text stringlengths 0 3.99k | embedding listlengths 768 768 | metadata dict |
|---|---|---|
Azure Firewall Policy Analytics
Article • 05/15/2023
Policy Analytics provides insights, centralized visibility, and control to Azure Firewall. IT
teams today are challenged to keep Firewall rules up to date, manage existing rules, and
remove unused rules. Any accidental rule updates can lead to a significant downtime ... | [
0.00768463546410203,
-0.020104771479964256,
0.03804057091474533,
-0.022562839090824127,
0.03094222955405712,
-0.016526436433196068,
0.04730435088276863,
-0.03672762215137482,
0.004411506466567516,
-0.06848626583814621,
-0.0162805188447237,
-0.01183701865375042,
-0.04595624655485153,
0.0347... | {
"azure_component": "security",
"chunk_index": 59,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "55",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
enabled.
1. Select Policy analytics in the table of contents.
2. Next, select Configure Workspaces.
3. In the pane that opens, select the Enable Policy Analytics checkbox.
4. Next, choose a log analytics workspace. The log analytics workspace should be the
same as the Firewall attached to the policy.
5. Select Save aft... | [
0.013416713103652,
0.03238142654299736,
0.02167600952088833,
-0.035480134189128876,
0.10792470723390579,
0.002218236681073904,
0.06613955646753311,
-0.04322442784905434,
0.01108493097126484,
-0.02855519764125347,
-0.04329054802656174,
-0.009869026020169258,
-0.06519520282745361,
0.00330818... | {
"azure_component": "security",
"chunk_index": 60,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "56",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall FQDN filtering
07/03/2025
A fully qualified domain name (FQDN) is the complete domain name of a host on the internet,
such as www.microsoft.com
. In Azure Firewall and Firewall policy, FQDNs can be used to filter
traffic in DNAT, network, and application rules, depending on the type and direction of traf... | [
-0.007498491555452347,
-0.006383924745023251,
0.018728718161582947,
-0.007299452554434538,
0.062156643718481064,
-0.006321803666651249,
0.013946615159511566,
-0.00204818369820714,
0.008654050529003143,
-0.032960742712020874,
-0.02596113830804825,
-0.03853246197104454,
-0.10057587176561356,
... | {
"azure_component": "security",
"chunk_index": 61,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "57",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Key characteristics:
Enable inbound traffic routing to backend servers.
Support FQDN-based targeting for dynamic environments.
Useful for scenarios requiring flexible backend server configurations.
Network rules are used for filtering traffic based on any TCP or UDP protocol, such as Network
Time Protocol (NTP), Secure... | [
-0.01871340163052082,
-0.021914727985858917,
0.01622152142226696,
-0.00889875739812851,
0.06255672127008438,
-0.010730736888945103,
0.010442603379487991,
-0.006550909485667944,
-0.02540001831948757,
-0.05898071080446243,
-0.004846880678087473,
-0.03695405274629593,
-0.06865158677101135,
0.... | {
"azure_component": "security",
"chunk_index": 62,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "58",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
[
0.012244698591530323,
0.03951340541243553,
-0.007785371970385313,
0.002132061403244734,
0.04660492390394211,
0.012159298174083233,
0.039779067039489746,
0.04207933694124222,
-0.02076350525021553,
-0.039035167545080185,
0.02428349107503891,
-0.008056429214775562,
-0.04972242936491966,
0.017... | {
"azure_component": "security",
"chunk_index": 63,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "59",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} | |
Infrastructure FQDNs
Article • 03/23/2020
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are
allowed by default. These FQDNs are specific for the platform and can't be used for
other purposes.
The following services are included in the built-in rule collection:
Compute access to storag... | [
-0.016091346740722656,
-0.02877487614750862,
0.002739051589742303,
0.01947939582169056,
0.08598179370164871,
-0.029950421303510666,
0.016578953713178635,
0.02711927890777588,
-0.02157118171453476,
-0.049006491899490356,
-0.03489658236503601,
-0.03416231647133827,
-0.07997116446495056,
0.03... | {
"azure_component": "security",
"chunk_index": 64,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "60",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall IDPS signature rule
categories
Article • 12/28/2021
Azure Firewall IDPS features over 50 categories that can be assigned to individual
signatures. The following table is a list of definitions for each category.
