Skip to content

Commit e59a3e7

Browse files
Merge pull request #312050 from asudbring/tsk554556-sfi-bastion
Update inspect traffic with Azure Firewall tutorial - Bastion Developer SKU and inline portal instructions
2 parents 3a5a4ca + 246ddce commit e59a3e7

1 file changed

Lines changed: 147 additions & 5 deletions

File tree

articles/private-link/tutorial-inspect-traffic-azure-firewall.md

Lines changed: 147 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: abell
66
ms.service: azure-private-link
77
ms.topic: tutorial
88
ms.custom: mvc, linux-related-content
9-
ms.date: 02/18/2025
9+
ms.date: 02/23/2026
1010
# Customer intent: "As a network administrator, I want to configure Azure Firewall to inspect traffic to private endpoints, so that I can enhance security and ensure only authorized access to Azure resources."
1111
---
1212
# Tutorial: Inspect private endpoint traffic with Azure Firewall
@@ -48,11 +48,147 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
4848

4949
Sign in to the [Azure portal](https://portal.azure.com).
5050

51-
[!INCLUDE [virtual-network-create-with-bastion.md](~/reusable-content/ce-skilling/azure/includes/virtual-network-create-with-bastion.md)]
51+
## Create a resource group
52+
53+
A resource group is a logical container for Azure resources. This procedure creates a resource group for all resources used in this tutorial.
54+
55+
1. In the portal, search for and select **Resource groups**.
56+
57+
1. On the **Resource groups** page, select **+ Create**.
58+
59+
1. On the **Basics** tab, enter or select the following information:
60+
61+
| Setting | Value |
62+
|---|---|
63+
| **Project details** | |
64+
| Subscription | Select your subscription. |
65+
| Resource group | Enter **test-rg**. |
66+
| **Resource details** | |
67+
| Region | Select **East US 2**. |
68+
69+
1. Select **Review + create**, and then select **Create**.
70+
71+
## Create a virtual network
72+
73+
The following procedure creates a virtual network with a resource subnet.
74+
75+
1. In the portal, search for and select **Virtual networks**.
76+
77+
1. On the **Virtual networks** page, select **+ Create**.
78+
79+
1. On the **Basics** tab of **Create virtual network**, enter, or select the following information:
80+
81+
| Setting | Value |
82+
|---|---|
83+
| **Project details** | |
84+
| Subscription | Select your subscription. |
85+
| Resource group | Select **test-rg**. |
86+
| **Instance details** | |
87+
| Name | Enter **vnet-1**. |
88+
| Region | Select **East US 2**. |
89+
90+
1. Select **Next** to proceed to the **Security** tab.
91+
92+
1. Select **Next** to proceed to the **IP Addresses** tab.
93+
94+
1. In the address space box in **Subnets**, select the **default** subnet.
95+
96+
1. In **Edit subnet**, enter or select the following information:
97+
98+
| Setting | Value |
99+
|---|---|
100+
| **Subnet details** | |
101+
| Subnet template | Leave the default **Default**. |
102+
| Name | Enter **subnet-1**. |
103+
| Starting address | Leave the default of **10.0.0.0**. |
104+
| Subnet size | Leave the default of **/24 (256 addresses)**. |
105+
106+
1. Select **Save**.
107+
108+
1. Select **Review + create** at the bottom of the screen, and when validation passes, select **Create**.
109+
110+
## Deploy Azure Bastion
111+
112+
Azure Bastion uses your browser to connect to VMs in your virtual network over Secure Shell (SSH) or Remote Desktop Protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](/azure/bastion/bastion-overview).
113+
114+
>[!NOTE]
115+
>[!INCLUDE [Pricing](~/reusable-content/ce-skilling/azure/includes/bastion-pricing.md)]
116+
117+
1. In the search box at the top of the portal, enter **Bastion**. Select **Bastions** in the search results.
118+
119+
1. Select **+ Create**.
120+
121+
1. In the **Basics** tab of **Create a Bastion**, enter, or select the following information:
122+
123+
| Setting | Value |
124+
|---|---|
125+
| **Project details** | |
126+
| Subscription | Select your subscription. |
127+
| Resource group | Select **test-rg**. |
128+
| **Instance details** | |
129+
| Name | Enter **bastion**. |
130+
| Region | Select **East US 2**. |
131+
| Tier | Select **Developer**. |
132+
| **Configure virtual networks** | |
133+
| Virtual network | Select **vnet-1**. |
134+
135+
1. Select **Review + create**.
136+
137+
1. Select **Create**.
52138

