Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
51 views
Lab03 AzureFirewall
AZ500- Lab03
Uploaded by
sale kate
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Lab03_AzureFirewall For Later
Download
Save
Save Lab03_AzureFirewall For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
51 views
Lab03 AzureFirewall
AZ500- Lab03
Uploaded by
sale kate
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Lab03_AzureFirewall For Later
Carousel Previous
Carousel Next
Save
Save Lab03_AzureFirewall For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 11
Search
Fullscreen
5119/24, 1048 PM —_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicosoftLeaming/AZS00-AzureSecu MicrosoftLearning / ee = ‘AZ500-AzureSecurityTechnologies a 8 <> Code © Issues 11 Pullrequests © Actions © Security [~ Insights AZS500-AzureSecurityTechnologies / Instructions / Labs / LAB_03_AzureFirewallmd oe © serling1962 Update LAB_03_AzureFirewallmd ~ Smonths ago 2 324 Lines (198 loc) » 13.7 KB Preview | Code Blame rw O& 2 v lab title module 03 - Azure Firewall Module 02 - Plan and implement security for public access to Azt < > Lab 03: Azure Firewall Student lab manual Lab scenario You have been asked to install Azure Firewall. This will help your organization control inbound and outbound network access which is an important part of an overall network security plan. Specifically, you would like to create and test the following infrastructure components: * A virtual network with a workload subnet and a jump host subnet. * A virtual machine is each subnet. * Acustom route that ensures all outbound workload traffic from the workload subnet must use the firewall. to www.bing.com, nps:igthub.comMicrosotLeamingiAZS00-AzureSecuryTechnologesibiobimasterlinsiucionsiLabsiLAB_03_AzureFiewal.md ant © Firewall Application rules that only allow outbound tra!5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu * Firewall Network rules that allow external DNS server lookups. For all the resources in this lab, we are using the East US region. Verify with your instructor this is the region to use for class, Lab objectives In this lab, you will complete the following exercise: * Exercise 1: Deploy and test an Azure Firewall Azure Firewall diagram vec, ak God) Tere W-¥N 0000016 Instructions Lab files: * \Allfiles\Labs\08\template json Exercise 1: Deploy and test an Azure Firewall Estimated timing: 40 minutes For all the resources in this lab, we are using the East (US) region. Verify with your instructor this is region to use for you class. nps:iigthub.comMicrosotLeaming/AZS00-AzureSecuryTechnologesibiobimasterlnsiucionsiLabsiLAB_03_AzureFiewal.mnd ant5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu In this exercise, you will complete the following tasks: * Task 1; Use a template to deploy the lab environment. * Task 2: Deploy an Azure firewall. © Task 3: Create a default route. * Task 4: Configure an application rule. # Task 5: Configure a network rule. * Task 6: Configure DNS servers. © Task 7: Test the firewall. Task 1: Use a template to deploy the lab environment. In this task, you will review and deploy the lab environment. In this task, you will create a virtual machine by using an ARM template. This virtual machine will be used in the last exercise for this lab. 1. Sign-in to the Azure portal https: //portal-azure.con/ . Note: Sign in to the Azure portal using an account that has the Owner or Contributor role in the Azure subscription you are using for this lab. 2. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Deploy a custom template and press the Enter key. 3. On the Custom deployment blade, click the Build your own template in the editor option. 4, On the Edit template blade, click Load file and click Open. , locate the \Allfiles\Labs\08\template,json Note: Review the content of the template and note that it deploys an Azure VM hosting Windows Server 2016 Datacenter. 5. On the Edit template blade, click Save. 6. On the Custom deployment blade, ensure that the following settings are configured (leave any others with their default values): Setting Value Subscription the name of the Azure subscrip n you will be using in this lab Resource group click Create new and type the name AZSOOLABO8 ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant5119/24, 1048 PM ——_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu Setting Value Location (US) East US Note: To identify Azure regions where you can provision Azure VMs, refer to https://azure.microsoft.com/en-us/regions/offers/ 7. Click Review + create, and then click Create. Note: Wait for the deployment to complete. This should take about 2 minutes. Task 2: Deploy the Azure firewall In this task you will deploy the Azure firewall into the virtual network 1. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Firewalls and press the Enter key. 2. On the Firewalls blade, click + Create. 3. On the Basics tab of the Create a firewall blade, specify the following settings (leave others with their default values) Setting Value Resource group AZSOOLABO8 Name Test-FWO1 Region (US) East US Firewall SKU Standard Firewall management Use Firewall rules (classic) to manage this firewall Choose a virtual click the Use existing option and, in the drop-down list, network select Test-FW-VN clck Add new and type the name TEST-FW-PIP and click Public IP addi ublic IP address oK 4, Click Review + create and then click Create. Note: Wait for the deployment to complete. This should take about 5 minutes. 5. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Resource groups and press the Enter key. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu 6. On the Resource groups blade, in the list of resource group, click the AZSOOLABO8 entry. Note: On the AZSOOLABO8 resource group blade, review the list of resources. You can sort by Type. 7. In the list of resources, click the entry representing the Test-FWO1 firewall 8. On the Test-FWO1 blade, identify the Private IP address that was assigned to the firewall, Note: You will need this information in the next task. Task 3: Create a default route In this task, you will create a default route for the Workload-SN subnet. This route will configure outbound traffic through the firewall. 1. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Route tables and press the Enter key. 2. On the Route tables blade, click + Create. 3. On the Create route table blade, specify the following settings: Setting Value Resource group AZSOOLABO8 Region East US Name Firewall-route 4, Click Review + create, then click Create, and wait for the provisioning to complete. 5. On the Route tables blade, click Refresh, and, in the list of route tables, click the Firewall-route entry. 6. On the Firewall-route blade, in the Settings section, click Subnets and then, on the Firewall-route | Subnets blade, click + Associate. 7. On the Associate subnet blade, specify the following settings: Setting Value Virtual network Test-FW-VN ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ont511924, 1048PM —_AZSO0-AcureSecuryTachnologislnsnconslLabsLAB,_03_Azu‘eFrewallmd a master - MicosofL.erringlAZS00.AzureSecu, Setting Value Subnet Workload-SN Note: Ensure the Workload-SN subnet is selected for this route, otherwise the firewall won't work correctly. 8. Click OK to associate the firewall to the virtual network subnet. 9. Back on the Firewall-route blade, in the Settings section, click Routes and then click + Add. 10. On the Add route blade, specify the following settings: Setting Value Route name FW-DG ‘Address prefix destination IP Address Destination IP 0.0.0.0/0 addresses/CIDR ranges Next hop type Virtual appliance the private IP address of the firewall that you Next hop address identified in the previous task >ttNote**: Azure Firewall is actually a managed service, but virtual a appliance works in this situation. 11. Click Add to add the route. Task 4: Configure an application rule In this task you will create an application rule that allows outbound access to wou. bing.com - 1. In the Azure portal, navigate back to the Test-FWO1 firewall 2. On the Test-FWO1 blade, in the Settings section, click Rules (classic). 