text stringlengths 0 3.99k | embedding listlengths 768 768 | metadata dict |
|---|---|---|
Setting
Value
Subscription
Select your Azure subscription.
Resource group
Select Test-FW-RG.
Name
Enter Test-FW-VN.
Region
Select the same location that you used previously.
5. Select Next: IP addresses.
6. For IPv4 Address space, accept the default 10.1.0.0/16.
7. Under Subnet, select default.
8. For Subnet name chang... | [
0.025096653029322624,
-0.011831749230623245,
-0.013956972397863865,
0.009104394353926182,
0.08089807629585266,
0.059704720973968506,
0.05233685299754143,
-0.002778324531391263,
0.014826996251940727,
-0.03978170454502106,
-0.006613459438085556,
-0.001979089342057705,
-0.06501206010580063,
0... | {
"azure_component": "security",
"chunk_index": 259,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "246",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
2. Select Windows Server 2019 Datacenter.
3. Enter or select these values for the virtual machine:
Setting
Value
Subscription
Select your Azure subscription.
Resource group
Select Test-FW-RG.
Virtual machine name
Enter Srv-Work.
Region
Select the same location that you used previously.
Username
Enter a username.
Passwo... | [
0.006663553882390261,
0.018566861748695374,
0.02832251600921154,
0.009072915650904179,
0.08257108926773071,
0.02870146557688713,
0.06876212358474731,
0.005117950029671192,
0.00999381486326456,
-0.0593707337975502,
-0.031694747507572174,
-0.005870914086699486,
-0.05041336640715599,
0.020743... | {
"azure_component": "security",
"chunk_index": 260,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "247",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. Select Firewall and then select Create.
4. On the Create a Firewall page, use the following table to configure the firewall:
Setting
Value
Subscription
Select your Azure subscription.
Resource group
Select Test-FW-RG.
Name
Enter Test-FW01.
Region
Select the same location that you used previously.
Firewall management... | [
0.0338745042681694,
0.023304205387830734,
0.015873581171035767,
0.011846966110169888,
0.07724035531282425,
0.030685892328619957,
0.04162105917930603,
0.017278941348195076,
0.011709003709256649,
-0.05335308983922005,
-0.032773926854133606,
-0.012047607451677322,
-0.06583627313375473,
0.0101... | {
"azure_component": "security",
"chunk_index": 261,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "248",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Subscription
Select your Azure subscription.
Resource group
Select Test-FW-RG.
Region
Select the same location that you used previously.
Name
Enter Firewall-route.
4. Select Review + create.
5. Select Create.
After deployment completes, select Go to resource.
1. On the Firewall-route page, select Subnets ... | [
0.036329396069049835,
-0.0030655241571366787,
0.033150602132081985,
0.01467547845095396,
0.0693981721997261,
0.03674360737204552,
0.06286140531301498,
-0.0007790105883032084,
0.009971056133508682,
-0.05532664433121681,
-0.005440844222903252,
-0.003671238198876381,
-0.07236502319574356,
0.0... | {
"azure_component": "security",
"chunk_index": 262,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "249",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
9. For Source, enter 10.0.2.0/24.
10. For Protocol:port, enter http, https.
11. For Destination Type, select FQDN.
12. For Destination, enter www.google.com
13. Select Add.
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by
default. These FQDNs are specific for the platform ... | [
-0.00773946288973093,
-0.009031589142978191,
-0.013557328842580318,
-0.025608470663428307,
0.07066307216882706,
-0.005726432427763939,
0.03960409387946129,
-0.003524663159623742,
0.012957525439560413,
-0.048809267580509186,
-0.01738119125366211,
-0.015141697600483894,
-0.09722534567117691,
... | {
"azure_component": "security",
"chunk_index": 263,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "250",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
7. For Source type, select IP address.
8. For Source, enter *.
9. For Protocol, select TCP.
10. For Destination Ports, enter 3389.
11. For Destination Type, select IP Address.
12. For Destination, enter the firewall public IP address.
13. For Translated address, enter the Srv-work private IP address.
14. For Translated... | [
-0.01190252136439085,
0.032256536185741425,
-0.00810805894434452,
-0.010844884440302849,
0.06366977840662003,
0.03862551972270012,
0.05995595455169678,
0.005713116377592087,
0.03206152841448784,
-0.049394287168979645,
0.004116775467991829,
-0.004201997071504593,
-0.07223714143037796,
0.040... | {
"azure_component": "security",
"chunk_index": 264,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "251",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can browse to the one allowed FQDN, but not to any others.
You can resolve DNS names using the configured external DNS server.
You can keep your firewall resources for the next tutorial, or if no longer needed, delete the
Test-FW-RG resource group to delete all firewall-related resources.
Clean up resources
Next st... | [
-0.020197270438075066,
0.016679203137755394,
-0.008034258149564266,
0.011028347536921501,
0.07165030390024185,
0.008494308218359947,
0.034759894013404846,
-0.012478924356400967,
0.026642628014087677,
-0.02938966453075409,
-0.014389336109161377,
0.010796412825584412,
-0.07615680247545242,
0... | {
"azure_component": "security",
"chunk_index": 265,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "252",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Integrate NAT gateway with Azure Firewall
in a hub and spoke network for outbound
connectivity
05/30/2025
In this tutorial, you learn how to integrate a NAT gateway with Azure Firewall in a hub and
spoke network for enhanced outbound connectivity and scalability.
Azure Firewall provides 2,496 SNAT ports per public IP a... | [
-0.012137188576161861,
-0.03688860684633255,
0.015625489875674248,
0.006420498713850975,
0.007809518836438656,
0.01777639240026474,
0.07699614018201828,
0.015436146408319473,
-0.04428831487894058,
-0.015756528824567795,
-0.034295596182346344,
-0.030557865276932716,
-0.0537976436316967,
0.0... | {
"azure_component": "security",
"chunk_index": 266,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "253",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
In this tutorial, you learn how to:
An Azure account with an active subscription. Create an account for free
.
The hub virtual network contains the firewall subnet that is associated with the Azure Firewall
and NAT gateway. Use the following example to create the hub virtual network.
1. Sign in to the Azure portal
.
2.... | [
0.0046874480322003365,
-0.010279207490384579,
0.034434035420417786,
0.013451717793941498,
0.03219575434923172,
-0.009120352566242218,
0.05737719312310219,
0.021947618573904037,
-0.00032981112599372864,
-0.03938649222254753,
-0.02747308276593685,
-0.02704496681690216,
-0.06480121612548828,
... | {
"azure_component": "security",
"chunk_index": 267,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "254",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Project details
Subscription
Select your subscription.
Resource group
Select Create new.
Enter test-rg.
Select OK.
Instance details
Name
Enter vnet-hub.
Region
Select (US) South Central US.
5. Select Next to proceed to the Security tab.
6. Select Enable Azure Bastion in the Azure Bastion section of the Se... | [
-0.026816967874765396,
0.04163696989417076,
0.000978977419435978,
0.018485642969608307,
0.04857945069670677,
0.029189936816692352,
0.05160887539386749,
-0.003510970389470458,
0.00305615714751184,
-0.04780769348144531,
-0.07022412121295929,
0.015804661437869072,
-0.07344666123390198,
0.0353... | {
"azure_component": "security",
"chunk_index": 268,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "255",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall is a managed, cloud-based network security service that protects your
Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in
high availability and unrestricted cloud scalability. For more information about Azure
Firewall, see Azure Firewall.
9. Enter or select the foll... | [
0.013807428069412708,
0.00041150860488414764,
0.017152704298496246,
0.021162232384085655,
0.041055358946323395,
0.023256665095686913,
0.05955810472369194,
0.019280962646007538,
-0.01298218872398138,
-0.048807788640260696,
-0.0396200455725193,
-0.04067074507474899,
-0.05014995485544205,
0.0... | {
"azure_component": "security",
"chunk_index": 269,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "256",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. In the Basics tab of Create network address translation (NAT) gateway enter or
select the following information:
Setting
Value
Project details
Subscription
Select your subscription.
Resource group
Select test-rg.
Instance details
NAT gateway name
Enter nat-gateway.
Region
Select South Central US.
Availability zone
S... | [
0.012282571755349636,
-0.01289052702486515,
0.005093054845929146,
-0.0008154097595252097,
0.05610642954707146,
0.018231600522994995,
0.0849376916885376,
0.025293204933404922,
-0.0008815960609354079,
-0.03552516549825668,
-0.03667784854769707,
-0.0007071797735989094,
-0.0502312146127224,
0.... | {
"azure_component": "security",
"chunk_index": 270,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "257",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The spoke virtual network contains the test virtual machine used to test the routing of the
internet traffic to the NAT gateway. Use the following example to create the spoke network.
1. In the search box at the top of the portal, enter Virtual network. Select Virtual
networks in the search results.
