Skip to content

Latest commit

 

History

History
574 lines (478 loc) · 28 KB

hubnetwork-azfw.md

File metadata and controls

574 lines (478 loc) · 28 KB

Archetype: Hub Networking with Azure Firewall

Table of Contents

Overview

The recommended network design achieves the purpose of hosting Protected B workloads on Profile 3 (cloud only). This is a simplified network design given all ingress and egress traffic will traverse through the same VIP.

Hub Networking with Azure Firewall

  • Cloud network topology based on proven hub-and-spoke design.

  • Hub contains a single instance of Azure Firewall and Azure Firewall Policy.

  • The hub contains a subnet acting as a public access zones (PAZ, using RFC 6598 space) where service delivery occurs (i.e. web application delivery), either dedicated to line of business workload or as a shared system. When using Azure Application Gateway, this subnet(PAZ) will be reserved for it.

  • Hub links to a spoke MRZ Virtual Network (Management Restricted Zone) for management, security, and shared infrastructure purposes (i.e. Domain Controllers, Secure Jumpbox, Software Management, Log Relays, etc.).

  • Spokes contains RZ (Restricted Zone) for line of business workloads, including dedicated PAZ (Public Access Zone), App RZ (Restricted Zone), and Data RZ (Data Restricted Zone).

  • All ingress traffic traverses the hub's firewall, and all egress to internet routed to the firewall for complete traffic inspection for virtual machines. PaaS and Managed IaaS services will have direct communication with the Azure control plane to avoid asymmetric routing.

  • No public IPs allowed in the landing zone spokes for virtual machines. Public IPs for landing zones are only allowed in the external area network (EAN). Azure Policy is in place to prevent Public IPs from being directly attached to Virtual Machines NICs.

  • Spokes have network segmentation and security rules to filter East-West traffic and Spoke-to-Spoke traffic will be denied by default in the firewall.

  • Most network operations in the spokes, as well as all operations in the hub, are centrally managed by networking team.

  • In this initial design, the hub is in a single region, no BCDR plan yet.

Application Gateway with WAFv2 will be used for ingress traffic and application delivery. Application Gateways will be placed on the shared Public Access Zone (a subnet in the Hub), where public IPs will be protected with Azure DDoS (either Basic or Standard).

Other possible topologies are explained in Azure documentation and we recommend reviewing to ensure the topology aligns to your department's network design.

There will be at least one shared Application Gateway instance and multiple dedicated Application Gateways for those line of businesses that require their own deployment (i.e. performance or cost allocation). All egress traffic from the spokes will be routed to the hub's edge firewall, inspected, and authorized/denied based on network (IP/Port) or application rules (FQDNs).

IP Addresses

Network design will require 3 IP blocks:

  • RFC 1918 for Azure native-traffic (including IaaS and PaaS). This will also include the Azure Gateway subnet. Example: 10.18.0.0/16
  • RFC 1918 for Azure Bastion. Example: 192.168.0.0/16
  • RFC 6598 for department to department traffic through GCnet. Example: 100.60.0.0/16

This document will reference the example IP addresses above to illustrate network flow and configuration.

Virtual Network Address Space Hub Virtual Network Address Space

Hub Virtual Network

  • Azure Firewall Premium instance configured with
    • Either forced tunneling (requires the next hop as another device such as NVA, on-premises or another Azure Firewall at the edge) or without forced tunneling. When forced tunneling is turned on, all management traffic will flow through the separate AzureFirewallManagementSubnet subnet.
    • DNS Proxy
    • Threat Intelligence in Alert mode
    • IDPS in Alert mode
  • Azure Firewall Policy
    • Base firewall rules to support spoke archetypes
  • Azure Bastion

Management Restricted Zone Virtual Network

  • Management Access Zone (OZ) - to host any privileged access workstations (PAW), with Management Public IPs forwarded via the hub's firewall.

  • Management (OZ) – hosting the management servers (DNS Servers).

  • Infrastructure (OZ) – hosting other common infrastructure, like file shares.

  • Security Management (OZ) – hosting security, proxies and patching servers.

  • Logging (OZ) – hosting logging relays.

  • A User-Defined-Route forces all traffic to be sent to the Hub's firewall via the Internal Load Balancer in the Hub (this doesn't apply to Azure Bastion).

    MrzSpokeUdr Route Table MrzSpokeUdr Route Table

Shared Public Access Zone subnet in the Hub

To simplify management and compliance, all public-facing web servers, reverse proxies and application delivery controllers will be hosted in this subnet, as a sort of DMZ.

Application Gateway can have either public or private frontends (also with RFC 6598 space) and it requires a full subnet for it's instances.

The Backend URL should map to a VIP and Port mapping in the firewall's External network. In the future, Backend URLs could be directly pointed to the Frontend subnets in the spoke. The firewall performs DNAT and sends to the webserver, which will answer to the source IP (Application Gateway's internal IP), which means the webserver may need a UDR to force traffic destined to Application Gateway to re-traverse the firewall (next-hop), which is considered asymmetric routing (other example topologies).

User Defined Routes

All traffic to be sent to the Hub's Azure Firewall VIP.

Azure supports connecting to PaaS services using RFC 1918 private IPs, avoiding all traffic from the internet and only allowing connections from designated private endpoints as a special kind of NICs in the subnet of choice. Private DNS resolution must be implemented so the PaaS service URLs properly translate to the individual private IP of the private endpoint.

Network Security Groups

Below is a list of requirements for the NSGs in each subnet:

Subnets and IP Ranges

This section will reference the example IP addresses above to illustrate network flow and configuration.

We'll use as few IPs as possible for the Core, MRZ and PAZ virtual networks, and use a small CIDR for a Generic Subscription archetype that works as an example for other Prod and Dev workloads. However, it's key to remember that each line of business may have to get their own IP range (RFC 1918) and peer it to the Hub network without conflicts (i.e. with 10.18.0.0/16).

We also use a RFC 6598 range for external networking, which makes this design compatible with SCED requirements for future hybrid. connectivity.

To leverage Azure Bastion as a shared service for all spoke virtual networks, we use a third IP range (outside of the RFC 1918 and RFC 6598 ranges).

Core network (Firewall and future VPN/ExpressRoute Gateway)

Hub Virtual Network Address Space Hub Virtual Network Address Space

Subnets with Network Security Group & User Defined Routes Hub Virtual Network Subnets

Hub Virtual Network - 10.18.0.0/22, 100.60.0.0/24, 192.168.0.0/16 Function IP block
PAZSubnet Shared Application Gateways 100.60.1.0/24
AzureFirewallSubnet Data plane traffic. When forced tunneling is off, it is also used for management traffic. 100.60.1.0/24
AzureFirewallManagementSubnet Management plane traffic. Only used when forced tunneling is on.
AzureBastionSubnet Azure Bastion 192.168.0.0/24
GatewaySubnet Gateway Subnet 10.18.0.0/27

Management Restricted Zone Virtual Network (Spoke)

MRZ Virtual Network Address Space MRZ Virtual Network Address Space

Subnets with Network Security Group & User Defined Routes Hub Virtual Network Subnets

Hub Virtual Network - 10.18.4.0/22 Function IP block
MazSubnet Management (Access Zone) 10.18.4.0/25
InfSubnet Infrastructure Services (Restricted Zone) 10.18.4.128/25
SecSubnet Security Services (Restricted Zone) 10.18.5.0/26
LogSubnet Logging Services (Restricted Zone) 10.18.5.64/26
MgmtSubnet Core Management Interfaces 10.18.4.128/26

Example Spoke: Generic Subscription Archetype

Spoke Virtual Network - 10.18.16.0/21 Function IP block
oz-subnet Internal Foundational Elements (OZ) /25
paz-subnet Presentation Zone (PAZ) /25
rz-subnet Application zone (RZ) /25
hrz-subnet Data Zone (HRZ) /25

Required Routes

Required routing rules to enforce the security controls required to protect the workloads by centralizing all network flows through the Hub's firewall.

