Deploy and configure Azure Firewall using Azure PowerShell
Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that can be accessed.
One way you can control outbound network access from an Azure subnet is with Azure Firewall. With Azure Firewall, you can configure:
- Application rules that define fully qualified domain names (FQDNs) that can be accessed from a subnet.
- Network rules that define source address, protocol, destination port, and destination address.
Network traffic is subjected to the configured firewall rules when you route your network traffic to the firewall as the subnet default gateway.
For this article, you create a simplified single VNet with three subnets for easy deployment. For production deployments, a hub and spoke model is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
- AzureFirewallSubnet - the firewall is in this subnet.
- Workload-SN - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
- Jump-SN - The "jump" server is in this subnet. The jump server has a public IP address that you can connect to using Remote Desktop. From there, you can then connect to (using another Remote Desktop) the workload server.
In this article, you learn how to:
- Set up a test network environment
- Deploy a firewall
- Create a default route
- Configure an application rule to allow access to www.google.com
- Configure a network rule to allow access to external DNS servers
- Test the firewall
If you prefer, you can complete this procedure using the Azure portal.
If you don't have an Azure subscription, create a free account before you begin.
This procedure requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run
Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install Azure PowerShell module. After you verify the PowerShell version, run
Connect-AzAccount to create a connection with Azure.
Set up the network
First, create a resource group to contain the resources needed to deploy the firewall. Then create a VNet, subnets, and test servers.
Create a resource group
The resource group contains all the resources for the deployment.
New-AzResourceGroup -Name Test-FW-RG -Location "East US"
Create a VNet
This virtual network has three subnets:
The size of the AzureFirewallSubnet subnet is /26. For more information about the subnet size, see Azure Firewall FAQ.
$FWsub = New-AzVirtualNetworkSubnetConfig -Name AzureFirewallSubnet -AddressPrefix 10.0.1.0/26 $Worksub = New-AzVirtualNetworkSubnetConfig -Name Workload-SN -AddressPrefix 10.0.2.0/24 $Jumpsub = New-AzVirtualNetworkSubnetConfig -Name Jump-SN -AddressPrefix 10.0.3.0/24
Now, create the virtual network:
$testVnet = New-AzVirtualNetwork -Name Test-FW-VN -ResourceGroupName Test-FW-RG ` -Location "East US" -AddressPrefix 10.0.0.0/16 -Subnet $FWsub, $Worksub, $Jumpsub
Create virtual machines
Now create the jump and workload virtual machines, and place them in the appropriate subnets. When prompted, type a user name and password for the virtual machine.
Create the Srv-Jump virtual machine.
New-AzVm ` -ResourceGroupName Test-FW-RG ` -Name "Srv-Jump" ` -Location "East US" ` -VirtualNetworkName Test-FW-VN ` -SubnetName Jump-SN ` -OpenPorts 3389 ` -Size "Standard_DS2"
Create a workload virtual machine with no public IP address. When prompted, type a user name and password for the virtual machine.
#Create the NIC $NIC = New-AzNetworkInterface -Name Srv-work -ResourceGroupName Test-FW-RG ` -Location "East US" -Subnetid $testVnet.Subnets.Id #Define the virtual machine $VirtualMachine = New-AzVMConfig -VMName Srv-Work -VMSize "Standard_DS2" $VirtualMachine = Set-AzVMOperatingSystem -VM $VirtualMachine -Windows -ComputerName Srv-Work -ProvisionVMAgent -EnableAutoUpdate $VirtualMachine = Add-AzVMNetworkInterface -VM $VirtualMachine -Id $NIC.Id $VirtualMachine = Set-AzVMSourceImage -VM $VirtualMachine -PublisherName 'MicrosoftWindowsServer' -Offer 'WindowsServer' -Skus '2016-Datacenter' -Version latest #Create the virtual machine New-AzVM -ResourceGroupName Test-FW-RG -Location "East US" -VM $VirtualMachine -Verbose
Deploy the firewall
Now deploy the firewall into the virtual network.
