Create a sandbox setup with Firewall Policy
This template creates a virtual network with 3 subnets (server subnet, jumpbox subnet and AzureFirewall subnet), a jumpbox VM running Ubuntu Linux with public IP and RDP access, A server VM running Ubuntu Linux with only a private IP, UDR route to point to AzureFirewall for the ServerSubnet, an Azure Firewall Policy with 1 sample application rule and a sample Network rule and an AzureFirewall. The firewall applies the rules defined in the Firewall Policy to traffic that it inspects. Azure Firewall is a managed cloud-based network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual network. Azure Firewall uses one or more static public IP addresses for your virtual network resources allowing outside firewalls to identify traffic originating from your virtual network. The service is fully integrated with Azure Monitor for logging and analytics. Learn more at https://docs.microsoft.com/azure/firewall.
Tags: Microsoft.Storage/storageAccounts, Microsoft.Network/routeTables, Microsoft.Network/networkSecurityGroups, Microsoft.Network/virtualNetworks, Microsoft.Network/publicIPAddresses, Microsoft.Network/networkInterfaces, Microsoft.Compute/virtualMachines, Microsoft.Network/firewallPolicies, ruleGroups, Allow, Microsoft.Network/azureFirewalls