3. On the Test-FWO1 | Rules (classic) blade, click the Application rule collection tab, and then click + Add application rule collection. hitosothub.convMicrosottLearning/AZ500-AzureSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md ent571324, 1048PM —_AZ500-AzureSceuriyTochnoogosinsrctonsabs/LAB_02_AzureFiowallmd at mast: Microsoft eaminglAZ500.AzureSeou 4. On the Add application rule collection blade, specify the following settings (leave others with their default values): Setting Value Name App-Coll01 Priority 200 Action — Allow 5. On the Add application rule collection blade, create a new entry in the Target FQDNs section with the following settings (leave others with their default values): Setting Value name AllowGH Source type IP Address Source 10.0.2.0/24 Protocol port _http:80, https:443 Target FQDNS — www.bing.com 6. Click Add to add the Target FQDNs-based application rule. Note: Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes Task 5: Configure a network rule In this task, you will create a network rule that allows outbound access to two IP addresses ‘on port 53 (DNS). 1. In the Azure portal, navigate back to the Test-FWO1 | Rules (classic) blade. 2. On the Test-FWO1 | Rules (classic) blade, click the Network rule collection tab and then click + Add network rule collection. 3. On the Add network rule collection blade, specify the following settings (leave others with their default values): ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md mm511924, 1048PM —_AZSOO-AcureSecuryTachnologislnsnconslLabsLAB,_02_Azu‘eFirewallmd a master - MicosofL.erringlAZS00.AzureSeu, Setting Value Name Net-Coll01 Priority 200 Action Allow 4, On the Add network rule collection blade, create a new entry in the IP Addresses section with the following settings (leave others with their default values): Setting Value Name AllowDNS Protocol upp Source type IP address Source Addresses 10.0.2.0/24 Destination type IP address Destination Address 209.244.0.3,209.244.0.4 Destination Ports 53 5. Click Add to add the network rule, Note: The destination addresses used in this case are known public DNS servers. Task 6: Configure the virtual machine DNS servers In this task, you will configure the primary and secondary DNS addresses for the virtual machine, This is not a firewall requirement. 1. In the Azure portal, navigate back to the AZSOOLABO8 resource group. 2. On the AZSOOLABO8 blade, in the list of resources, click the Srv-Work virtual machine. 3. On the Srv-Work blade, in the Settings section, click Networking, 4. On the Srv-Work | Networking blade, click the link next to the Network interface entry. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu 5. On the network interface blade, in the Settings section, click DNS servers, select the Custom option, add the two DNS servers referenced in the network rule: 209.244.0.3 and 209.244.0.4, and click Save to save the change. 6. Return to the Srv-Work virtual machine page. Note: Wait for the update to complete. Note: Updating the DNS servers for a network interface will automatically restart the virtual machine to which that interface is attached, and if applicable, any other virtual machines in the same availability set. Task 7: Test the firewall In this task, you will test the firewall to confirm that it works as expected 1. In the Azure portal, navigate back to the AZSOOLABO8 resource group. 2. On the AZS500LAB08 blade, in the list of resources, click the Srv-Jump virtual machine. 3. On the Srv-Jump blade, click Connect and, in the drop down menu, click RDP. 4, Click Download RDP File and use it to connect to the Srv-Jump Azure VM via Remote Desktop. When prompted to authenticate, provide the following credntials: Setting Value Username — localadmin Password — PaSSw.rd 1234 Note: The following steps are performed in the Remote Desktop session to the Srv-Jump Azure VM. Note: You will connect to the Srv-Work virtual machine. This is being done so we can test the ability to access the bing.com website. 5, Within the Remote Desktop session to Srv-Jump, right-click Start, in the right-click menu, click Run, and, from the Run dialog box, run the following to connect to Srv- Work. mstse /v:Srv-Work e 6. When prompted to authenticate, provide the following credentials: ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ont511924, 1048 —_AZSO0-AcureSecuryTachnologislnsnconslLabsLAB,_02_Azu‘eFrewallmd at mastr- MicosofL.errnglAZ500.AzureSecu, Setting Value Username — localadmin Password PaSSw.rd1234 Note: Wait for the Remote Desktop session to be established and the Server Manager interface to load 7. Within the Remote Desktop session to Srv-Work, in Server Manager, click Local Server and then click IE Enhanced Security Configuration. 8. In the Internet Explorer Enhanced Security Configuration dialog box, set both options to Off and click OK. 9. Within the Remote Desktop session to Srv-Work, start Internet Explorer and browse to https: //waw.bing.com . Note: The website should successfully display. The firewall allows you access. 10. Browse to http: //wmw.microsoft.com/ Note: Within the browser page, you should receive a message with text o00ex to resembling the following: HTTP request from 10.0.2.4: nicrosoft.com:8@. Action: Deny. No rule matched. Proceeding with default action. This is expected, since the firewall blocks access to this website. 11. Terminate both Remote Desktop sessions. Result: You have successfully configured and tested the Azure Firewall. Clean up resources Remember to remove any newly created Azure resources that you no longer use. Removing unused resources ensures you will not incur unexpected costs. 1. In the Azure portal, open the Cloud Shell by clicking the first icon in the top right of the Azure Portal. If prompted, click PowerShell and Create storage 2. Ensure PowerShell is selected in the drop-down menu in the upper-left corner of the Cloud Shell pane. 3. In the PowerShell session within the Cloud Shell pane, run the following to remove the resource group you created in this lab: hitosothub.convMicrosottLearning/AZ500-AzureSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md ron5119/24, 1048 PM ——_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - Micosofteaming/AZS00-AzureSecu Remove-AzResourceGroup -Nane “AZS@@LAB@8" -Force -AsJob oe 4, Close the Cloud Shell pane. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnologiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md wm
You might also like
Az 700 Oct 24
PDF
No ratings yet
Az 700 Oct 24
32 pages
Azure Transit Vnet Deployment Guide Common Firewall Option
PDF
No ratings yet
Azure Transit Vnet Deployment Guide Common Firewall Option
164 pages
Azure Firewall Manager
PDF
No ratings yet
Azure Firewall Manager
104 pages
AZ-104 Exam Questions and Answers
PDF
No ratings yet
AZ-104 Exam Questions and Answers
50 pages
CST8248 - Emerging Technologies: Lab5 - Azure Cloud
PDF
No ratings yet
CST8248 - Emerging Technologies: Lab5 - Azure Cloud
3 pages
Module 2 Implement Management and Security Solutions - Azure Firewall Hands On
PDF
No ratings yet
Module 2 Implement Management and Security Solutions - Azure Firewall Hands On
4 pages
156 - Firewall-Lab
PDF
No ratings yet
156 - Firewall-Lab
34 pages
Azure Firewall 1710410501
PDF
No ratings yet
Azure Firewall 1710410501
16 pages
Azure Administer Virtual Networking
PDF
No ratings yet
Azure Administer Virtual Networking
42 pages
Az 104t00a Enu Powerpoint 04
PDF
No ratings yet
Az 104t00a Enu Powerpoint 04
42 pages
Ngf0501 - Microsoft Azure - Lab Guide - Rev1
PDF
No ratings yet
Ngf0501 - Microsoft Azure - Lab Guide - Rev1
16 pages
Lab 04 - Implement Virtual Networking
PDF
No ratings yet
Lab 04 - Implement Virtual Networking
8 pages
Microsoft Az 700 Dumps by Watson 09 08 2024 7qa Dumpshq
PDF
No ratings yet
Microsoft Az 700 Dumps by Watson 09 08 2024 7qa Dumpshq
18 pages
Azure Firewall
PDF
No ratings yet
Azure Firewall
283 pages
Azure Firewall
PDF
No ratings yet
Azure Firewall
171 pages
Policy Based VPN To Azure
PDF
No ratings yet
Policy Based VPN To Azure
12 pages
AZ 500T00A ENU Powerpoint 02
PDF
No ratings yet
AZ 500T00A ENU Powerpoint 02
82 pages
Bitscape - Azure Networking and Security Services
PDF
