You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-hybrid-portal.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
21
21
22
22
-**VNet-Hub**: The firewall is in this virtual network.
23
23
-**VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24
-
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24
+
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a virtual private network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
25
25
26
26

27
27
@@ -58,7 +58,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
58
58
First, create the resource group to contain the resources:
59
59
60
60
1. Sign in to the [Azure portal](https://portal.azure.com).
61
-
1. On the Azure portal home page, select **Resource groups** > **Create**.
61
+
1. On the Azure portal's home page, select **Resource groups** > **Create**.
62
62
1. For **Subscription**, select your subscription.
63
63
1. For **Resource group**, enter **RG-fw-hybrid-test**.
64
64
1. For **Region**, select a region. All resources that you create later must be in the same region.
@@ -473,4 +473,4 @@ You can keep your firewall resources for further testing. If you no longer need
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-hybrid-ps.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
21
21
22
22
-**VNet-Hub**: The firewall is in this virtual network.
23
23
-**VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24
-
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24
+
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a virtual private network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
25
25
26
26

27
27
@@ -38,13 +38,13 @@ There are three key requirements for this scenario to work correctly:
38
38
- A user-defined route (UDR) on the spoke subnet that points to the Azure Firewall IP address as the default gateway. Virtual network gateway route propagation must be *disabled* on this route table.
39
39
- A UDR on the hub gateway subnet must point to the firewall IP address as the next hop to the spoke networks.
40
40
41
-
No UDR is required on the Azure Firewall subnet, because it learns routes from BGP.
41
+
No UDR is required on the Azure Firewall subnet, because it learns routes from Border Gateway Protocol (BGP).
42
42
- Be sure to set `AllowGatewayTransit` when you're peering **VNet-Hub** to **VNet-Spoke**. Set `UseRemoteGateways` when you're peering **VNet-Spoke** to **VNet-Hub**.
43
43
44
44
The [Create the routes](#create-the-routes) section later in this article shows how to create these routes.
45
45
46
46
>[!NOTE]
47
-
>Azure Firewall must have direct internet connectivity. If your **AzureFirewallSubnet** subnet learns a default route to your on-premises network via Border Gateway Protocol (BGP), you must configure Azure Firewall in forced tunneling mode. If this is an existing Azure Firewall instance that can't be reconfigured in forced tunneling mode, we recommend that you add a 0.0.0.0/0 UDR on the **AzureFirewallSubnet** subnet with the `NextHopType` value set as `Internet` to maintain direct internet connectivity.
47
+
>Azure Firewall must have direct internet connectivity. If your **AzureFirewallSubnet** subnet learns a default route to your on-premises network via BGP, you must configure Azure Firewall in forced tunneling mode. If this is an existing Azure Firewall instance that can't be reconfigured in forced tunneling mode, we recommend that you add a 0.0.0.0/0 UDR on the **AzureFirewallSubnet** subnet with the `NextHopType` value set as `Internet` to maintain direct internet connectivity.
48
48
>
49
49
>For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
0 commit comments