You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -74,22 +74,24 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
74
74
1. Select your subscription, and for Resource group, select **Create new** and create a resource group named **FW-Hybrid-Test**.
75
75
2. For the policy name, type **Pol-Net01**.
76
76
3. For Region, select **East US**.
77
-
4. Select **Next:Rules**.
78
-
5. Select **Add a rule collection**.
79
-
6. For **Name**, type **RCNet01**.
80
-
7. For **Rule collection type**, select **Network**.
81
-
8. For **Priority**, type **100**.
82
-
9. For **Action**, select **Allow**.
83
-
10. Under **Rules**, for **Name**, type **AllowWeb**.
84
-
11. For **Source Addresses**, type **192.168.1.0/24**.
85
-
12. For **Protocol**, select **TCP**.
86
-
13. For **Destination Ports**, type **80**.
87
-
14. For **Destination Type**, select **IP Address**.
88
-
15. For **Destination**, type **10.6.0.0/16**.
89
-
16. On the next rule row, enter the following information:
77
+
1. Select **Next : DNS Settings**.
78
+
1. Select **Next : TLS inspection (preview)**
79
+
1. Select **Next:Rules**.
80
+
1. Select **Add a rule collection**.
81
+
1. For **Name**, type **RCNet01**.
82
+
1. For **Rule collection type**, select **Network**.
83
+
1. For **Priority**, type **100**.
84
+
1. For **Action**, select **Allow**.
85
+
1. Under **Rules**, for **Name**, type **AllowWeb**.
86
+
1. For **Source**, type **192.168.1.0/24**.
87
+
1. For **Protocol**, select **TCP**.
88
+
1. For **Destination Ports**, type **80**.
89
+
1. For **Destination Type**, select **IP Address**.
90
+
1. For **Destination**, type **10.6.0.0/16**.
91
+
1. On the next rule row, enter the following information:
90
92
91
93
Name: type **AllowRDP**<br>
92
-
Source IP address: type **192.168.1.0/24**.<br>
94
+
Source: type **192.168.1.0/24**.<br>
93
95
Protocol, select **TCP**<br>
94
96
Destination Ports, type **3389**<br>
95
97
Destination Type, select **IP Address**<br>
@@ -105,75 +107,81 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
105
107
> The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see [Azure Firewall FAQ](../firewall/firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
106
108
107
109
1. From the Azure portal home page, select **Create a resource**.
108
-
2. Under **Networking**, select **Virtual network**.
109
-
4. For **Name**, type **VNet-hub**.
110
-
5. For **Address space**, type **10.5.0.0/16**.
111
-
6. For **Subscription**, select your subscription.
112
-
7. For **Resource group**, select **FW-Hybrid-Test**.
113
-
8. For **Location**, select **East US**.
114
-
9. Under **Subnet**, for **Name** type **AzureFirewallSubnet**. The firewall will be in this subnet, and the subnet name **must** be AzureFirewallSubnet.
115
-
10. For **Address range**, type **10.5.0.0/26**.
116
-
11. Accept the other default settings, and then select **Create**.
110
+
2. Search for **Virtual network** and then select **Virtual network**.
111
+
1. Select **Create**.
112
+
1. For **Subscription**, select your subscription.
113
+
1. For **Resource group**, select **FW-Hybrid-Test**.
114
+
1. For **Name**, type **VNet-hub**.
115
+
1. For **Region**, select **East US**.
116
+
1. Select **Next : IP Addresses**.
117
+
118
+
1. For **IPv4 address space**, type **10.5.0.0/16**.
119
+
1. Under **Subnet name**, select **default**.
120
+
1. Change the **Subnet name** to **AzureFirewallSubnet**. The firewall is in this subnet, and the subnet name **must** be AzureFirewallSubnet.
121
+
1. For **Subnet address range**, type **10.5.0.0/26**.
122
+
1. Accept the other default settings, and then select **Save**.
123
+
1. Select **Review + create**.
124
+
1. Select **Create**.
117
125
118
126
## Create the spoke virtual network
119
127
120
128
1. From the Azure portal home page, select **Create a resource**.
121
-
2. Under **Networking**, select **Virtual network**.
122
-
4. For **Name**, type **VNet-Spoke**.
123
-
5. For **Address space**, type **10.6.0.0/16**.
124
-
6. For **Subscription**, select your subscription.
125
-
7. For **Resource group**, select **FW-Hybrid-Test**.
126
-
8. For **Location**, select the same location that you used previously.
127
-
9. Under **Subnet**, for **Name** type **SN-Workload**.
128
-
10. For **Address range**, type **10.6.0.0/24**.
129
-
11. Accept the other default settings, and then select **Create**.
129
+
2. Search for **Virtual network** and then select **Virtual network**.
130
+
1. Select **Create**.
131
+
1. For **Subscription**, select your subscription.
132
+
1. For **Resource group**, select **FW-Hybrid-Test**.
133
+
1. For **Name**, type **VNet-Spoke**.
134
+
1. For **Region**, select **East US**.
135
+
1. Select **Next : IP Addresses**.
136
+
137
+
1. For **IPv4 address space**, type **10.6.0.0/16**.
138
+
1. Under **Subnet name**, select **default**.
139
+
1. Change the **Subnet name** to **SN-Workload**.
140
+
1. For **Subnet address range**, type **10.6.0.0/24**.
141
+
1. Accept the other default settings, and then select **Save**.
142
+
1. Select **Review + create**.
143
+
1. Select **Create**.
144
+
130
145
131
146
## Create the on-premises virtual network
132
147
133
148
1. From the Azure portal home page, select **Create a resource**.
134
-
2. Under **Networking**, select **Virtual network**.
135
-
4. For **Name**, type **VNet-OnPrem**.
136
-
5. For **Address space**, type **192.168.0.0/16**.
137
-
6. For **Subscription**, select your subscription.
138
-
7. For **Resource group**, select **FW-Hybrid-Test**.
139
-
8. For **Location**, select the same location that you used previously.
140
-
9. Under **Subnet**, for **Name** type **SN-Corp**.
141
-
10. For **Address range**, type **192.168.1.0/24**.
142
-
11. Accept the other default settings, and then select **Create**.
143
-
144
-
After the virtual network is deployed, create a second subnet for the gateway.
149
+
2. Search for **Virtual network** and then select **Virtual network**.
150
+
1. Select **Create**.
151
+
1. For **Subscription**, select your subscription.
152
+
1. For **Resource group**, select **FW-Hybrid-Test**.
153
+
1. For **Name**, type **VNet-OnPrem**.
154
+
1. For **Region**, select **East US**.
155
+
1. Select **Next : IP Addresses**.
156
+
157
+
1. For **IPv4 address space**, type **192.168.0.0/16**.
158
+
1. Under **Subnet name**, select **default**.
159
+
1. Change the **Subnet name** to **SN-Corp**.
160
+
1. For **Subnet address range**, type **192.168.1.0/24**.
161
+
1. Accept the other default settings, and then select **Save**.
162
+
2. Select **Add Subnet**.
163
+
3. For **Subnet name**, type **GatewaySubnet**.
164
+
4. For **Subnet address range** type **192.168.2.0/24**.
165
+
5. Select **Add**.
166
+
1. Select **Review + create**.
167
+
1. Select **Create**.
145
168
146
-
1. On the **VNet-Onprem** page, select **Subnets**.
147
-
2. Select **+Subnet**.
148
-
3. For **Name**, type **GatewaySubnet**.
149
-
4. For **Address range (CIDR block)** type **192.168.2.0/24**.
150
-
5. Select **OK**.
151
169
152
-
### Create a public IP address
153
170
154
-
This is the public IP address used for the on-premises gateway.
155
-
156
-
1. From the Azure portal home page, select **Create a resource**.
157
-
2. In the search text box, type **public IP address** and press **Enter**.
158
-
3. Select **Public IP address** and then select **Create**.
159
-
4. For the name, type **VNet-Onprem-GW-pip**.
160
-
5. For the resource group, type **FW-Hybrid-Test**.
161
-
6. For **Location**, select select **East US**.
162
-
7. Accept the other defaults, and then select **Create**.
163
171
164
172
## Configure and deploy the firewall
165
173
166
-
When security policies are associated with a hub, it is referred to as a *hub virtual network*.
