Quickstart: Secure your virtual hub using Azure Firewall Manager - Terraform

In this quickstart, you use Terraform to secure your virtual hub using Azure Firewall Manager. The deployed firewall has an application rule that allows connections to www.microsoft.com . Two Windows Server 2019 virtual machines are deployed to test the firewall. One jump server is used to connect to the workload server. From the workload server, you can only connect to www.microsoft.com.

For more information about Azure Firewall Manager, see What is Azure Firewall Manager?.

Prerequisites

  • Azure subscription: If you don't have an Azure subscription, create a free account before you begin.

Review and Implement the Terraform code

Note

The sample code for this article is located in the Azure Terraform GitHub repo. You can view the log file containing the test results from current and previous versions of Terraform.

See more articles and sample code showing how to use Terraform to manage Azure resources

Multiple Azure resources are defined in the Terraform code. The following resources are defined in the main.tf file:

  1. Create a directory in which to test the sample Terraform code and make it the current directory.

  2. Create a file named provider.tf and insert the following code:

    terraform {
      required_providers {
        azurerm = {
          source  = "hashicorp/azurerm"
          version = "~>3.0"
        }
        random = {
          source  = "hashicorp/random"
          version = "~>3.0"
        }
      }
    }
    
    provider "azurerm" {
      features {
        virtual_machine {
          delete_os_disk_on_deletion = true
          skip_shutdown_and_force_delete = true
        }
      }
    }
    
  3. Create a file named main.tf and insert the following code:

    resource "random_pet" "rg-name" {
      prefix = var.resource_group_name_prefix
    }
    
    resource "azurerm_resource_group" "rg" {
      name     = random_pet.rg-name.id
      location = var.resource_group_location
    }
    
    resource "azurerm_virtual_wan" "azfw_vwan" {
      name                           = "vwan-azfw-securehub-eus"
      location                       = azurerm_resource_group.rg.location
      resource_group_name            = azurerm_resource_group.rg.name
      allow_branch_to_branch_traffic = true
      disable_vpn_encryption         = false
    }
    
    resource "azurerm_virtual_hub" "azfw_vwan_hub" {
      name                = "hub-azfw-securehub-eus"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      virtual_wan_id      = azurerm_virtual_wan.azfw_vwan.id
      address_prefix      = "10.20.0.0/23"
    }
    
    resource "azurerm_virtual_hub_connection" "azfw_vwan_hub_connection" {
      name                      = "hub-to-spoke"
      virtual_hub_id            = azurerm_virtual_hub.azfw_vwan_hub.id
      remote_virtual_network_id = azurerm_virtual_network.azfw_vnet.id
      internet_security_enabled = true
      routing {
        associated_route_table_id = azurerm_virtual_hub_route_table.vhub_rt.id
        propagated_route_table {
          route_table_ids = [azurerm_virtual_hub_route_table.vhub_rt.id]
          labels          = ["VNet"]
        }
      }
    }
    
    resource "azurerm_public_ip" "pip_azfw" {
      name                = "pip-azfw-securehub-eus"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      allocation_method   = "Static"
      sku                 = "Standard"
    }
    
    resource "azurerm_firewall_policy" "azfw_policy" {
      name                     = "policy-azfw-securehub-eus"
      resource_group_name      = azurerm_resource_group.rg.name
      location                 = azurerm_resource_group.rg.location
      sku                      = var.firewall_sku_name
      threat_intelligence_mode = "Alert"
    }
    
    resource "azurerm_firewall_policy_rule_collection_group" "app_policy_rule_collection_group" {
      name               = "DefaulApplicationtRuleCollectionGroup"
      firewall_policy_id = azurerm_firewall_policy.azfw_policy.id
      priority           = 300
      application_rule_collection {
        name     = "DefaultApplicationRuleCollection"
        action   = "Allow"
        priority = 100
        rule {
          name        = "Allow-MSFT"
          description = "Allow access to Microsoft.com"
          protocols {
            type = "Https"
            port = 443
          }
          protocols {
            type = "Http"
            port = 80
          }
          destination_fqdns = ["*.microsoft.com"]
          terminate_tls     = false
          source_addresses  = ["*"]
        }
      }
    }
    
    resource "azurerm_firewall" "fw" {
      name                = "fw-azfw-securehub-eus"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      sku_name            = "AZFW_Hub"
      sku_tier            = var.firewall_sku_name
      virtual_hub {
        virtual_hub_id  = azurerm_virtual_hub.azfw_vwan_hub.id
        public_ip_count = 1
      }
      firewall_policy_id = azurerm_firewall_policy.azfw_policy.id
    }
    