2. Select + Create.... | [
0.04002643749117851,
-0.0025970793794840574,
0.010328059084713459,
0.03489207103848457,
0.055559996515512466,
0.017115699127316475,
0.06936575472354889,
0.01961621269583702,
-0.030536051839590073,
-0.0519372895359993,
-0.0009698112844489515,
0.01504421979188919,
-0.04802247881889343,
0.043... | {
"azure_component": "security",
"chunk_index": 271,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "258",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Subnet purpose
Leave the default Default.
Name
Enter subnet-private.
IPv4
IPv4 address range
Leave the default of 10.1.0.0/16.
Starting address
Leave the default of 10.1.0.0.
Size
Leave the default of /24(256 addresses).
11. Select Add.
12. Select Review + create.
13. Select Create.
A virtual network peer... | [
0.019116049632430077,
0.006907708011567593,
0.01719655841588974,
-0.014011344872415066,
0.06441430747509003,
0.025950312614440918,
0.04924438148736954,
0.01088431105017662,
0.011183816939592361,
-0.07113419473171234,
-0.00955283548682928,
-0.011907494626939297,
-0.07499264180660248,
0.0408... | {
"azure_component": "security",
"chunk_index": 272,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "259",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Virtual network deployment model
Leave the default of Resource
manager.
Subscription
Select your subscription.
Virtual network
Select vnet-spoke (test-rg).
Remote virtual network peering settings
Allow 'vnet-spoke' to access 'vnet-hub'
Leave the default of Selected.
Allow 'vnet-spoke' to receive forwarded... | [
0.03710039705038071,
-0.0037216634955257177,
0.0431877076625824,
0.0008169015054591,
0.0867045521736145,
0.027345776557922363,
0.05896992236375809,
0.03378486633300781,
-0.0034668606240302324,
-0.06891310960054398,
-0.03453582525253296,
0.014514622278511524,
-0.06638411432504654,
0.0527829... | {
"azure_component": "security",
"chunk_index": 273,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "260",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The private IP address of the firewall is needed for the route table created later in this article.
Use the following example to obtain the firewall private IP address.
1. In the search box at the top of the portal, enter Firewall. Select Firewalls in the search
results.
2. Select firewall.
3. In the Overview of firewa... | [
0.004887724295258522,
0.02742915041744709,
0.010743077844381332,
0.023396743461489677,
0.030092190951108932,
0.010256802663207054,
0.05490582808852196,
0.03477266803383827,
0.006684056483209133,
-0.023717815056443214,
-0.013515817001461983,
-0.015069516375660896,
-0.04397976025938988,
0.03... | {
"azure_component": "security",
"chunk_index": 274,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "261",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Name
Enter route-table-spoke.
Propagate gateway routes
Select No.
4. Select Review + create.
5. Select Create.
6. In the search box at the top of the portal, enter Route table. Select Route tables in
the search results.
7. Select route-table-spoke.
8. In Settings select Routes.
9. Select + Add in Routes.
... | [
0.004164175130426884,
0.030468033626675606,
-0.00504278251901269,
0.0003241320955567062,
0.07633869349956512,
0.04653710126876831,
0.04889962822198868,
0.01549573428928852,
0.010605941526591778,
-0.08601732552051544,
0.01204953994601965,
0.013916091062128544,
-0.053050700575113297,
0.05288... | {
"azure_component": "security",
"chunk_index": 275,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "262",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Subnet
Select subnet-private.
15. Select OK.
Traffic from the spoke through the hub must be allowed through and firewall policy and a
network rule. Use the following example to create the firewall policy and network rule.
1. In the search box at the top of the portal, enter Firewall. Select Firewall Polic... | [
-0.016253193840384483,
-0.025210095569491386,
0.023752419278025627,
-0.019907252863049507,
0.060056887567043304,
-0.0075886738486588,
0.03340991213917732,
-0.030308732762932777,
0.0023794923909008503,
-0.05443401262164116,
-0.020984560251235962,
0.006458051037043333,
-0.07866089791059494,
... | {
"azure_component": "security",
"chunk_index": 276,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "263",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Source type
IP Address.
Source
Enter 10.1.0.0/24.
Protocol
Select TCP.
Destination Ports
Enter 80,443.
Destination Type
Select IP Address.
Destination
Enter *
6. Select Add.
An Ubuntu virtual machine is used to test the outbound internet traffic through the NAT
gateway. Use the following example to create... | [
0.004207974299788475,
-0.004372929688543081,
-0.035404741764068604,
0.03788084536790848,
0.03883953392505646,
0.04391893744468689,
0.06165122240781784,
0.05382820591330528,
-0.006375533994287252,
-0.05644644796848297,
-0.003759249346330762,
0.009302705526351929,
-0.07216423004865646,
0.065... | {
"azure_component": "security",
"chunk_index": 277,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "264",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Availability options
Select No infrastructure redundancy required.
Security type
Leave the default of Standard.
Image
Select Ubuntu Server 24.04 LTS - x64 Gen2.
VM architecture
Leave the default of x64.
Size
Select a size.
Administrator account
Authentication type
Select Password.
Username
Enter azureuser... | [
-0.02927197329699993,
0.006805452052503824,
-0.007733483333140612,
0.026766372844576836,
0.08775684237480164,
0.03733551874756813,
0.0451313741505146,
-0.003162964479997754,
-0.024958454072475433,
-0.06959283351898193,
-0.0212163794785738,
-0.0025224618148058653,
-0.07703246921300888,
0.02... | {
"azure_component": "security",
"chunk_index": 278,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "265",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
7. Review the settings and select Create.
Wait for the virtual machine to finishing deploying before proceeding to the next steps.
You connect to the Ubuntu virtual machines you created in the previous steps to verify that the
outbound internet traffic is leaving the NAT gateway.
Obtain the NAT gateway public IP addres... | [
-0.008852832019329071,
0.007881244644522667,
0.004093918018043041,
0.01138631533831358,
0.01591172255575657,
0.016100911423563957,
0.07228858023881912,
0.03076828084886074,
-0.02691548690199852,
-0.045417942106723785,
-0.038522280752658844,
0.010783715173602104,
-0.03401973843574524,
0.025... | {
"azure_component": "security",
"chunk_index": 279,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "266",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Select SSH as the connection type. Upload your SSH private key file. Select Connect.
5. In the bash prompt, enter the following command:
Bash
6. Verify the IP address returned by the command matches the public IP address of the NAT
gateway.
Output
7. Close the Bastion connection to vm-spoke.
When you finish using th... | [
-0.028446363285183907,
0.04891052097082138,
0.019757647067308426,
0.011687101796269417,
0.03641516715288162,
0.035567767918109894,
0.07862550020217896,
-0.0007299998542293906,
-0.01319233886897564,
-0.05627404898405075,
-0.036292072385549545,
0.005141721572726965,
-0.050773803144693375,
0.... | {
"azure_component": "security",
"chunk_index": 280,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "267",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
IP Groups in Azure Firewall
Article • 03/20/2025
IP Groups allow you to group and manage IP addresses for Azure Firewall rules in the
following ways:
As a source address in DNAT rules
As a source or destination address in network rules
As a source address in application rules
An IP Group can have a single IP address, m... | [
0.0005548053304664791,
0.0031734032090753317,
-0.006396961864084005,
0.0027062096633017063,
0.005402971059083939,
-0.021817626431584358,
0.04009072855114937,
0.032221030443906784,
0.0264875665307045,
-0.056572459638118744,
-0.029653161764144897,
-0.038606058806180954,
-0.07191962003707886,
... | {
"azure_component": "security",
"chunk_index": 281,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "268",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can see all the IP addresses in the IP Group and the rules or resources that are
associated with it. To delete an IP Group, you must first dissociate the IP Group from the
resource that is using it.
1. To view or edit the IP addresses, select IP Addresses under Settings on the left
pane.
2. To add a single or multi... | [
0.006675765849649906,
0.03135662153363228,
0.009579203091561794,
0.009547819383442402,
0.053156524896621704,
-0.012303132563829422,
0.039459649473428726,
0.044899772852659225,
-0.00024602958001196384,
-0.05584855377674103,
-0.012392669916152954,
-0.029151413589715958,
-0.09006523340940475,
... | {
"azure_component": "security",
"chunk_index": 282,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "269",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Error message
Description
Recommended action
In failed state
(skipping update)
Azure Firewall or Firewall Policy
is in a failed state. Updates
cannot proceed until the
resource is healthy.
Review previous operations and
correct any misconfigurations to
ensure the resource is healthy.
Backend server
could not update
Fir... | [
-0.017995774745941162,
-0.029743900522589684,
-0.012508358806371689,
0.01967054232954979,
0.06611640006303787,
0.024454854428768158,
0.06244878098368645,
0.010669266805052757,
-0.0027150188107043505,
-0.04143583029508591,
-0.02591945230960846,
-0.02736067771911621,
-0.06798145920038223,
0.... | {
"azure_component": "security",
"chunk_index": 283,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "270",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
New-AzFirewallNetworkRule
New-AzFirewallApplicationRule
New-AzFirewallNatRule
Learn how to deploy and configure an Azure Firewall.
