You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-hybrid-network.md
+79-61Lines changed: 79 additions & 61 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: vhorne
6
6
ms.service: firewall-manager
7
7
ms.custom: ignite-2022
8
8
ms.topic: tutorial
9
-
ms.date: 06/15/2022
9
+
ms.date: 09/26/2023
10
10
ms.author: victorh
11
11
---
12
12
@@ -22,7 +22,7 @@ For this tutorial, you create three virtual networks:
22
22
23
23
-**VNet-Hub** - the firewall is in this virtual network.
24
24
-**VNet-Spoke** - the spoke virtual network represents the workload located on Azure.
25
-
-**VNet-Onprem** - The on-premises virtual network represents an on-premises network. In an actual deployment, it can be connected by either a VPN or ExpressRoute connection. For simplicity, this tutorial uses a VPN gateway connection, and an Azure-located virtual network is used to represent an on-premises network.
25
+
-**VNet-Onprem** - The on-premises virtual network represents an on-premises network. In an actual deployment, it can be connected using either a VPN or ExpressRoute connection. For simplicity, this tutorial uses a VPN gateway connection, and an Azure-located virtual network is used to represent an on-premises network.
@@ -45,7 +45,7 @@ A hybrid network uses the hub-and-spoke architecture model to route traffic betw
45
45
46
46
- Set **AllowGatewayTransit** when peering VNet-Hub to VNet-Spoke. In a hub-and-spoke network architecture, a gateway transit allows the spoke virtual networks to share the VPN gateway in the hub, instead of deploying VPN gateways in every spoke virtual network.
47
47
48
-
Additionally, routes to the gateway-connected virtual networks or on-premises networks will automatically propagate to the routing tables for the peered virtual networks using the gateway transit. For more information, see [Configure VPN gateway transit for virtual network peering](../vpn-gateway/vpn-gateway-peering-gateway-transit.md).
48
+
Additionally, routes to the gateway-connected virtual networks or on-premises networks are automatically propagated to the routing tables for the peered virtual networks using the gateway transit. For more information, see [Configure VPN gateway transit for virtual network peering](../vpn-gateway/vpn-gateway-peering-gateway-transit.md).
49
49
50
50
- Set **UseRemoteGateways** when you peer VNet-Spoke to VNet-Hub. If **UseRemoteGateways** is set and **AllowGatewayTransit** on remote peering is also set, the spoke virtual network uses gateways of the remote virtual network for transit.
51
51
- To route the spoke subnet traffic through the hub firewall, you need a User Defined route (UDR) that points to the firewall with the **Virtual network gateway route propagation** setting disabled. This option prevents route distribution to the spoke subnets. This prevents learned routes from conflicting with your UDR.
@@ -67,9 +67,9 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
67
67
68
68
1. Sign in to the [Azure portal](https://portal.azure.com).
69
69
2. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
70
-
3. On the Azure Firewall Manager page, select**View Azure firewall policies**.
70
+
3. On the Azure Firewall Manager page, under**Security**, select **Azure firewall policies**.
:::image type="content" source="media/secure-hybrid-network/firewall-manager-policy.png" alt-text="Screenshot showing Firewall Manager main page."lightbox="media/secure-hybrid-network/firewall-manager-policy.png":::
73
73
74
74
1. Select **Create Azure Firewall Policy**.
75
75
1. Select your subscription, and for Resource group, select **Create new** and create a resource group named **FW-Hybrid-Test**.
@@ -114,16 +114,19 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
114
114
1. For **Resource group**, select **FW-Hybrid-Test**.
115
115
1. For **Name**, type **VNet-hub**.
116
116
1. For **Region**, select **East US**.
117
-
1. Select **Next : IP Addresses**.
117
+
1. Select **Next**.
118
+
1. On the **Security**, select **Next**.
118
119
119
120
1. For **IPv4 address space**, type **10.5.0.0/16**.
120
-
1. Under **Subnet name**, select **default**.
121
-
1. Change the **Subnet name** to**AzureFirewallSubnet**. The firewall is in this subnet, and the subnet name **must** be AzureFirewallSubnet.
122
-
1. For **Subnet address range**, type **10.5.0.0/26**.
121
+
1. Under **Subnets**, select **default**.
122
+
1.For Subnet template, select**Azure Firewall**.