    resource "azurerm_virtual_network" "azfw_vnet" {
      name                = "vnet-azfw-securehub-eus"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      address_space       = ["10.10.0.0/16"]
    }
    
    resource "azurerm_subnet" "workload_subnet" {
      name                 = "subnet-workload"
      resource_group_name  = azurerm_resource_group.rg.name
      virtual_network_name = azurerm_virtual_network.azfw_vnet.name
      address_prefixes     = ["10.10.1.0/24"]
    }
    
    resource "azurerm_subnet" "jump_subnet" {
      name                 = "subnet-jump"
      resource_group_name  = azurerm_resource_group.rg.name
      virtual_network_name = azurerm_virtual_network.azfw_vnet.name
      address_prefixes     = ["10.10.2.0/24"]
    }
    
    resource "azurerm_network_interface" "vm_workload_nic" {
      name                = "nic-workload"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
    
      ip_configuration {
        name                          = "ipconfig-workload"
        subnet_id                     = azurerm_subnet.workload_subnet.id
        private_ip_address_allocation = "Dynamic"
      }
    }
    
    resource "azurerm_public_ip" "vm_jump_pip" {
      name                = "pip-jump"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      allocation_method   = "Static"
      sku                 = "Standard"
    }
    
    resource "azurerm_network_interface" "vm_jump_nic" {
      name                = "nic-jump"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
    
      ip_configuration {
        name                          = "ipconfig-jump"
        subnet_id                     = azurerm_subnet.jump_subnet.id
        private_ip_address_allocation = "Dynamic"
        public_ip_address_id          = azurerm_public_ip.vm_jump_pip.id
      }
    }
    
    resource "azurerm_network_security_group" "vm_workload_nsg" {
      name                = "nsg-workload"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
    }
    
    resource "azurerm_network_security_group" "vm_jump_nsg" {
      name                = "nsg-jump"
      location            = azurerm_resource_group.rg.location
      resource_group_name = azurerm_resource_group.rg.name
      security_rule {
        name                       = "Allow-RDP"
        priority                   = 300
        direction                  = "Inbound"
        access                     = "Allow"
        protocol                   = "Tcp"
        source_port_range          = "*"
        destination_port_range     = "3389"
        source_address_prefix      = "*"
        destination_address_prefix = "*"
      }
    }
    
    resource "azurerm_network_interface_security_group_association" "vm_workload_nsg_association" {
      network_interface_id      = azurerm_network_interface.vm_workload_nic.id
      network_security_group_id = azurerm_network_security_group.vm_workload_nsg.id
    }
    
    resource "azurerm_network_interface_security_group_association" "vm_jump_nsg_association" {
      network_interface_id      = azurerm_network_interface.vm_jump_nic.id
      network_security_group_id = azurerm_network_security_group.vm_jump_nsg.id
    }
    
    resource "azurerm_windows_virtual_machine" "vm_workload" {
      name                  = "workload-vm"
      resource_group_name   = azurerm_resource_group.rg.name
      location              = azurerm_resource_group.rg.location
      size                  = var.virtual_machine_size
      admin_username        = var.admin_username
      admin_password        = random_password.password.result
      network_interface_ids = [azurerm_network_interface.vm_workload_nic.id]
      os_disk {
        caching              = "ReadWrite"
        storage_account_type = "Standard_LRS"
      }
      source_image_reference {
        publisher = "MicrosoftWindowsServer"
        offer     = "WindowsServer"
        sku       = "2019-Datacenter"
        version   = "latest"
      }
    }
    
    resource "azurerm_windows_virtual_machine" "vm_jump" {
      name                  = "jump-vm"
      resource_group_name   = azurerm_resource_group.rg.name
      location              = azurerm_resource_group.rg.location
      size                  = var.virtual_machine_size
      admin_username        = var.admin_username
      admin_password        = random_password.password.result
      network_interface_ids = [azurerm_network_interface.vm_jump_nic.id]
      os_disk {
        caching              = "ReadWrite"
        storage_account_type = "Standard_LRS"
      }
      source_image_reference {
        publisher = "MicrosoftWindowsServer"
        offer     = "WindowsServer"
        sku       = "2019-Datacenter"
        version   = "latest"
      }
    }
    
    resource "azurerm_route_table" "rt" {
      name                          = "rt-azfw-securehub-eus"
      location                      = azurerm_resource_group.rg.location
      resource_group_name           = azurerm_resource_group.rg.name
      disable_bgp_route_propagation = false
      route {
        name           = "jump-to-internet"
        address_prefix = "0.0.0.0/0"
        next_hop_type  = "Internet"
      }
    }
    