Next steps
Yes
No | [
0.04326951131224632,
-0.02291242405772209,
-0.0005895343492738903,
-0.0044681718572974205,
0.04128321632742882,
-0.024785753339529037,
0.052051130682229996,
0.026518670842051506,
0.025368832051753998,
-0.04333779215812683,
-0.051585614681243896,
-0.015494297258555889,
-0.0662904605269432,
... | {
"azure_component": "security",
"chunk_index": 284,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "271",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Create IP Groups
Article • 11/01/2022
IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They
can have a single IP address, multiple IP addresses, or one or more IP address ranges.
To create an IP Group by using the Azure portal:
1. On the Azure portal home page, select Create a resource.
2.... | [
0.0028312974609434605,
0.014980176463723183,
-0.001970910932868719,
-0.00027339463122189045,
0.04043836146593094,
-0.011195845901966095,
0.04313601180911064,
0.029092678800225258,
-0.00360893364995718,
-0.060797836631536484,
-0.03140787035226822,
-0.04370982199907303,
-0.07208926975727081,
... | {
"azure_component": "security",
"chunk_index": 285,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "272",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
This example creates an IP Group with an address prefix and an IP address by using
Azure PowerShell:
Azure PowerShell
This example creates an IP Group with an address prefix and an IP address by using the
Azure CLI:
Azure CLI
Learn more about IP Groups
$ipGroup = @{
Name = 'ipGroup'
ResourceGroupNa... | [
0.017504291608929634,
-0.024279432371258736,
-0.004067236557602882,
0.03727220371365547,
0.04469427093863487,
-0.014134753495454788,
0.02069840393960476,
0.05106491968035698,
0.012022694572806358,
-0.0265023335814476,
-0.02510792948305607,
-0.015647446736693382,
-0.053681034594774246,
-0.0... | {
"azure_component": "security",
"chunk_index": 286,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "273",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall and
IP Groups - Bicep
Article • 03/08/2023
In this quickstart, you use a Bicep file to deploy an Azure Firewall with sample IP Groups
used in a network rule and application rule. An IP Group is a top-level resource that
allows you to define and group IP addresses, ranges, and subnet... | [
0.005733074154704809,
-0.04143482819199562,
0.006015677470713854,
-0.011630939319729805,
0.02382931113243103,
-0.009705561213195324,
0.046263303607702255,
0.013569667935371399,
-0.0005248701781965792,
-0.07596248388290405,
-0.03290313854813576,
-0.04607919603586197,
-0.08870238810777664,
0... | {
"azure_component": "security",
"chunk_index": 287,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "274",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
@minValue(1)
@maxValue(100)
param numberOfFirewallPublicIPAddresses int = 1
@description('Type of authentication to use on the Virtual Machine. SSH key
is recommended.')
@allowed([
'sshPublicKey'
'password'
])
param authenticationType string = 'sshPublicKey'
@description('SSH Key or password for the Virtual Machin... | [
-0.012202367186546326,
-0.03620748966932297,
0.006706584710627794,
0.0527033805847168,
0.055625829845666885,
0.023708540946245193,
0.06793394684791565,
-0.02765781059861183,
-0.010430528782308102,
-0.06943560391664505,
0.004612816963344812,
-0.04138989746570587,
-0.0809914618730545,
0.0369... | {
"azure_component": "security",
"chunk_index": 288,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "275",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
virtualNetworkName,
azureFirewallSubnetName)
var linuxConfiguration = {
disablePasswordAuthentication: true
ssh: {
publicKeys: [
{
path: '/home/${adminUsername}/.ssh/authorized_keys'
keyData: adminPasswordOrKey
}
]
}
}
var networkSecurityGroupName = '${serversSubnetName}-nsg'
... | [
-0.019276488572359085,
-0.016329364851117134,
0.017565740272402763,
0.0002614193654153496,
0.07081654667854309,
0.03170880302786827,
0.07398084551095963,
-0.008018563501536846,
-0.004582569934427738,
-0.041176408529281616,
-0.011601444333791733,
-0.018435712903738022,
-0.06371282041072845,
... | {
"azure_component": "security",
"chunk_index": 289,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "275",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
name: 'IpConf${i}'
properties: {
subnet: {
id: (i == 0) ? azureFirewallSubnetId : null
}
publicIPAddress: {
id: publicIP[i].id
}
}
}]
resource ipgroup1 'Microsoft.Network/ipGroups@2021-08-01' = {
name: ipgroups_name1
location: location
properties: {
ipAddresses: [
'13.73.... | [
-0.018754547461867332,
-0.012979980558156967,
-0.005652176681905985,
0.017414402216672897,
0.07603517174720764,
-0.011818049475550652,
0.04592038691043854,
0.046455759555101395,
0.011497477069497108,
-0.05984014645218849,
-0.009553461335599422,
-0.04524758830666542,
-0.07592024654150009,
0... | {
"azure_component": "security",
"chunk_index": 290,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "276",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
nextHopIpAddress: nextHopIP
}
}
]
}
}
resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-
08-01' = {
name: networkSecurityGroupName
location: location
properties: {}
}
resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-08-01' = {
name: virtualNetworkName... | [
0.01147293671965599,
-0.006236770190298557,
0.023032277822494507,
0.02282894216477871,
0.059913236647844315,
-0.010191984474658966,
0.06958196312189102,
0.02303783781826496,
0.011548119597136974,
-0.04731333255767822,
-0.01594490371644497,
-0.06816267222166061,
-0.07678893953561783,
0.0275... | {
"azure_component": "security",
"chunk_index": 291,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "277",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
resource publicIP 'Microsoft.Network/publicIPAddresses@2021-08-01' = [for i
in range(0, numberOfFirewallPublicIPAddresses): {
name: '${publicIPNamePrefix}${i + 1}'
location: location
sku: {
name: 'Standard'
}
properties: {
publicIPAllocationMethod: 'Static'
publicIPAddressVersion: 'IPv4'
}
}]
r... | [
-0.020357169210910797,
-0.008258482441306114,
-0.05264301598072052,
0.010112829506397247,
0.052409760653972626,
-0.010644719004631042,
0.04588498920202255,
0.04266993701457977,
0.016035303473472595,
-0.042552001774311066,
0.009971837513148785,
-0.04803060367703438,
-0.0982670933008194,
0.0... | {
"azure_component": "security",
"chunk_index": 292,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "278",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
}
subnet: {
id: jumpBoxSubnetId
}
}
}
]
networkSecurityGroup: {
id: jumpBoxNsg.id
}
}
dependsOn: [
virtualNetwork
]
}
resource ServerNic 'Microsoft.Network/networkInterfaces@2021-08-01' = {
name: serverNicName
location: location
properties:... | [
-0.023395387455821037,
-0.03503495827317238,
0.007834858261048794,
0.017706431448459625,
0.08407288044691086,
-0.0005003570695407689,
0.04582640901207924,
0.011641723103821278,
-0.01742810755968094,
-0.052016571164131165,
0.018442079424858093,
-0.029464611783623695,
-0.06632377952337265,
0... | {
"azure_component": "security",
"chunk_index": 293,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "279",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
osProfile: {
computerName: 'JumpBox'
adminUsername: adminUsername
adminPassword: adminPasswordOrKey
linuxConfiguration: ((authenticationType == 'password') ? json('null')
: linuxConfiguration)
}
networkProfile: {
networkInterfaces: [
{
id: JumpBoxNic.id
}... | [
-0.03968506306409836,
-0.028494704514741898,
0.0007384272757917643,
0.02878432162106037,
0.10164492577314377,
0.030971987172961235,
0.03523232415318489,
0.05262776091694832,
-0.028639810159802437,
-0.05539972335100174,
0.0039158654399216175,
-0.03714612126350403,
-0.07100075483322144,
0.01... | {
"azure_component": "security",
"chunk_index": 294,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "280",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
diagnosticsProfile: {
bootDiagnostics: {
enabled: true
storageUri: storageAccount.properties.primaryEndpoints.blob
}
}
}
}
resource firewall 'Microsoft.Network/azureFirewalls@2021-08-01' = {
name: firewallName
location: location
dependsOn: [
virtualNetwork
publicIP
]
... | [
-0.044402215629816055,
-0.009389761835336685,
0.016832636669278145,
-0.009966365061700344,
0.06506747752428055,
-0.012196107767522335,
0.07347030192613602,
0.012564282864332199,
-0.0010390708921477199,
-0.052236512303352356,
-0.019419128075242043,
-0.032367076724767685,
-0.08103461563587189,... | {
"azure_component": "security",
"chunk_index": 295,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "281",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Multiple Azure resources are defined in the Bicep file:
Microsoft.Network/ipGroups
Microsoft.Storage/storageAccounts
Microsoft.Network/routeTables
Microsoft.Network/networkSecurityGroups
Microsoft.Network/virtualNetworks
ipgroup2.id
]
}
]
}
}
]
n... | [
-0.03232841193675995,
-0.04316993057727814,
-0.042618487030267715,
-0.01487673819065094,
0.05796227976679802,
-0.019681310281157494,
0.035566478967666626,
0.00800712127238512,
0.004295945633202791,
-0.061597567051649094,
0.0030794476624578238,
-0.010555281303822994,
-0.09219888597726822,
0... | {
"azure_component": "security",
"chunk_index": 296,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "282",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Microsoft.Network/publicIPAddresses
Microsoft.Network/networkInterfaces
Microsoft.Compute/virtualMachines
Microsoft.Network/azureFirewalls
1. Save the Bicep file as main.bicep to your local computer.
2. Deploy the Bicep file using either Azure CLI or Azure PowerShell.
Azure CLI
You'll be prompted to enter the following... | [
0.01633581332862377,
-0.006065013352781534,
-0.0009508985094726086,
-0.004833355080336332,
0.05759729817509651,
0.031709104776382446,
0.025379527360200882,
0.012844386510550976,
-0.005410889163613319,
-0.07353820651769638,
-0.011094077490270138,
-0.025598306208848953,
-0.07309426367282867,
... | {
"azure_component": "security",
"chunk_index": 297,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "283",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
When you no longer need them, use the Azure portal, Azure CLI, or Azure PowerShell to
remove the resource group, firewall, and all related resources.