174
+
When security policies are associated with a hub, it's referred to as a *hub virtual network*.
167
175
168
176
Convert the **VNet-Hub** virtual network into a *hub virtual network* and secure it with Azure Firewall.
169
177
170
178
1. In the Azure portal search bar, type **Firewall Manager** and press **Enter**.
171
179
3. On the Azure Firewall Manager page, under **Add security to virtual networks**, select **View hub virtual networks**.
172
-
4. Select**Convert virtual networks**.
173
-
5. Select **VNet-hub** and then select **Next : Azure Firewall**.
174
-
6. For the **Firewall Policy**, select **Pol-Net01**.
175
-
7. Select **Next " Review + confirm**
176
-
8. Review the details and then select **Confirm**.
180
+
1. Under**Virtual Networks**, select the check box for **VNet-hub**.
181
+
1. Select **Manage Security**, and then select **Deploy a Firewall with Firewall Policy**.
182
+
1. On the **Convert virtual networks** page, under **Firewall Policy**, select the check box for**Pol-Net01**.
183
+
1. Select **Next : Review + confirm**
184
+
1. Review the details and then select **Confirm**.
177
185
178
186
179
187
This takes a few minutes to deploy.
@@ -214,20 +222,20 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
214
222
7. For **VPN type**, select **Route-based**.
215
223
8. For **SKU**, select **Basic**.
216
224
9. For **Virtual network**, select **VNet-Onprem**.
217
-
10. For **Public IP address**, select **Use existing*, and select**VNet-Onprem-GW-pip** for the name.
225
+
10. For **Public IP address**, select **Create new**, and type**VNet-Onprem-GW-pip** for the name.
218
226
11. Accept the remaining defaults and then select **Review + create**.
219
227
12. Review the configuration, then select **Create**.
220
228
221
229
### Create the VPN connections
222
230
223
231
Now you can create the VPN connections between the hub and on-premises gateways.
224
232
225
-
In this step, you create the connection from the hub virtual network to the on-premises virtual network. You'll see a shared key referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. Creating a connection can take a short while to complete.
233
+
In this step, you create the connection from the hub virtual network to the on-premises virtual network. You'll see a shared key referenced in the examples. You can use your own values for the shared key. The important thing is that the shared key must match for both connections. It takes some time to create the connection.
226
234
227
235
1. Open the **FW-Hybrid-Test** resource group and select the **GW-hub** gateway.
228
236
2. Select **Connections** in the left column.
229
237
3. Select **Add**.
230
-
4.The the connection name, type **Hub-to-Onprem**.
238
+
4.For the connection name, type **Hub-to-Onprem**.
231
239
5. Select **VNet-to-VNet** for **Connection type**.
232
240
6. For the **Second virtual network gateway**, select **GW-Onprem**.
233
241
7. For **Shared key (PSK)**, type **AzureA1b2C3**.
@@ -258,21 +266,31 @@ Now peer the hub and spoke virtual networks.
258
266
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-hub** virtual network.
259
267
2. In the left column, select **Peerings**.
260
268
3. Select **Add**.
261
-
4. For **Name**, type **HubtoSpoke**.
262
-
5. For the **Virtual network**, select **VNet-spoke**
263
-
6. For the name of the peering from VNetSpoke to VNet-hub, type **SpoketoHub**.
264
-
7. Select **Allow gateway transit**.
265
-
8. Select **OK**.
266
-
267
-
### Configure additional settings for the SpoketoHub peering
268
-
269
-
You'll need to enable the **Allow forwarded traffic** on the SpoketoHub peering.
