Azure Firewall Overview
Azure Firewall is a managed, cloud-based network security service that protects Azure Virtual Network resources. It is a fully stateful firewall as a service, with:
-
Built-in high availability
-
Unlimited cloud scalability
-
Centralized creation, enforcement, and logging of application and network connectivity policies
-
Uses a static public IP for your virtual network resources
-
Fully integrated with Azure Monitor for logging and analytics
Key Features
-
High Availability
-
No extra load balancers required
-
Built-in redundancy
-
-
Availability Zones
-
Can span multiple Availability Zones for resilience
-
-
Scalability
-
Can scale dynamically to accommodate traffic
-
-
Application FQDN Filtering
-
Limit outbound HTTP/S or Azure SQL traffic to specific FQDNs, including wildcards
-
-
Network Traffic Filtering
-
Create allow/deny rules by source/destination IP, port, and protocol
-
Fully stateful with logging across multiple subscriptions/VNETs
-
-
Threat Intelligence
-
Alerts and blocks traffic from known malicious IPs/domains
-
-
Multiple Public IP Addresses
-
Up to 100 public IPs can be associated
-
Implementing Azure Firewall
Example setup:
-
Create network infrastructure:
-
Virtual network with three subnets
-
-
Deploy the firewall:
-
In its own subnet with public and private IPs
-
Private IP used in a routing table
-
-
Create a default route:
-
Direct workload subnet traffic to the firewall
-
-
Configure application rules
Production recommendation: Use a Hub and Spoke model, with the firewall in its own VNET and workload servers in peered VNETs.
Firewall Rule Types
By default, all traffic is blocked. Rules must be configured to allow traffic.
1. NAT Rules (DNAT)
Translate inbound traffic to internal subnets. Useful for exposing services like SSH, RDP, or custom ports.
Configuration settings:
-
Name
-
Protocol (TCP/UDP)
-
Source Address (* / specific IP / CIDR)
-
Destination Address (firewall public IP)
-
Destination Ports
-
Translated Address (internal service)
-
Translated Port
NAT rules must have a matching network rule to allow traffic.
2. Network Rules
Allow non-HTTP/S traffic between subnets or external networks.
Configuration settings:
-
Name
-
Protocol (TCP, UDP, ICMP, Any)
-
Source Address / CIDR
-
Destination Address(es) / CIDR
-
Destination Port
3. Application Rules
Control HTTP/S access by FQDN.
Configuration settings:
-
Name
-
Source Addresses
-
Protocol/Port (HTTP/HTTPS)
-
Target FQDNs (supports wildcards)
FQDN tags exist for Microsoft services like Windows Update or Azure Backup.
Rule Processing Order
-
Network Rules
-
Application Rules
Rules are terminating. Once a match allows traffic, no further rules are checked.
If you want, I can also make a simplified visual diagram showing the Hub & Spoke network with firewall,