How to Configure VNET peering with the F-Series Firewall

Similar documents
How to Configure Azure Route Tables (UDR) using Azure Portal and ARM

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

How to Configure Azure Route Tables (UDR) using PowerShell and ARM

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

Example - Configuring a Site-to-Site IPsec VPN Tunnel

Silver Peak EC-V and Microsoft Azure Deployment Guide

How to Configure Azure OMS Log Streaming

S2S VPN with Azure Route Based

Microsoft Azure for AWS Experts

VPN Solutions for Zerto Virtual Replication to Azure. SoftEther Installation Guide

MCR Google Cloud Partner Interconnect

Transit Network VPC. AWS Reference Deployment Guide. Last updated: May 10, Aviatrix Systems, Inc. 411 High Street Palo Alto, CA USA

How to Configure a High Availability Cluster in Azure via Web Portal and ASM

Microsoft. AZ-100 EXAM Azure Infrastructure and Deployment. m/ Product: Demo. For More Information:

Azure Compute. Azure Virtual Machines

Microsoft Azure Course Content

Lab Guide. Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501

1. Click on "IaaS" to advance to the Windows Azure Scenario. 2. Click to configure the "CloudNet" Virtual Network

40390: Microsoft Azure for AWS Experts

Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Portal

MCR Connections to Microsoft Azure using ExpressRoute

A: SETTING UP VMware Horizon

Exam : Implementing Microsoft Azure Infrastructure Solutions

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Developing Microsoft Azure Solutions (70-532) Syllabus

How to Configure an IKEv2 IPsec Site-to-Site VPN to a Routed-Based Microsoft Azure VPN Gateway

How to Configure a Dynamic Mesh VPN with the GTI Editor

Microsoft Azure Architect Technologies (beta)

Tableau Server on Microsoft Azure:

How to Configure User Defined Routes in Azure

Developing Microsoft Azure Solutions (70-532) Syllabus

Configuring VNet Peering For Azure

Developing Microsoft Azure Solutions (70-532) Syllabus

Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management Portal

MarkLogic Server. MarkLogic Server on Microsoft Azure Guide. MarkLogic 9 January, 2018

Reserved, Static and Public IP Addresses in the Azure Cloud using ASM

Deccansoft Software Services

Configuring Aviatrix Encryption

How to Create a VPN Tunnel with the VPN GTI Editor

[MS20533]: Implementing Microsoft Azure Infrastructure Solutions

How to Deploy the Barracuda Security Gateway in the New Microsoft Azure Management Portal

Azure 209x Practical Exercises Overview

How to Configure a Route-Based VPN Between Azure and a Forcepoint NGFW TECHNICAL DOCUMENT

Next-Generation Security Platform on Azure Reference Architecture

Microsoft Networking Academy

How to Configure a Dynamic Mesh VPN with the GTI Editor

Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG

EASYHA SQL SERVER V1.0

vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5

vcloud Director User's Guide

Azure Virtual Machines Practice Exercises

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways

NGF0502 AWS Student Slides

Check Point vsec for Microsoft Azure

Implementing Microsoft Azure Infrastructure Solutions (20533)

Developing Microsoft Azure Solutions

Implementing Microsoft Azure Infrastructure Solutions

Aviatrix Site2Cloud Virtual Appliance

Pentaho and Microsoft Azure

EASYSECURITY SYMANTEC V1.0

The Great Azure Networking Tour. Morgan Simonsen Innofactor

Session objectives and takeaways

Virtual Private Cloud. User Guide. Issue 03 Date

Virtual Private Cloud. User Guide

<Hot>Table 1.1 lists the Infoblox vnios for Azure appliance models that are supported for this release. # of vcpu Cores. TE-V Yes

Mesh and hub-and-spoke networks on Azure

Azure for On-Premises Administrators Practice Exercises

EXPRESSCLUSTER X 4.0. HA Cluster Configuration Guide for Microsoft Azure (Windows) April 17, st Edition

Deploying and Provisioning the Barracuda CloudGen WAF in the Classic Microsoft Azure Management Portal

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide

Hyperledger Fabric Single Member Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

How to Configure Dynamic Mesh VPN

Cloud Operations Using Microsoft Azure. Nikhil Shampur

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Networking Lecture 11

CLOUD GATEWAY TECHNICAL GUIDE

SD-WAN Deployment Guide (CVD)

MASERGY S MANAGED SD-WAN

IBM Cloud for VMware Solutions NSX Edge Services Gateway Solution Architecture

How to Configure a Remote Management Tunnel for an F-Series Firewall

A deep-dive into Azure Networking!

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Cisco CSR 1000v Deployment Guide for Microsoft Azure

USER GUIDE Azure Factory

2018 Hands-on Guide. F5 Azure SACA. F5 Networks, Inc.

Page No 1. AZ-302 EXAM Microsoft Azure Solutions Architect Certification Transition. For More Information:

FUJITSU Cloud Service S5 Connecting to a Virtual Machine (VM)

Extending Enterprise Security to Multicloud and Public Cloud

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Developing Microsoft Azure Solutions

Deccansoft Software Services

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE

Data Sheet GigaSECURE Cloud

MIGRATE2IAAS CLOUDSCRAPER TM V0.5 USER MANUAL. 16 Feb 2014 Copyright M2IAAS INC.

Migration WordPress to Azure using Azure Site Recovery (ASR)

Add Path Support in EIGRP

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate

Transcription:

How to Configure VNET peering with the F-Series Firewall If you have multiple virtual networks in the same Azure region, you can connect them with a high bandwidth, low-latency connection via virtual network peering. Create a hub and spoke architecture with all spoke VNETs peered to a central VNET containing the NextGen Firewall VMs. The subnets in the spoke VNETs are associated with an Azure route table using the firewall VM in the central VNET as the next hop device. In this way, all traffic passes through the firewall, thereby allowing you to centrally apply security policies. Using the firewall as the next hop device also allows you to forward traffic between VNETs that are not directly peered with each other. The route table using the firewalls as nexthop routes must be associated with at least one (backend) subnet in the central hub, otherwise the routes will not be rewritten. The hub can contain not only the firewalls, but also additional backend subnets for services shared by all spoke VNETs. By default, you can create up to 10 VNET peerings per virtual network. Contact Microsoft Azure support to increase this limit to up to 50 peerings. Limitations for VNET Peering with the NextGen Firewall F The virtual networks must be in the same Azure region. The virtual networks must use the same Azure subscription. The virtual networks and route tables must be in the same resource group. The networks of the hub VNET and the spoke VNETs may not overlap. The Azure route table must be associated with at least one (backend) subnet in the hub VNET for the routes to be updated. All virtual virtual networks must use the Azure Resource Manger deployment mode. Before you begin Deploy a high availability firewall cluster. This virtual network is used as the hub. For more information, see High Availability in Azure. Configure Cloud Integration for the firewall cluster. For more information, see How to Configure Azure Cloud Integration using ARM. Create an Azure route table and user defined routes (UDR). For more information, see How to Configure Azure Route Tables (UDR) using Azure Portal and ARM. 1 / 13

Step 1. Create spoke virtual networks Create the virtual networks that will be peered to the central virtual network. 1. 2. 3. 4. Go to the Azure Portal: https://portal.azure.com In the upper left corner, click NEW. In the NEW blade, click Networking. In the Networking blade, click Virtual network. 5. In the Virtual network blade, select Resource Manager from the deployment model drop-down list. 6. Click Create. 2 / 13

7. In the Create virtual network blade, enter: Name Enter a unique name for the virtual network. Address space Use either a large network not overlapping with the other virtual networks, or your on-premises networks. Subnet name Enter a name for the first subnet in the virtual network. Subnet address range Enter the network for the subnet. It must be a subnet of the network entered as the address space. Subscription Select the Azure subscription. Resource Group Click Select Existing and select the resource group the hub virtual network is in. Location Select the location the other virtual networks are in. 3 / 13

8. Click Create. You now have at least two virtual networks in the same resource group. The route table created for the F-Series Firewall HA cluster must also be in the same resource group. Step 2. Peer hub virtual network with spoke virtual networks Create the VNET peering between the hub virtual network and the spoke virtual networks. This will initialize, but not yet connect, the VNET peering. Create a VNET peering for every spoke VNET: 1. Go to the Azure Portal: https://portal.azure.com. 2. Select the resource group containing the virtual networks. 3. Select the Hub VNET. 4 / 13