270
-
271
-
1. Open the **FW-Hybrid-Test** resource group and select the **VNet-Spoke** virtual network.
272
-
2. In the left column, select **Peerings**.
273
-
3. Select the **SpoketoHub** peering.
274
-
4. Under **Allow forwarded traffic from VNet-hub to VNet-Spoke**, select **Enabled**.
275
-
5. Select **Save**.
269
+
4. Under **This virtual network**:
270
+
271
+
272
+
|Setting name |Value |
273
+
|---------|---------|
274
+
|Peering link name| HubtoSpoke|
275
+
|Traffic to remote virtual network| Allow (default) |
276
+
|Traffic forwarded from remote virtual network | Allow (default) |
277
+
|Virtual network gateway or route server | Use this virtual network's gateway |
@@ -285,18 +303,19 @@ Next, create a couple routes:
285
303
2. In the search text box, type **route table** and press **Enter**.
286
304
3. Select **Route table**.
287
305
4. Select **Create**.
288
-
5. For the name, type **UDR-Hub-Spoke**.
289
-
6. Select the **FW-Hybrid-Test** for the resource group.
290
-
8. For **Location**, select **(US) East US)**.
291
-
9. Select **Create**.
292
-
10. After the route table is created, select it to open the route table page.
293
-
11. Select **Routes** in the left column.
294
-
12. Select **Add**.
295
-
13. For the route name, type **ToSpoke**.
296
-
14. For the address prefix, type **10.6.0.0/16**.
297
-
15. For next hop type, select **Virtual appliance**.
298
-
16. For next hop address, type the firewall's private IP address that you noted earlier.
299
-
17. Select **OK**.
306
+
1. Select the **FW-Hybrid-Test** for the resource group.
307
+
1. For **Region**, select **East US**.
308
+
1. For the name, type **UDR-Hub-Spoke**.
309
+
1. Select **Review + Create**.
310
+
1. Select **Create**.
311
+
1. After the route table is created, select it to open the route table page.
312
+
1. Select **Routes** in the left column.
313
+
1. Select **Add**.
314
+
1. For the route name, type **ToSpoke**.
315
+
1. For the address prefix, type **10.6.0.0/16**.
316
+
1. For next hop type, select **Virtual appliance**.
317
+
1. For next hop address, type the firewall's private IP address that you noted earlier.
318
+
1. Select **OK**.
300
319
301
320
Now associate the route to the subnet.
302
321
@@ -312,19 +331,20 @@ Now create the default route from the spoke subnet.
312
331
2. In the search text box, type **route table** and press **Enter**.
313
332
3. Select **Route table**.
314
333
5. Select **Create**.
315
-
6. For the name, type **UDR-DG**.
316
334
7. Select the **FW-Hybrid-Test** for the resource group.
317
-
8. For **Location**, select **(US) East US)**.
318
-
4. For **Virtual network gateway route propagation**, select **Disabled**.
335
+
8. For **Region**, select **East US**.
336
+
1. For the name, type **UDR-DG**.
337
+
4. For **Propagate gateway routes**, select **No**.
338
+
1. Select **Review + create**.
319
339
1. Select **Create**.
320
-
2. After the route table is created, select it to open the route table page.
321
-
3. Select **Routes** in the left column.
322
-
4. Select **Add**.
323
-
5. For the route name, type **ToHub**.
324
-
6. For the address prefix, type **0.0.0.0/0**.
325
-
7. For next hop type, select **Virtual appliance**.
326
-
8. For next hop address, type the firewall's private IP address that you noted earlier.
327
-
9. Select **OK**.
340
+
1. After the route table is created, select it to open the route table page.
341
+
1. Select **Routes** in the left column.
342
+
1. Select **Add**.
343
+
1. For the route name, type **ToHub**.
344
+
1. For the address prefix, type **0.0.0.0/0**.
345
+
1. For next hop type, select **Virtual appliance**.
346
+
1. For next hop address, type the firewall's private IP address that you noted earlier.
347
+
1. Select **OK**.
328
348
329
349
Now associate the route to the subnet.
330
350
@@ -345,20 +365,21 @@ Create a virtual machine in the spoke virtual network, running IIS, with no publ
345
365
1. From the Azure portal home page, select **Create a resource**.
346
366
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
347
367
3. Enter these values for the virtual machine:
348
-
-**Resource group** - Select **FW-Hybrid-Test**.
349
-
-**Virtual machine name**: *VM-Spoke-01*.
350
-
-**Region** - *(US) East US)*.
351
-
-**User name**: *azureuser*.
