0% found this document useful (0 votes)
51 views

Lab03 AzureFirewall

AZ500- Lab03

Uploaded by

sale kate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
51 views

Lab03 AzureFirewall

AZ500- Lab03

Uploaded by

sale kate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
5119/24, 1048 PM —_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicosoftLeaming/AZS00-AzureSecu MicrosoftLearning / ee = ‘AZ500-AzureSecurityTechnologies a 8 <> Code © Issues 11 Pullrequests © Actions © Security [~ Insights AZS500-AzureSecurityTechnologies / Instructions / Labs / LAB_03_AzureFirewallmd oe © serling1962 Update LAB_03_AzureFirewallmd ~ Smonths ago 2 324 Lines (198 loc) » 13.7 KB Preview | Code Blame rw O& 2 v lab title module 03 - Azure Firewall Module 02 - Plan and implement security for public access to Azt < > Lab 03: Azure Firewall Student lab manual Lab scenario You have been asked to install Azure Firewall. This will help your organization control inbound and outbound network access which is an important part of an overall network security plan. Specifically, you would like to create and test the following infrastructure components: * A virtual network with a workload subnet and a jump host subnet. * A virtual machine is each subnet. * Acustom route that ensures all outbound workload traffic from the workload subnet must use the firewall. to www.bing.com, nps:igthub.comMicrosotLeamingiAZS00-AzureSecuryTechnologesibiobimasterlinsiucionsiLabsiLAB_03_AzureFiewal.md ant © Firewall Application rules that only allow outbound tra! 5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu * Firewall Network rules that allow external DNS server lookups. For all the resources in this lab, we are using the East US region. Verify with your instructor this is the region to use for class, Lab objectives In this lab, you will complete the following exercise: * Exercise 1: Deploy and test an Azure Firewall Azure Firewall diagram vec, ak God) Tere W-¥N 0000016 Instructions Lab files: * \Allfiles\Labs\08\template json Exercise 1: Deploy and test an Azure Firewall Estimated timing: 40 minutes For all the resources in this lab, we are using the East (US) region. Verify with your instructor this is region to use for you class. nps:iigthub.comMicrosotLeaming/AZS00-AzureSecuryTechnologesibiobimasterlnsiucionsiLabsiLAB_03_AzureFiewal.mnd ant 5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu In this exercise, you will complete the following tasks: * Task 1; Use a template to deploy the lab environment. * Task 2: Deploy an Azure firewall. © Task 3: Create a default route. * Task 4: Configure an application rule. # Task 5: Configure a network rule. * Task 6: Configure DNS servers. © Task 7: Test the firewall. Task 1: Use a template to deploy the lab environment. In this task, you will review and deploy the lab environment. In this task, you will create a virtual machine by using an ARM template. This virtual machine will be used in the last exercise for this lab. 1. Sign-in to the Azure portal https: //portal-azure.con/ . Note: Sign in to the Azure portal using an account that has the Owner or Contributor role in the Azure subscription you are using for this lab. 2. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Deploy a custom template and press the Enter key. 3. On the Custom deployment blade, click the Build your own template in the editor option. 4, On the Edit template blade, click Load file and click Open. , locate the \Allfiles\Labs\08\template,json Note: Review the content of the template and note that it deploys an Azure VM hosting Windows Server 2016 Datacenter. 5. On the Edit template blade, click Save. 6. On the Custom deployment blade, ensure that the following settings are configured (leave any others with their default values): Setting Value Subscription the name of the Azure subscrip n you will be using in this lab Resource group click Create new and type the name AZSOOLABO8 ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant 5119/24, 1048 PM ——_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu Setting Value Location (US) East US Note: To identify Azure regions where you can provision Azure VMs, refer to https://azure.microsoft.com/en-us/regions/offers/ 7. Click Review + create, and then click Create. Note: Wait for the deployment to complete. This should take about 2 minutes. Task 2: Deploy the Azure firewall In this task you will deploy the Azure firewall into the virtual network 1. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Firewalls and press the Enter key. 2. On the Firewalls blade, click + Create. 3. On the Basics tab of the Create a firewall blade, specify the following settings (leave others with their default values) Setting Value Resource group AZSOOLABO8 Name Test-FWO1 Region (US) East US Firewall SKU Standard Firewall management Use Firewall rules (classic) to manage this firewall Choose a virtual click the Use existing option and, in the drop-down list, network select Test-FW-VN clck Add new and type the name TEST-FW-PIP and click Public IP addi ublic IP address oK 4, Click Review + create and then click Create. Note: Wait for the deployment to complete. This should take about 5 minutes. 5. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Resource groups and press the Enter key. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant 5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu 6. On the Resource groups blade, in the list of resource group, click the AZSOOLABO8 entry. Note: On the AZSOOLABO8 resource group blade, review the list of resources. You can sort by Type. 7. In the list of resources, click the entry representing the Test-FWO1 firewall 8. On the Test-FWO1 blade, identify the Private IP address that was assigned to the firewall, Note: You will need this information in the next task. Task 3: Create a default route In this task, you will create a default route for the Workload-SN subnet. This route will configure outbound traffic through the firewall. 1. In the Azure portal, in the Search resources, services, and docs text box at the top of the Azure portal page, type Route tables and press the Enter key. 2. On the Route tables blade, click + Create. 3. On the Create route table blade, specify the following settings: Setting Value Resource group AZSOOLABO8 Region East US Name Firewall-route 4, Click Review + create, then click Create, and wait for the provisioning to complete. 5. On the Route tables blade, click Refresh, and, in the list of route tables, click the Firewall-route entry. 6. On the Firewall-route blade, in the Settings section, click Subnets and then, on the Firewall-route | Subnets blade, click + Associate. 7. On the Associate subnet blade, specify the following settings: Setting Value Virtual network Test-FW-VN ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ont 511924, 1048PM —_AZSO0-AcureSecuryTachnologislnsnconslLabsLAB,_03_Azu‘eFrewallmd a master - MicosofL.erringlAZS00.AzureSecu, Setting Value Subnet Workload-SN Note: Ensure the Workload-SN subnet is selected for this route, otherwise the firewall won't work correctly. 8. Click OK to associate the firewall to the virtual network subnet. 9. Back on the Firewall-route blade, in the Settings section, click Routes and then click + Add. 10. On the Add route blade, specify the following settings: Setting Value Route name FW-DG ‘Address prefix destination IP Address Destination IP 0.0.0.0/0 addresses/CIDR ranges Next hop type Virtual appliance the private IP address of the firewall that you Next hop address identified in the previous task >ttNote**: Azure Firewall is actually a managed service, but virtual a appliance works in this situation. 11. Click Add to add the route. Task 4: Configure an application rule In this task you will create an application rule that allows outbound access to wou. bing.com - 1. In the Azure portal, navigate back to the Test-FWO1 firewall 2. On the Test-FWO1 blade, in the Settings section, click Rules (classic). 3. On the Test-FWO1 | Rules (classic) blade, click the Application rule collection tab, and then click + Add application rule collection. hitosothub.convMicrosottLearning/AZ500-AzureSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md ent 571324, 1048PM —_AZ500-AzureSceuriyTochnoogosinsrctonsabs/LAB_02_AzureFiowallmd at mast: Microsoft eaminglAZ500.AzureSeou 4. On the Add application rule collection blade, specify the following settings (leave others with their default values): Setting Value Name App-Coll01 Priority 200 Action — Allow 5. On the Add application rule collection blade, create a new entry in the Target FQDNs section with the following settings (leave others with their default values): Setting Value name AllowGH Source type IP Address Source 10.0.2.0/24 Protocol port _http:80, https:443 Target FQDNS — www.bing.com 6. Click Add to add the Target FQDNs-based application rule. Note: Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes Task 5: Configure a network rule In this task, you will create a network rule that allows outbound access to two IP addresses ‘on port 53 (DNS). 1. In the Azure portal, navigate back to the Test-FWO1 | Rules (classic) blade. 2. On the Test-FWO1 | Rules (classic) blade, click the Network rule collection tab and then click + Add network rule collection. 