Skip to content

Commit 62a4325

Browse files
Adding Private Range (No SNAT) Support to Firewall Policies (#14577)
* Add Azure Route Server CRUD cmdlets to deprecate Virtual Router cmdlets (#14036) * change name from virtual router to route server * add test records * fix warning * delete unused import * no snat private ranges * adding private range in firewall policies * using AzPSArgumentException instead of PSArgumentException * using Resources.resx for AzPSArgumentException * reverting changes in Resources.Designer.cs that is not related to my code * adding help instruction for set-AzFirewallPolicy * updated changeLog Co-authored-by: litchiyangMSFT <[email protected]>
1 parent aa81b6b commit 62a4325

File tree

12 files changed

+1620
-8
lines changed

12 files changed

+1620
-8
lines changed

src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.cs

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,5 +132,13 @@ public void TestAzureFirewallPolicyPremiumWithTerminateTLSEnabledAndTargetUrls()
132132
{
133133
TestRunner.RunTestScript("Test-AzureFirewallPolicyPremiumWithTerminateTLSEnabledAndTargetUrls");
134134
}
135+
136+
[Fact]
137+
[Trait(Category.AcceptanceType, Category.CheckIn)]
138+
[Trait(Category.Owner, NrpTeamAlias.azurefirewall)]
139+
public void TestAzureFirewallPolicyPrivateRangeCRUD()
140+
{
141+
TestRunner.RunTestScript("Test-AzureFirewallPolicyPrivateRangeCRUD");
142+
}
135143
}
136144
}

src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1417,4 +1417,48 @@ function Test-AzureFirewallPolicyPremiumFeatures {
14171417
# Cleanup
14181418
Clean-ResourceGroup $rgname
14191419
}
1420+
}
1421+
1422+
<#
1423+
.SYNOPSIS
1424+
Tests AzureFirewall Policy PrivateRange
1425+
#>
1426+
function Test-AzureFirewallPolicyPrivateRangeCRUD {
1427+
$rgname = Get-ResourceGroupName
1428+
$azureFirewallPolicyName = Get-ResourceName
1429+
$resourceTypeParent = "Microsoft.Network/FirewallPolicies"
1430+
$location = "westus2"
1431+
$vnetName = Get-ResourceName
1432+
$privateRange2 = @("IANAPrivateRanges", "0.0.0.0/0", "66.92.0.0/16")
1433+
$privateRange1 = @("3.3.0.0/24", "98.0.0.0/8")
1434+
$privateRange2Translated = @("0.0.0.0/0", "66.92.0.0/16", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "100.64.0.0/10")
1435+
1436+
try {
1437+
1438+
# Create the resource group
1439+
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" }
1440+
1441+
# Create AzureFirewallPolicy (with no rules, ThreatIntel is in Alert mode by default)
1442+
$azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location -PrivateRange $privateRange1
1443+
1444+
# Get AzureFirewallPolicy
1445+
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
1446+
1447+
#verification
1448+
Assert-AreEqual $rgName $getAzureFirewallPolicy.ResourceGroupName
1449+
Assert-AreEqual $azureFirewallPolicyName $getAzureFirewallPolicy.Name
1450+
Assert-NotNull $getAzureFirewallPolicy.Location
1451+
Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location
1452+
Assert-AreEqualArray $privateRange1 $getAzureFirewallPolicy.PrivateRange
1453+
1454+
# Modify
1455+
$azureFirewallPolicy.PrivateRange = $privateRange2
1456+
Set-AzFirewallPolicy -InputObject $azureFirewallPolicy
1457+
$getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname
1458+
Assert-AreEqualArray $privateRange2Translated $getAzureFirewallPolicy.PrivateRange
1459+
}
1460+
finally {
1461+
# Cleanup
1462+
Clean-ResourceGroup $rgname
1463+
}
14201464
}

0 commit comments

Comments
 (0)