352
-
-**Password**: type your password
368
+
-**Resource group** - Select **FW-Hybrid-Test**
369
+
-**Virtual machine name**: *VM-Spoke-01*
370
+
-**Region** - *(US) East US*
371
+
-**User name**: type a user name
372
+
-**Password**: type a password
353
373
354
374
4. Select **Next:Disks**.
355
375
5. Accept the defaults and select **Next: Networking**.
356
376
6. Select **VNet-Spoke** for the virtual network and the subnet is **SN-Workload**.
357
-
7. For **Public IP**, select **None**.
358
377
8. For **Public inbound ports**, select **Allow selected ports**, and then select **HTTP (80)**, and **RDP (3389)**
359
-
9. Select **Next:Management**.
360
-
10. For **Boot diagnostics**, Select **Off**.
361
-
11. Select **Review+Create**, review the settings on the summary page, and then select **Create**.
378
+
1. Select **Next : Disks**.
379
+
1. Select **Next : Networking**.
380
+
1. Select **Next:Management**.
381
+
1. For **Boot diagnostics**, Select **Disable**.
382
+
1. Select **Review + Create**, review the settings on the summary page, and then select **Create**.
362
383
363
384
### Install IIS
364
385
@@ -384,19 +405,19 @@ This is a virtual machine that you use to connect using Remote Desktop to the pu
384
405
1. From the Azure portal home page, select **Create a resource**.
385
406
2. Under **Popular**, select **Windows Server 2016 Datacenter**.
386
407
3. Enter these values for the virtual machine:
387
-
-**Resource group** - Select existing, and then select **FW-Hybrid-Test**.
388
-
-**Virtual machine name** - *VM-Onprem*.
389
-
-**Region** - *(US) East US)*.
390
-
-**User name**: *azureuser*.
391
-
-**Password**: type your password.
408
+
-**Resource group** - Select existing, and then select **FW-Hybrid-Test**
409
+
-**Virtual machine name** - *VM-Onprem*
410
+
-**Region** - *(US) East US*
411
+
-**User name**: type a user name
412
+
-**Password**: type your password
392
413
393
414
4. Select **Next:Disks**.
394
415
5. Accept the defaults and select **Next:Networking**.
395
416
6. Select **VNet-Onprem** for virtual network and verify the subnet is **SN-Corp**.
396
417
7. For **Public inbound ports**, select **Allow selected ports**, and then select **RDP (3389)**
397
418
8. Select **Next:Management**.
398
-
9. For **Boot diagnostics**, select **Off**.
399
-
10. Select **Review+Create**, review the settings on the summary page, and then select **Create**.
419
+
9. For **Boot diagnostics**, select **Disable**.
420
+
10. Select **Review + Create**, review the settings on the summary page, and then select **Create**.
400
421
401
422
## Test the firewall
402
423
@@ -423,17 +444,17 @@ So now you've verified that the firewall rules are working:
423
444
424
445
Next, change the firewall network rule collection action to **Deny** to verify that the firewall rules work as expected.
425
446
426
-
1. Open the **FW-Hybrid-Test** resource group and select the **Pol-Net01**firewall policy.
427
-
2. Under **Settings**, select **Rules**.
428
-
3. Under **Network rules**, select the **RCNet01** rule collection, select the ellipses (...), and select **Edit**.
429
-
4. For **Rule collection action**, select **Deny**.
430
-
5. Select **Save**.
447
+
1. Open the **FW-Hybrid-Test** resource group and select the **Pol-Net01**firewall policy.
448
+
2. Under **Settings**, select **Rule Collections**.
449
+
1. Select the **RCNet01** rule collection.
450
+
1. For **Rule collection action**, select **Deny**.
451
+
1. Select **Save**.
431
452
432
-
Close any existing remote desktops and browsers on **VM-Onprem** before testing the changed rules. After the rule collection update is complete, run the tests again. They should all fail this time.
453
+
Close any existing remote desktops and browsers on **VM-Onprem** before testing the changed rules. After the rule collection update is complete, run the tests again. They should all fail to connect this time.
433
454
434
455
## Clean up resources
435
456
436
-
You can keep your firewall resources for the next tutorial, or if no longer needed, delete the **FW-Hybrid-Test** resource group to delete all firewall-related resources.
457
+
You can keep your firewall resources for further investigation, or if no longer needed, delete the **FW-Hybrid-Test** resource group to delete all firewall-related resources.
0 commit comments