Skip to content

Commit 56c18c8

Browse files
committed
docs: fix metadata, alt text, lightbox, headings, style edits
1 parent 90b7cec commit 56c18c8

1 file changed

Lines changed: 54 additions & 63 deletions

File tree

articles/firewall/management-nic.md

Lines changed: 54 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -1,125 +1,116 @@
11
---
22
title: Azure Firewall Management NIC
33
description: You can configure a Management NIC to support the Forced Tunneling and Packet Capture features.
4-
services: firewall
54
author: duongau
6-
ms.date: 11/6/2024
5+
ms.author: duau
76
ms.service: azure-firewall
87
ms.topic: concept-article
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
# Customer intent: "As a network administrator, I want to configure a Management NIC for Azure Firewall, so that I can ensure proper management traffic handling and prepare for upcoming Firewall features without service disruption."
1110
---
1211

1312
# Azure Firewall Management NIC
1413

1514
> [!NOTE]
16-
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
15+
> This feature was previously called Forced Tunneling. Originally, a Management network interface was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management network interface, so it has been decoupled from Forced Tunneling.
1716
18-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Certain upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall to avoid service disruption.
17+
An Azure Firewall Management network interface separates firewall management traffic from customer traffic. To support forced tunneling and other management features, you must create an Azure Firewall with the Firewall Management network interface enabled, or enable it on an existing Azure Firewall to avoid service disruption.
1918

20-
## What happens when you enable the Management NIC
19+
## What happens when you enable the Management network interface
2120

22-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
21+
If you enable a Management NIC, the firewall routes its management traffic through the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. The AzureFirewallManagementSubnet includes all traffic required for firewall operational purposes.
2322

24-
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
23+
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this configuration can cause service disruptions. If you do associate a route table, ensure it has a default route to the Internet to avoid service disruptions.
2524

26-
:::image type="content" source="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall management NIC dialog.":::
25+
:::image type="content" source="media/management-nic/firewall-management-nic.png" lightbox="media/management-nic/firewall-management-nic.png" alt-text="Screenshot showing the firewall Management NIC configuration.":::
2726

28-
## Enable the Management NIC on existing firewalls
27+
## Enable the management NIC on existing firewalls
2928

30-
For Standard and Premium firewall versions, the Firewall Management NIC must be manually enabled during the create process as shown previously, but all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled.
29+
For Standard and Premium firewall versions, you must manually enable the Firewall Management NIC during the creation process as shown previously. However, all Basic Firewall versions and all Secured Hub firewalls always have a Management NIC enabled.
3130

32-
For a pre-existing firewall, you must stop the firewall and then restart it with the Firewall Management NIC enabled to support Forced tunneling. Stopping/starting the firewall can be used to enable the Firewall Management NIC without the need to delete an existing firewall and redeploy a new one. You should always start/stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
31+
For an existing firewall, you must stop the firewall and then restart it with the Firewall Management network interface enabled to support forced tunneling. You can use stopping or starting the firewall to enable the Firewall Management NIC without needing to delete an existing firewall and redeploy a new one. Always start or stop the firewall during maintenance hours to avoid disruptions, including when attempting to enable the Firewall Management NIC.
3332

34-
Use the following steps:
33+
1. Create the `AzureFirewallManagementSubnet` in the Azure portal and use the appropriate IP address range for the virtual network.
3534

36-
1. Create the `AzureFirewallManagementSubnet` on the Azure portal and use the appropriate IP address range for the virtual network.
37-
38-
:::image type="content" source="media/management-nic/firewall-management-subnet.png" alt-text="Screenshot showing add a subnet.":::
39-
1. Create the new management public IP address with the same properties as the existing firewall public IP address: SKU, Tier, and Location.
35+
:::image type="content" source="media/management-nic/firewall-management-subnet.png" lightbox="media/management-nic/firewall-management-subnet.png" alt-text="Screenshot showing the subnet configuration for AzureFirewallManagementSubnet.":::
36+
1. Create the new management public IP address with the same properties as the existing firewall public IP address: SKU, tier, and location.
4037

4138
:::image type="content" source="media/management-nic/firewall-management-ip.png" lightbox="media/management-nic/firewall-management-ip.png" alt-text="Screenshot showing the public IP address creation.":::
42-
43-
1. Stop the firewall
39+
40+
1. Stop the firewall.
4441

4542
Use the information in [Azure Firewall FAQ](firewall-faq.yml#how-can-i-stop-and-start-azure-firewall) to stop the firewall:
46-
43+
4744
```azurepowershell
4845
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
4946
$azfw.Deallocate()
5047
Set-AzFirewall -AzureFirewall $azfw
5148
```
52-
53-
49+
5450
1. Start the firewall with the management public IP address and subnet.
5551

56-
Start a firewall with one public IP address and a Management public IP address:
57-
52+
Start a firewall with one public IP address and a management public IP address:
53+
5854
```azurepowershell
5955
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
60-
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
56+
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
6157
$pip = Get-AzPublicIpAddress -Name "azfwpublicip" -ResourceGroupName "RG Name"
62-
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
58+
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
6359
$azfw.Allocate($vnet, $pip, $mgmtPip)
6460
$azfw | Set-AzFirewall
6561
```
66-
67-
Start a firewall with two public IP addresses and a Management public IP address:
68-
62+
63+
Start a firewall with two public IP addresses and a management public IP address:
64+
6965
```azurepowershell
7066
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
71-
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
67+
$vnet = Get-AzVirtualNetwork -Name "VNet Name" -ResourceGroupName "RG Name"
7268
$pip1 = Get-AzPublicIpAddress -Name "azfwpublicip" -ResourceGroupName "RG Name"
7369
$pip2 = Get-AzPublicIpAddress -Name "azfwpublicip2" -ResourceGroupName "RG Name"
74-
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
70+
$mgmtPip = Get-AzPublicIpAddress -Name "mgmtpip" -ResourceGroupName "RG Name"
7571
$azfw.Allocate($vnet,@($pip1,$pip2), $mgmtPip)
7672
$azfw | Set-AzFirewall
7773
```
78-
74+
7975
> [!NOTE]
80-
> You must reallocate a firewall and public IP to the original resource group and subscription. When stop/start is performed, the private IP address of the firewall may change to a different IP address within the subnet. This can affect the connectivity of previously configured route tables.
76+
> You must reallocate a firewall and public IP to the original resource group and subscription. When you stop or start the firewall, the private IP address might change to a different IP address within the subnet. This can affect the connectivity of previously configured route tables.
8177
82-
Now when you view the firewall in the Azure portal, you see the assigned Management public IP address:
78+
When you view the firewall in the Azure portal, you see the assigned management public IP address:
8379

8480
:::image type="content" source="media/management-nic/firewall-with-management-ip.png" lightbox="media/management-nic/firewall-with-management-ip.png" alt-text="Screenshot showing the firewall with a management IP address.":::
8581

8682

8783
> [!NOTE]
88-
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
84+
> If you remove all other IP address configurations on your firewall, you also remove the management IP address configuration, and the firewall is deallocated. You can't remove the public IP address assigned to the management IP address configuration, but you can assign a different public IP address.
8985
90-
## Deploying a New Azure Firewall with Management NIC for Forced Tunneling
86+
## Deploy a new Azure Firewall with management network interface for forced tunneling
9187

92-
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
88+
If you prefer to deploy a new Azure Firewall instead of using the stop/start method, make sure to include a management subnet and management NIC as part of your configuration.
9389

94-
**Important Note**
95-
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls can't exist within the same virtual network, it's recommended to delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
96-
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
90+
> [!IMPORTANT]
91+
> - **Single firewall per virtual network**: Since two firewalls can't exist within the same virtual network, delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
92+
> - **Pre-create subnet**: Make sure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
9793
98-
**Prerequisites**
99-
* Create the **AzureFirewallManagementSubnet**:
100-
* Minimum subnet size: /26
101-
* Example: 10.0.1.0/26
94+
### Prerequisites
10295

103-
**Deployment Steps**
104-
1. Go to **Create a Resource** in the Azure portal.
105-
1. Search for **Firewall** and select **Create**.
106-
1. On the Create a Firewall page, configure the following settings:
107-
* **Subscription**: Select your subscription.
108-
* **Resource Group**: Select or create a new resource group.
109-
* **Name**: Enter a name for the firewall.
110-
* **Region**: Choose your region.
111-
* **Firewall SKU**: Select Basic, Standard, or Premium.
112-
* **Virtual Network**: Create a new virtual network or use an existing one.
113-
* Address space: for example, 10.0.0.0/16
114-
* Subnet for AzureFirewallSubnet: for example, 10.0.0.0/26
115-
* **Public IP Address**: Add new Public IP
116-
* Name: for example, FW-PIP
117-
1. Firewall Management NIC
118-
* Select **Enable Firewall Management NIC**
119-
* Subnet for AzureFirewallManagementSubnet: for example, 10.0.1.0/24
120-
* Create Management public IP address: for example, Mgmt-PIP
121-
1. Select **Review + Create** to validate and deploy the firewall. This takes a few minutes to deploy.
96+
- Create the **AzureFirewallManagementSubnet**:
97+
- Minimum subnet size: /26
98+
- Example: 10.0.1.0/26
99+
100+
### Deployment steps
122101

102+
1. Go to **Create a Resource** in the Azure portal.
103+
1. Search for **Firewall** and select **Create**.
104+
1. On **Create a Firewall**, configure the following settings:
105+
- **Subscription**: Select your subscription.
106+
- **Resource group**: Select an existing resource group or create a new one.
107+
- **Name**: Enter a name for the firewall.
108+
- **Region**: Choose your region.
109+
- **Firewall SKU**: Select Basic, Standard, or Premium.
110+
- **Virtual Network**: Create a new virtual network or use an existing one. For example, use address space 10.0.0.0/16 and subnet 10.0.0.0/26 for AzureFirewallSubnet.
111+
- **Public IP Address**: Add a new public IP address. For example, name it FW-PIP.
112+
- **Enable Firewall Management NIC**: Select this option. Set the AzureFirewallManagementSubnet address range (for example, 10.0.1.0/26) and create a management public IP address (for example, Mgmt-PIP).
113+
1. Select **Review + Create** to validate and deploy the firewall. It takes a few minutes to deploy.
123114

124115
## Related content
125116

0 commit comments

Comments
 (0)