Exercise - establish outbound internet connectivity
This unit focuses on practical implementation of enabling network controls using Azure Firewall. Then test to see if those controls are working or not from a virtual machine (VM) in Azure VMware Solution workload segment.
Capture Azure VMware Solution workload segment address space
Use the following command to get the workload segment address space from Azure VMware Solution private cloud:
az vmware workload-network segment show --resource-group <resource-group-name> --private-cloud <avs-private-cloud-name>
Configure Azure Firewall Rule for Azure VMware Solution workload network segment
Use the following command to configure Firewall rule for workload segment:
az network firewall network-rule create --collection-name <firewall-rule-collection-name> --destination-addresses <*-or-selective-addresses-to-be-opened> --destination-ports <*-or-selective-ports-to-be-opened> --firewall-name <name-of-firewall> --name <firewall-rule-name> --protocols <*-or-selective-protocols-to-be-opened> --resource-group <resource-group-name> --priority <your-priority-preference> --source-addresses <azure-vmware-solution-workload-network-segment-address-space> --action Allow
Test outbound internet connectivity from a VM in Azure VMware Solution workload network segment
- Sign in the VM in Azure VMware Solution workload network segment.
- Navigate to any public URL from the VM. Any public URL should be accessible from browser.