The following example explains Azure active-active deployment with symmetric load balancing and User Defined Routing (UDR). With this setup, all traffic coming from the virtual networks hits the load balancer and will be distributed to the firewall units according to the rules configured in the template. Traffic from the firewalls, in turn, back to the networks does not require any translation and is processed by the firewall rules and therefore sent back to the correct recipient.
Azure active-active performance deployment with symmetric load balancing provides the following advantages:
- Integrates well with network infrastructures using UDR and Azure Express Route
- Does not require NAT
- Extremely straightforward (add VMs to the backend pool, no other modifications required)
The CloudGen Firewall configuration in Microsoft Azure supports repositories, conf templates, and the distributed firewall. For more information, see Repositories, Distributed Firewall and How to Work with Configuration Templates on Different Levels in the Configuration Tree.
Before You Begin
Before proceeding with deploying the Barracuda CloudGen Firewall HA template, make sure that your network infrastructure meets the service requirements listed in CloudGen Firewall Active-Active Performance in Microsoft Azure.
Otherwise, do the following:
- Create a resource group
- Create a storage account
- Create VNET and subnet
- Get a CGF image
For more information, see How to Create a Resource Network in Azure.
Step 1. Deploy a Barracuda Virtual Machine Scale Set
- Log into your Azure Portal.
- Go to the resource group. (See the "Before You Begin" section for more information.)
- Click + to create a new resource.
- Search for
VMSS
in the Marketplace. - Choose Virtual machine scale set.
- Click Create.
- On the next page, configure the following settings:
- Virtual machine scale set name – Enter a name.
- Region – Select your region.
- Availability zone – Select your preferred availability zone.
- Image – Select image cgf/cgf-byol/latest.
- VM Architecture – Select x64.
- Size – Select the VM size.
- Username – Enter a username.
- Password – Enter a password.
- On the next page, configure Spot settings according to your requirements.
- On the next page, set up Disks according to your requirements.
- On the next page, configure following settings:
- Virtual network – Select the virtual network created in the "Before You Begin" section.
- Edit NIC – Select the subnet you want to deploy the scale set to.
- Load balancing options – Select None. An internal load balancer will be added later.
- On the next page, choose your scaling settings:
- Initial Instance count – Enter
2
- Scaling Policy – Select Manual.
- Initial Instance count – Enter
- On the next page, choose the storage account or create a new one.
- Click Next to continue on the Health page.
- Click Next to continue on the Advanced page.
- Optional: Add a user data script to get retrieve par file configuration in case the instance is relaunched.
- Click Next to continue on the Tags page.
- Verify the settings on the Review and Create page.
- Click Create to create the scale set.
Step 2. Virtual Machine Scale Set – Post-Deployment Steps
Go to the resource group the scale set has been deployed to.
- Select the Network Security Group created along with VMSS.
- Configure inbound security rules – Allow port 443, 807, 801, 22
- Configure outbound security rules according to your specification.
- Go back to the resource group.
- For each VMSS instance, select the corresponding network interface.
- In IP configuration, make sure that Enable IP forwarding is selected.
Step 3. Create an Internal Load Balancer
- From the resource group, click + to create a new resource.
- Type in
Load Balancer
and select the resource from the list. The Load Balancer page opens. - Click Create to create a new load balancer.
- On the next page, choose your settings:
- SKU – Select the desired SKU (default: Standard).
- Type – Select Internal.
- Tier – Select Regional.
- On the next page, set your Frontend IP configuration.
- Click Add a frontend IP.
- The Frontend IP window opens. Configure the following settings:
- Name – Enter a descriptive name.
- Virtual Network – Select the virtual network where the VMSS resides.
- Subnet – Select the virtual network where the VMSS resides.
- Assignment – Select Static.
- IP Address – Enter the IP address.
- Availibility Zone – Select Zone-redundant.
- Click Save.
- Proceed with the Backend pool:
- Provide a Name.
- Click + to add a backend pool.
- Select the related NICs from VM scale set.
- Click Add and Save.
- Click Next to continue with Inbound rules:
- Click + Add a load balancing rule, and specify the following settings:
- Name – Enter a name.
- IP Version – Select IPv4.
- Frontend IP address – Select the IP address.
- Backend Pool – Select the backend pool.
- High availability ports – Select the check box.
- Health Probe – Create a new entry.
- Name – Enter a name.
- Protocol – TCP
- Port – Enter
65000
- Interval seconds – Enter
5
- Idle timeout – Select 4 (default)
- Enable TCP Reset – Leave unchecked.
- Floating IP – Leave unchecked.
- Click Save.
- Click Next to proceed to Outbound rules.
- Click Next to proceed to Tags.
- On the Review and create page, verify your settings.
- Click Create.
Step 4 Create a User Defined Route Table
- From the resource group, click + to create a new resource.
- Type in
Route Table
and select the resource from the list.
- Click Create. The Route table > Basics page opens.
- Configure the following settings:
- Subscription – Select your subscription.
- Resource group – Select your resource group.
- Region – Select your region.
- Name – Provide a name.
- Click Next to continue with Tags.
- Click Next to see the summary.
- Click Create to create the resource.
- Go to the route table resource and select it.
- On the left plane, select Routes and click + to add a route.
- Configure the following settings:
- Route name – Enter a descriptive route name.
- Destination type – Select IP Addresses.
- Destination IP addresses/CIDR ranges – Add your route in CDIR notation.
- Next hope type – Select Virtual appliance.
- Next hop address – Enter the front IP address of the load balancer.
- Click Add.
- On the left plane, select Subnets and click + to associate the subnets.
- Associate all appropriate subnets with the route table.
Step 5. Add the Firewall Instances to the Control Center
Add the CloudGen Firewall instances created with the Firewall VM scale set to the Control Center. For more information on managed firewalls, please refer to How to Import an Existing CloudGen Firewall into a Control Center.
Create a cluster- / range-level repository for the linked configuration management. For more information, see Repositories.
Step 6. Set Up Rules and Repositories, and Link Them to Your Firewall Scale Set
- On the Control Center, go to Configuration Tree > your Range > your Cluster > your Box > Assigned Services > Firewall.
- Right-click Forwarding Rules and select Copy to Cluster repository.
- Provide a Name and copy the node.
- Open the created repository.
- Click Lock.
- Add an App Redirect Rule rule for load balancing heath check.
- Source – Select Any.
- Services – Add
65000 TCP
- Destination – Select DHCP1 Local IP.
- Redirection – Enter
127.0.0.1:450
- Add a Dst NAT rule to access the back-end server:
- Source – Select Any.
- Services – Add the ports for required services.
- Destination – Select DHCP1 Local IP.
- Redirection – Enter the IP address of your back-end server.
- Connection Method – select Original Source IP.
- Click OK.
- Click Send Changes.
- Close the repository window.
- Right-click on the firewall repository and select Multiple Object Action.
- Select all firewall instances for the corresponding scale set.
- Select Link To repository > Go.
- Click OK.
- Click Activate.
Step 7. Verify the Setup
Your Barracuda CloudGen Firewall instances are now fully integrated in the Azure cloud and communicate with the load balancer that processes traffic from and to your subnets. To verify that your CloudGen Firewalls are up and running, go to Firewall > Live. The traffic details for your CloudGen Firewalls should be listed with the configured rules.
- All instances from subnets associated with the route table should be able to reach the ILB Front IP.
- All instances from subnets associated with the route table should be able to reach the back-end services.
Next Steps
You can now configure your routing rules on the CloudGen Firewalls according to individual requirements.