3. On the Add network rule collection blade, specify the following settings (leave others with their default values): ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md mm 511924, 1048PM —_AZSOO-AcureSecuryTachnologislnsnconslLabsLAB,_02_Azu‘eFirewallmd a master - MicosofL.erringlAZS00.AzureSeu, Setting Value Name Net-Coll01 Priority 200 Action Allow 4, On the Add network rule collection blade, create a new entry in the IP Addresses section with the following settings (leave others with their default values): Setting Value Name AllowDNS Protocol upp Source type IP address Source Addresses 10.0.2.0/24 Destination type IP address Destination Address 209.244.0.3,209.244.0.4 Destination Ports 53 5. Click Add to add the network rule, Note: The destination addresses used in this case are known public DNS servers. Task 6: Configure the virtual machine DNS servers In this task, you will configure the primary and secondary DNS addresses for the virtual machine, This is not a firewall requirement. 1. In the Azure portal, navigate back to the AZSOOLABO8 resource group. 2. On the AZSOOLABO8 blade, in the list of resources, click the Srv-Work virtual machine. 3. On the Srv-Work blade, in the Settings section, click Networking, 4. On the Srv-Work | Networking blade, click the link next to the Network interface entry. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ant 5119/24, 1048 PM —_AZS00-AzureSecurityTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - MicrosoftLearing/AZS00-AzureSecu 5. On the network interface blade, in the Settings section, click DNS servers, select the Custom option, add the two DNS servers referenced in the network rule: 209.244.0.3 and 209.244.0.4, and click Save to save the change. 6. Return to the Srv-Work virtual machine page. Note: Wait for the update to complete. Note: Updating the DNS servers for a network interface will automatically restart the virtual machine to which that interface is attached, and if applicable, any other virtual machines in the same availability set. Task 7: Test the firewall In this task, you will test the firewall to confirm that it works as expected 1. In the Azure portal, navigate back to the AZSOOLABO8 resource group. 2. On the AZS500LAB08 blade, in the list of resources, click the Srv-Jump virtual machine. 3. On the Srv-Jump blade, click Connect and, in the drop down menu, click RDP. 4, Click Download RDP File and use it to connect to the Srv-Jump Azure VM via Remote Desktop. When prompted to authenticate, provide the following credntials: Setting Value Username — localadmin Password — PaSSw.rd 1234 Note: The following steps are performed in the Remote Desktop session to the Srv-Jump Azure VM. Note: You will connect to the Srv-Work virtual machine. This is being done so we can test the ability to access the bing.com website. 5, Within the Remote Desktop session to Srv-Jump, right-click Start, in the right-click menu, click Run, and, from the Run dialog box, run the following to connect to Srv- Work. mstse /v:Srv-Work e 6. When prompted to authenticate, provide the following credentials: ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_0_AzureFewall md ont 511924, 1048 —_AZSO0-AcureSecuryTachnologislnsnconslLabsLAB,_02_Azu‘eFrewallmd at mastr- MicosofL.errnglAZ500.AzureSecu, Setting Value Username — localadmin Password PaSSw.rd1234 Note: Wait for the Remote Desktop session to be established and the Server Manager interface to load 7. Within the Remote Desktop session to Srv-Work, in Server Manager, click Local Server and then click IE Enhanced Security Configuration. 8. In the Internet Explorer Enhanced Security Configuration dialog box, set both options to Off and click OK. 9. Within the Remote Desktop session to Srv-Work, start Internet Explorer and browse to https: //waw.bing.com . Note: The website should successfully display. The firewall allows you access. 10. Browse to http: //wmw.microsoft.com/ Note: Within the browser page, you should receive a message with text o00ex to resembling the following: HTTP request from 10.0.2.4: nicrosoft.com:8@. Action: Deny. No rule matched. Proceeding with default action. This is expected, since the firewall blocks access to this website. 11. Terminate both Remote Desktop sessions. Result: You have successfully configured and tested the Azure Firewall. Clean up resources Remember to remove any newly created Azure resources that you no longer use. Removing unused resources ensures you will not incur unexpected costs. 1. In the Azure portal, open the Cloud Shell by clicking the first icon in the top right of the Azure Portal. If prompted, click PowerShell and Create storage 2. Ensure PowerShell is selected in the drop-down menu in the upper-left corner of the Cloud Shell pane. 3. In the PowerShell session within the Cloud Shell pane, run the following to remove the resource group you created in this lab: hitosothub.convMicrosottLearning/AZ500-AzureSecuryTechnolagiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md ron 5119/24, 1048 PM ——_AZS00-AzureSecuriyTechnologies/Intnuctions/Labs/LAB_03_AzureFirewallmd at master - Micosofteaming/AZS00-AzureSecu Remove-AzResourceGroup -Nane “AZS@@LAB@8" -Force -AsJob oe 4, Close the Cloud Shell pane. ios othub.convMicrosottLearning/AZ500-AzueSecuryTechnologiesblobimasterinstuctionsiLabsILAB_03_AzureFewall md wm

You might also like