You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-hybrid-portal-policy.md
+81-50Lines changed: 81 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: tutorial
8
-
ms.date: 08/05/2024
8
+
ms.date: 01/27/2026
9
9
ms.author: duau
10
10
ms.custom: sfi-image-nochange
11
11
#Customer intent: As an administrator, I want to control network access from an on-premises network to an Azure virtual network.
@@ -36,7 +36,7 @@ In this tutorial, you learn how to:
36
36
> * Create and connect the VPN gateways
37
37
> * Peer the hub and spoke virtual networks
38
38
> * Create the routes
39
-
> * Create the virtual machines
39
+
> * Create the virtual machine
40
40
> * Test the firewall
41
41
42
42
If you want to use Azure PowerShell instead to complete this procedure, see [Deploy and configure Azure Firewall in a hybrid network using Azure PowerShell](tutorial-hybrid-ps.md).
@@ -190,19 +190,6 @@ First, add a network rule to allow web traffic.
190
190
1. For **Destination type**, select **IP address**.
191
191
1. For **Destination**, type **10.6.0.0/16**.
192
192
193
-
Now add a rule to allow RDP traffic.
194
-
195
-
On the second rule row, type the following information:
196
-
197
-
1.**Name**, type **AllowRDP**.
198
-
3. For **Source type**, select **IP address**.
199
-
4. For **Source**, type **192.168.1.0/24**.
200
-
2. For **Protocol**, select **TCP**.
201
-
1. For **Destination Ports**, type **3389**.
202
-
1. For **Destination type**, select **IP address**.
203
-
1. For **Destination**, type **10.6.0.0/16**
204
-
1. Select **Add**.
205
-
206
193
## Create and connect the VPN gateways
207
194
208
195
The hub and on-premises virtual networks are connected via VPN gateways.
@@ -386,17 +373,21 @@ Now create the spoke workload and on-premises virtual machines, and place them i
386
373
387
374
### Create the workload virtual machine
388
375
389
-
Create a virtual machine in the spoke virtual network, running IIS, with no public IP address.
376
+
Create a virtual machine in the spoke virtual network, running NGINX, with no public IP address.
390
377
391
378
1. From the Azure portal home page, select **Create a resource**.
392
-
2. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
379
+
2. Under **Popular Marketplace products**, select **Ubuntu Server 22.04 LTS**.
393
380
3. Enter these values for the virtual machine:
394
381
-**Resource group** - Select **FW-Hybrid-Test**
395
382
-**Virtual machine name**: *VM-Spoke-01*
396
-
-**Region** - Same region that you're used previously
397
-
-**User name**: \<type a user name\>
398
-
-**Password**: \<type a password\>
399
-
4. For **Public inbound ports**, select **Allow selected ports**, and then select **HTTP (80)**, and **RDP (3389)**.
383
+
-**Region** - Same region that you used previously
384
+
-**Image** - Ubuntu Server 22.04 LTS - x64 Gen2
385
+
-**Size** - Standard_B2s
386
+
-**Authentication type** - SSH public key
387
+
-**Username**: **azureuser**
388
+
-**SSH public key source** - Generate new key pair
389
+
-**Key pair name** - **VM-Spoke-01_key**
390
+
4. For **Public inbound ports**, select **None**.
400
391
4. Select **Next:Disks**.
401
392
5. Accept the defaults and select **Next: Networking**.
402
393
6. Select **VNet-Spoke** for the virtual network and the subnet is **SN-Workload**.
@@ -405,68 +396,108 @@ Create a virtual machine in the spoke virtual network, running IIS, with no publ
405
396
1. Select **Next : Monitoring**.
406
397
1. For **Boot diagnostics**, Select **Disable**.
407
398
1. Select **Review+Create**, review the settings on the summary page, and then select **Create**.
399
+
1. On the **Generate new key pair** dialog, select **Download private key and create resource**. Save the key file as **VM-Spoke-01_key.pem**.
408
400
409
-
### Install IIS
401
+
### Install Nginx
410
402
411
-
After the virtual machine is created, install IIS.
403
+
After the virtual machine is created, install Nginx web server.
412
404
413
-
1. From the Azure portal, open the Cloud Shell and make sure that it's set to **PowerShell**.
414
-
2. Run the following command to install IIS on the virtual machine and change the location if necessary:
405
+
1. From the Azure portal, open the Cloud Shell and make sure that it's set to **Bash**.
406
+
2. Run the following command to install Nginx on the virtual machine:
This is a virtual machine that you use to connect using Remote Desktop to the public IP address. From there, you then connect to the on-premises server through the firewall.
418
+
This is a virtual machine that you use to connect using Azure Bastion. From there, you then connect to the spoke server through the firewall.
431
419
432
420
1. From the Azure portal home page, select **Create a resource**.
433
-
2. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
421
+
2. Under **Popular Marketplace products**, select **Ubuntu Server 22.04 LTS**.
434
422
3. Enter these values for the virtual machine:
435
423
-**Resource group** - Select existing, and then select **FW-Hybrid-Test**.
436
424
-**Virtual machine name** - *VM-Onprem*.
437
425
-**Region** - Same region that you used previously.
438
-
-**User name**: \<type a user name\>.
439
-
-**Password**: \<type a user password\>.
440
-
7. For **Public inbound ports**, select **Allow selected ports**, and then select **RDP (3389)**
426
+
-**Image** - Ubuntu Server 22.04 LTS - x64 Gen2
427
+
-**Size** - Standard_B2s
428
+
-**Authentication type** - SSH public key
429
+
-**Username**: **azureuser**
430
+
-**SSH public key source** - Generate new key pair
431
+
-**Key pair name** - **VM-Onprem_key**
432
+
433
+
7. For **Public inbound ports**, select **None**
441
434
4. Select **Next:Disks**.
442
435
5. Accept the defaults and select **Next:Networking**.
443
436
6. Select **VNet-Onprem** for virtual network and the subnet is **SN-Corp**.
437
+
444
438
8. Select **Next:Management**.
445
439
1. Select **Next : Monitoring**.
446
440
1. For **Boot diagnostics**, select **Disable**.
447
441
1. Select **Review+Create**, review the settings on the summary page, and then select **Create**.
442
+
1. On the **Generate new key pair** dialog, select **Download private key and create resource**. Save the key file as **VM-Onprem_key.pem**.
0 commit comments