Steps to Enable Internet Access via Azure Firewall

Steps to Enable Internet Access via Azure Firewall

Allowing internet access through Azure Firewall may seem challenging, but our straightforward step-by-step guide will walk you through the process seamlessly.

How to Allow Internet Traffic Through Azure Firewall

1. Create an Azure Firewall

  1. Open your web browser, navigate to the Azure portal, and log in using your credentials.
  2. Select Create a resource > Networking > Firewall.
  3. Complete the necessary fields, including Resource Group, Name, Region, and Firewall Policy.
  4. Click Review + create, then click Create.

If you already have an Azure Firewall set up, you can skip this step.

2. Create a Firewall Subnet and Add a Route

  1. Within Azure, navigate to your Virtual Network.
  2. Select Subnets > + Subnet.
  3. Name the subnet AzureFirewallSubnet.
  4. Specify a subnet address range (minimum /26), then click Save.
  5. After creating the subnet, deploy the firewall into it.
  6. Access the Firewall you just created.
  7. Under Settings, choose Public IP configuration and associate a public IP address.
  8. Go to All services > Route tables > + Add.
  9. Provide the necessary details to create the route table.
  10. Once the table is created, access it and select Routes > + Add.
  11. Add a new route with the following specifications:
    • Route name: AllowAllOutbound Address prefix: 0.0.0.0/0 Next hop type: Virtual appliance Next hop address: The private IP address of your Azure Firewall.
  12. To associate the Route Table with the Subnet, navigate to the Subnets section of the route table.
  13. Select + Associate and choose the subnet you want to route through the firewall.

3. Create a Network Rule in Azure Firewall

  1. Access your Azure Firewall.
  2. Under Settings, click on Rules > Network rule collection > + Add network rule collection.
  3. Enter the required details:
    • Name: AllowAllOutbound Priority: 100 (or suitable priority as per your rule set) Action: Allow
  4. Add a rule with the following parameters:
    • Name: AllowAll Protocol: Any Source: Any Destination: 0.0.0.0/0 Destination Ports: *

4. Verify the Configuration

Now, it’s essential to verify the configuration you just set up. Double-check that the route table is correctly linked with the subnet.

Ensure that the network rule is active and accurately configured in the Azure Firewall. Test the outbound traffic from a VM in the subnet to confirm it routes through the firewall.

This configuration will direct all outbound traffic from the specified subnet through the Azure Firewall, enabling all outbound traffic according to the set rules.

Have you explored the Azure Video Indexer? Click the highlighted link to discover more about it.

If you have specific requirements or run into any issues, please feel free to ask in the comments below.

Source

Leave a Reply

Your email address will not be published. Required fields are marked *