123
+
1. For **Starting address**, type **10.5.0.0/26**.
123
124
1. Accept the other default settings, and then select **Save**.
124
125
1. Select **Review + create**.
125
126
1. Select **Create**.
126
127
128
+
Add another subnet named **GatewaySubnet** with an address space of 10.5.1.0/27. This subnet is used for the VPN gateway.
129
+
127
130
## Create the spoke virtual network
128
131
129
132
1. From the Azure portal home page, select **Create a resource**.
@@ -133,12 +136,13 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
133
136
1. For **Resource group**, select **FW-Hybrid-Test**.
134
137
1. For **Name**, type **VNet-Spoke**.
135
138
1. For **Region**, select **East US**.
139
+
1. Select **Next**.
140
+
1. On the **Security** page, select **Next**.
136
141
1. Select **Next : IP Addresses**.
137
-
138
142
1. For **IPv4 address space**, type **10.6.0.0/16**.
139
-
1. Under **Subnet name**, select **default**.
140
-
1. Change the **Subnet name** to **SN-Workload**.
141
-
1. For **Subnet address range**, type **10.6.0.0/24**.
143
+
1. Under **Subnets**, select **default**.
144
+
1. Change the **Name** to **SN-Workload**.
145
+
1. For **Starting address**, type **10.6.0.0/24**.
142
146
1. Accept the other default settings, and then select **Save**.
143
147
1. Select **Review + create**.
144
148
1. Select **Create**.
@@ -151,19 +155,20 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
151
155
1. Select **Create**.
152
156
1. For **Subscription**, select your subscription.
153
157
1. For **Resource group**, select **FW-Hybrid-Test**.
154
-
1. For **Name**, type **VNet-OnPrem**.
158
+
1. For **Virtual network name**, type **VNet-OnPrem**.
155
159
1. For **Region**, select **East US**.
156
-
1. Select **Next : IP Addresses**.
160
+
1. Select **Next**.
161
+
1. On the **Security** page, select **Next**.
157
162
158
163
1. For **IPv4 address space**, type **192.168.0.0/16**.
159
-
1. Under **Subnet name**, select **default**.
160
-
1. Change the **Subnet name** to **SN-Corp**.
161
-
1. For **Subnet address range**, type **192.168.1.0/24**.
164
+
1. Under **Subnets**, select **default**.
165
+
1. Change the **Name** to **SN-Corp**.
166
+
1. For **Starting address**, type **192.168.1.0/24**.
162
167
1. Accept the other default settings, and then select **Save**.
163
-
2. Select **Add Subnet**.
164
-
3. For **Subnet name**, type**GatewaySubnet**.
165
-
4. For **Subnet address range** type **192.168.2.0/24**.
166
-
5. Select **Add**.
168
+
2. Select **Add a subnet**.
169
+
1. For **Subnet template**, select**Virtual Network Gateway**.
170
+
1. For **Starting address** type **192.168.2.0/27**.
171
+
1. Select **Add**.
167
172
1. Select **Review + create**.
168
173
1. Select **Create**.
169
174
@@ -177,17 +182,18 @@ When security policies are associated with a hub, it's referred to as a *hub vir
177
182
Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure it with Azure Firewall.
178
183
179
184
1. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
180
-
3. On the Azure Firewall Manager page, under **Add security to virtual networks**, select **View hub virtual networks**.
185
+
1. In the right pane, select **Overview**.
186
+
1. On the Azure Firewall Manager page, under **Add security to virtual networks**, select **View hub virtual networks**.
181
187
1. Under **Virtual Networks**, select the check box for **VNet-hub**.
182
188
1. Select **Manage Security**, and then select **Deploy a Firewall with Firewall Policy**.
183
-
1. On the **Convert virtual networks** page, under **Firewall Policy**, select the check box for **Pol-Net01**.
189
+
1. On the **Convert virtual networks** page, under **Azure Firewall tier**, select **Premium**. Under **Firewall Policy**, select the check box for **Pol-Net01**.
184
190
1. Select **Next : Review + confirm**
185
191
1. Review the details and then select **Confirm**.
186
192
187
193
188
194
This takes a few minutes to deploy.
189
195
7. After deployment completes, go to the **FW-Hybrid-Test** resource group, and select the firewall.
190
-
9. Note the **Firewall private IP** address on the **Overview** page. You'll use it later when you create the default route.
196
+
9. Note the **Firewall private IP** address on the **Overview** page. You use it later when you create the default route.
191
197
192
198
## Create and connect the VPN gateways
193
199
@@ -204,11 +210,13 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
204
210
5. For **Region**, select **(US) East US**.
205
211
6. For **Gateway type**, select **VPN**.
206
212
7. For **VPN type**, select **Route-based**.
207
-
8. For **SKU**, select **Basic**.
208
-
9. For **Virtual network**, select **VNet-hub**.
209
-
10. For **Public IP address**, select **Create new**, and type **VNet-hub-GW-pip** for the name.
210
-
11. Accept the remaining defaults and then select **Review + create**.
211
-
12. Review the configuration, then select **Create**.
213
+
8. For **SKU**, select **VpnGw2**.
214
+
1. For **Generation**, select **Generation2**.
215
+
1. For **Virtual network**, select **VNet-hub**.
216
+
1. For **Public IP address**, select **Create new**, and type **VNet-hub-GW-pip** for the name.
217
+
1. For **Enable active-active mode**, select **Disabled**.
218
+
1. Accept the remaining defaults and then select **Review + create**.
219
+
1. Review the configuration, then select **Create**.
212
220
213
221
### Create a VPN gateway for the on-premises virtual network
214
222
@@ -221,26 +229,31 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
221
229
5. For **Region**, select **(US) East US**.
222
230
6. For **Gateway type**, select **VPN**.
223
231
7. For **VPN type**, select **Route-based**.
224
-
8. For **SKU**, select **Basic**.
225
-
9. For **Virtual network**, select **VNet-Onprem**.
226
-
10. For **Public IP address**, select **Create new**, and type **VNet-Onprem-GW-pip** for the name.
227
-
11. Accept the remaining defaults and then select **Review + create**.
228
-
12. Review the configuration, then select **Create**.
232
+
8. For **SKU**, select **VpnGw2**.
233
+
1. For **Generation**, select **Generation2**.
234
+
1. For **Virtual network**, select **VNet-Onprem**.
235
+
1. For **Public IP address**, select **Create new**, and type **VNet-Onprem-GW-pip** for the name.
236
+
1. For **Enable active-active mode**, select **Disabled**.
237
+
1. Accept the remaining defaults and then select **Review + create**.
238
+
1. Review the configuration, then select **Create**.
229
239
230
240
### Create the VPN connections
231
241
232
242
Now you can create the VPN connections between the hub and on-premises gateways.
233
243
234
-
In this step, you create the connection from the hub virtual network to the on-premises virtual network. You'll see a shared key referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
244
+
In this step, you create the connection from the hub virtual network to the on-premises virtual network. A shared key is referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
235
245
236
246
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
237
247
2. Select **Connections** in the left column.
238
248
3. Select **Add**.
239
249
4. For the connection name, type **Hub-to-Onprem**.
240
250
5. Select **VNet-to-VNet** for **Connection type**.
241
-
6. For the **Second virtual network gateway**, select **GW-Onprem**.
242
-
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
243
-
8. Select **OK**.
251
+
1. Select **Next : Settings**.
252
+
1. For the **First virtual network gateway**, select **GW-hub**.
253
+
1. For the **Second virtual network gateway**, select **GW-Onprem**.
254
+
1. For **Shared key (PSK)**, type **AzureA1b2C3**.
255
+
1. Select **Review + create**.
256
+
1. Select **Create**.
244
257
245
258
Create the on-premises to hub virtual network connection. This step is similar to the previous one, except you create the connection from VNet-Onprem to VNet-hub. Make sure the shared keys match. The connection will be established after a few minutes.
246
259
@@ -258,7 +271,7 @@ Create the on-premises to hub virtual network connection. This step is similar t
258
271
259
272
After about five minutes or so, the status of both connections should be **Connected**.
@@ -313,10 +326,11 @@ Next, create a couple routes:
313
326
1. Select **Routes** in the left column.
314
327
1. Select **Add**.
315
328
1. For the route name, type **ToSpoke**.
316
-
1. For the address prefix, type **10.6.0.0/16**.
329
+
1. For **Destination type**, select **IP addresses**.
330
+
1. For **Destination IP addresses/CIDR ranges**, type **10.6.0.0/16**.
317
331
1. For next hop type, select **Virtual appliance**.
318
332
1. For next hop address, type the firewall's private IP address that you noted earlier.
319
-
1. Select **OK**.
333
+
1. Select **Add**.
320
334
321
335
Now associate the route to the subnet.
322
336
@@ -342,10 +356,11 @@ Now create the default route from the spoke subnet.