No ratings yet
Bitscape - Azure Networking and Security Services
70 pages
Firewall Lecture Notes and Demo
PDF
No ratings yet
Firewall Lecture Notes and Demo
7 pages
Customer Presentation AZFW and AZFM NDA
PDF
No ratings yet
Customer Presentation AZFW and AZFM NDA
27 pages
Sample Questions For Microsoft Az 700 Exam by Hoffman
PDF
No ratings yet
Sample Questions For Microsoft Az 700 Exam by Hoffman
41 pages
LAB 04-Implement Virtual Networking
PDF
No ratings yet
LAB 04-Implement Virtual Networking
9 pages
Lab 04
PDF
No ratings yet
Lab 04
15 pages
Lab 04
PDF
No ratings yet
Lab 04
33 pages
Lab 3_ Azure Networking _ Security Basic
PDF
No ratings yet
Lab 3_ Azure Networking _ Security Basic
4 pages
AZ 104T00A ENU PowerPoint - 04
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 04
42 pages
Azu
PDF
No ratings yet
Azu
9 pages
Design Implement and Manage An Azure Firewall Deployment Slides
PDF
No ratings yet
Design Implement and Manage An Azure Firewall Deployment Slides
21 pages
Lesson - 05 - Configure and Manage Virtual Networking
PDF
No ratings yet
Lesson - 05 - Configure and Manage Virtual Networking
88 pages
Create A Subnet With The Following Settings
PDF
No ratings yet
Create A Subnet With The Following Settings
6 pages
AZ 104T00A ENU PowerPoint - 04
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 04
35 pages
Az 104t00a Enu Powerpoint 04
PDF
No ratings yet
Az 104t00a Enu Powerpoint 04
42 pages
Virtual Net PDF
PDF
No ratings yet
Virtual Net PDF
590 pages
Mod 6 - Lab - Use Azure Network Watcher For Monitoring and Troubleshooting Network Connectivity
PDF
No ratings yet
Mod 6 - Lab - Use Azure Network Watcher For Monitoring and Troubleshooting Network Connectivity
10 pages
Azure Networking Lab Guide
PDF
No ratings yet
Azure Networking Lab Guide
9 pages
Zero Trust Principles To An Azure Virtual WAN
PDF
No ratings yet
Zero Trust Principles To An Azure Virtual WAN
17 pages
Azure Single Vnet Dedicated Inbound Deployment Guide PDF
PDF
No ratings yet
Azure Single Vnet Dedicated Inbound Deployment Guide PDF
201 pages
Iliou - TP2
PDF
No ratings yet
Iliou - TP2
12 pages
AZ900 Questions#3
PDF
No ratings yet
AZ900 Questions#3
64 pages
MC - Uge 36 Og Uge37-Dario Baskarad
PDF
No ratings yet
MC - Uge 36 Og Uge37-Dario Baskarad
6 pages
Lab 06
PDF
No ratings yet
Lab 06
24 pages
azure basic 35
PDF
No ratings yet
azure basic 35
2 pages
VPN To Azure From FTD-1
PDF
No ratings yet
VPN To Azure From FTD-1
11 pages
AZ-900 - Part2
PDF
No ratings yet
AZ-900 - Part2
133 pages
Microsoft: Question & Answers
PDF
No ratings yet
Microsoft: Question & Answers
217 pages
Cloud NGFW Azure VWAN Lab Guide
PDF
No ratings yet
Cloud NGFW Azure VWAN Lab Guide
48 pages
Azure Transit Vnet Deployment Guide PDF
PDF
No ratings yet
Azure Transit Vnet Deployment Guide PDF
117 pages
168 - Peering-and-NSG-labs
PDF
No ratings yet
168 - Peering-and-NSG-labs
27 pages
AZ 104 Demo
PDF
No ratings yet
AZ 104 Demo
12 pages
Az900 Prep
PDF
No ratings yet
Az900 Prep
13 pages
VN PDF
PDF
No ratings yet
VN PDF
848 pages
Azure Learning Task With Examples
PDF
No ratings yet
Azure Learning Task With Examples
4 pages
Create An Application Security Group For Two Web Servers in Azure
PDF
No ratings yet
Create An Application Security Group For Two Web Servers in Azure
3 pages
LAB AZ Virtual Networks - 04
PDF
No ratings yet
LAB AZ Virtual Networks - 04
9 pages
Az 104t00a Enu Powerpoint 04
PDF
No ratings yet
Az 104t00a Enu Powerpoint 04
42 pages
Azure Transit Vnet Deployment Guide
PDF
No ratings yet
Azure Transit Vnet Deployment Guide
178 pages
TP 2
PDF
No ratings yet
TP 2
7 pages
Comptia Pentest Plus pt0 002 2 4 1 Web and Cloud Discovery and Enumeration
PDF
No ratings yet
Comptia Pentest Plus pt0 002 2 4 1 Web and Cloud Discovery and Enumeration
1 page
Lab05 SecuringAzureSQLDatabase
PDF
No ratings yet
Lab05 SecuringAzureSQLDatabase
7 pages
Lab03 ConfiguringandSecuringACRandAKS
PDF
No ratings yet
Lab03 ConfiguringandSecuringACRandAKS
12 pages
Sy0 601 14
PDF
No ratings yet
Sy0 601 14
50 pages
Sy0 601 12
PDF
No ratings yet
Sy0 601 12
34 pages
Compapre HPM880z
PDF
No ratings yet
Compapre HPM880z
1 page