    resource "azurerm_subnet_route_table_association" "jump_subnet_rt_association" {
      subnet_id      = azurerm_subnet.jump_subnet.id
      route_table_id = azurerm_route_table.rt.id
    }
    
    resource "azurerm_virtual_hub_route_table" "vhub_rt" {
      name           = "vhub-rt-azfw-securehub-eus"
      virtual_hub_id = azurerm_virtual_hub.azfw_vwan_hub.id
      route {
        name              = "workload-SNToFirewall"
        destinations_type = "CIDR"
        destinations      = ["10.10.1.0/24"]
        next_hop_type     = "ResourceId"
        next_hop          = azurerm_firewall.fw.id
      }
      route {
        name              = "InternetToFirewall"
        destinations_type = "CIDR"
        destinations      = ["0.0.0.0/0"]
        next_hop_type     = "ResourceId"
        next_hop          = azurerm_firewall.fw.id
      }
      labels = ["VNet"]
    }
    
    resource "random_password" "password" {
      length      = 20
      min_lower   = 1
      min_upper   = 1
      min_numeric = 1
      min_special = 1
      special     = true
    }
    
  4. Create a file named variables.tf and insert the following code:

    variable "resource_group_location" {
      type        = string
      description = "Location for all resources."
      default     = "eastus"
    }
    
    variable "resource_group_name_prefix" {
      type = string
      description = "Prefix for the Resource Group Name that's combined with a random id so name is unique in your Azure subcription."  
      default = "rg"
    }
    
    variable "firewall_sku_name" {
      type        = string
      description = "SKU name for the firewall."
      default     = "Premium" # Valid values are Standard and Premium
    }
    
    variable "virtual_machine_size" {
      type        = string
      description = "Size of the virtual machine."
      default     = "Standard_D2_v3"
    }
    
    variable "admin_username" {
      default = "azureuser"
    }
    
  5. Create a file named outputs.tf and insert the following code, being sure to update the value to your own backend hostname:

    output "resource_group_name" {
      value = azurerm_resource_group.rg.name
    }
    
    output "virtual_hub_name" {
      value = azurerm_virtual_hub.azfw_vwan_hub.name
    }
    
    output "jump_admin_password" {
      sensitive = true
      value     = azurerm_windows_virtual_machine.vm_jump.admin_password
    }
    
    output "workload_admin_password" {
      sensitive = true
      value     = azurerm_windows_virtual_machine.vm_workload.admin_password
    }
    

Initialize Terraform

Run terraform init to initialize the Terraform deployment. This command downloads the Azure provider required to manage your Azure resources.

terraform init -upgrade

Key points:

  • The -upgrade parameter upgrades the necessary provider plugins to the newest version that complies with the configuration's version constraints.

Create a Terraform execution plan

Run terraform plan to create an execution plan.

terraform plan -out main.tfplan

Key points:

  • The terraform plan command creates an execution plan, but doesn't execute it. Instead, it determines what actions are necessary to create the configuration specified in your configuration files. This pattern allows you to verify whether the execution plan matches your expectations before making any changes to actual resources.
  • The optional -out parameter allows you to specify an output file for the plan. Using the -out parameter ensures that the plan you reviewed is exactly what is applied.

Apply a Terraform execution plan

Run terraform apply to apply the execution plan to your cloud infrastructure.

terraform apply main.tfplan

Key points:

  • The example terraform apply command assumes you previously ran terraform plan -out main.tfplan.
  • If you specified a different filename for the -out parameter, use that same filename in the call to terraform apply.
  • If you didn't use the -out parameter, call terraform apply without any parameters.

Clean up resources

When you no longer need the resources created via Terraform, do the following steps:

  1. Run terraform plan and specify the destroy flag.

    terraform plan -destroy -out main.destroy.tfplan
    

    Key points:

    • The terraform plan command creates an execution plan, but doesn't execute it. Instead, it determines what actions are necessary to create the configuration specified in your configuration files. This pattern allows you to verify whether the execution plan matches your expectations before making any changes to actual resources.
    • The optional -out parameter allows you to specify an output file for the plan. Using the -out parameter ensures that the plan you reviewed is exactly what is applied.
  2. Run terraform apply to apply the execution plan.

    terraform apply main.destroy.tfplan
    

Troubleshoot Terraform on Azure

Troubleshoot common problems when using Terraform on Azure

Next steps