You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/tutorial-inspect-traffic-azure-firewall.md
+147-5Lines changed: 147 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: abell
6
6
ms.service: azure-private-link
7
7
ms.topic: tutorial
8
8
ms.custom: mvc, linux-related-content
9
-
ms.date: 02/18/2025
9
+
ms.date: 02/23/2026
10
10
# Customer intent: "As a network administrator, I want to configure Azure Firewall to inspect traffic to private endpoints, so that I can enhance security and ensure only authorized access to Azure resources."
11
11
---
12
12
# Tutorial: Inspect private endpoint traffic with Azure Firewall
@@ -48,11 +48,147 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
48
48
49
49
Sign in to the [Azure portal](https://portal.azure.com).
A resource group is a logical container for Azure resources. This procedure creates a resource group for all resources used in this tutorial.
54
+
55
+
1. In the portal, search for and select **Resource groups**.
56
+
57
+
1. On the **Resource groups** page, select **+ Create**.
58
+
59
+
1. On the **Basics** tab, enter or select the following information:
60
+
61
+
| Setting | Value |
62
+
|---|---|
63
+
|**Project details**||
64
+
| Subscription | Select your subscription. |
65
+
| Resource group | Enter **test-rg**. |
66
+
|**Resource details**||
67
+
| Region | Select **East US 2**. |
68
+
69
+
1. Select **Review + create**, and then select **Create**.
70
+
71
+
## Create a virtual network
72
+
73
+
The following procedure creates a virtual network with a resource subnet.
74
+
75
+
1. In the portal, search for and select **Virtual networks**.
76
+
77
+
1. On the **Virtual networks** page, select **+ Create**.
78
+
79
+
1. On the **Basics** tab of **Create virtual network**, enter, or select the following information:
80
+
81
+
| Setting | Value |
82
+
|---|---|
83
+
|**Project details**||
84
+
| Subscription | Select your subscription. |
85
+
| Resource group | Select **test-rg**. |
86
+
|**Instance details**||
87
+
| Name | Enter **vnet-1**. |
88
+
| Region | Select **East US 2**. |
89
+
90
+
1. Select **Next** to proceed to the **Security** tab.
91
+
92
+
1. Select **Next** to proceed to the **IP Addresses** tab.
93
+
94
+
1. In the address space box in **Subnets**, select the **default** subnet.
95
+
96
+
1. In **Edit subnet**, enter or select the following information:
97
+
98
+
| Setting | Value |
99
+
|---|---|
100
+
|**Subnet details**||
101
+
| Subnet template | Leave the default **Default**. |
102
+
| Name | Enter **subnet-1**. |
103
+
| Starting address | Leave the default of **10.0.0.0**. |
104
+
| Subnet size | Leave the default of **/24 (256 addresses)**. |
105
+
106
+
1. Select **Save**.
107
+
108
+
1. Select **Review + create** at the bottom of the screen, and when validation passes, select **Create**.
109
+
110
+
## Deploy Azure Bastion
111
+
112
+
Azure Bastion uses your browser to connect to VMs in your virtual network over Secure Shell (SSH) or Remote Desktop Protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](/azure/bastion/bastion-overview).
| Configure network security group | Select **Create new**.</br> In **Name** enter **nsg-1**.</br> Select **OK**. |
184
+
185
+
1. Leave the rest of the options at the defaults and select **Review + create**.
186
+
187
+
1. Select **Create**.
188
+
189
+
1. A **Generate new key pair** pop-up opens. Select **Download private key and create resource**.
190
+
191
+
1. The private key file is downloaded as **vm-1-key.pem**. Make sure you know where this file is downloaded so you can use it to sign in to the virtual machine in the next steps.
56
192
57
193
## Deploy Azure Firewall
58
194
@@ -358,9 +494,15 @@ Create an application rule to allow communication from **vnet-1** to the private
358
494
359
495
1. Select **vm-1**.
360
496
361
-
1.In**Operations**select**Bastion**.
497
+
1.Select**Connect**then**Connect via Bastion** in the **Overview** section.
362
498
363
-
1. Enter the username and password for the virtual machine.
499
+
1. In the **Bastion** connection page, enter or select the following information:
500
+
501
+
| Setting | Value |
502
+
| ------- | ----- |
503
+
| Authentication Type | Select **SSH Private Key from Local File**. |
504
+
| Username | Enter the username you created. |
505
+
| Local File | Select the **vm-1-key** private key file you downloaded. |
0 commit comments