Exercise - establish outbound internet connectivity

Completed

This unit focuses on practical implementation of enabling network controls using Azure Firewall. Then test to see if those controls are working or not from a virtual machine (VM) in Azure VMware Solution workload segment.

Capture Azure VMware Solution workload segment address space

Use the following command to get the workload segment address space from Azure VMware Solution private cloud:


az vmware workload-network segment show --resource-group <resource-group-name>  --private-cloud <avs-private-cloud-name>

Configure Azure Firewall Rule for Azure VMware Solution workload network segment

Use the following command to configure Firewall rule for workload segment:

az network firewall network-rule create  --collection-name <firewall-rule-collection-name>  --destination-addresses <*-or-selective-addresses-to-be-opened>  --destination-ports <*-or-selective-ports-to-be-opened>  --firewall-name <name-of-firewall>  --name <firewall-rule-name> --protocols <*-or-selective-protocols-to-be-opened>  --resource-group <resource-group-name>  --priority <your-priority-preference>  --source-addresses <azure-vmware-solution-workload-network-segment-address-space>  --action Allow

Test outbound internet connectivity from a VM in Azure VMware Solution workload network segment

  1. Sign in the VM in Azure VMware Solution workload network segment.
  2. Navigate to any public URL from the VM. Any public URL should be accessible from browser.

Knowledge Check

1.

You have multiple Azure Firewall instances globally. Which mode is best for configuring rules?

2.

When Azure VMware Solution guest VMs reach an internet destination using Azure Firewall, which IP address will the destination receive?