Azure Firewall Manager is a central network security policy and route management service for globally distributed, software-defined perimeters. It can provide security management for two network architecture types, the secured virtual hub and the hub virtual network.
Using Azure Firewall Manager, you can create secured virtual hubs to secure your cloud network traffic destined to private IP addresses, Azure PaaS, and the Internet. Traffic routing to the firewall is automated, so there’s no need to create user-defined routes (UDRs).

In this series of posts, we will learn how to:
- Create the spoke virtual network
- Create a secured virtual hub
- Connect the hub and spoke virtual networks
- Deploy the servers
- Route traffic to your hub
- Create a firewall policy and secure the hub
- Test the firewall
For part 1 of the series, we will configure points 1, 2 and 3.
Create a hub and spoke architecture Link to heading
In this first secrtion, we will create two spoke virtual networks and subnets and the secured virtual hub where you can place our servers.
Create two spoke virtual networks and subnets Link to heading
First, we will create a Resource Group where all the resources in this project will be allocated. The Resource Group will be named Az_FW_Man_Project.
We have to click Resource Groups -> Create

Then, select the Subscription, the Resources Group’s name and the Region. Then, click “Review + create”. Then, click create.

Now that we have the Resource Group where all our resources will live, lets create the two spoke virtual networks and subnets. The two virtual networks will each have a workload server in them and will be protected by the firewall.
From the Azure portal home page, select Create a resource.
Search for Virtual network and select Create.

- Select your subscription, the Resouce Group we have created earlier, and the name of the virtual network. In this case, it will be Spoke-1. Also select the Region, it has to be the same as the RG (Resource Group).

Select Next: IP Addresses.
For Address space, accept the default 10.0.0.0/16. Select Add subnet.

- For Subnet name, type Workload-1-SN. For Subnet address range, type 10.0.1.0/24. Click Add.

- Lastly, delete the default subnet. The only subnet now should be Workload-1-SN. Select Review + create and then select Create.

You can review the settings in this window before clicking Create.

Repeat this procedure to create another similar virtual network in the fw-manager-rg resource group:
Name: Spoke-02
Address space: 10.1.0.0/16
Subnet name: Workload-02-SN
Subnet address range: 10.1.1.0/24
It is important that the subnet address ranges do not overlap.
Create the secured virtual hub: Link to heading
Create your secured virtual hub using Firewall Manager.
From the Azure portal home page, select All services. In the search box, type Firewall Manager and select Firewall Manager.
On the Firewall Manager page under Deployments, select Virtual hubs.

- On the Firewall Manager | Virtual hubs page, select Create new secured virtual hub.

Select your Subscription, Resource group (Az_FW_Man_Project) and Region (East US).
For the Secured virtual hub name, type Hub-1. For Hub address space, type 10.2.0.0/16.
Select New vWAN and name it VWan-1. For Type Select Standard.
Leave the Include VPN gateway to enable Trusted Security Partners check box cleared.

Select Next: Azure Firewall.
Accept the default Azure FirewallEnabled setting.
For Azure Firewall tier, select Standard. IMPORTANT TO SELECT STANDARD.
For Avaliablity zones, I selected None. Also specify the number op public IP addresses needed. In this case, 1 is enough.
Select the Firewall Policy to apply at the new Azure Firewall instance. Select Default Deny Policy, which we will modify later in the post.
Select Next: Security Partner Provider.

Accept the default Trusted Security Partner Disabled setting and select Next: Review + create.
In this page, we can review the settings for our virtual hub. Once everything is checked, select Create. It may take up to thirty minutes for the secured virtual hub to create.

You can get the firewall public IP address after the deployment is complete.
Open Firewall Manager.
Select Virtual hubs.
Select hub-01.
Under Azure Firewall, select Public IP configuration.
Note the public IP address to use later.
Connect the hub and spoke virtual networks Link to heading
Here, we will peer (or connect) the hub and spoke virtual networks. Peering is a mechanism that seamlessly connects two or more Azure virtual networks. Once peered, these networks appear as one for connectivity purposes, and the traffic between them travels through the Microsoft backbone infrastructure, not over the public internet.
Lets peer the hub and spoke virtual networks:
- Select the resource group of the project, then select the VWan-1 virtual WAN which we configured earlier.

- Under Connectivity, select Virtual network connections. Select Add connection.

For Connection name, type Hub-Spoke-1. For Hubs, select Hub-1. For Resource group, select the project’s Resource Group.
For Virtual network, select Spoke-1. Leave everything else as is.

Select Create.
Repeat to connect the Spoke-2 virtual network: connection name - Hub-Spoke-2.
We have successfuly created our two spoke virtual networks and the secure hub, and peered them toguether.
Thank you for reading Part 1 of the “Configure and deploy Azure FW Manager” series. In Part 2 of the series, we will create a firewall policy and secure our hub. In the last part of the series, Part 3, we will deploy the “workload” servers, and thest the firewall.