Welcome back everyone, Today we will be putting the following perspective into consideration. Now lets say your organization needs a central way to secure the application’s virtual network. As more people use the app, it will need stronger filtering and protection against threats. The app will also need regular updates from Azure DevOps pipelines. Based on this, you found these requirements:
Use Azure Firewall to add extra security to the app’s virtual network.
Set up a firewall policy to control access to the app.
Create an application rule in the firewall policy to let the app connect to Azure DevOps for code updates.
Create a network rule in the firewall policy to allow DNS lookups (so domain names can be resolved).
Lets get started!
First we create Azure Firewall subnet in our existing virtual network
- Now we create an Azure Firewall
- key in the following
- Now we update the Firewall Policy
- we can now add an application rule
Note: The web application may use Azure Pipelines thanks to the AllowAzurePipelines rule. The rule permits the web application to visit the Azure website and use the Azure DevOps service.
- now we add a network rule
Check the state of the firewall and firewall policy
- Look for and choose Firewall on the portal.
- Verify that the provisioning state is Succeeded by viewing the app-vnet-firewall. It could take several minutes.
- Search for and choose Firewall policies on the portal.
- Make sure that the provisioning state is met by looking at the fw-policy. It could take several minutes.
As we can see we are all set up and it is running fine. congratulation guys!
Top comments (0)