Category
Description
3CORESec
This category is for signatures that are generated automatically... | [
-0.011349641717970371,
-0.02551857940852642,
-0.003443461610004306,
0.008620315231382847,
0.047140222042798996,
0.0017345822416245937,
0.05515855923295021,
-0.032260455191135406,
0.004536911845207214,
-0.03728639334440231,
-0.00837628822773695,
-0.026342641562223434,
-0.057185184210538864,
... | {
"azure_component": "security",
"chunk_index": 65,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "61",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Compromised
This category is for signatures based on a list of known compromised hosts. This
list is confirmed and updated daily. The signatures in this category can vary from
one to several hundred rules depending on the data sources. The data sources
for this category come from several private bu... | [
0.004789452999830246,
-0.0421295128762722,
0.0043104966171085835,
-0.02185220457613468,
0.056083619594573975,
-0.03165686875581741,
0.06556757539510727,
-0.04574393108487129,
-0.019613666459918022,
-0.0261465422809124,
0.013014445081353188,
-0.04087788611650467,
-0.03403167799115181,
0.019... | {
"azure_component": "security",
"chunk_index": 66,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "62",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
attackers identified by Dshield. The rules
in this category are updated daily from the DShield top attackers list, which is
reliable.
Exploit
This category is for signatures that protect against direct exploits not otherwise
covered in a specific service category. This category is where specific attacks
against vulnera... | [
0.030130822211503983,
-0.03858034685254097,
-0.008979498408734798,
-0.014530172571539879,
0.07705558836460114,
-0.0480586476624012,
0.06718965619802475,
-0.050273872911930084,
0.03102910704910755,
-0.036657437682151794,
0.00530804879963398,
-0.03248758241534233,
-0.06334163248538971,
-0.00... | {
"azure_component": "security",
"chunk_index": 67,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "62",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Games
This category is for signatures that identify of gaming traffic and attacks against
those games. The rules cover games such as World of Warcraft, Starcraft, and
other popular online games. While the games and their traffic aren't malicious,
they're often unwanted and prohibited by policy on c... | [
-0.0031220263335853815,
0.00331891980022192,
0.02025008387863636,
-0.014463101513683796,
0.04451513662934303,
-0.031297702342271805,
0.0409189835190773,
0.0036945324391126633,
-0.04226292669773102,
-0.016500195488333702,
0.017674311995506287,
-0.02285786345601082,
-0.052999820560216904,
0.... | {
"azure_component": "security",
"chunk_index": 68,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "63",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
impact and high rate
of false positives.
Info
This category is for signatures to help provide audit level events that are useful
for correlation and identifying interesting activity, which may not be inherently
malicious but is often observed in malware and other threats. For example,
downloading an Executable over HTT... | [
-0.004429852124303579,
-0.0004993660259060562,
0.018642626702785492,
-0.04121997579932213,
0.048069968819618225,
-0.0403384231030941,
0.03713563457131386,
-0.0015294436598196626,
-0.03977122902870178,
-0.0024691778235137463,
-0.012828114442527294,
-0.008059236221015453,
-0.07283098995685577,... | {
"azure_component": "security",
"chunk_index": 69,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "63",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
JA3
This category is for signatures to fingerprint malicious SSL certificates using JA3
hashes. These rules are based on parameters that are in the SSL handshake
negotiation by both clients and servers. These rules can have a high false positive
rate but can be useful for threat hunting or malware ... | [
0.006183397490531206,
-0.006425794214010239,
-0.0072641633450984955,
-0.008282572031021118,
0.03802888095378876,
-0.014241545461118221,
0.06629505008459091,
-0.04607974365353584,
-0.016575783491134644,
-0.04937034100294113,
-0.004393814131617546,
-0.007852473296225071,
-0.05557555332779884,
... | {
"azure_component": "security",
"chunk_index": 70,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "64",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
signatures to “Alert and Deny” mode.
Phishing
This category is for signatures that detect credential-phishing activity. This
includes landing pages displaying credential phishing and successful submission
of credentials into credential-phishing sites.
Policy
This category is for signatures that may indicate violations ... | [
-0.0013250879710540175,
0.010754265822470188,
0.007884983904659748,
-0.005655758082866669,
0.04882613942027092,
-0.03877676650881767,
0.053034793585538864,
-0.010983794927597046,
-0.04035578668117523,
-0.006297231186181307,
-0.016776127740740776,
-0.021668341010808945,
-0.058636851608753204,... | {
"azure_component": "security",
"chunk_index": 71,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "64",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
POP3
This category is for signatures related to attacks, exploits, and vulnerabilities
associated with the Post Office Protocol 3.0 (POP3). This category also includes
rules that detect nonmalicious POP3 activity for logging purposes.