Azure CLI
Clean up resources
CLI
az group delete --name exampleRG
Next steps
Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure
portal | [
-0.0067188492976129055,
0.05536886677145958,
0.021557947620749474,
0.027252741158008575,
0.0871981754899025,
-0.031067781150341034,
-0.0017192249651998281,
0.015616636723279953,
-0.0032095848582684994,
-0.033510372042655945,
-0.07201635837554932,
0.03646823763847351,
-0.07399704307317734,
... | {
"azure_component": "security",
"chunk_index": 298,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "284",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall and
IP Groups - Terraform
Article • 10/18/2023
) AI-assisted content. This article was partially created with the help of AI. An author reviewed and
revised the content as needed. Learn more
In this quickstart, you use Terraform to deploy an Azure Firewall with sample IP Groups
used... | [
0.02286907285451889,
-0.024182220920920372,
0.014329628087580204,
0.03622296079993248,
0.040470704436302185,
-0.004148905165493488,
0.04568619281053543,
0.03732934221625328,
-0.008473660796880722,
-0.05127359554171562,
-0.057992953807115555,
-0.03695293888449669,
-0.05378815159201622,
0.02... | {
"azure_component": "security",
"chunk_index": 299,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "285",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
an Azure Firewall using azurerm_firewall
"
Create an Azure IP group using azurerm_ip_group
"
Create an Azure Virtual Network using azurerm_virtual_network
"
Create three Azure subnets using azurerm_subnet
"
Create a network interface using azurerm_network_interface
"
Create a network security group (to contain a list o... | [
0.0238249059766531,
0.03182710334658623,
0.013043869286775589,
0.012877491302788258,
0.06223180890083313,
-0.010212430730462074,
0.05351245775818825,
-0.003943986259400845,
-0.015538185834884644,
-0.019362078979611397,
-0.0021058020647615194,
0.00534417200833559,
-0.058264851570129395,
0.0... | {
"azure_component": "security",
"chunk_index": 300,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "285",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Install and configure Terraform
1. Create a directory in which to test the sample Terraform code and make it the
current directory.
2. Create a file named providers.tf and insert the following code:
Terraform
Create an Azure Linux Virtual Machine using azurerm_linux_virtual_machine
"
Create a route table using azurerm... | [
0.041754502803087234,
-0.0006700620288029313,
-0.04034949466586113,
0.06517555564641953,
0.09076758474111557,
0.012323910370469093,
0.04560789465904236,
0.044770386070013046,
0.017804762348532677,
-0.0764777883887291,
-0.015240400098264217,
-0.007992780767381191,
-0.051518749445676804,
0.0... | {
"azure_component": "security",
"chunk_index": 301,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "286",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. Create a file named ssh.tf and insert the following code:
Terraform
4. Create a file named main.tf and insert the following code:
Terraform
}
}
provider "azurerm" {
features {}
}
resource "random_pet" "ssh_key_name" {
prefix = "ssh"
separator = ""
}
resource "azapi_resource_action" "ssh_public_key_gen" ... | [
0.03886695206165314,
-0.004562390968203545,
-0.02655886858701706,
0.06848651170730591,
0.08266755193471909,
0.03757047280669212,
0.04802258312702179,
0.003550466615706682,
0.006643348373472691,
-0.0866561159491539,
-0.011231111362576485,
-0.02149244397878647,
-0.06334487348794937,
0.027464... | {
"azure_component": "security",
"chunk_index": 302,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "287",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
}
resource "random_password" "password" {
length = 20
min_lower = 1
min_upper = 1
min_numeric = 1
min_special = 1
special = true
}
resource "azurerm_resource_group" "rg" {
name = random_pet.rg_name.id
location = var.resource_group_location
}
resource "azurerm_public_ip" "pip_azfw" {
n... | [
0.02283136174082756,
-0.009978659451007843,
0.0013945935061201453,
0.042903680354356766,
0.06895047426223755,
0.025977661833167076,
0.06194904074072838,
0.01728774979710579,
-0.02208210900425911,
-0.06855860352516174,
-0.0069382949732244015,
-0.037139780819416046,
-0.05683738365769386,
0.0... | {
"azure_component": "security",
"chunk_index": 303,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "288",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
destination_fqdns = ["*bing.com"]
source_ip_groups = [azurerm_ip_group.ip_group_1.id]
}
}
network_rule_collection {
name = "net-rule-collection-1"
priority = 200
action = "Allow"
rule {
name = "someNetRule"
protocols = ["TCP", "UDP", "ICMP"]
... | [
-0.020801227539777756,
0.0033009578473865986,
0.015097025781869888,
-0.009373687207698822,
0.08392679691314697,
-0.02954866550862789,
0.0462103970348835,
0.022347869351506233,
0.014120074920356274,
-0.023288555443286896,
-0.014704626053571701,
-0.014604160562157631,
-0.06757981330156326,
0... | {
"azure_component": "security",
"chunk_index": 304,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "289",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
public_ip_address_id = azurerm_public_ip.pip_azfw.id
}
firewall_policy_id = azurerm_firewall_policy.azfw_policy.id
}
resource "azurerm_ip_group" "ip_group_1" {
name = "ip-group_1"
resource_group_name = azurerm_resource_group.rg.name
location = azurerm_resource_group.rg.location
cid... | [
-0.0010642970446497202,
0.030838102102279663,
0.010481488890945911,
0.012773878872394562,
0.06096675619482994,
0.01035415567457676,
0.06299536675214767,
0.013473124243319035,
0.018573811277747154,
-0.015010391362011433,
-0.014612685889005661,
-0.009526833891868591,
-0.07097003608942032,
0.... | {
"azure_component": "security",
"chunk_index": 305,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "289",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
resource_group_name = azurerm_resource_group.rg.name
virtual_network_name = azurerm_virtual_network.azfw_vnet.name
address_prefixes = ["10.10.0.0/26"]
}
resource "azurerm_subnet" "server_subnet" {
name = "subnet-server"
resource_group_name = azurerm_resource_group.rg.name
virtual_network... | [
0.027644017711281776,
-0.0027275134343653917,
0.0157155804336071,
0.012580464594066143,
0.08021628111600876,
0.005743347108364105,
0.050615910440683365,
0.01493196189403534,
0.01706733927130699,
-0.0335124135017395,
-0.012429769150912762,
0.008884713985025883,
-0.07143577188253403,
0.03976... | {
"azure_component": "security",
"chunk_index": 306,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "290",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
= azurerm_resource_group.rg.location
resource_group_name = azurerm_resource_group.rg.name
ip_configuration {
name = "ipconfig-workload"
subnet_id = azurerm_subnet.server_subnet.id
private_ip_address_allocation = "Dynamic"
}
}
resource "azurerm_network_inter... | [
0.003936776425689459,
0.004233113490045071,
0.004950855392962694,
-0.0038986140862107277,
0.09434795379638672,
0.02104911021888256,
0.05695557966828346,
0.01469871774315834,
0.011468308046460152,
-0.021805932745337486,
0.0021802035626024008,
-0.003490862436592579,
-0.06394831836223602,
0.0... | {
"azure_component": "security",
"chunk_index": 307,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "290",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
resource_group_name = azurerm_resource_group.rg.name
}
resource "azurerm_network_security_group" "vm_jump_nsg" {
name = "nsg-jump"
location = azurerm_resource_group.rg.location
resource_group_name = azurerm_resource_group.rg.name
security_rule {
name = "Allow-... | [
-0.030071387067437172,
-0.0033792464528232813,
0.014156891964375973,
0.00908033736050129,
0.08177830278873444,
-0.01617990992963314,
0.06689465790987015,
0.009832363575696945,
-0.015186911448836327,
-0.045253936201334,
-0.01859368197619915,
-0.00016749987844377756,
-0.06362385302782059,
0.... | {
"azure_component": "security",
"chunk_index": 308,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "291",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
version = "latest"
}
boot_diagnostics {
storage_account_uri =
azurerm_storage_account.sa.primary_blob_endpoint
}
}
resource "azurerm_linux_virtual_machine" "vm_jump" {
name = "jump-vm"
resource_group_name = azurerm_resource_group.rg.name
location = azurerm_resource_gro... | [
-0.01110087800770998,
-0.007010458502918482,
0.008555865846574306,
0.02329425886273384,
0.10622890293598175,
0.0205317921936512,
0.0557209737598896,
0.03931513428688049,
0.0069482349790632725,
-0.034902289509773254,
0.003360872622579336,
-0.013616523705422878,
-0.04903053119778633,
0.03838... | {
"azure_component": "security",
"chunk_index": 309,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "292",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
5. Create a file named variables.tf and insert the following code:
Terraform
6. Create a file named outputs.tf and insert the following code:
Terraform
route_table_id = azurerm_route_table.rt.id
}
variable "resource_group_location" {
type = string
description = "Location for all resources."
