@@ -38,7 +38,10 @@ The **New-AzFirewall** cmdlet creates an Azure Firewall.
38
38
39
39
### 1: Create a Firewall attached to a virtual network
40
40
```
41
- New-AzFirewall -Name "azFw" -ResourceGroupName "rg" -Location centralus -VirtualNetworkName "vnet" -PublicIpName "pip-name"
41
+ $rgName = "resourceGroupName"
42
+ $vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
43
+ $pip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name "publicIpName"
44
+ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetworkName $vnet.Name -PublicIpName $pip.Name
42
45
```
43
46
44
47
This example creates a Firewall attached to virtual network "vnet" in the same resource group as the firewall.
@@ -47,9 +50,13 @@ Threat Intel will also run in default mode - Alert - which means malicious traff
47
50
48
51
### 2: Create a Firewall which allows all HTTPS traffic
49
52
```
53
+ $rgName = "resourceGroupName"
54
+ $vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
55
+ $pip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name "publicIpName"
56
+
50
57
$rule = New-AzFirewallApplicationRule -Name R1 -Protocol "https:443" -TargetFqdn "*"
51
58
$ruleCollection = New-AzFirewallApplicationRuleCollection -Name RC1 -Priority 100 -Rule $rule -ActionType "Allow"
52
- New-AzFirewall -Name "azFw" -ResourceGroupName "rg" -Location centralus -VirtualNetworkName " vnet" -PublicIpName " pip-name" -ApplicationRuleCollection $ruleCollection
59
+ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetworkName $ vnet.Name -PublicIpName $ pip.Name -ApplicationRuleCollection $ruleCollection
53
60
```
54
61
55
62
This example creates a Firewall which allows all HTTPS traffic on port 443.
@@ -67,17 +74,24 @@ Threat Intel is turned off in this example.
67
74
68
75
### 4: Create a Firewall with no rules and with Threat Intel in Alert mode
69
76
```
70
- New-AzFirewall -Name "azFw" -ResourceGroupName "rg" -Location centralus -VirtualNetworkName "vnet" -PublicIpName "pip-name" -ThreatIntelMode Alert
77
+ $rgName = "resourceGroupName"
78
+ $vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
79
+ $pip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name "publicIpName"
80
+ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetworkName $vnet.Name -PublicIpName $pip.Name -ThreatIntelMode Alert
71
81
```
72
82
73
83
This example creates a Firewall which blocks all traffic (default behavior) and has Threat Intel running in Alert mode.
74
84
This means alerting logs are emitted for malicious traffic before applying the other rules (in this case just the default rule - Deny All)
75
85
76
86
### 5: Create a Firewall which allows all HTTP traffic on port 8080, but blocks malicious domains identified by Threat Intel
77
87
```
88
+ $rgName = "resourceGroupName"
89
+ $vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
90
+ $pip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name "publicIpName"
91
+
78
92
$rule = New-AzFirewallApplicationRule -Name R1 -Protocol "http:8080" -TargetFqdn "*"
79
93
$ruleCollection = New-AzFirewallApplicationRuleCollection -Name RC1 -Priority 100 -Rule $rule -ActionType "Allow"
80
- New-AzFirewall -Name "azFw" -ResourceGroupName "rg" -Location centralus -VirtualNetworkName " vnet" -PublicIpName " pip-name" -ApplicationRuleCollection $ruleCollection -ThreatIntelMode Deny
94
+ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetworkName $ vnet.Name -PublicIpName $ pip.Name -ApplicationRuleCollection $ruleCollection -ThreatIntelMode Deny
81
95
```
82
96
83
97
This example creates a Firewall which allows all HTTP traffic on port 8080 unless it is considered malicious by Threat Intel.
0 commit comments