4. 5. In the left menu of the virtual network blade, select Peerings. Click Add to add a new peering relationship. 6. In the Add peering blade, enter the peering settings: Name Enter a name. Peer details Select Resource manager. Subscription Select the Azure subscription. Virtual network Click and select the spoke VNET you want to peer with. Allow virtual network access Select Enabled to allow access to the virtual network. 5 / 13

Allow forward traffic Enable to allow virtual machines to forward traffic 7. Click OK. Repeat this process for every spoke VNET. The VNET Peering Status in the Virtual network blade is now Initiated. 6 / 13

Step 3. Peer spoke virtual networks with the hub virtual network Create the VNET peering between the spoke virtual networks and the hub virtual networks. This will change the peering state to Connected from Initialized. Repeat this step for every spoke VNET. 1. 2. 3. Go to the Azure Portal: https://portal.azure.com. Select the resource group containing the virtual networks. Select a spoke VNET. 4. In the left menu of the virtual network blade select Peerings and click Add. 5. In the Add peering blade, enter the peering settings: Name Enter a name. Peer details Select Resource manager. Subscription Select the Azure subscription. Virtual network Click and select the hub VNET. Allow virtual network access Select Enabled to allow access to the virtual network. Allow forward traffic Enable to allow virtual machines to forward traffic 7 / 13

6. Click OK. Repeat this process for every spoke VNET. The VNET Peering Status in the Virtual network blade is now Connected. Step 4. Associate route table with spoke subnets To send traffic over the firewall in the peered subnet, associate the Azure route table containing the UDR routes 8 / 13

with the subnets. Repeat this for each spoke VNET. 1. 2. 3. Go to the Azure Portal: https://portal.azure.com. Select the resource group containing the virtual networks. Select a spoke VNET. 4. 5. In the left menu of the blade, click Subnets. Select the subnet. A blade with the subnet name opens. 6. Click Route Table and select the route table created for the hub VNET. 9 / 13

7. 8. Click Save. Repeat for the other subnets in this virtual network that are allowed to send traffic to other VNETs or need access to the Internet. Traffic from VMs are now routed over the firewall VM in the hub VNET. Step 5. Create access rules to allow traffic between spoke VNETs Create access rules to allow traffic between the spoke VNETS 1. 2. 3. 4. 5. 6. Log into the primary firewall. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Forwarding Rules. Click Lock. From the Edit Rule menu in the left menu, click New. The New Rule window opens. Enter a Name E.g., VNET1-to-VNET2 In the New Rule window, configure the settings to allow traffic between both systems: Action Select Pass. Bi-Directional Select the check box to apply the rule in both directions. Source Enter the network of the first spoke VNET. Service Select the services allowed to access the tunnel. Default: Any Destination Enter the network of the second spoke VNET.. Connection Method Select Original Source IP. 10 / 13

7. 8. 9. Click OK. Reorder the access rule by dragging it to the correct position in the forwarding firewall's ruleset. Click Send Changes and Activate. The VMs in the first spoke VNET can now access the VMs in the second spoke. Replace this access rule with more specific rules to lock down traffic between the spokes further. Step 6. (optional) Create access rule to allow spoke VNETs access to the Internet Create an access rule that allows VMs in the spoke VNETs access to the Internet: 1. 2. 3. 4. 5. 6. Log into the primary firewall. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Forwarding Rules. Click Lock. From the Edit Rule menu in the left menu, click New. The New Rule window opens. Enter a Name E.g., SpokeVNETs-2-INTERNET In the New Rule window, configure the settings to allow traffic between both systems: Action Select Pass. Source Enter the networks for the spoke VNETs. Service Select the services allowed to access the tunnel. Default: Any Destination Select Internet. Connection Method Select Dynamic NAT. 11 / 13

7. 8. 9. Click OK. Reorder the access rule by dragging it to the correct position in the forwarding firewall's ruleset. Click Send Changes and Activate. All traffic from the subnets in the spoke VNETs is now passing through the high availability firewall cluster in the hub VNET. 12 / 13

Figures 13 / 13