RPC
This category is for signatures related to attacks, exploits... | [
0.0101965656504035,
-0.01599765196442604,
-0.0087050786241889,
-0.01984586752951145,
0.04854561388492584,
-0.019846484065055847,
0.036149490624666214,
-0.035411737859249115,
-0.028620509430766106,
-0.020625904202461243,
0.0031514824368059635,
-0.0023755680304020643,
-0.059166714549064636,
... | {
"azure_component": "security",
"chunk_index": 72,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "65",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
a "connect back" shell
code because the shell code connects back to the attacker’s machine.
SMTP
This category is for signatures related to attacks, exploits, and vulnerabilities
associated with Simple Mail Transfer Protocol (SMTP). This category also includes
rules that detect non-malicious SMTP activity for logging p... | [
-0.008226708509027958,
-0.02370430715382099,
-0.04646187275648117,
-0.03216114640235901,
0.0638435035943985,
-0.01046370156109333,
0.058751460164785385,
-0.03771127760410309,
-0.028125597164034843,
-0.0414755642414093,
0.008171959780156612,
0.00640531349927187,
-0.05326049029827118,
0.0236... | {
"azure_component": "security",
"chunk_index": 73,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "65",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
SQL
This category is for signatures related to attacks, exploits, and vulnerabilities
associated with Structured Query Language (SQL). This category also includes
rules that detect non-malicious SQL activity for logging purposes.
Note: All the signatures in this category are defined as “Alert Only... | [
0.015361598692834377,
-0.0019153477624058723,
-0.006594407372176647,
-0.007819171994924545,
0.066193588078022,
-0.0462324284017086,
0.06661780923604965,
-0.00859936885535717,
-0.012210244312882423,
-0.023439886048436165,
-0.00625860458239913,
-0.027108699083328247,
-0.0757579654455185,
-0.... | {
"azure_component": "security",
"chunk_index": 74,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "66",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
others.
Web Server
This category is for signatures to detect attacks against web server infrastructure
such as APACHE, TOMCAT, NGINX, Microsoft Internet Information Services (IIS),
and other web server software.
Web Specific
Apps
This category is for signatures to detect attacks and vulnerabilities in specific web
appl... | [
0.012844821438193321,
-0.04665384814143181,
0.020100358873605728,
-0.016638996079564095,
0.04107280075550079,
-0.026150938123464584,
0.07357078045606613,
-0.017574327066540718,
-0.03173297271132469,
-0.0351085290312767,
0.021920105442404747,
-0.033646758645772934,
-0.05878129601478577,
0.0... | {
"azure_component": "security",
"chunk_index": 75,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "66",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To learn more about Azure Firewall Premium features, see Azure Firewall Premium
features.
Next steps | [
0.013339038006961346,
-0.005280637182295322,
0.04980004206299782,
0.02812722884118557,
0.06181257218122482,
-0.007472293451428413,
0.08489345014095306,
-0.021843301132321358,
0.005082506220787764,
-0.04348834231495857,
-0.016110317781567574,
-0.022031905129551888,
-0.01302394364029169,
-0.... | {
"azure_component": "security",
"chunk_index": 76,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "67",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall web categories
Article • 10/20/2023
Web categories let administrators allow or deny user access to web site categories such
as gambling websites, social media websites, and others. The categories are organized
based on severity under Liability, High-Bandwidth, Business use, Productivity loss,
General sur... | [
0.017403485253453255,
0.044289927929639816,
-0.029965749010443687,
0.0218263678252697,
0.04941309615969658,
-0.0176969263702631,
0.06316261738538742,
-0.007315112743526697,
0.002441072603687644,
-0.0016205934807658195,
-0.022709334269165993,
-0.014807919040322304,
-0.07594824582338333,
0.0... | {
"azure_component": "security",
"chunk_index": 77,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "68",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Lingerie + swimsuits
Sites that offer images of models in suggestive costume, with semi-
nudity permitted. Includes sites offering lingerie or swimwear.
Marijuana
Sites that contain information, discussions, or sale of marijuana and
associated products or services, including legalizing marijuana an... | [
0.010887286625802517,
-0.01346360519528389,
-0.07049822062253952,
0.01317236665636301,
0.022637590765953064,
-0.04045095294713974,
0.048872046172618866,
-0.003551148111000657,
-0.00316446996293962,
-0.0013343642931431532,
-0.02792654186487198,
-0.0017567438771948218,
-0.04073024541139603,
... | {
"azure_component": "security",
"chunk_index": 78,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "69",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Entertainment
Sites containing programming guides to television, movies, music and
video (including video on demand), celebrity sites, and entertainment news.
Category
Description
Business
Sites that provide business related information such as corporate web sites.
Information, services, or product... | [
0.053204458206892014,
0.0000745991274015978,
-0.01014617271721363,
0.0050408546812832355,
0.06383515894412994,
-0.02592843398451805,
0.02033698372542858,
0.04078619182109833,
-0.025438755750656128,
0.02393527887761593,
-0.022238902747631073,
0.04261697083711624,
-0.07934954762458801,
0.022... | {
"azure_component": "security",
"chunk_index": 79,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "70",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Personal sites
Sites about or hosted by personal individuals, including those hosted on
commercial sites such as Blogger, AOL, etc.
Private IP
addresses
Sites that are private IP addresses as defined in RFC 1918, that is, hosts that
don't require access to hosts in other enterprises (or require lim... | [
-0.003127671778202057,
0.029124164953827858,
-0.026036784052848816,
0.015527831390500069,
0.02821812406182289,
-0.032672345638275146,
0.06962142884731293,
0.03141898661851883,
-0.009782476350665092,
-0.00716140354052186,
-0.02000604011118412,
-0.03858817741274834,
-0.03520777449011803,
-0.... | {
"azure_component": "security",
"chunk_index": 80,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "71",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
category such as health & medicine.
Social networking
Sites that enable social networking for online communities of various topics,
for friendship, or/and dating.
Category
Description
Arts
Sites with artistic content or relating to artistic institutions such as theaters,
museums, galleries, dance c... | [
0.044474925845861435,
-0.002640953753143549,
0.00868759211152792,
-0.004843581933528185,
0.03488895297050476,
-0.03075769729912281,
0.04131583124399185,
0.011665083467960358,
-0.028567923232913017,
-0.01947568543255329,
0.003812846727669239,
-0.009158002212643623,
-0.07297094166278839,
0.0... | {
"azure_component": "security",
"chunk_index": 81,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "72",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Category
Description
Travel
Sites that provide travel and tourism information or online booking or travel
services such as airlines, accommodations, car rentals. Includes regional or city
information sites.
Uncategorized
Sites that haven't been categorized, such as new websites, personal sites, and
so on.
Quickstart: C... | [
-0.00016857888840604573,
0.007489905692636967,
0.007889528758823872,
0.03396756201982498,
0.05626776069402695,
-0.02682415023446083,
0.04790302366018295,
-0.015770522877573967,
-0.021596770733594894,
-0.04490627348423004,
-0.048133235424757004,
-0.033447686582803726,
-0.05413047969341278,
... | {
"azure_component": "security",
"chunk_index": 82,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "73",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Configure Azure Firewall rules
05/07/2025
You can configure NAT rules, network rules, and applications rules on Azure Firewall using
either classic rules or Firewall Policy. Azure Firewall denies all traffic by default, until rules are
manually configured to allow traffic. The rules are terminating, so rule processing ... | [
-0.015023748390376568,
-0.007727826479822397,
0.0060241976752877235,
-0.01235256902873516,
0.031147442758083344,
-0.0320822112262249,
0.057268448173999786,
-0.024845845997333527,
-0.02194545790553093,
-0.06191186606884003,
-0.04555419832468033,
-0.005066638812422752,
-0.0729963630437851,
0... | {
"azure_component": "security",
"chunk_index": 83,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "74",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
So, to summarize:
Parent policy always takes precedence.
