Skip to content

Files

Latest commit

df233d3 · Jun 7, 2022

History

History
162 lines (92 loc) · 8.01 KB

enable-public-internet-access.md

File metadata and controls

162 lines (92 loc) · 8.01 KB
title description ms.topic ms.service ms.date
Enable public internet for Azure VMware Solution workloads
This article explains how to use the public IP functionality in Azure Virtual WAN.
how-to
azure-vmware
06/25/2021

Enable public internet for Azure VMware Solution workloads

Public IP is a feature in Azure VMware Solution connectivity. It makes resources, such as web servers, virtual machines (VMs), and hosts accessible through a public network.

You enable public internet access in two ways.

  • Host and publish applications under the Application Gateway load balancer for HTTP/HTTPS traffic.

  • Publish through public IP features in Azure Virtual WAN.

As a part of Azure VMware Solution private cloud deployment, upon enabling public IP functionality, the required components with automation get created and enabled:

  • Virtual WAN

  • Virtual WAN hub with ExpressRoute connectivity

  • Azure Firewall services with public IP

This article details how you can use the public IP functionality in Virtual WAN.

Prerequisites

  • Azure VMware Solution environment

  • A webserver running in Azure VMware Solution environment.

  • A new non-overlapping IP range for the Virtual WAN hub deployment, typically a /24.

Reference architecture

:::image type="content" source="media/public-ip-usage/public-ip-architecture-diagram.png" alt-text="Diagram showing the public IP architecture for Azure VMware Solution." border="false" lightbox="media/public-ip-usage/public-ip-architecture-diagram.png":::

The architecture diagram shows a web server hosted in the Azure VMware Solution environment and configured with RFC1918 private IP addresses. The web service is made available to the internet through Virtual WAN public IP functionality. Public IP is typically a destination NAT translated in Azure Firewall. With DNAT rules, firewall policy translates public IP address requests to a private address (webserver) with a port.

User requests hit the firewall on a public IP that, in turn, is translated to private IP using DNAT rules in the Azure Firewall. The firewall checks the NAT table, and if the request matches an entry, it forwards the traffic to the translated address and port in the Azure VMware Solution environment.

The web server receives the request and replies with the requested information or page to the firewall, and then the firewall forwards the information to the user on the public IP address.

Test case

In this scenario, you'll publish the IIS webserver to the internet. Use the public IP feature in Azure VMware Solution to publish the website on a public IP address. You'll also configure NAT rules on the firewall and access Azure VMware Solution resource (VMs with a web server) with public IP.

Tip

To enable egress traffic, you must set Security configuration > Internet traffic to Azure Firewall.

Deploy Virtual WAN

  1. Sign in to the Azure portal and then search for and select Azure VMware Solution.

  2. Select the Azure VMware Solution private cloud.

  3. Under Manage, select Connectivity.

    :::image type="content" source="media/public-ip-usage/avs-private-cloud-manage-menu.png" alt-text="Screenshot of the Connectivity section." lightbox="media/public-ip-usage/avs-private-cloud-manage-menu.png":::

  4. Select the Public IP tab and then select Configure.

    :::image type="content" source="media/public-ip-usage/connectivity-public-ip-tab.png" alt-text="Screenshot that shows where to begin to configure the public IP." lightbox="media/public-ip-usage/connectivity-public-ip-tab.png":::

  5. Accept the default values or change them, and then select Create.

    • Virtual WAN resource group

    • Virtual WAN name

    • Virtual hub address block (using new non-overlapping IP range)

    • Number of public IPs (1-100)

It takes about one hour to complete the deployment of all components. This deployment only has to occur once to support all future public IPs for this Azure VMware Solution environment.

Tip

You can monitor the status from the Notification area.

View and add public IP addresses

We can check and add more public IP addresses by following the below steps.

  1. In the Azure portal, search for and select Firewall.

  2. Select a deployed firewall and then select Visit Azure Firewall Manager to configure and manage this firewall.

    :::image type="content" source="media/public-ip-usage/configure-manage-deployed-firewall.png" alt-text="Screenshot that shows the option to configure and manage the firewall." lightbox="media/public-ip-usage/configure-manage-deployed-firewall.png":::

  3. Select Secured virtual hubs and, from the list, select a virtual hub.

    :::image type="content" source="media/public-ip-usage/select-virtual-hub.png" alt-text="Screenshot of Firewall Manager." lightbox="media/public-ip-usage/select-virtual-hub.png":::

  4. On the virtual hub page, select Public IP configuration, and to add more public IP address, then select Add.

    :::image type="content" source="media/public-ip-usage/virtual-hub-page-public-ip-configuration.png" alt-text="Screenshot of how to add a public IP configuration in Firewall Manager." lightbox="media/public-ip-usage/virtual-hub-page-public-ip-configuration.png":::

  5. Provide the number of IPs required and select Add.

    :::image type="content" source="media/public-ip-usage/add-number-of-ip-addresses-required.png" alt-text="Screenshot to add a specified number of public IP configurations.":::

Create firewall policies

Once all components are deployed, you can see them in the added Resource group. The next step is to add a firewall policy.

  1. In the Azure portal, search for and select Firewall.

  2. Select a deployed firewall and then select Visit Azure Firewall Manager to configure and manage this firewall.

    :::image type="content" source="media/public-ip-usage/configure-manage-deployed-firewall.png" alt-text="Screenshot that shows the option to configure and manage the firewall." lightbox="media/public-ip-usage/configure-manage-deployed-firewall.png":::

  3. Select Azure Firewall Policies and then select Create Azure Firewall Policy.

    :::image type="content" source="media/public-ip-usage/create-firewall-policy.png" alt-text="Screenshot of how to create a firewall policy in Firewall Manager." lightbox="media/public-ip-usage/create-firewall-policy.png":::

  4. Under the Basics tab, provide the required details and select Next: DNS Settings.

  5. Under the DNS tab, select Disable, and then select Next: Rules.

  6. Select Add a rule collection, provide the below details and select Add. Then select Next: Threat intelligence.

    • Name
    • Rules collection Type - DNAT
    • Priority
    • Rule collection Action – Allow
    • Name of rule
    • Source Type- IPaddress
    • Source - *
    • Protocol – TCP
    • Destination port – 80
    • Destination Type – IP Address
    • Destination – Public IP Address
    • Translated address – Azure VMware Solution Web Server private IP Address
    • Translated port - Azure VMware Solution Web Server port
  7. Leave the default value, and then select Next: Hubs.

  8. Select Associate virtual hub.

  9. Select a hub from the list and select Add.

    :::image type="content" source="media/public-ip-usage/secure-hubs-with-azure-firewall-policy.png" alt-text="Screenshot that shows the selected hubs that will be converted to Secured Virtual Hubs." lightbox="media/public-ip-usage/secure-hubs-with-azure-firewall-policy.png":::

  10. Select Next: Tags.

  11. (Optional) Create name and value pairs to categorize your resources.

  12. Select Next: Review + create and then select Create.

Limitations

You can have 100 public IPs per private cloud.

Next steps

Now that you've covered how to use the public IP functionality in Azure VMware Solution, you may want to learn about: