Skip to content

Commit f992b5d

Browse files
authored
Merge pull request #277490 from vhorne/fw-tut-deploy
tutorial freshness
2 parents 70bbb86 + fa39905 commit f992b5d

File tree

1 file changed

+53
-46
lines changed

1 file changed

+53
-46
lines changed

articles/firewall/tutorial-firewall-deploy-portal-policy.md

Lines changed: 53 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 10/28/2022
8+
ms.date: 06/06/2024
99
ms.author: victorh
1010
ms.custom: template-tutorial, mvc, engagement-fy23
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -57,12 +57,12 @@ First, create a resource group to contain the resources needed to deploy the fir
5757
The resource group contains all the resources for the tutorial.
5858

5959
1. Sign in to the [Azure portal](https://portal.azure.com).
60-
1. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page, then select **Add**. Enter or select the following values:
60+
1. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page, then select **Create**. Enter or select the following values:
6161

6262
| Setting | Value |
6363
| -------- | ------ |
6464
| Subscription | Select your Azure subscription. |
65-
| Resource group | Enter *Test-FW-RG*. |
65+
| Resource group | Enter **Test-FW-RG**. |
6666
| Region | Select a region. All other resources that you create must be in the same region. |
6767

6868
1. Select **Review + create**.
@@ -77,28 +77,31 @@ This VNet will have two subnets.
7777
7878
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
7979
1. Select **Networking**.
80-
1. Search for **Virtual network** and select it.
81-
1. Select **Create**, then enter or select the following values:
80+
1. Search for **Virtual network** and select **Create**.
81+
1. Enter or select the following values:
8282

8383
| Setting | Value |
8484
| -------- | ------ |
8585
| Subscription | Select your Azure subscription. |
8686
| Resource group | Select **Test-FW-RG**. |
87-
| Name | Enter *Test-FW-VN*. |
87+
| Name | Enter **Test-FW-VN**. |
8888
| Region | Select the same location that you used previously. |
8989

90-
1. Select **Next: IP addresses**.
90+
1. Select **Next**.
91+
1. On the **Security** tab, select **Next**.
9192
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
92-
1. Under **Subnet**, select **default**.
93-
1. For **Subnet name** change the name to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
94-
1. For **Address range**, type **10.0.1.0/26**.
93+
1. Under **Subnets**, select **default**.
94+
1. On the **Edit subnet** page, for **Subnet purpose**, select **Azure Firewall**.
95+
96+
The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
97+
1. For **Starting address**, type **10.0.1.0**.
9598
1. Select **Save**.
9699

97-
Next, create a subnet for the workload server.
100+
Next, create a subnet for the workload server.
98101

99102
1. Select **Add subnet**.
100103
1. For **Subnet name**, type **Workload-SN**.
101-
1. For **Subnet address range**, type **10.0.2.0/24**.
104+
1. For **Starting address**, type **10.0.2.0/24**.
102105
1. Select **Add**.
103106
1. Select **Review + create**.
104107
1. Select **Create**.
@@ -115,7 +118,7 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
115118
| ------- | ----- |
116119
| Subscription | Select your Azure subscription. |
117120
| Resource group | Select **Test-FW-RG**. |
118-
| Virtual machine name | Enter *Srv-Work*.|
121+
| Virtual machine name | Enter **Srv-Work**.|
119122
| Region | Select the same location that you used previously. |
120123
| Username | Enter a username. |
121124
| Password | Enter a password. |
@@ -126,6 +129,7 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
126129
1. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
127130
1. For **Public IP**, select **None**.
128131
1. Accept the other defaults and select **Next: Management**.
132+
1. Select **Next:Monitoring**.
129133
1. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
130134
1. Review the settings on the summary page, and then select **Create**.
131135
1. After the deployment completes, select the **Srv-Work** resource and note the private IP address for later use.
@@ -143,15 +147,16 @@ Deploy the firewall into the VNet.
143147
| ------- | ----- |
144148
| Subscription | Select your Azure subscription. |
145149
| Resource group | Select **Test-FW-RG**. |
146-
| Name | Enter *Test-FW01*. |
150+
| Name | Enter **Test-FW01**. |
147151
| Region | Select the same location that you used previously. |
148152
| Firewall management | Select **Use a Firewall Policy to manage this firewall**. |
149-
| Firewall policy | Select **Add new**, and enter *fw-test-pol*. <br> Select the same region that you used previously.
153+
| Firewall policy | Select **Add new**, and enter **fw-test-pol**. <br> Select the same region that you used previously.|
150154
| Choose a virtual network | Select **Use existing**, and then select **Test-FW-VN**. |
151-
| Public IP address | Select **Add new**, and enter *fw-pip* for the **Name**. |
155+
| Public IP address | Select **Add new**, and enter **fw-pip** for the **Name**. |
152156

153-
5. Accept the other default values, then select **Review + create**.
154-
6. Review the summary, and then select **Create** to create the firewall.
157+
5. Accept the other default values, then select **Next: Tags**.
158+
1. Select **Next : Review + create**.
159+
1. Review the summary, and then select **Create** to create the firewall.
155160

156161
This will take a few minutes to deploy.
157162
7. After deployment completes, go to the **Test-FW-RG** resource group, and select the **Test-FW01** firewall.
@@ -170,39 +175,41 @@ For the **Workload-SN** subnet, configure the outbound default route to go throu
170175
| Subscription | Select your Azure subscription. |
171176
| Resource group | Select **Test-FW-RG**. |
172177
| Region | Select the same location that you used previously. |
173-
| Name | Enter *Firewall-route*. |
178+
| Name | Enter **Firewall-route**. |
174179

175180
1. Select **Review + create**.
176181
1. Select **Create**.
177182

178183
After deployment completes, select **Go to resource**.
179184

180-
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
181-
1. Select **Virtual network** > **Test-FW-VN**.
182-
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
185+
1. On the **Firewall-route** page, under **Settings**, select **Subnets** and then select **Associate**.
186+
1. For **Virtual network** select **Test-FW-VN**.
187+
1. For **Subnet**, select **Workload-SN**.
183188
1. Select **OK**.
184189
1. Select **Routes** and then select **Add**.
185-
1. For **Route name**, enter *fw-dg*.
186-
1. For **Address prefix**, enter *0.0.0.0/0*.
190+
1. For **Route name**, enter **fw-dg**.
191+
1. For **Destination type** select **IP Addresses**.
192+
1. For **Destination IP addresses/CIDR ranges prefix**, enter **0.0.0.0/0**.
187193
1. For **Next hop type**, select **Virtual appliance**.
188-
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
194+
195+
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
189196
1. For **Next hop address**, enter the private IP address for the firewall that you noted previously.
190-
1. Select **OK**.
197+
1. Select **Add**.
191198

192199
## Configure an application rule
193200

194201
This is the application rule that allows outbound access to `www.google.com`.
195202

196203
1. Open the **Test-FW-RG** resource group, and select the **fw-test-pol** firewall policy.
197-
1. Select **Application rules**.
204+
1. Under **Settings**, Select **Application rules**.
198205
1. Select **Add a rule collection**.
199-
1. For **Name**, enter *App-Coll01*.
200-
1. For **Priority**, enter *200*.
206+
1. For **Name**, enter **App-Coll01**.
207+
1. For **Priority**, enter **200**.
201208
1. For **Rule collection action**, select **Allow**.
202-
1. Under **Rules**, for **Name**, enter *Allow-Google*.
209+
1. Under **Rules**, for **Name**, enter **Allow-Google**.
203210
1. For **Source type**, select **IP address**.
204-
1. For **Source**, enter *10.0.2.0/24*.
205-
1. For **Protocol:port**, enter *http, https*.
211+
1. For **Source**, enter **10.0.2.0/24**.
212+
1. For **Protocol:port**, enter **http, https**.
206213
1. For **Destination Type**, select **FQDN**.
207214
1. For **Destination**, enter *`www.google.com`*
208215
1. Select **Add**.
@@ -215,17 +222,17 @@ This is the network rule that allows outbound access to two IP addresses at port
215222

