Skip to content

Commit f0a63bd

Browse files
committed
updates deom abhinav
1 parent 64e95bf commit f0a63bd

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/firewall/management-nic.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ ms.author: victorh
1212
# Azure Firewall Management NIC
1313

1414
> [!NOTE]
15-
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
15+
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
1616
17-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
17+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Certain upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall to avoid service disruption.
1818

1919
## What happens when you enable the Management NIC
2020

21-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
21+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
2222

2323
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
2424

@@ -91,33 +91,33 @@ Now when you view the firewall in the Azure portal, you see the assigned Managem
9191
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
9292

9393
**Important Note**
94-
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls cannot exist within the same virtual network, it is recommended to delete the old firewall before starting the new deployment if you plan to reuse the same VNET.
95-
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing VNET.
94+
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls can't exist within the same virtual network, it's recommended to delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
95+
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
9696

9797
**Prerequisites**
9898
* Create the **AzureFirewallManagementSubnet**:
9999
* Minimum subnet size: /26
100100
* Example: 10.0.1.0/26
101101

102102
**Deployment Steps**
103-
1. Go to **Create a Resource** in the Azure Portal.
103+
1. Go to **Create a Resource** in the Azure portal.
104104
1. Search for **Firewall** and select **Create**.
105-
1. On the Create a Firewall page, configure the following:
105+
1. On the Create a Firewall page, configure the following settings:
106106
* **Subscription**: Select your subscription.
107107
* **Resource Group**: Select or create a new resource group.
108108
* **Name**: Enter a name for the firewall.
109109
* **Region**: Choose your region.
110110
* **Firewall SKU**: Select Basic, Standard, or Premium.
111111
* **Virtual Network**: Create a new virtual network or use an existing one.
112-
* Address space: e.g., 10.0.0.0/16
113-
* Subnet for AzureFirewallSubnet: e.g., 10.0.0.0/26
112+
* Address space: for example, 10.0.0.0/16
113+
* Subnet for AzureFirewallSubnet: for example, 10.0.0.0/26
114114
* **Public IP Address**: Add new Public IP
115-
* Name: e.g., FW-PIP
115+
* Name: for example, FW-PIP
116116
1. Firewall Management NIC
117117
* Select **Enable Firewall Management NIC**
118-
* Subnet for AzureFirewallManagementSubnet: e.g., 10.0.1.0/24
119-
* Create Management public IP address: e.g., Mgmt-PIP
120-
1. Select **Review + Create** to validate and deploy the firewall. This will take a few minutes to deploy.
118+
* Subnet for AzureFirewallManagementSubnet: for example, 10.0.1.0/24
119+
* Create Management public IP address: for example, Mgmt-PIP
120+
1. Select **Review + Create** to validate and deploy the firewall. This takes a few minutes to deploy.
121121

122122

123123
## Related content

0 commit comments

Comments
 (0)