Deploy and configure Azure Firewall Basic and policy using the Azure portal
Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is recommended to deploy the Standard SKU for environments with more than 250 Mbps throughput requirements and the Premium SKU for advanced threat protection.
Filtering network and application traffic is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that can be accessed.
One way you can control both inbound and outbound network access from an Azure subnet is with Azure Firewall and Firewall Policy. With Azure Firewall and Firewall Policy, you can configure:
- Application rules that define fully qualified domain names (FQDNs) that can be accessed from a subnet.
- Network rules that define source address, protocol, destination port, and destination address.
- DNAT rules to translate and filter inbound Internet traffic to your subnets.
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
For this how-to, you create a simplified single VNet with three subnets for easy deployment. Firewall Basic has a mandatory requirement to be configured with a management NIC.
- AzureFirewallSubnet - the firewall is in this subnet.
- AzureFirewallManagementSubnet - for service management traffic.
- Workload-SN - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
Note
As the Azure Firewall Basic has limited traffic compared to the Azure Firewall Standard or Premium SKU, it requires the AzureFirewallManagementSubnet to separate customer traffic from Microsoft management traffic to ensure no disruptions on it. This management traffic is needed for updates and health metrics communication that occurs automatically to and from Microsoft only. No other connections are allowed on this IP.
For production deployments, a hub and spoke model is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
In this how-to, you learn how to:
- Set up a test network environment
- Deploy a basic firewall and basic firewall policy
- Create a default route
- Configure an application rule to allow access to www.google.com
- Configure a network rule to allow access to external DNS servers
- Configure a NAT rule to allow a remote desktop to the test server
- Test the firewall
If you prefer, you can complete this procedure using Azure PowerShell.
Prerequisites
If you don't have an Azure subscription, create a free account before you begin.
Create a resource group
The resource group contains all the resources for the how-to.
- Sign in to the Azure portal.
- On the Azure portal menu, select Resource groups or search for and select Resource groups from any page. Then select Create.
- For Subscription, select your subscription.
- For Resource group name, enter Test-FW-RG.
- For Region, select a region. All other resources that you create must be in the same region.
- Select Review + create.
- Select Create.
Deploy the firewall and policy
Deploy the firewall and create associated network infrastructure.
On the Azure portal menu or from the Home page, select Create a resource.
Type firewall in the search box and press Enter.
Select Firewall and then select Create.
On the Create a Firewall page, use the following table to configure the firewall:
Setting Value Subscription <your subscription> Resource group Test-FW-RG Name Test-FW01 Region Select the same location that you used previously Firewall Tier Basic Firewall management Use a Firewall Policy to manage this firewall Firewall policy Add new:
fw-test-pol
Your selected region
Policy tier should default to BasicChoose a virtual network Create new
Name: Test-FW-VN
Address space: 10.0.0.0/16
Subnet address space: 10.0.0.0/26Public IP address Add new:
Name: fw-pipManagement - Subnet address space 10.0.1.0/26 Management public IP address Add new
fw-mgmt-pipAccept the other default values, then select Review + create.
Review the summary, and then select Create to create the firewall.
This will take a few minutes to deploy.
After deployment completes, go to the Test-FW-RG resource group, and select the Test-FW01 firewall.
Note the firewall private and public IP (fw-pip) addresses. You'll use these addresses later.
Create a subnet for the workload server
Next, create a subnet for the workload server.
- Go to the Test-FW-RG resource group and select the Test-FW-VN virtual network.
- Select Subnets.
- Select Subnet.
- For Subnet name, type Workload-SN.
- For Subnet address range, type 10.0.2.0/24.
- Select Save.
Create a virtual machine
Now create the workload virtual machine, and place it in the Workload-SN subnet.
On the Azure portal menu or from the Home page, select Create a resource.
Select Windows Server 2019 Datacenter.
Enter these values for the virtual machine:
Setting Value Resource group Test-FW-RG Virtual machine name Srv-Work Region Same as previous Image Windows Server 2019 Datacenter Administrator user name Type a user name Password Type a password Under Inbound port rules, Public inbound ports, select None.
Accept the other defaults and select Next: Disks.
Accept the disk defaults and select Next: Networking.
Make sure that Test-FW-VN is selected for the virtual network and the subnet is Workload-SN.
For Public IP, select None.
Accept the other defaults and select Next: Management.
Select Next: Monitoring.
Select Disable to disable boot diagnostics. Accept the other defaults and select Review + create.
Review the settings on the summary page, and then select Create.