default ... | [
0.05024077370762825,
0.008478828705847263,
-0.005527251400053501,
0.047055698931217194,
0.08022197335958481,
0.03345562890172005,
0.04898114129900932,
0.027683304622769356,
0.002307743998244405,
-0.0526886060833931,
-0.03903080150485039,
-0.011032185517251492,
-0.05255519971251488,
0.04661... | {
"azure_component": "security",
"chunk_index": 310,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "293",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Run terraform init
to initialize the Terraform deployment. This command downloads
the Azure provider required to manage your Azure resources.
Console
Key points:
The -upgrade parameter upgrades the necessary provider plugins to the newest
version that complies with the configuration's version constraints.
Run terrafo... | [
0.01691417396068573,
-0.022271711379289627,
-0.013474983163177967,
-0.026022955775260925,
0.08451855927705765,
0.026131073012948036,
0.02108047343790531,
0.005842709913849831,
0.006296288222074509,
-0.06288699805736542,
-0.041008636355400085,
0.01078671496361494,
-0.044663239270448685,
0.0... | {
"azure_component": "security",
"chunk_index": 311,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "294",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Run terraform apply
to apply the execution plan to your cloud infrastructure.
Console
Key points:
The example terraform apply command assumes you previously ran terraform
plan -out main.tfplan .
If you specified a different filename for the -out parameter, use that same
filename in the call to terraform apply .
If y... | [
0.04213741794228554,
-0.00024329859297722578,
-0.003750767093151808,
-0.048576295375823975,
0.0823218896985054,
0.02909129485487938,
0.0029330349061638117,
0.042736638337373734,
-0.007679162546992302,
-0.056750304996967316,
-0.04099469259381294,
0.016396090388298035,
-0.05314856022596359,
... | {
"azure_component": "security",
"chunk_index": 312,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "295",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Key points:
The terraform plan command creates an execution plan, but doesn't execute
it. Instead, it determines what actions are necessary to create the
configuration specified in your configuration files. This pattern allows you to
verify whether the execution plan matches your expectations before making
any changes... | [
0.009889673441648483,
-0.008848068304359913,
-0.03267110139131546,
-0.013178138993680477,
0.07126346975564957,
0.028926916420459747,
0.02046511508524418,
0.006480294279754162,
0.013724317774176598,
-0.07177790999412537,
-0.05442557856440544,
0.011649149470031261,
-0.05233031138777733,
0.03... | {
"azure_component": "security",
"chunk_index": 313,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "296",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall and
IP Groups - ARM template
Article • 03/08/2023
In this quickstart, you use an Azure Resource Manager template (ARM template) to
deploy an Azure Firewall with sample IP Groups used in a network rule and application
rule. An IP Group is a top-level resource that allows you to defin... | [
-0.007157889660447836,
-0.012750990688800812,
-0.008250868879258633,
0.010947705246508121,
0.027134791016578674,
-0.023832347244024277,
0.03810236603021622,
0.013074260205030441,
-0.008297462947666645,
-0.0580562949180603,
-0.04921186715364456,
-0.03410971537232399,
-0.04350041225552559,
0... | {
"azure_component": "security",
"chunk_index": 314,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "297",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"name": "bicep",
"version": "0.9.1.41621",
"templateHash": "7270757728234245791"
}
},
"parameters": {
"virtualNetworkName": {
"type": "string",
"defaultValue": "[format('vnet{0}',
uniqueString(resourceGroup().id))]",
"metadata": {
"description": "virtual network name"
... | [
-0.004270367324352264,
-0.015202012844383717,
0.002650276757776737,
-0.008544322103261948,
0.05976714938879013,
0.006463548168540001,
0.05385280027985573,
-0.001707512536086142,
-0.0005449663149192929,
-0.0688098892569542,
-0.005876463372260332,
-0.03187039494514465,
-0.09304723888635635,
... | {
"azure_component": "security",
"chunk_index": 315,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "298",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"type": "string",
"defaultValue": "sshPublicKey",
"allowedValues": [
"sshPublicKey",
"password"
],
"metadata": {
"description": "Type of authentication to use on the Virtual
Machine. SSH key is recommended."
}
},
"adminPasswordOrKey": {
"type": "secur... | [
-0.009014724753797054,
-0.008231863379478455,
-0.009128456935286522,
0.03392641246318817,
0.08422175794839859,
0.04915005341172218,
0.07053079456090927,
-0.013362734578549862,
-0.00014426249254029244,
-0.05718912556767464,
0.0029474066104739904,
-0.03726332634687424,
-0.08087420463562012,
... | {
"azure_component": "security",
"chunk_index": 316,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "299",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
null())]"
},
"publicIPAddress": {
"id": "[resourceId('Microsoft.Network/publicIPAddresses',
format('{0}{1}', variables('publicIPNamePrefix'), add(range(0,
parameters('numberOfFirewallPublicIPAddresses'))[range(0,
parameters('numberOfFirewallPublicIPAddresses'))
[copyIndex('azure... | [
-0.0036355399060994387,
-0.04693702980875969,
-0.009301220066845417,
0.026803506538271904,
0.05623995140194893,
0.030722349882125854,
0.06785635650157928,
0.017415257170796394,
-0.010826190002262592,
-0.048871807754039764,
-0.019961262121796608,
-0.030538339167833328,
-0.07909400016069412,
... | {
"azure_component": "security",
"chunk_index": 317,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "299",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"jumpBoxPublicIPAddressName": "JumpHostPublicIP",
"jumpBoxNsgName": "JumpHostNSG",
"jumpBoxNicName": "JumpHostNic",
"jumpBoxSubnetId": "
[resourceId('Microsoft.Network/virtualNetworks/subnets',
parameters('virtualNetworkName'), variables('jumpBoxSubnetName'))]",
"serverNicName": "ServerNic",
"serve... | [
-0.013198375701904297,
-0.053255558013916016,
-0.035447657108306885,
0.02056272141635418,
0.06668215990066528,
-0.008478116244077682,
0.05483392998576164,
0.031068697571754456,
0.011194172315299511,
-0.03861687704920769,
-0.00821725744754076,
-0.047239720821380615,
-0.09396880120038986,
0.... | {
"azure_component": "security",
"chunk_index": 318,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "300",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"[format('{0}-nsg',
variables('serversSubnetName'))]"
},
"resources": [
{
"type": "Microsoft.Network/ipGroups",
"apiVersion": "2021-08-01",
"name": "[parameters('ipgroups_name1')]",
"location": "[parameters('location')]",
"properties": {
"ipAddresses": [
"13.73.6... | [
-0.02020503394305706,
-0.019470220431685448,
-0.005725397262722254,
-0.006859304383397102,
0.06790429353713989,
0.01578087918460369,
0.043440550565719604,
0.03802664577960968,
-0.019365373998880386,
-0.054519172757864,
-0.011338450945913792,
-0.03355306386947632,
-0.06796998530626297,
0.00... | {
"azure_component": "security",
"chunk_index": 319,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "300",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"13.9.0.0/24"
]
}
},
{
"type": "Microsoft.Storage/storageAccounts",
"apiVersion": "2021-09-01",
"name": "[variables('storageAccountName')]",
"location": "[parameters('location')]",
"sku": {
"name": "Standard_LRS"
},
"kind": "StorageV2",
"prop... | [
0.0037049183156341314,
-0.005331379361450672,
0.022972971200942993,
0.013966763392090797,
0.10123425722122192,
-0.00877346657216549,
0.03473305702209473,
0.03021831437945366,
-0.010975752025842667,
-0.0527847483754158,
0.0018215239979326725,
-0.053767357021570206,
-0.0601097047328949,
0.03... | {
"azure_component": "security",
"chunk_index": 320,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "301",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"subnets": [
{
"name": "[variables('jumpBoxSubnetName')]",
"properties": {
"addressPrefix": "[variables('jumpboxSubnetPrefix')]"
}
},
{
"name": "[variables('azureFirewallSubnetName')]",
"properties": {
... | [
-0.007342599332332611,
-0.0332118421792984,
-0.02061663568019867,
0.01766989938914776,
0.07643334567546844,
0.0014855596236884594,
0.050539400428533554,
0.015956781804561615,
0.0068124127574265,
-0.03583424538373947,
0.006881212815642357,
-0.04468141868710518,
-0.09492354840040207,
0.01259... | {
"azure_component": "security",
"chunk_index": 321,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "302",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
}
},
{
"type": "Microsoft.Network/publicIPAddresses",
"apiVersion": "2021-08-01",
"name": "[variables('jumpBoxPublicIPAddressName')]",
"location": "[parameters('location')]",
"properties": {
"publicIPAllocationMethod": "Dynamic"
