You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -57,12 +57,12 @@ First, create a resource group to contain the resources needed to deploy the fir
57
57
The resource group contains all the resources for the tutorial.
58
58
59
59
1. Sign in to the [Azure portal](https://portal.azure.com).
60
-
1. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page, then select **Add**. Enter or select the following values:
60
+
1. On the Azure portal menu, select **Resource groups** or search for and select *Resource groups* from any page, then select **Create**. Enter or select the following values:
61
61
62
62
| Setting | Value |
63
63
| -------- | ------ |
64
64
| Subscription | Select your Azure subscription. |
65
-
| Resource group | Enter *Test-FW-RG*. |
65
+
| Resource group | Enter **Test-FW-RG**. |
66
66
| Region | Select a region. All other resources that you create must be in the same region. |
67
67
68
68
1. Select **Review + create**.
@@ -77,28 +77,31 @@ This VNet will have two subnets.
77
77
78
78
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
79
79
1. Select **Networking**.
80
-
1. Search for **Virtual network** and select it.
81
-
1.Select **Create**, then enter or select the following values:
80
+
1. Search for **Virtual network** and select **Create**.
81
+
1.Enter or select the following values:
82
82
83
83
| Setting | Value |
84
84
| -------- | ------ |
85
85
| Subscription | Select your Azure subscription. |
86
86
| Resource group | Select **Test-FW-RG**. |
87
-
| Name | Enter *Test-FW-VN*. |
87
+
| Name | Enter **Test-FW-VN**. |
88
88
| Region | Select the same location that you used previously. |
89
89
90
-
1. Select **Next: IP addresses**.
90
+
1. Select **Next**.
91
+
1. On the **Security** tab, select **Next**.
91
92
1. For **IPv4 Address space**, accept the default **10.0.0.0/16**.
92
-
1. Under **Subnet**, select **default**.
93
-
1. For **Subnet name** change the name to **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
94
-
1. For **Address range**, type **10.0.1.0/26**.
93
+
1. Under **Subnets**, select **default**.
94
+
1. On the **Edit subnet** page, for **Subnet purpose**, select **Azure Firewall**.
95
+
96
+
The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
97
+
1. For **Starting address**, type **10.0.1.0**.
95
98
1. Select **Save**.
96
99
97
-
Next, create a subnet for the workload server.
100
+
Next, create a subnet for the workload server.
98
101
99
102
1. Select **Add subnet**.
100
103
1. For **Subnet name**, type **Workload-SN**.
101
-
1. For **Subnet address range**, type **10.0.2.0/24**.
104
+
1. For **Starting address**, type **10.0.2.0/24**.
102
105
1. Select **Add**.
103
106
1. Select **Review + create**.
104
107
1. Select **Create**.
@@ -115,7 +118,7 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
115
118
| ------- | ----- |
116
119
| Subscription | Select your Azure subscription. |
117
120
| Resource group | Select **Test-FW-RG**. |
118
-
| Virtual machine name | Enter *Srv-Work*.|
121
+
| Virtual machine name | Enter **Srv-Work**.|
119
122
| Region | Select the same location that you used previously. |
120
123
| Username | Enter a username. |
121
124
| Password | Enter a password. |
@@ -126,6 +129,7 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
126
129
1. Make sure that **Test-FW-VN** is selected for the virtual network and the subnet is **Workload-SN**.
127
130
1. For **Public IP**, select **None**.
128
131
1. Accept the other defaults and select **Next: Management**.
132
+
1. Select **Next:Monitoring**.
129
133
1. Select **Disable** to disable boot diagnostics. Accept the other defaults and select **Review + create**.
130
134
1. Review the settings on the summary page, and then select **Create**.
131
135
1. After the deployment completes, select the **Srv-Work** resource and note the private IP address for later use.
@@ -143,15 +147,16 @@ Deploy the firewall into the VNet.
143
147
| ------- | ----- |
144
148
| Subscription | Select your Azure subscription. |
145
149
| Resource group | Select **Test-FW-RG**. |
146
-
| Name | Enter *Test-FW01*. |
150
+
| Name | Enter **Test-FW01**. |
147
151
| Region | Select the same location that you used previously. |
148
152
| Firewall management | Select **Use a Firewall Policy to manage this firewall**. |
149
-
| Firewall policy | Select **Add new**, and enter *fw-test-pol*. <br> Select the same region that you used previously.
153
+
| Firewall policy | Select **Add new**, and enter **fw-test-pol**. <br> Select the same region that you used previously.|
150
154
| Choose a virtual network | Select **Use existing**, and then select **Test-FW-VN**. |
151
-
| Public IP address | Select **Add new**, and enter *fw-pip* for the **Name**. |
155
+
| Public IP address | Select **Add new**, and enter **fw-pip** for the **Name**. |
152
156
153
-
5. Accept the other default values, then select **Review + create**.
154
-
6. Review the summary, and then select **Create** to create the firewall.
157
+
5. Accept the other default values, then select **Next: Tags**.
158
+
1. Select **Next : Review + create**.
159
+
1. Review the summary, and then select **Create** to create the firewall.
155
160
156
161
This will take a few minutes to deploy.
157
162
7. After deployment completes, go to the **Test-FW-RG** resource group, and select the **Test-FW01** firewall.
@@ -170,39 +175,41 @@ For the **Workload-SN** subnet, configure the outbound default route to go throu
170
175
| Subscription | Select your Azure subscription. |
171
176
| Resource group | Select **Test-FW-RG**. |
172
177
| Region | Select the same location that you used previously. |
173
-
| Name | Enter *Firewall-route*. |
178
+
| Name | Enter **Firewall-route**. |
174
179
175
180
1. Select **Review + create**.
176
181
1. Select **Create**.
177
182
178
183
After deployment completes, select **Go to resource**.
179
184
180
-
1. On the **Firewall-route** page, select **Subnets** and then select **Associate**.
181
-
1.Select**Virtual network**>**Test-FW-VN**.
182
-
1. For **Subnet**, select **Workload-SN**. Make sure that you select only the **Workload-SN** subnet for this route, otherwise your firewall won't work correctly.
185
+
1. On the **Firewall-route** page, under **Settings**, select **Subnets** and then select **Associate**.
186
+
1.For**Virtual network**select**Test-FW-VN**.
187
+
1. For **Subnet**, select **Workload-SN**.
183
188
1. Select **OK**.
184
189
1. Select **Routes** and then select **Add**.
185
-
1. For **Route name**, enter *fw-dg*.
186
-
1. For **Address prefix**, enter *0.0.0.0/0*.
190
+
1. For **Route name**, enter **fw-dg**.
191
+
1. For **Destination type** select **IP Addresses**.
192
+
1. For **Destination IP addresses/CIDR ranges prefix**, enter **0.0.0.0/0**.
187
193
1. For **Next hop type**, select **Virtual appliance**.
188
-
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
194
+
195
+
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
189
196
1. For **Next hop address**, enter the private IP address for the firewall that you noted previously.
190
-
1. Select **OK**.
197
+
1. Select **Add**.
191
198
192
199
## Configure an application rule
193
200
194
201
This is the application rule that allows outbound access to `www.google.com`.
195
202
196
203
1. Open the **Test-FW-RG** resource group, and select the **fw-test-pol** firewall policy.
0 commit comments