# Get a Public IP for the firewall $FWpip = New-AzPublicIpAddress -Name "fw-pip" -ResourceGroupName Test-FW-RG ` -Location "East US" -AllocationMethod Static -Sku Standard # Create the firewall $Azfw = New-AzFirewall -Name Test-FW01 -ResourceGroupName Test-FW-RG -Location "East US" -VirtualNetworkName Test-FW-VN -PublicIpName fw-pip #Save the firewall private IP address for future use $AzfwPrivateIP = $Azfw.IpConfigurations.privateipaddress $AzfwPrivateIP
Note the private IP address. You'll use it later when you create the default route.
Create a default route
Create a table, with BGP route propagation disabled
$routeTableDG = New-AzRouteTable ` -Name Firewall-rt-table ` -ResourceGroupName Test-FW-RG ` -location "East US" ` -DisableBgpRoutePropagation #Create a route Add-AzRouteConfig ` -Name "DG-Route" ` -RouteTable $routeTableDG ` -AddressPrefix 0.0.0.0/0 ` -NextHopType "VirtualAppliance" ` -NextHopIpAddress $AzfwPrivateIP ` | Set-AzRouteTable #Associate the route table to the subnet Set-AzVirtualNetworkSubnetConfig ` -VirtualNetwork $testVnet ` -Name Workload-SN ` -AddressPrefix 10.0.2.0/24 ` -RouteTable $routeTableDG | Set-AzVirtualNetwork
Configure an application rule
The application rule allows outbound access to www.google.com.
$AppRule1 = New-AzFirewallApplicationRule -Name Allow-Google -SourceAddress 10.0.2.0/24 ` -Protocol http, https -TargetFqdn www.google.com $AppRuleCollection = New-AzFirewallApplicationRuleCollection -Name App-Coll01 ` -Priority 200 -ActionType Allow -Rule $AppRule1 $Azfw.ApplicationRuleCollections = $AppRuleCollection Set-AzFirewall -AzureFirewall $Azfw
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see Infrastructure FQDNs.
Configure a network rule
The network rule allows outbound access to two IP addresses at port 53 (DNS).
$NetRule1 = New-AzFirewallNetworkRule -Name "Allow-DNS" -Protocol UDP -SourceAddress 10.0.2.0/24 ` -DestinationAddress 188.8.131.52,184.108.40.206 -DestinationPort 53 $NetRuleCollection = New-AzFirewallNetworkRuleCollection -Name RCNet01 -Priority 200 ` -Rule $NetRule1 -ActionType "Allow" $Azfw.NetworkRuleCollections = $NetRuleCollection Set-AzFirewall -AzureFirewall $Azfw
Change the primary and secondary DNS address for the Srv-Work network interface
For testing purposes in this procedure, configure the server's primary and secondary DNS addresses. This isn't a general Azure Firewall requirement.
$NIC.DnsSettings.DnsServers.Add("220.127.116.11") $NIC.DnsSettings.DnsServers.Add("18.104.22.168") $NIC | Set-AzNetworkInterface
Test the firewall
Now, test the firewall to confirm that it works as expected.
Note the private IP address for the Srv-Work virtual machine:
Connect a remote desktop to Srv-Jump virtual machine, and sign in. From there, open a remote desktop connection to the Srv-Work private IP address and sign in.
On SRV-Work, open a PowerShell window and run the following commands:
nslookup www.google.com nslookup www.microsoft.com
Both commands should return answers, showing that your DNS queries are getting through the firewall.
Run the following commands:
Invoke-WebRequest -Uri https://www.google.com Invoke-WebRequest -Uri https://www.google.com Invoke-WebRequest -Uri https://www.microsoft.com Invoke-WebRequest -Uri https://www.microsoft.com
www.google.comrequests should succeed, and the
www.microsoft.comrequests should fail. This demonstrates that your firewall rules are operating as expected.
So now you've verified that the firewall rules are working:
- You can resolve DNS names using the configured external DNS server.
- You can browse to the one allowed FQDN, but not to any others.
Clean up resources
You can keep your firewall resources for the next tutorial, or if no longer needed, delete the Test-FW-RG resource group to delete all firewall-related resources:
Remove-AzResourceGroup -Name Test-FW-RG