}
},
{
"type": "Microsoft... | [
-0.021162359043955803,
-0.016865482553839684,
-0.03576686605811119,
0.011077895760536194,
0.06621228903532028,
-0.006688487716019154,
0.04900931939482689,
0.03437051549553871,
-0.0062265535816550255,
-0.04010540246963501,
0.00037158059421926737,
-0.047211963683366776,
-0.10977309942245483,
... | {
"azure_component": "security",
"chunk_index": 322,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "303",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"networkSecurityGroup": {
"id": "[resourceId('Microsoft.Network/networkSecurityGroups',
variables('jumpBoxNsgName'))]"
}
},
"dependsOn": [
"[resourceId('Microsoft.Network/networkSecurityGroups',
variables('jumpBoxNsgName'))]",
"[resourceId('Microsoft.Network/publicIPAddre... | [
-0.007737445179373026,
-0.02793434076011181,
0.01868181861937046,
0.022673113271594048,
0.08190791308879852,
-0.004269235301762819,
0.05409971624612808,
0.021431203931570053,
-0.010624796152114868,
-0.0360591784119606,
0.006486264523118734,
-0.03322821110486984,
-0.07279781997203827,
0.020... | {
"azure_component": "security",
"chunk_index": 323,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "304",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
}
},
"osProfile": {
"computerName": "JumpBox",
"adminUsername": "[parameters('adminUsername')]",
"adminPassword": "[parameters('adminPasswordOrKey')]",
"linuxConfiguration": "
[if(equals(parameters('authenticationType'), 'password'), json('null'),
variables('linu... | [
-0.03936583921313286,
-0.0236335601657629,
0.0006278973305597901,
0.026874544098973274,
0.11371859908103943,
0.03290901333093643,
0.03704487532377243,
0.03965640813112259,
-0.0180488433688879,
-0.05138278007507324,
0.0011001118691638112,
-0.030405746772885323,
-0.08195741474628448,
0.00526... | {
"azure_component": "security",
"chunk_index": 324,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "305",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"computerName": "Server",
"adminUsername": "[parameters('adminUsername')]",
"adminPassword": "[parameters('adminPasswordOrKey')]",
"linuxConfiguration": "
[if(equals(parameters('authenticationType'), 'password'), json('null'),
variables('linuxConfiguration'))]"
},
"network... | [
-0.025468897074460983,
-0.0040112994611263275,
-0.027646493166685104,
-0.0010844345670193434,
0.09004130959510803,
0.02594282478094101,
0.04011504352092743,
0.01891670934855938,
-0.020580949261784554,
-0.04824468865990639,
-0.01714836061000824,
-0.05610448122024536,
-0.05211076885461807,
0... | {
"azure_component": "security",
"chunk_index": 325,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "306",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"targetFqdns": [
"*bing.com"
],
"sourceIpGroups": [
"[resourceId('Microsoft.Network/ipGroups',
parameters('ipgroups_name1'))]"
]
},
{
"name": "someOtherAppRule",
... | [
-0.04237661883234978,
-0.03231378644704819,
0.012130395509302616,
-0.025672905147075653,
0.0589391328394413,
-0.03787444159388542,
0.03411518782377243,
0.033260755240917206,
-0.0029017673805356026,
-0.037610605359077454,
-0.004238185007125139,
-0.0038754765409976244,
-0.0869663879275322,
0... | {
"azure_component": "security",
"chunk_index": 326,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "307",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Multiple Azure resources are defined in the template:
Microsoft.Network/ipGroups
Microsoft.Storage/storageAccounts
Microsoft.Network/routeTables
Microsoft.Network/networkSecurityGroups
Microsoft.Network/virtualNetworks
Microsoft.Network/publicIPAddresses
Microsoft.Network/networkInterfaces
Microsoft.Compute/virtualMach... | [
0.010817774571478367,
0.003756331279873848,
-0.012722511775791645,
0.03074631653726101,
0.08995769917964935,
0.03106769174337387,
0.015336356125772,
0.003160942578688264,
0.0016904547810554504,
-0.06216365844011307,
-0.02160113863646984,
-0.033136263489723206,
-0.024311214685440063,
0.0178... | {
"azure_component": "security",
"chunk_index": 327,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "308",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
2. In the portal, on the Create an Azure Firewall with IpGroups page, type or select
the following values:
Subscription: Select from existing subscriptions
Resource group: Select from existing resource groups or select Create new,
and select OK.
Location: Select a location
Virtual Network Name: Type a name for the new ... | [
0.04530622810125351,
0.023404758423566818,
0.028438031673431396,
0.019829610362648964,
0.06016753613948822,
0.032830409705638885,
0.038635868579149246,
0.004302792716771364,
-0.000058898287534248084,
-0.06601450592279434,
-0.03235975280404091,
-0.02478012628853321,
-0.04763796180486679,
0.... | {
"azure_component": "security",
"chunk_index": 328,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "309",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To learn about the JSON syntax and properties for a firewall in a template, see
Microsoft.Network azureFirewalls template reference.
When you no longer need the resources that you created with the firewall, delete the
resource group. This removes the firewall and all the related resources.
To delete the resource group,... | [
-0.01014717947691679,
0.06406169384717941,
0.032276302576065063,
0.020387521013617516,
0.05562858656048775,
-0.023622484877705574,
0.01634153351187706,
0.011259659193456173,
0.011146875098347664,
-0.031387168914079666,
-0.08861257135868073,
0.021498335525393486,
-0.06484133005142212,
0.028... | {
"azure_component": "security",
"chunk_index": 329,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "310",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Deploy an Azure Firewall with multiple
public IP addresses using Azure
PowerShell
Article • 07/01/2024
This feature enables the following scenarios:
DNAT - You can translate multiple standard port instances to your backend servers.
For example, if you have two public IP addresses, you can translate TCP port 3389
(RDP) ... | [
-0.015175175853073597,
-0.021287525072693825,
-0.02493566833436489,
0.01915045827627182,
0.02965441718697548,
0.01645287126302719,
0.028020568192005157,
0.02267102524638176,
0.013490092940628529,
-0.038175687193870544,
-0.031376663595438004,
-0.03047822043299675,
-0.07181937992572784,
-0.0... | {
"azure_component": "security",
"chunk_index": 330,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "311",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
This example creates a firewall attached to virtual network vnet with two public IP
addresses.
Azure PowerShell
In this example, the public IP address azFwPublicIp1 is attached to the firewall.
Azure PowerShell
Create a firewall with two or more public IP
addresses
$rgName = "resourceGroupName"
$vnet = Get-AzVirtualNet... | [
0.012056735344231129,
-0.012610037811100483,
0.0012242840602993965,
0.0407257154583931,
0.04577174037694931,
0.016080308705568314,
0.032378360629081726,
0.007982424460351467,
0.004724150989204645,
-0.005043774843215942,
-0.043806616216897964,
0.000501236179843545,
-0.058683350682258606,
0.... | {
"azure_component": "security",
"chunk_index": 331,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "312",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
In this example, the public IP address azFwPublicIp1 is detached from the firewall.
Azure PowerShell
Quickstart: Create an Azure Firewall with multiple public IP addresses - Resource
Manager template
-Name "AzureFirewall" `
-ResourceGroupName "rg"
$azFw.AddPu... | [
-0.017229942604899406,
-0.02942253090441227,
-0.02001124992966652,
0.03625885024666786,
0.03120788186788559,
-0.011904534883797169,
0.03901400417089462,
0.01282957661896944,
0.024617133662104607,
-0.005854614544659853,
-0.03723638504743576,
0.017564473673701286,
-0.09143158048391342,
0.005... | {
"azure_component": "security",
"chunk_index": 332,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "313",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall with
multiple public IP addresses - Bicep
Article • 10/19/2023
In this quickstart, you use a Bicep file to deploy an Azure Firewall with multiple public IP
addresses from a public IP address prefix. The deployed firewall has NAT rule collection
rules that allow RDP connections to tw... | [
-0.013324513100087643,
-0.04977770522236824,
-0.03318385034799576,
-0.007079668343067169,
0.01524978969246149,
0.023800114169716835,
0.0418969988822937,
0.004548952449113131,
-0.01249984186142683,
-0.04724229872226715,
-0.01925758644938469,
-0.016528701409697533,
-0.10212665796279907,
-0.0... | {
"azure_component": "security",
"chunk_index": 333,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "314",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
This Bicep file creates an Azure Firewall with two public IP addresses, along with the
necessary resources to support the Azure Firewall.