216223
1. Select **Network rules**.
217224
2. Select **Add a rule collection**.
218-
3. For **Name**, enter *Net-Coll01*.
219-
4. For **Priority**, enter *200*.
225+
3. For **Name**, enter **Net-Coll01**.
226+
4. For **Priority**, enter **200**.
220227
5. For **Rule collection action**, select **Allow**.
221228
1. For **Rule collection group**, select **DefaultNetworkRuleCollectionGroup**.
222-
1. Under **Rules**, for **Name**, enter *Allow-DNS*.
229+
1. Under **Rules**, for **Name**, enter **Allow-DNS**.
223230
1. For **Source type**, select **IP Address**.
224-
1. For **Source**, enter *10.0.2.0/24*.
231+
1. For **Source**, enter **10.0.2.0/24**.
225232
1. For **Protocol**, select **UDP**.
226-
1. For **Destination Ports**, enter *53*.
233+
1. For **Destination Ports**, enter **53**.
227234
1. For **Destination type** select **IP address**.
228-
1. For **Destination**, enter *209.244.0.3,209.244.0.4*.<br>These are public DNS servers operated by CenturyLink.
235+
1. For **Destination**, enter **209.244.0.3,209.244.0.4**.<br>These are public DNS servers operated by CenturyLink.
229236
2. Select **Add**.
230237

231238
## Configure a DNAT rule
@@ -234,18 +241,18 @@ This rule allows you to connect a remote desktop to the **Srv-Work** virtual mac
234241

235242
1. Select the **DNAT rules**.
236243
2. Select **Add a rule collection**.
237-
3. For **Name**, enter *rdp*.
238-
1. For **Priority**, enter *200*.
244+
3. For **Name**, enter **RDP**.
245+
1. For **Priority**, enter **200**.
239246
1. For **Rule collection group**, select **DefaultDnatRuleCollectionGroup**.
240-
1. Under **Rules**, for **Name**, enter *rdp-nat*.
247+
1. Under **Rules**, for **Name**, enter **rdp-nat**.
241248
1. For **Source type**, select **IP address**.
242249
1. For **Source**, enter *\**.
243250
1. For **Protocol**, select **TCP**.
244-
1. For **Destination Ports**, enter *3389*.
245-
1. For **Destination Type**, select **IP Address**.
251+
1. For **Destination Ports**, enter **3389**.
246252
1. For **Destination**, enter the firewall public IP address.
253+
1. For **Translated type**, select **IP Address**.
247254
1. For **Translated address**, enter the **Srv-work** private IP address.
248-
1. For **Translated port**, enter *3389*.
255+
1. For **Translated port**, enter **3389**.
249256
1. Select **Add**.
250257

251258

@@ -257,7 +264,7 @@ For testing purposes in this tutorial, configure the server's primary and second
257264
2. Select the network interface for the **Srv-Work** virtual machine.
258265
3. Under **Settings**, select **DNS servers**.
259266
4. Under **DNS servers**, select **Custom**.
260-
5. Enter *209.244.0.3* in the **Add DNS server** text box, and *209.244.0.4* in the next text box.
267+
5. Enter **209.244.0.3** in the **Add DNS server** text box, and **209.244.0.4** in the next text box.
261268
6. Select **Save**.
262269
7. Restart the **Srv-Work** virtual machine.
263270

@@ -266,7 +273,7 @@ For testing purposes in this tutorial, configure the server's primary and second
266273
Now, test the firewall to confirm that it works as expected.
267274

268275
1. Connect a remote desktop to firewall public IP address and sign in to the **Srv-Work** virtual machine.
269-
3. Open Internet Explorer and browse to `https://www.google.com`.
276+
3. Open Microsoft Edge and browse to `https://www.google.com`.
270277
4. Select **OK** > **Close** on the Internet Explorer security alerts.
271278

272279
You should see the Google home page.

0 commit comments

Comments
 (0)