Proposed Pull Request Change

title description author ms.service services ms.topic ms.date ms.author
Azure Firewall Manager deployment overview Learn the high-level deployment steps required for Azure Firewall Manager duongau azure-firewall-manager firewall-manager concept-article 06/21/2024 duau
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Azure Firewall Manager deployment overview description: Learn the high-level deployment steps required for Azure Firewall Manager author: duongau ms.service: azure-firewall-manager services: firewall-manager ms.topic: concept-article ms.date: 06/21/2024 ms.author: duau --- # Azure Firewall Manager deployment overview There's more than one way to use Azure Firewall Manager to deploy Azure Firewall, but the following general process is recommended. To review network architecture options, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md) ## General deployment process ### Hub virtual networks 1. Create a firewall policy - Create a new policy <br>*or*<br> - Derive a base policy and customize a local policy <br>*or*<br> - Import rules from an existing Azure Firewall (Classic). By design, importing rules from an existing Firewall Policy is not supported by design. Note: NAT rules should be removed from policies intended for use across multiple firewalls. 1. Create your hub and spoke architecture - Create a Hub Virtual Network using Azure Firewall Manager and peer spoke virtual networks to it using virtual network peering <br>*or*<br> - Create a virtual network and add virtual network connections and peer spoke virtual networks to it using virtual network peering 3. Select security providers and associate firewall policy. Currently, only Azure Firewall is a supported provider. - This is done while you create a Hub Virtual Network <br>*or*<br> - Convert an existing virtual network to a Hub Virtual Network. It's also possible to convert multiple virtual networks. 4. Configure User Define Routes to route traffic to your Hub Virtual Network firewall. ### Secured virtual hubs 1. Create your hub and spoke architecture - Create a Secured Virtual Hub using Azure Firewall Manager and add virtual network connections.<br>*or*<br> - Create a Virtual WAN Hub and add virtual network connections. 2. Select security providers - Done while creating a Secured Virtual Hub.<br>*or*<br> - Convert an existing Virtual WAN Hub to Secure Virtual Hub. 3. Create a firewall policy and associate it with your hub - Applicable only if using Azure Firewall. - Partner security as a service (SECaaS) policies are configured via partners management experience. 4. Configure route settings to route traffic to your secured hub - Easily route traffic to your secured hub for filtering and logging without User Defined Routes (UDR) on spoke Virtual Networks using the Secured Virtual Hub Route Setting page. > [!NOTE] > - You can't have overlapping IP spaces for hubs in a vWAN. > For more known issues, see [What is Azure Firewall Manager?](overview.md#known-issues) ## Convert virtual networks The following information applies if you convert an existing virtual network to a hub virtual network: - If the virtual network has an existing Azure Firewall, you select a Firewall Policy to associate with the existing firewall. The firewall provisioning status is updated while the firewall policy replaces firewall rules. During the provisioning state, the firewall continues processing traffic and has no downtime. You can import existing rules to a Firewall Policy using Firewall Manager or Azure PowerShell. - If the virtual network doesn't have an associated Azure Firewall, a firewall is deployed and the Firewall Policy is associated with the new firewall. ## Next steps - [Tutorial: Secure your cloud network with Azure Firewall Manager using the Azure portal](secure-cloud-network.md) - [Learn more about Azure network security](../networking/security/index.yml)
Success! Branch created successfully. Create Pull Request on GitHub
Error: