Skip to content

Commit f7e3bca

Browse files
committed
update to accout for IP groups in rule config
1 parent 41b3d1d commit f7e3bca

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 10/28/2019
8+
ms.date: 02/21/2020
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -22,7 +22,7 @@ One way you can control outbound network access from an Azure subnet is with Azu
2222

2323
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
2424

25-
For this tutorial, you create a simplified single VNet with three subnets for easy deployment. For production deployments, a [hub and spoke model](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
25+
For this tutorial, you create a simplified single VNet with three subnets for easy deployment. For production deployments, a [hub and spoke model](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended. The firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
2626

2727
* **AzureFirewallSubnet** - the firewall is in this subnet.
2828
* **Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
@@ -56,7 +56,7 @@ The resource group contains all the resources for the tutorial.
5656
2. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page. Then select **Add**.
5757
3. For **Resource group name**, enter *Test-FW-RG*.
5858
4. For **Subscription**, select your subscription.
59-
5. For **Resource group location**, select a location. All subsequent resources that you create must be in the same location.
59+
5. For **Resource group location**, select a location. All other resources that you create must be in the same location.
6060
6. Select **Create**.
6161

6262
### Create a VNet
@@ -189,10 +189,11 @@ This is the application rule that allows outbound access to www.google.com.
189189
6. For **Priority**, type **200**.
190190
7. For **Action**, select **Allow**.
191191
8. Under **Rules**, **Target FQDNs**, for **Name**, type **Allow-Google**.
192-
9. For **Source Addresses**, type **10.0.2.0/24**.
193-
10. For **Protocol:port**, type **http, https**.
194-
11. For **Target FQDNS**, type **www.google.com**
195-
12. Select **Add**.
192+
9. For **Source type**, select **IP address**.
193+
10. For **Source**, type **10.0.2.0/24**.
194+
11. For **Protocol:port**, type **http, https**.
195+
12. For **Target FQDNS**, type **www.google.com**
196+
13. Select **Add**.
196197

197198
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see [Infrastructure FQDNs](infrastructure-fqdns.md).
198199

@@ -205,10 +206,11 @@ This is the network rule that allows outbound access to two IP addresses at port
205206
3. For **Name**, type **Net-Coll01**.
206207
4. For **Priority**, type **200**.
207208
5. For **Action**, select **Allow**.
208-
6. Under **Rules**, for **Name**, type **Allow-DNS**.
209+
6. Under **Rules**, **IP addresses**, for **Name**, type **Allow-DNS**.
209210
7. For **Protocol**, select **UDP**.
210-
8. For **Source Addresses**, type **10.0.2.0/24**.
211-
9. For Destination address, type **209.244.0.3,209.244.0.4**
211+
9. For **Source type**, select **IP address**.
212+
1. For **Source**, type **10.0.2.0/24**.
213+
2. For Destination address, type **209.244.0.3,209.244.0.4**
212214

213215
These are public DNS servers operated by CenturyLink.
214216
1. For **Destination Ports**, type **53**.

0 commit comments

Comments
 (0)