Example: MrzSpokeUdr Route Table MrzSpokeUdr Route Table

UDR Name Rules Applied to Comments
PrdSpokesUdr 0.0.0.0/0, 10.18.0.0/16 and 100.60.0.0/16 via Azure Firewall VIP. All production spoke virtual networks. Via peering, spokes learn static routes to reach any IP in the Hub. Hence, we override the Hub virtual network's IPs (10.18/16 and 100.60/16) and force traffic via Firewall.
DevSpokesUdr Same as above. All development spoke virtual networks. Same as above.
MrzSpokeUdr Same as above. Mrz spoke virtual network Same as above.
PazSubnetUdr Same as above. Force traffic from Application Gateway to be sent via the Firewall VIP Same as above. The 0.0.0.0./0 "Next hop type" should be updated as "Internet" and not the Virtual Appliance IP if deploying Azure Application Gateway..

Azure Firewall Rules

Azure Firewall Rules are configured via Azure Firewall Policy. This allows for firewall rules to be updated without redeploying the Hub Networking elements including Azure Firewall instances.

Firewall Rule definition is located at landingzones/lz-platform-connectivity-hub-azfw/azfw-policy/azure-firewall-policy.bicep

Azure Firewall Policy - Rule Collections Azure Firewall Policy - Rule Collections

Azure Firewall Policy - Network Rules Azure Firewall Policy - Network Rules

Azure Firewall Policy - Application Rules Azure Firewall Policy - Application Rules

Log Analytics Integration

Azure Firewall forwards it's logs to Log Analytics Workspace. This integration is automatically configured through Azure Policy for Diagnostic Settings.

Diagnostic Settings

Once Log Analytics Workspace has collected logs, Azure Monitor Workbook for Azure Firewall can be used to monitor traffic flows.

Below are sample queries that can also be used to query Log Analytics Workspace directly.

Sample Firewall Logs Query

AzureDiagnostics 
| where Category contains "AzureFirewall"
| where msg_s contains "Deny"
| project TimeGenerated, msg_s
| order by TimeGenerated desc

Sample DNS Logs

Sample DNS Logs Query

AzureDiagnostics
| where Category == "AzureFirewallDnsProxy"
| where msg_s !contains "NOERROR"
| project TimeGenerated, msg_s
| order by TimeGenerated desc 

Sample DNS Logs

Azure Deployment

Schema Definition

Reference implementation uses parameter files with object parameters to consolidate parameters based on their context. The schemas types are:

Delete Locks

As an administrator, you can lock a subscription, resource group, or resource to prevent other users in your organization from accidentally deleting or modifying critical resources. The lock overrides any permissions the user might have. You can set the lock level to CanNotDelete or ReadOnly. Please see Azure Docs for more information.

By default, this archetype deploys CanNotDelete lock to prevent accidental deletion at:

  • Hub Virtual Network resource group
  • Management Restricted Zone resource group
  • Public Access Zone resource group
  • DDoS resource group (when enabled)

Service Health

Service health notifications are published by Azure, and contain information about the resources under your subscription. Service health notifications can be informational or actionable, depending on the category.

Our examples configure service health alerts for Security and Incident. However, these categories can be customized based on your need. Please review the possible options in Azure Docs.

Deployment Scenarios for Azure Firewall Policy

Sample deployment scenarios are based on the latest JSON parameters file schema definition. If you have an older version of this repository, please use the examples from your repository.

Scenario Example JSON Parameters Notes
Full Deployment tests/schemas/lz-platform-connectivity-hub-azfw-policy/FullDeployment.json -

Deployment Scenarios for Hub Networking with Azure Firewall

Sample deployment scenarios are based on the latest JSON parameters file schema definition. If you have an older version of this repository, please use the examples from your repository.