1. Rule collection groups are processed in priority order.
2. Rule collections are processed in priority order.
3. DNAT rules, then Network rules, then Application rules are processed.
Here's an example policy:
Assuming BaseRCG1 is a rule collection group priorit... | [
-0.03715725988149643,
-0.0007574200280942023,
0.019024476408958435,
0.013617380522191525,
0.042726919054985046,
-0.057054512202739716,
-0.0011958519462496042,
-0.027800042182207108,
-0.00735601969063282,
-0.06792622804641724,
-0.01076439581811428,
-0.01610902138054371,
-0.054389603435993195,... | {
"azure_component": "security",
"chunk_index": 84,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "75",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Name
Type
Priority
Rules
Inherited from
ChAppRC2
Application rule collection
2000
7
-
ChDNATRC3
DNAT rule collection
3000
2
-
Initial Iteration for DNAT Rules:
The process begins by examining the rule collection group (RCG) with the lowest number,
which is BaseRCG1 with a priority of 200. Within this group, it searches... | [
-0.020216364413499832,
-0.008482464589178562,
-0.01083393394947052,
-0.01554952748119831,
0.041681040078401566,
-0.017059559002518654,
0.0016919764457270503,
-0.0111532649025321,
-0.013510292395949364,
-0.06896872818470001,
-0.003921323921531439,
-0.0122921047732234,
-0.07443691045045853,
... | {
"azure_component": "security",
"chunk_index": 85,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "76",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
the APPLICATION rule.
Finally, in ChildRCG2, it locates ChAppRC2 (priority 2000) as the APPLICATION rule.
In summary, the rule processing sequence is as follows: DNATRC1, DNATRC3, ChDNATRC3,
NetworkRC1, NetworkRC2, ChNetRC1, ChNetRC2, AppRC2, ChAppRC1, ChAppRC2.
This process involves analyzing rule collection groups by... | [
-0.014981153421103954,
-0.0065310318022966385,
0.01515961904078722,
-0.014668368734419346,
0.028655236586928368,
-0.02515759877860546,
0.009246893227100372,
0.00539630651473999,
0.0019281270215287805,
-0.06211305409669876,
-0.026201650500297546,
-0.0314340777695179,
-0.06221729889512062,
0... | {
"azure_component": "security",
"chunk_index": 86,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "76",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If you enable threat intelligence-based filtering, those rules are highest priority and are always
processed first (before network and application rules). Threat-intelligence filtering may deny
traffic before any configured rules are processed. For more information, see Azure Firewall
threat intelligence-based filterin... | [
-0.03437572717666626,
0.009642229415476322,
0.013376640155911446,
0.013091284781694412,
0.06910870969295502,
-0.04701614007353783,
0.061020802706480026,
-0.0016882859636098146,
-0.019276989623904228,
-0.048602182418107986,
-0.01956946775317192,
-0.03346138820052147,
-0.08443477004766464,
0... | {
"azure_component": "security",
"chunk_index": 87,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "77",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
get port number in the Host header, otherwise it assumes the standard port 80. If there's a port
mismatch between the actual TCP port and the port in the host header, the traffic is
dropped. DNS resolution is done by Azure DNS or by a custom DNS if configured on the
firewall.
When an application rule contains TLS insp... | [
-0.02580336295068264,
0.009636178612709045,
-0.009130868129432201,
0.0004560349916573614,
0.06378152221441269,
-0.018163906410336494,
0.019978689029812813,
0.012043793685734272,
0.028710883110761642,
-0.05335333198308945,
0.013703362084925175,
-0.03146813064813614,
-0.07052317261695862,
0.... | {
"azure_component": "security",
"chunk_index": 88,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "78",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
the IP protocols as defined in the Internet Assigned Numbers Authority (IANA)
Protocol Numbers document. If a destination port is explicitly configured, then the rule is
translated to a TCP+UDP rule. Before November 9, 2020, Any meant TCP, or UDP, or ICMP.
So, you might have configured a rule before that date with Prot... | [
-0.04050600901246071,
0.012457812204957008,
0.011035236530005932,
-0.009168229065835476,
0.05835394561290741,
-0.040264640003442764,
0.04358111694455147,
0.0034919572062790394,
0.01689090020954609,
-0.029086681082844734,
-0.0018575862050056458,
-0.0194025207310915,
-0.09374421834945679,
0.... | {
"azure_component": "security",
"chunk_index": 89,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "78",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
is Azure Web Application Firewall?
The following examples show the results of some of these rule combinations.
Connection to google.com is allowed because of a matching network rule.