342
356
1. Select **Routes** in the left column.
343
357
1. Select **Add**.
344
358
1. For the route name, type **ToHub**.
345
-
1. For the address prefix, type **0.0.0.0/0**.
359
+
1. For **Destination type**, select **IP addresses**
360
+
1. For **Destination IP addresses/CIDR ranges**, type **0.0.0.0/0**.
346
361
1. For next hop type, select **Virtual appliance**.
347
362
1. For next hop address, type the firewall's private IP address that you noted earlier.
348
-
1. Select **OK**.
363
+
1. Select **Add**.
349
364
350
365
Now associate the route to the subnet.
351
366
@@ -364,19 +379,20 @@ Now create the spoke workload and on-premises virtual machines, and place them i
364
379
Create a virtual machine in the spoke virtual network, running IIS, with no public IP address.
365
380
366
381
1. From the Azure portal home page, select **Create a resource**.
367
-
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
382
+
2. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
368
383
3. Enter these values for the virtual machine:
369
384
-**Resource group** - Select **FW-Hybrid-Test**
370
385
-**Virtual machine name**: *VM-Spoke-01*
371
386
-**Region** - *(US) East US*
372
387
-**User name**: type a user name
373
388
-**Password**: type a password
374
389
375
-
4.Select**Next:Disks**.
376
-
5. Accept the defaults and select **Next: Networking**.
377
-
6. Select **VNet-Spoke** for the virtual network and the subnet is **SN-Workload**.
378
-
8. For**Public inbound ports**, select **Allow selected ports**, and then select **HTTP (80)**, and **RDP (3389)**
390
+
4.For**Public inbound ports**, select **Allow selected ports**, and then select **HTTP (80)**, and **RDP (3389)**
391
+
1. Select **Next:Disks**.
392
+
1. Accept the defaults and select **Next: Networking**.
393
+
1. Select**VNet-Spoke** for the virtual network and the subnet is **SN-Workload**.
379
394
1. Select **Next:Management**.
395
+
1. Select **Next : Monitoring**.
380
396
1. For **Boot diagnostics**, Select **Disable**.
381
397
1. Select **Review + Create**, review the settings on the summary page, and then select **Create**.
382
398
@@ -402,21 +418,23 @@ Create a virtual machine in the spoke virtual network, running IIS, with no publ
402
418
This is a virtual machine that you use to connect using Remote Desktop to the public IP address. From there, you then connect to the on-premises server through the firewall.
403
419
404
420
1. From the Azure portal home page, select **Create a resource**.
405
-
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
421
+
2. Under **Popular**, select **Windows Server 2019 Datacenter**.
406
422
3. Enter these values for the virtual machine:
407
423
-**Resource group** - Select existing, and then select **FW-Hybrid-Test**
408
424
-**Virtual machine name** - *VM-Onprem*
409
425
-**Region** - *(US) East US*
410
426
-**User name**: type a user name
411
427
-**Password**: type your password
412
428
429
+
7. For **Public inbound ports**, select **Allow selected ports**, and then select **RDP (3389)**
413
430
4. Select **Next:Disks**.
414
431
5. Accept the defaults and select **Next:Networking**.
415
432
6. Select **VNet-Onprem** for virtual network and verify the subnet is **SN-Corp**.
416
-
7. For **Public inbound ports**, select **Allow selected ports**, and then select **RDP (3389)**
433
+
417
434
8. Select **Next:Management**.
418
-
9. For **Boot diagnostics**, select **Disable**.
419
-
10. Select **Review + Create**, review the settings on the summary page, and then select **Create**.
435
+
1. Select **Next : Monitoring**.
436
+
1. For **Boot diagnostics**, select **Disable**.
437
+
1. Select **Review + Create**, review the settings on the summary page, and then select **Create**.
420
438
421
439
## Test the firewall
422
440
@@ -429,7 +447,7 @@ This is a virtual machine that you use to connect using Remote Desktop to the pu
429
447
3. Open a web browser on **VM-Onprem**, and browse to http://\<VM-spoke-01 private IP\>.
430
448
431
449
You should see the **VM-spoke-01** web page:
432
-

450
+
:::image type="content" source="media/secure-hybrid-network/vm-spoke-01-web.png" alt-text="Screenshot showing vm-spoke-01 web page.":::
433
451
434
452
4. From the **VM-Onprem** virtual machine, open a remote desktop to **VM-spoke-01** at the private IP address.
0 commit comments