53139
[!INCLUDE [virtual-network-create-private-endpoint.md](../../includes/virtual-network-create-private-endpoint.md)]
54140

55-
[!INCLUDE [create-test-virtual-machine-linux.md](~/reusable-content/ce-skilling/azure/includes/create-test-virtual-machine-linux.md)]
141+
## Create a test virtual machine
142+
143+
The following procedure creates a test virtual machine (VM) named **vm-1** in the virtual network.
144+
145+
1. In the portal, search for and select **Virtual machines**.
146+
147+
1. In **Virtual machines**, select **+ Create**, then select **Azure virtual machine**.
148+
149+
1. On the **Basics** tab of **Create a virtual machine**, enter or select the following information:
150+
151+
| Setting | Value |
152+
| ------- | ----- |
153+
| **Project details** | |
154+
| Subscription | Select your subscription. |
155+
| Resource group | Select **test-rg**. |
156+
| **Instance details** | |
157+
| Virtual machine name | Enter **vm-1**. |
158+
| Region | Select **(US) East US 2**. |
159+
| Availability options | Select **No infrastructure redundancy required**. |
160+
| Security type | Select **Standard**. |
161+
| Image | Select **Ubuntu Server 24.04 LTS - x64 Gen2**. |
162+
| VM architecture | Leave the default of **x64**. |
163+
| Size | Select a size. |
164+
| **Administrator account** | |
165+
| Authentication type | Select **SSH public key**. |
166+
| Username | Enter a username. |
167+
| SSH public key source | Select **Generate new key pair**. |
168+
| Key pair name | Enter **vm-1-key**. |
169+
| **Inbound port rules** | |
170+
| Public inbound ports | Select **None**. |
171+
172+
1. Select **Next: Disks** then **Next: Networking**.
173+
174+
1. In the Networking tab, enter or select the following information:
175+
176+
| Setting | Value |
177+
| ------- | ----- |
178+
| **Network interface** | |
179+
| Virtual network | Select **vnet-1**. |
180+
| Subnet | Select **subnet-1 (10.0.0.0/24)**. |
181+
| Public IP | Select **None**. |
182+
| Network interface (NIC) network security group | Select **Advanced**. |
183+
| Configure network security group | Select **Create new**.</br> In **Name** enter **nsg-1**.</br> Select **OK**. |
184+
185+
1. Leave the rest of the options at the defaults and select **Review + create**.
186+
187+
1. Select **Create**.
188+
189+
1. A **Generate new key pair** pop-up opens. Select **Download private key and create resource**.
190+
191+
1. The private key file is downloaded as **vm-1-key.pem**. Make sure you know where this file is downloaded so you can use it to sign in to the virtual machine in the next steps.
56192

57193
## Deploy Azure Firewall
58194

@@ -358,9 +494,15 @@ Create an application rule to allow communication from **vnet-1** to the private
358494

359495
1. Select **vm-1**.
360496

361-
1. In **Operations** select **Bastion**.
497+
1. Select **Connect** then **Connect via Bastion** in the **Overview** section.
362498

363-
1. Enter the username and password for the virtual machine.
499+
1. In the **Bastion** connection page, enter or select the following information:
500+
501+
| Setting | Value |
502+
| ------- | ----- |
503+
| Authentication Type | Select **SSH Private Key from Local File**. |
504+
| Username | Enter the username you created. |
505+
| Local File | Select the **vm-1-key** private key file you downloaded. |
364506

365507
1. Select **Connect**.
366508

0 commit comments

Comments
 (0)