Network rule
Action: Allow
name
Protocol
Source
type
Source
Destination
type
Destination
address
Destination
ports
Allow-
web
TCP
IP addr... | [
-0.015076759271323681,
0.0010050400160253048,
-0.028684519231319427,
-0.0068590897135436535,
0.036183737218379974,
-0.02191293239593506,
0.0322190523147583,
0.02399047277867794,
0.010822979733347893,
-0.03789736330509186,
-0.016345061361789703,
-0.03588780760765076,
-0.10137804597616196,
0... | {
"azure_component": "security",
"chunk_index": 90,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "79",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Priority: 200
Action: Allow
name
Protocol
Source
type
Source
Destination
type
Destination
address
Destination
ports
Allow-
SSH
TCP
IP address
*
IP address
*
22
Network rule collection 2
Name: Deny-collection
Priority: 100
Action: Deny
name
Protocol
Source
type
Source
Destination
type
Destination
address
Destination
por... | [
-0.023061783984303474,
-0.006325074005872011,
-0.0630846917629242,
0.01805846020579338,
0.019667087122797966,
-0.02453419379889965,
0.0284113809466362,
-0.010447315871715546,
-0.01862984150648117,
-0.06431099772453308,
0.005101247224956751,
-0.0003369692713022232,
-0.07725842297077179,
0.1... | {
"azure_component": "security",
"chunk_index": 91,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "80",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Learn more about Azure Firewall NAT behaviors
Learn how to deploy and configure an Azure Firewall
Learn more about Azure network security
Next steps | [
-0.0013939316850155592,
-0.026991672813892365,
-0.0038733184337615967,
0.024891456589102745,
0.035055454820394516,
-0.014101831242442131,
0.08772013336420059,
-0.010009431280195713,
-0.003050585277378559,
-0.052442390471696854,
-0.025790318846702576,
-0.012982605956494808,
-0.034778755158185... | {
"azure_component": "security",
"chunk_index": 92,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "81",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall forced tunneling
Article • 11/06/2024
When you configure a new Azure Firewall, you can route all Internet-bound traffic to a
designated next hop instead of going directly to the Internet. For example, you could
have a default route advertised via BGP or using User Defined Routes (UDRs) to force
traffic t... | [
0.0064760721288621426,
-0.012769007124006748,
-0.008465318940579891,
0.004785970319062471,
0.042725820094347,
-0.007963576354086399,
0.04763934761285782,
0.03950609266757965,
0.002303174464032054,
-0.033522818237543106,
-0.008504316210746765,
-0.001883707707747817,
-0.07621791213750839,
0.... | {
"azure_component": "security",
"chunk_index": 93,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "82",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
premises network while routing traffic to the Internet for KMS activation, ensuring the
KMS server is activated. You can do this using route tables on the AzureFirewallSubnet.
For more information, see Configuring Azure Firewall in Forced Tunneling mode -
Microsoft Community Hub
.
When the Firewall Management NIC is en... | [
-0.002458292990922928,
-0.04085780680179596,
0.00544707803055644,
0.005105828400701284,
0.060673393309116364,
-0.028439294546842575,
0.0606733001768589,
0.02700895071029663,
0.030090490356087685,
-0.036134615540504456,
-0.013992682099342346,
-0.030308306217193604,
-0.06942715495824814,
0.0... | {
"azure_component": "security",
"chunk_index": 94,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "83",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Azure Firewall Management NIC
Yes
No | [
0.04446582868695259,
-0.02081151120364666,
0.044397562742233276,
0.017122624441981316,
0.034473951905965805,
0.01581541635096073,
0.02756224200129509,
0.03842458128929138,
0.020050616934895515,
-0.025606239214539528,
0.02331707440316677,
0.0034469347447156906,
-0.04197607934474945,
0.04187... | {
"azure_component": "security",
"chunk_index": 95,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "84",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Management NIC
Article • 12/05/2024
An Azure Firewall Management NIC separates firewall management traffic from
customer traffic. Certain upcoming Firewall features will also require a Management NIC.
To support any of these capabilities, you must create an Azure Firewall with the Firewall
Management NIC... | [
-0.022480156272649765,
-0.03154189512133598,
0.012809855863451958,
-0.009958507493138313,
0.04520201310515404,
-0.03967989608645439,
0.048872992396354675,
0.03183116391301155,
0.0022845931816846132,
-0.021595025435090065,
-0.0008955606608651578,
0.014583653770387173,
-0.03547557070851326,
... | {
"azure_component": "security",
"chunk_index": 96,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "85",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For Standard and Premium firewall versions, the Firewall Management NIC must be
manually enabled during the create process as shown previously, but all Basic Firewall
versions and all Secured Hub firewalls always have a Management NIC enabled.
