213
207
1. For **Generation**, select **Generation2**.
214
208
1. For **Virtual network**, select **VNet-hub**.
@@ -227,7 +221,6 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
227
221
4. For **Name**, type **GW-Onprem**.
228
222
5. For **Region**, select **(US) East US**.
229
223
6. For **Gateway type**, select **VPN**.
230
-
7. For **VPN type**, select **Route-based**.
231
224
8. For **SKU**, select **VpnGw2**.
232
225
1. For **Generation**, select **Generation2**.
233
226
1. For **Virtual network**, select **VNet-Onprem**.
@@ -243,7 +236,7 @@ Now you can create the VPN connections between the hub and on-premises gateways.
243
236
In this step, you create the connection from the hub virtual network to the on-premises virtual network. A shared key is referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
244
237
245
238
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
246
-
2.Select **Connections** in the left column.
239
+
2.In the left column, under **Settings**, select **Connections**.
247
240
3. Select **Add**.
248
241
4. For the connection name, type **Hub-to-Onprem**.
249
242
5. Select **VNet-to-VNet** for **Connection type**.
@@ -261,16 +254,18 @@ Create the on-premises to hub virtual network connection. This step is similar t
261
254
3. Select **Add**.
262
255
4. For the connection name, type **Onprem-to-Hub**.
263
256
5. Select **VNet-to-VNet** for **Connection type**.
264
-
6. For the **Second virtual network gateway**, select **GW-hub**.
265
-
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
266
-
8. Select **OK**.
257
+
1. Select **Next : Settings**.
258
+
1. For the **First virtual network gateway**, select **GW-Onprem**.
259
+
1. For the **Second virtual network gateway**, select **GW-hub**.
260
+
1. For **Shared key (PSK)**, type **AzureA1b2C3**.
261
+
1. Select **OK**.
267
262
268
263
269
264
#### Verify the connection
270
265
271
-
After about five minutes or so, the status of both connections should be **Connected**.
266
+
After about five minutes or so after the second network connection is deployed, the status of both connections should be **Connected**.
272
267
273
-
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
268
+
:::image type="content" source="media/secure-hybrid-network/gateway-connections.png" lightbox="media/secure-hybrid-network/gateway-connections.png" alt-text="Screenshot showing the vpn gateway connections.":::
274
269
275
270
## Peer the hub and spoke virtual networks
276
271
@@ -279,31 +274,34 @@ Now peer the hub and spoke virtual networks.
279
274
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-hub** virtual network.
280
275
2. In the left column, select **Peerings**.
281
276
3. Select **Add**.
282
-
4. Under **This virtual network**:
283
-
277
+
1. Under **Remote virtual network summary**:
284
278
285
279
|Setting name |Value |
286
280
|---------|---------|
287
-
|Peering link name| HubtoSpoke|
288
-
|Allow traffic to remote virtual network| selected |
289
-
|Allow traffic forwarded from the remote virtual network (allow gateway transit) | selected |
290
-
|Use remote Virtual network gateway or route server | not selected |
0 commit comments