After the deployment completes, select the Srv-Work resource and note the private IP address for later use.
Create a default route
For the Workload-SN subnet, configure the outbound default route to go through the firewall.
- On the Azure portal menu, select All services or search for and select All services from any page.
- Under Networking, select Route tables.
- Select Create.
- For Subscription, select your subscription.
- For Resource group, select Test-FW-RG.
- For Region, select the same location that you used previously.
- For Name, type Firewall-route.
- Select Review + create.
- Select Create.
After deployment completes, select Go to resource.
On the Firewall-route page, select Subnets and then select Associate.
Select Virtual network > Test-FW-VN.
For Subnet, select Workload-SN. Make sure that you select only the Workload-SN subnet for this route, otherwise your firewall won't work correctly.
Select OK.
Select Routes and then select Add.
For Route name, type fw-dg.
For Address prefix destination, select IP Addresses.
For Destination IP addresses/CIDR ranges, type 0.0.0.0/0.
For Next hop type, select Virtual appliance.
Azure Firewall is actually a managed service, but virtual appliance works in this situation.
For Next hop address, type the private IP address for the firewall that you noted previously.
Select Add.
Configure an application rule
This is the application rule that allows outbound access to www.google.com
.
- Open the Test-FW-RG, and select the fw-test-pol firewall policy.
- Select Application rules.
- Select Add a rule collection.
- For Name, type App-Coll01.
- For Priority, type 200.
- For Rule collection action, select Allow.
- Under Rules, for Name, type Allow-Google.
- For Source type, select IP address.
- For Source, type 10.0.2.0/24.
- For Protocol:port, type http, https.
- For Destination Type, select FQDN.
- For Destination, type
www.google.com
- Select Add.
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see Infrastructure FQDNs.
Configure a network rule
This is the network rule that allows outbound access to two IP addresses at port 53 (DNS).
- Select Network rules.
- Select Add a rule collection.
- For Name, type Net-Coll01.
- For Priority, type 200.
- For Rule collection action, select Allow.
- For Rule collection group, select DefaultNetworkRuleCollectionGroup.
- Under Rules, for Name, type Allow-DNS.
- For Source type, select IP Address.
- For Source, type 10.0.2.0/24.
- For Protocol, select UDP.
- For Destination Ports, type 53.
- For Destination type select IP address.
- For Destination, type 209.244.0.3,209.244.0.4.
These are public DNS servers operated by Level3. - Select Add.
Configure a DNAT rule
This rule allows you to connect a remote desktop to the Srv-Work virtual machine through the firewall.
- Select the DNAT rules.
- Select Add a rule collection.
- For Name, type rdp.
- For Priority, type 200.
- For Rule collection group, select DefaultDnatRuleCollectionGroup.
- Under Rules, for Name, type rdp-nat.
- For Source type, select IP address.
- For Source, type *.
- For Protocol, select TCP.
- For Destination Ports, type 3389.
- For Destination Type, select IP Address.
- For Destination, type the firewall public IP address (fw-pip).
- For Translated address, type the Srv-work private IP address.
- For Translated port, type 3389.
- Select Add.
Change the primary and secondary DNS address for the Srv-Work network interface
For testing purposes in this how-to, configure the server's primary and secondary DNS addresses. This isn't a general Azure Firewall requirement.
- On the Azure portal menu, select Resource groups or search for and select Resource groups from any page. Select the Test-FW-RG resource group.
- Select the network interface for the Srv-Work virtual machine.
- Under Settings, select DNS servers.
- Under DNS servers, select Custom.
- Type 209.244.0.3 in the Add DNS server text box, and 209.244.0.4 in the next text box.
- Select Save.
- Restart the Srv-Work virtual machine.
Test the firewall
Now, test the firewall to confirm that it works as expected.
Connect a remote desktop to firewall public IP address (fw-pip) and sign in to the Srv-Work virtual machine.
Open Internet Explorer and browse to
https://www.google.com
.Select OK > Close on the Internet Explorer security alerts.
You should see the Google home page.
Browse to
http://www.microsoft.com
.You should be blocked by the firewall.
So now you've verified that the firewall rules are working:
- You can connect a remote desktop to the Srv-Work virtual machine.
- You can browse to the one allowed FQDN, but not to any others.
- You can resolve DNS names using the configured external DNS server.
Clean up resources
You can keep your firewall resources for further testing, or if no longer needed, delete the Test-FW-RG resource group to delete all firewall-related resources.
Next steps
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for