Configuring Azure Firewall in forced tunneling mode
Forced tunneling allows us to force all internet-bound traffic to an on-premises firewall for inspection or audit. Because of different Azure dependencies, this is not enabled by default and requires User Defined Routes (USRs) to allow forced tunneling. This is also not possible by using AzureFirewallSubnet
, and we need to add an additional subnet named AzureFirewallManagementSubnet
. Note that this needs to be done prior to Azure Firewall deployment and will not work if the subnet is added afterward.
Getting ready
Before you start, open your browser and go to the Azure portal at https://portal.azure.com.
How to do it...
In order to add AzureFirewallManagementSubnet
for forced tunneling, we need to do the following:
- In the Azure portal, select Create a resource and choose Route Table under Networking services (or search for
Route Table
in the search bar). - In the new pane, provide information for the Subscription...