Scenario Example JSON Parameters Notes
Full Deployment tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment.json -
Full Deployment with Azure Firewall Policy tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithAzureFirewallPolicy.json parameters.azureFirewallExistingPolicyId.value is configured. When it's not defined, this setting is added by Azure DevOps pipeline during deployment.
Full Deployment with Log Analytics Workspace tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithLogAnalyticsWorkspace.json parameters.logAnalyticsWorkspaceResourceId.value is configured. When it's not defined, this setting is added by Azure DevOps pipeline during deployment.
Deployment without subscription budget tests/schemas/lz-platform-connectivity-hub-azfw/BudgetIsFalse.json parameters.subscriptionBudget.value.createBudget is set to false and budget information removed.
Deployment with optional hub subnets tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-With-OptionalHubSubnets.json parameters.hub.value.network.subnets.optional array is set.
Deployment without Management Restricted Zone tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-Without-ManagementRestrictedZone.json parameters.managementRestrictedZone.value.enabled is set to false and parameters.managementRestrictedZone.value.network.subnets array is empty.

Example Deployment Parameters for Azure Firewall Policy

This example configures:

  1. Resource Group with Tags
  2. Azure Firewall Policy
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "resourceTags": {
      "value": {
        "ClientOrganization": "client-organization-tag",
        "CostCenter": "cost-center-tag",
        "DataSensitivity": "data-sensitivity-tag",
        "ProjectContact": "project-contact-tag",
        "ProjectName": "project-name-tag",
        "TechnicalContact": "technical-contact-tag"
      }
    },
    "resourceGroupName": {
      "value": "pubsec-azure-firewall-policy"
    },
    "policyName": {
      "value": "pubsecAzureFirewallPolicy"
    }
  }
}

Example Deployment Parameters for Hub Networking with Azure Firewall

This example configures:

  1. Service Health Alerts
  2. Microsoft Defender for Cloud
  3. Subscription Role Assignments using built-in and custom roles
  4. Subscription Budget with $1000
  5. Subscription Tags
  6. Resource Tags (aligned to the default tags defined in Policies)
  7. Log Analytics Workspace integration through Azure Defender for Cloud
  8. Hub Network with Azure Firewall and 2 optional subnets in Hub Virtual Network.
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "serviceHealthAlerts": {
      "value": {
          "resourceGroupName": "service-health",
          "incidentTypes": [ "Incident", "Security" ],
          "regions": [ "Global", "Canada East", "Canada Central" ],
          "receivers": {
              "app": [ "[email protected]" ],
              "email": [ "[email protected]" ],
              "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ],
              "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ]
          },
          "actionGroupName": "Service health action group",
          "actionGroupShortName": "health-alert",
          "alertRuleName": "Incidents and Security",
          "alertRuleDescription": "Service Health: Incidents and Security"
      }
    },
    "securityCenter": {
      "value": {
        "email": "[email protected]",
        "phone": "6045555555"
      }
    },
    "subscriptionRoleAssignments": {
      "value": [
        {
          "comments": "Built-in Contributor Role",
          "roleDefinitionId": "b24988ac-6180-42a0-ab88-20f7382dd24c",
          "securityGroupObjectIds": [
            "38f33f7e-a471-4630-8ce9-c6653495a2ee"
          ]
        }
      ]
    },
    "subscriptionBudget": {
      "value": {
        "createBudget": true,
        "name": "MonthlySubscriptionBudget",
        "amount": 1000,
        "timeGrain": "Monthly",
        "contactEmails": [
          "[email protected]"
        ]
      }
    },
    "subscriptionTags": {
      "value": {
        "ISSO": "isso-tbd"
      }
    },
    "resourceTags": {
      "value": {
        "ClientOrganization": "client-organization-tag",
        "CostCenter": "cost-center-tag",
        "DataSensitivity": "data-sensitivity-tag",
        "ProjectContact": "project-contact-tag",
        "ProjectName": "project-name-tag",
        "TechnicalContact": "technical-contact-tag"
      }
    },
    "privateDnsZones": {
      "value": {
        "enabled": true,
        "resourceGroupName": "pubsec-dns"
      }
    },
    "ddosStandard": {
      "value": {
        "enabled": false,
        "resourceGroupName": "pubsec-ddos",
        "planName": "ddos-plan"
      }
    },
    "publicAccessZone": {
      "value": {
        "enabled": true,
        "resourceGroupName": "pubsec-public-access-zone"
      }
    },
    "managementRestrictedZone": {
      "value": {
        "enabled": true,
        "resourceGroupName": "pubsec-management-restricted-zone",
        "network": {
          "name": "management-restricted-vnet",
          "addressPrefixes": ["10.18.4.0/22"],
          "subnets": [
            {
              "comments": "Management (Access Zone) Subnet",
              "name": "MazSubnet",
              "addressPrefix": "10.18.4.0/25",
              "nsg": {
                  "enabled": true
              },
              "udr": {
                  "enabled": true
              }
            },
            {
              "comments": "Infrastructure Services (Restricted Zone) Subnet",
              "name": "InfSubnet",
              "addressPrefix": "10.18.4.128/25",
              "nsg": {
                  "enabled": true
              },
              "udr": {
                  "enabled": true
              }
            },
            {
              "comments": "Security Services (Restricted Zone) Subnet",
              "name": "SecSubnet",
              "addressPrefix": "10.18.5.0/26",
              "nsg": {
                  "enabled": true
              },
              "udr": {
                  "enabled": true
              }
            },
            {
              "comments": "Logging Services (Restricted Zone) Subnet",
              "name": "LogSubnet",
              "addressPrefix": "10.18.5.64/26",
              "nsg": {
                  "enabled": true
              },
              "udr": {
                  "enabled": true
              }
            },
            {
              "comments": "Core Management Interfaces (Restricted Zone) Subnet",
              "name": "MgmtSubnet",
              "addressPrefix": "10.18.5.128/26",
              "nsg": {
                  "enabled": true
              },
              "udr": {
                  "enabled": true
              }
            }
          ]
        }
      }
    },
    "hub": {
      "value": {
        "resourceGroupName": "pubsec-hub-networking",
        "bastion": {
          "enabled": true,
          "name": "bastion",
          "sku": "Standard",
          "scaleUnits": 2
        },
        "azureFirewall": {
          "name": "pubsecAzureFirewall",
          "availabilityZones": ["1", "2", "3"],
          "forcedTunnelingEnabled": false,
          "forcedTunnelingNextHop": "10.17.1.4"
        },
        "network": {
          "name": "hub-vnet",
          "addressPrefixes": [
            "10.18.0.0/22",
            "100.60.0.0/16"
          ],
          "addressPrefixBastion": "192.168.0.0/16",
          "subnets": {
            "gateway": {
              "comments": "Gateway Subnet used for VPN and/or Express Route connectivity",
              "name": "GatewaySubnet",
              "addressPrefix": "10.18.0.0/27"
            },
            "firewall": {
              "comments": "Azure Firewall",
              "name": "AzureFirewallSubnet",
              "addressPrefix": "10.18.1.0/24"
            },
            "firewallManagement": {
              "comments": "Azure Firewall Management",
              "name": "AzureFirewallManagementSubnet",
              "addressPrefix": "10.18.2.0/26"
            },
            "bastion": {
              "comments": "Azure Bastion",
              "name": "AzureBastionSubnet",
              "addressPrefix": "192.168.0.0/24"
            },
            "publicAccess": {
              "comments": "Public Access Zone (Application Gateway)",
              "name": "PAZSubnet",
              "addressPrefix": "100.60.1.0/24"
            },
            "optional": [
              {
                "comments": "Optional 1 Subnet",
                "name": "Optional1Subnet",
                "addressPrefix": "10.18.3.0/26",
                "nsg": {
                    "enabled": true
                },
                "udr": {
                    "enabled": true
                }
              },
              {
                "comments": "Optional 2 Subnet",
                "name": "Optional1Subnet",
                "addressPrefix": "10.18.4.0/26",
                "nsg": {
                    "enabled": true
                },
                "udr": {
                    "enabled": true
                },
                "delegations": {
                  "serviceName": "Microsoft.NetApp/volumes"
                }
              }
            ]
          }
        }
      }
    },
    "networkWatcher": {
      "value": {
        "resourceGroupName": "NetworkWatcherRG"
      }
    }
  }
}