The Bicep file used in this quickstart is from Azure Quickstart Templates
.
Bicep
Review the Bicep file
@description('Admin username for the backend servers')
param adminUsername str... | [
-0.01689229905605316,
-0.0475093238055706,
-0.036683231592178345,
-0.004455448593944311,
0.03716030716896057,
0.01661982387304306,
0.05512562394142151,
-0.00009835911623667926,
-0.02197410725057125,
-0.057608578354120255,
-0.004846630617976189,
-0.04472970962524414,
-0.08430704474449158,
0... | {
"azure_component": "security",
"chunk_index": 334,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "315",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
name: 'RDP'
properties: {
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '3389'
sourceAddressPrefix: '*'
destinationAddressPrefix: '*'
access: 'Allow'
priority: 300
direction: 'Inbound'
}
}
]
}
}]
res... | [
-0.011315464973449707,
-0.005042437929660082,
-0.012751189060509205,
0.02241036482155323,
0.05430138111114502,
-0.013643722981214523,
0.029858268797397614,
0.03017219342291355,
0.019487880170345306,
-0.04581639543175697,
-0.00545688858255744,
-0.02418634481728077,
-0.09863491356372833,
0.0... | {
"azure_component": "security",
"chunk_index": 335,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "316",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
{
name: 'myBackendSubnet'
properties: {
addressPrefix: backendSubnetPrefix
routeTable: {
id: routeTable.id
}
privateEndpointNetworkPolicies: 'Enabled'
privateLinkServiceNetworkPolicies: 'Enabled'
}
}
]
enableDdosProtecti... | [
-0.02274579368531704,
-0.04531966522336006,
0.022983456030488014,
0.0008797970949672163,
0.08162018656730652,
0.0007571450551040471,
0.07958028465509415,
0.02620554529130459,
-0.0012443445157259703,
-0.06951915472745895,
-0.010570627637207508,
-0.03221028670668602,
-0.037773676216602325,
0... | {
"azure_component": "security",
"chunk_index": 336,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "317",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
adminPassword: adminPassword
windowsConfiguration: {
provisionVMAgent: true
enableAutomaticUpdates: true
}
allowExtensionOperations: true
}
networkProfile: {
networkInterfaces: [
{
id: netInterface[i].id
}
]
}
}
}]
resource netInterfa... | [
-0.01277399342507124,
-0.027965344488620758,
0.01985293999314308,
-0.029510367661714554,
0.08938518166542053,
-0.015332103706896305,
0.08670852333307266,
-0.002859893487766385,
-0.025149308145046234,
-0.043270401656627655,
-0.020318593829870224,
-0.019320275634527206,
-0.04488157480955124,
... | {
"azure_component": "security",
"chunk_index": 337,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "318",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
priority: 100
action: {
type: 'Allow'
}
rules: [
{
name: 'wan-address'
protocols: [
{
protocolType: 'Http'
port: 80
}
{
protocolType: 'H... | [
-0.04485778883099556,
-0.02351398766040802,
-0.029955189675092697,
-0.04100900888442993,
0.022861246019601822,
-0.002901681000366807,
0.062170375138521194,
0.012833813205361366,
0.017477039247751236,
-0.03272252157330513,
-0.015511522069573402,
0.004892901051789522,
-0.08593893051147461,
0... | {
"azure_component": "security",
"chunk_index": 338,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "319",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
fqdnTags: [
'WindowsUpdate'
]
sourceAddresses: [
'*'
]
}
]
}
}
]
natRuleCollections: [
{
name: 'Coll-01'
properties: {
priority: 100
action: {
type:... | [
-0.03568505495786667,
-0.05028046295046806,
-0.02679377980530262,
-0.012524562887847424,
0.05434948578476906,
-0.039749909192323685,
0.03412969037890434,
0.021743755787611008,
-0.0065464177168905735,
-0.04322349652647972,
-0.035621851682662964,
0.01877177134156227,
-0.09109704941511154,
0.... | {
"azure_component": "security",
"chunk_index": 339,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "320",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Multiple Azure resources are defined in the template:
Microsoft.Network/networkSecurityGroups
Microsoft.Network/publicIPPrefix
Microsoft.Network/publicIPAddresses
Microsoft.Network/virtualNetworks
Microsoft.Compute/virtualMachines
Microsoft.Storage/storageAccounts
Microsoft.Network/networkInterfaces
Microsoft.Network/a... | [
0.0030078699346631765,
-0.015359640121459961,
-0.010983891785144806,
0.02249855548143387,
0.08775036782026291,
0.008948714472353458,
0.024810640141367912,
0.016601085662841797,
-0.007082877680659294,
-0.08307761698961258,
0.004976687021553516,
-0.028479808941483498,
-0.0701482817530632,
0.... | {
"azure_component": "security",
"chunk_index": 340,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "321",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You will be prompt to enter the admin password.
When the deployment finishes, you should see a message indicating the
deployment succeeded.
In the Azure portal, review the deployed resources. Note the firewall public IP addresses.
Use Remote Desktop Connection to connect to the firewall public IP addresses.
Successful ... | [
-0.024293720722198486,
0.027649667114019394,
-0.002538141328841448,
-0.011660106480121613,
0.05931565910577774,
0.01176777295768261,
0.021939633414149284,
0.03658204525709152,
-0.019489720463752747,
-0.05186683312058449,
-0.06978991627693176,
-0.001659185509197414,
-0.04414021596312523,
0.... | {
"azure_component": "security",
"chunk_index": 341,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "322",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall with
multiple public IP addresses - Terraform
Article • 02/23/2024
) AI-assisted content. This article was partially created with the help of AI. An author reviewed and
revised the content as needed. Learn more
In this quickstart, you use Terraform to deploy an Azure Firewall with m... | [
0.01517490018159151,
-0.03515705093741417,
-0.020525142550468445,
0.04409489408135414,
0.038574300706386566,
0.028128990903496742,
0.04169671609997749,
0.030111972242593765,
-0.014421562664210796,
-0.04155389219522476,
-0.039434343576431274,
-0.014597771689295769,
-0.05735335126519203,
0.0... | {
"azure_component": "security",
"chunk_index": 342,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "323",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Create an Azure Firewall using azurerm_firewall
Create a route table using azurerm_route_table
Create an association between the route table and the subnet using -
azurerm_subnet_route_table_association
Install and configure Terraform
1. Create a directory in which to test the sample Terraform code and make it the
curr... | [
0.04748023301362991,
0.008821120485663414,
-0.022043682634830475,
0.051498789340257645,
0.07283802330493927,
-0.024538950994610786,
0.04033452644944191,
0.0289585143327713,
0.02706248126924038,
-0.05709275230765343,
-0.014920552261173725,
0.005447552539408207,
-0.03695281967520714,
0.03445... | {
"azure_component": "security",
"chunk_index": 343,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "324",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. Create a file named main.tf and insert the following code:
Terraform
}
}
}
resource "random_pet" "rg_name" {
prefix = var.resource_group_name_prefix
}
resource "random_password" "password" {
count = 2
length = 20
min_lower = 1
min_upper = 1
min_numeric = 1
min_special = 1
specia... | [
0.051295943558216095,
-0.034758664667606354,
-0.02400241419672966,
0.042490363121032715,
0.08701328933238983,
0.0332917720079422,
0.04053453356027603,
0.025602368637919426,
-0.009723921306431293,
-0.08072609454393387,
-0.03460340201854706,
-0.005488096736371517,
-0.04454933851957321,
0.015... | {
"azure_component": "security",
"chunk_index": 344,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "325",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
resource "azurerm_virtual_network" "azfw_vnet" {
name = "azfw-vnet"
location = azurerm_resource_group.rg.location
resource_group_name = azurerm_resource_group.rg.name
address_space = ["10.10.0.0/16"]
}
resource "azurerm_subnet" "azfw_subnet" {
name = "AzureFirew... | [
0.013496505096554756,
-0.004428836517035961,
0.020322879776358604,
0.0015557322185486555,
0.07186330109834671,
-0.006093006581068039,
0.06610507518053055,
0.014528708532452583,
0.009610257111489773,
-0.06248466670513153,
-0.005990856327116489,
-0.013319491408765316,
-0.054617829620838165,
... | {
"azure_component": "security",
"chunk_index": 345,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "326",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
network_interface_id =
azurerm_network_interface.backend_nic[count.index].id
network_security_group_id =
azurerm_network_security_group.backend_nsg.id
}
resource "azurerm_windows_virtual_machine" "vm_backend" {
count = 2
name = "vm-backend-${count.index + 1}"
resource_gro... | [
-0.021799949929118156,
-0.005618757102638483,
0.02829050086438656,
-0.0033831140026450157,
0.05885455012321472,
-0.0036767348647117615,
0.06338271498680115,
0.016648709774017334,
-0.004795687738806009,
-0.03781154379248619,
0.00538038183003664,
0.0013595462078228593,
-0.030098091810941696,
... | {
"azure_component": "security",
"chunk_index": 346,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "327",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
destination_fqdns = ["getmywanip.com"]
source_addresses = ["*"]
}
rule {
name = "google"
protocols {
type = "Http"
port = 80
}
protocols {
type = "Https"
port = 443
}
destination_fqdns = ["www.google.com"]
source_addresses = ["10.... | [
-0.03263125941157341,
-0.00483227102085948,
-0.01581592671573162,
-0.002876474056392908,
0.059885066002607346,
-0.01722654141485691,
0.0425475612282753,
0.049992259591817856,
0.04321398213505745,
-0.040845368057489395,
-0.029931565746665,
-0.01151710283011198,
-0.09549073874950409,
0.06512... | {
"azure_component": "security",
"chunk_index": 347,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "328",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Create a file named variables.tf and insert the following code:
Terraform
resource "azurerm_firewall" "fw" {
name = "azfw"
location = azurerm_resource_group.rg.location
resource_group_name = azurerm_resource_group.rg.name
sku_name = "AZFW_VNet"
sku_tier = va... | [
0.04767443984746933,
0.007033458910882473,
-0.012669593095779419,
0.03130025789141655,
0.087058424949646,
0.012471836991608143,
0.059430573135614395,
0.03435926139354706,
0.005617418326437473,
-0.05662795156240463,
-0.03622444346547127,
-0.004123773891478777,
-0.06160437688231468,
0.041924... | {
"azure_component": "security",
"chunk_index": 348,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "329",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
5. Create a file named outputs.tf and insert the following code:
Terraform
Run terraform init
to initialize the Terraform deployment. This command downloads
the Azure provider required to manage your Azure resources.