For a pre-existing firewall, you must stop the firewall and then restart it ... | [
-0.011650048196315765,
-0.0026135556399822235,
0.020732903853058815,
-0.007272819988429546,
0.05560664087533951,
-0.038901299238204956,
0.04865172877907753,
0.028196217492222786,
0.02609025314450264,
-0.027210243046283722,
-0.05804142355918884,
0.016040902584791183,
-0.04660141095519066,
0... | {
"azure_component": "security",
"chunk_index": 97,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "86",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
4. Start the firewall with the management public IP address and subnet.
Start a firewall with one public IP address and a Management public IP address:
Azure PowerShell
Start a firewall with two public IP addresses and a Management public IP address:
Azure PowerShell
Now when you view the firewall in the Azure portal, ... | [
0.005595831666141748,
0.0010053592268377542,
-0.014957200735807419,
-0.005949361715465784,
0.048914384096860886,
-0.018792472779750824,
0.07276139408349991,
0.015301567502319813,
0.03582273796200752,
-0.03625643253326416,
-0.05437624827027321,
0.01818874478340149,
-0.04301346838474274,
0.0... | {
"azure_component": "security",
"chunk_index": 98,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "87",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure
to include a Management Subnet and Management NIC as part of your configuration.
Important Note
Single Firewall per Virtual Network (VNET): Since two firewalls can't exist within
the same virtual network, it's recommended to delete... | [
0.011002957820892334,
-0.007231573574244976,
-0.0055182999931275845,
0.017136843875050545,
0.0672525018453598,
0.0031872664112597704,
0.04870115965604782,
0.009565871208906174,
0.0021505835466086864,
-0.06999334692955017,
-0.03669917955994606,
-0.012699932791292667,
-0.056892093271017075,
... | {
"azure_component": "security",
"chunk_index": 99,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "88",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Name: Enter a name for the firewall.
Region: Choose your region.
Firewall SKU: Select Basic, Standard, or Premium.
Virtual Network: Create a new virtual network or use an existing one.
Address space: for example, 10.0.0.0/16
Subnet fo... | [
0.02277854084968567,
0.00048682806664146483,
-0.002541509922593832,
0.016151726245880127,
0.056370873004198074,
0.022256020456552505,
0.038614533841609955,
0.015065746381878853,
0.018951771780848503,
-0.055860839784145355,
-0.035412732511758804,
-0.0014224685728549957,
-0.07038901746273041,
... | {
"azure_component": "security",
"chunk_index": 100,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "89",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall certifications
Article • 04/28/2023
To help you meet your own compliance obligations across regulated industries and
markets worldwide, Azure maintains the largest compliance portfolio in the industry
both in terms of breadth (total number of offerings) and depth (number of customer-
facing services
in ... | [
0.019369808956980705,
-0.007413092069327831,
0.026942377910017967,
0.018338296562433243,
0.04289822652935982,
-0.02857605554163456,
0.04960142821073532,
0.03758892044425011,
0.016080040484666824,
-0.0012321426765993237,
-0.030628854408860207,
-0.004471117630600929,
-0.04118198901414871,
0.... | {
"azure_component": "security",
"chunk_index": 101,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "90",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall FTP support
Article • 08/02/2023
To support FTP, a firewall must consider the following key aspects:
FTP mode – Active or Passive
Client/server location - Internet or intranet
Flow direction - inbound or outbound.
Azure Firewall supports both Active and Passive FTP scenarios. For more information
about F... | [
0.008040428161621094,
-0.06564022600650787,
0.014032100327312946,
-0.022037580609321594,
0.078458771109581,
-0.03454376012086868,
0.033146921545267105,
0.011742028407752514,
0.014059659093618393,
-0.024956339970231056,
-0.06884495168924332,
-0.021192509680986404,
-0.07218609005212784,
0.02... | {
"azure_component": "security",
"chunk_index": 102,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "91",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Firewall Scenario
Active FTP mode
Passive FTP mode
VNet-VNet
Network Rules to configure:
- Allow From Source VNet to Dest IP
port 21
- Allow From Dest IP port 20 to Source
VNet
Network Rules to configure:
- Allow From Source VNet to
Dest IP port 21
- Allow From Source VNet to
Dest IP <Range of Data Ports>
Outbound VNet... | [
0.017350830137729645,
-0.04207926243543625,
-0.0029551119077950716,
0.004406025633215904,
0.043396081775426865,
-0.03383245691657066,
0.028120199218392372,
0.0014727846719324589,
0.019858665764331818,
-0.051913876086473465,
-0.047343168407678604,
-0.019831331446766853,
-0.077064149081707,
... | {
"azure_component": "security",
"chunk_index": 103,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "92",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To deploy using Azure PowerShell, use the AllowActiveFTP parameter. For more
information, see Create a Firewall with Allow Active FTP.
