Module 2 Implement Management and Security Solutions - Azure Firewall Hands On
Module 2 Implement Management and Security Solutions - Azure Firewall Hands On
The Azure firewall is a fully managed, cloud-based network security service that protects your azure virtual
network resources.
The Azure firewall has built in high availability and unrestricted cloud scalability, so it does not matter if you are
just configuring Azure and you have a few dozen VMS, maybe a few dozen services or applications, or if you have
100 VMS 100 applications, it can scale to that level.
You can essentially create, enforce and log application and network connectivity policies across multiple
subscriptions and across multiple virtual networks.
As a firewall uses a static public IP address for your virtual network resources, this allows anything outside, it's
outside to identify traffic originating from your virtual network
This as your firewall service is fully integrated with Azure Monitor for logging and Analytics, and that is incredibly
detailed level of logging.
1. Azure Firewall
Objective – To set up an azure firewall to access application, the below are High Level steps & azure services
involved in setting up azure firewall environment
Setup a network Test environment – Azure Virtual Network, Subnets & NIC
Deploying a firewall – Azure Firewall
Create a default route – Azure Route
Configure an application rule to access to www.google.com
Configure a network rule to allow access to external DNS servers
Configure a NAT rule to allow a remote to test server
Other services -- Azure Virtual Machine, Azure Resource Group
Finally test the firewall environment.
Test-FW01
Internet
Workload Subnet:
Workload_SN
Srv-World-VM
Single VNet:
Test-FW-VN
Implementation steps
Under Rules
Name Protoco Source Source Destination Destination Translated Address Translated por
l type Address (Public / (IP Address of VM)
address of Translated
firewall) port
rdp- TCP IP- * Open 3389 Open VM , get 3389
nat Address firewall,click Private IP Address
fw-pip get Ip
Address
Click Add
Done with App ,Net , NAT Rule collection
Step 7. Azure Firewall DNS Configuration
Here change Primary and secondary DNS servers of Virtual Machine
Open Service VM ,
Under Networking Network Interface DNS servers
Custom DNS : 209.244.0.3 , 209.244.0.4
Click save
Now VM has external name resolution access
Step 8. Verify Azure Firewall Filters Traffic , get the public address of firewall
Open service Firewall, Test-FW01
Click fw-pip, take the public IP Addres
Log into VM
Past the Above IP address take , click connect
Open the browser in the VM
Google.com will work
Check Microsoft.com doesn’t work
Open service Test-FW01 Rules Application collection Collections
Add
Target FQDMs
Name Source type Source Protocol Port Target FQDNs
Allow-Microsoft IP-Address 10.0.2.0/24 http:80,https:443 www.microsoft.com