Console
Key points:
variable "firewall_sku_tier" {
type = string
description = "Firewall S... | [
0.03963399678468704,
-0.03285379335284233,
-0.003901098156347871,
0.027046963572502136,
0.08085121959447861,
0.046900879591703415,
0.02281484566628933,
0.02404235675930977,
0.0035764689091593027,
-0.05619709938764572,
-0.05598008632659912,
-0.008288266137242317,
-0.03443324938416481,
0.025... | {
"azure_component": "security",
"chunk_index": 349,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "330",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The -upgrade parameter upgrades the necessary provider plugins to the newest
version that complies with the configuration's version constraints.
Run terraform plan
to create an execution plan.
Console
Key points:
The terraform plan command creates an execution plan, but doesn't execute it.
Instead, it determines wha... | [
0.017049232497811317,
-0.031548574566841125,
-0.0014104284346103668,
-0.028793685138225555,
0.07997648417949677,
0.03252704069018364,
0.00286523113027215,
0.0013081720098853111,
-0.000661176978610456,
-0.06362683326005936,
-0.04477931559085846,
0.027104798704385757,
-0.0506625697016716,
0.... | {
"azure_component": "security",
"chunk_index": 350,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "331",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. Get the Azure resource group name.
Console
2. Run az network ip-group list to display the two new IP Groups.
Azure CLI
When you no longer need the resources created via Terraform, do the following steps:
1. Run terraform plan
and specify the destroy flag.
Console
Key points:
The terraform plan command creates an ... | [
0.017915528267621994,
0.010020274668931961,
-0.01921418309211731,
-0.022269539535045624,
0.07895927131175995,
-0.003834811272099614,
0.006919034756720066,
0.05210094153881073,
0.000034369419154245406,
-0.0642392709851265,
-0.0563044436275959,
0.026117583736777306,
-0.04728243127465248,
0.0... | {
"azure_component": "security",
"chunk_index": 351,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "332",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Troubleshoot common problems when using Terraform on Azure
Troubleshoot Terraform on Azure
Next steps
Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure
portal | [
0.01363109890371561,
0.0033081970177590847,
-0.053011342883110046,
0.03224048763513565,
0.05418528616428375,
0.024288533255457878,
0.044379815459251404,
0.0128730284050107,
-0.006254969164729118,
-0.061776481568813324,
-0.022700374945998192,
-0.0019183990079909563,
-0.05005906894803047,
0.... | {
"azure_component": "security",
"chunk_index": 352,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "333",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Quickstart: Create an Azure Firewall with
multiple public IP addresses - ARM
template
Article • 10/19/2023
In this quickstart, you use an Azure Resource Manager template (ARM template) to
deploy an Azure Firewall with multiple public IP addresses from a public IP address
prefix. The deployed firewall has NAT rule colle... | [
-0.02058006078004837,
-0.01608140580356121,
-0.03187871724367142,
0.01318382378667593,
0.024428745731711388,
0.004036662634462118,
0.0445600189268589,
0.0036786010023206472,
-0.0066320332698524,
-0.04840153083205223,
-0.04274335876107216,
-0.008182724006474018,
-0.04973757266998291,
0.0098... | {
"azure_component": "security",
"chunk_index": 353,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "334",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
portal.
An Azure account with an active subscription. Create an account for free
.
This template creates an Azure Firewall with two public IP addresses, along with the
necessary resources to support the Azure Firewall.
The template used in this quickstart is from Azure Quickstart Templates
.
JSON
Prerequisites
Review t... | [
-0.005737882107496262,
-0.01414189301431179,
-0.04470919445157051,
0.0022604905534535646,
0.03636512532830238,
-0.007937568239867687,
0.040108758956193924,
0.022675788030028343,
-0.0231342613697052,
-0.04545259475708008,
-0.017735321074724197,
-0.05482835695147514,
-0.047734640538692474,
0... | {
"azure_component": "security",
"chunk_index": 354,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "335",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"vmSize": {
"type": "string",
"defaultValue": "Standard_B2ms",
"metadata": {
"description": "Size of the virtual machine."
}
}
},
"variables": {
"copy": [
{
"name": "azureFirewallIpConfigurations",
"count": "[length(range(0, 2))]",
"input": {
... | [
-0.03215508535504341,
-0.02400137484073639,
0.0017518805107101798,
0.014474770054221153,
0.06961065530776978,
0.04478081688284874,
0.07529476284980774,
0.009780229069292545,
-0.027837395668029785,
-0.04173476994037628,
-0.02082766219973564,
-0.041427310556173325,
-0.09460436552762985,
0.02... | {
"azure_component": "security",
"chunk_index": 355,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "336",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
],
"virtualMachineName": "myVM",
"virtualNetworkName": "myVNet",
"networkInterfaceName": "net-int",
"ipConfigName": "ipconfig",
"ipPrefixName": "public_ip_prefix",
"ipPrefixSize": 31,
"publicIpAddressName": "public_ip",
"nsgName": "vm-nsg",
"firewallName": "FW-01",
"vnetPrefix": ... | [
-0.00522959977388382,
-0.01940714195370674,
0.014194375835359097,
-0.007855948992073536,
0.07713271677494049,
0.031771961599588394,
0.06918267160654068,
-0.0016489593544974923,
-0.012054670602083206,
-0.06383910030126572,
-0.008776911534368992,
-0.015099095180630684,
-0.06727957725524902,
... | {
"azure_component": "security",
"chunk_index": 356,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "336",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"location": "[parameters('location')]",
"properties": {
"securityRules": [
{
"name": "RDP",
"properties": {
"protocol": "Tcp",
"sourcePortRange": "*",
"destinationPortRange": "3389",
"sourceAddressPrefix": "*",
... | [
-0.0351601168513298,
-0.013682031072676182,
-0.029366077855229378,
0.009983016178011894,
0.06451950967311859,
-0.02977333404123783,
0.045387160032987595,
0.02444440685212612,
0.0018595579313114285,
-0.030519384890794754,
-0.006660094019025564,
-0.045249175280332565,
-0.09474419802427292,
0... | {
"azure_component": "security",
"chunk_index": 357,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "337",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
"[resourceId('Microsoft.Network/publicIPPrefixes',
variables('ipPrefixName'))]"
]
},
{
"type": "Microsoft.Network/virtualNetworks",
"apiVersion": "2022-01-01",
"name": "[variables('virtualNetworkName')]",
"location": "[parameters('location')]",
"properties": {
"addre... | [
0.007489249110221863,
-0.023304758593440056,
0.017831377685070038,
0.018719762563705444,
0.08876954764127731,
0.016715960577130318,
0.05229433998465538,
0.007290862966328859,
-0.01231956947594881,
-0.05299614742398262,
0.010374733246862888,
-0.026620525866746902,
-0.05613620579242706,
0.01... | {
"azure_component": "security",
"chunk_index": 358,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "338",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.