To update an existing Azure Firewall by using Azure PowerShell, switch the
AllowActiveFTP parameter to 'True'.
Azure PowerShell
To deploy using the Azure CLI, use the --allow-active-f... | [
0.006606641225516796,
-0.011813049204647541,
0.004751581232994795,
0.0062264627777040005,
0.08269323408603668,
0.017152253538370132,
0.015875041484832764,
0.004484603181481361,
0.01640663482248783,
-0.06465296447277069,
-0.06792287528514862,
-0.008107560686767101,
-0.06388736516237259,
0.0... | {
"azure_component": "security",
"chunk_index": 104,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "93",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall performance
Article • 12/26/2024
Reliable firewall performance is essential to operate and protect your virtual networks in
Azure. More advanced features (like those found in Azure Firewall Premium) require
more processing complexity, and affect firewall performance and overall network
performance.
Azure... | [
-0.011436769738793373,
0.016452139243483543,
0.045826829969882965,
0.02685203030705452,
0.07172604650259018,
-0.023376837372779846,
0.08912663161754608,
-0.0022061143536120653,
-0.02887740172445774,
-0.044473566114902496,
-0.012342343106865883,
-0.029543636366724968,
-0.03735283389687538,
... | {
"azure_component": "security",
"chunk_index": 105,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "94",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
account for the network topology, and emulate the actual characteristics of the
expected traffic through the firewall.
The following set of performance results demonstrates the maximal Azure Firewall
throughput in various use cases. All use cases were measured while Threat intelligence
mode was set to alert/deny. Azure... | [
0.0069474284537136555,
-0.019841216504573822,
0.003988765645772219,
0.03516637161374092,
0.06629651039838791,
0.019524984061717987,
0.053432077169418335,
0.023878905922174454,
0.0007446196977980435,
-0.037899039685726166,
-0.013779131695628166,
-0.0627589002251625,
-0.07394520193338394,
0.... | {
"azure_component": "security",
"chunk_index": 106,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "95",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Firewall use case
Throughput (Gbps)
Premium single TCP connection with IDPS on Alert and Deny mode
up to 300 Mbps
The following throughput numbers are for an Azure Firewall Standard and Premium
deployments before autoscale (out of the... | [
0.01399494893848896,
-0.027713770046830177,
0.031864263117313385,
-0.009225080721080303,
0.03859243541955948,
0.022135047242045403,
0.053690943866968155,
0.020007744431495667,
0.016459709033370018,
-0.02944262884557247,
0.015830228105187416,
-0.030153971165418625,
-0.07398805022239685,
0.0... | {
"azure_component": "security",
"chunk_index": 107,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "96",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Understanding Azure Firewall TCP
session management and idle timeout
behavior
Article • 03/27/2025
This article explains the behavior of long-running sessions and the TCP idle timeout for
Azure Firewall. Understanding these concepts is crucial for maintaining network security,
optimizing firewall resources, and ensurin... | [
0.00840364582836628,
-0.05957511439919472,
-0.02171351946890354,
0.010687645524740219,
0.03258474916219711,
-0.035834167152643204,
0.06287404894828796,
0.03265896812081337,
-0.0005289364489726722,
-0.053102921694517136,
-0.04100438952445984,
-0.0350860059261322,
-0.08293119817972183,
0.028... | {
"azure_component": "security",
"chunk_index": 108,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "97",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The TCP idle timeout specifies the duration a connection can stay inactive before the
Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall
by closing inactive connections and maintaining overall network performance.
The TCP idle timeout provides several benefits:
Efficient resource u... | [
0.029493430629372597,
-0.04813007265329361,
0.007247032131999731,
0.036869969218969345,
0.03391680493950844,
-0.009518074803054333,
0.03820350766181946,
0.04566223919391632,
-0.013405169360339642,
-0.06762666255235672,
-0.0426943264901638,
-0.032623834908008575,
-0.0757574662566185,
0.0305... | {
"azure_component": "security",
"chunk_index": 109,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "98",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
sessions active and prevent disruptions during scale-in, maintenance, or
autorecovery events.
Certain applications, such as traditional SAP GUI and SAP Remote Function Call (RFC)-
based applications, are sensitive to session resets an... | [
0.011874078772962093,
-0.03017692267894745,
0.002144627273082733,
0.024745631963014603,
0.057516515254974365,
-0.04702461510896683,
0.08226177841424942,
-0.0016325087053701282,
-0.004899806808680296,
-0.05831319838762283,
-0.0279511921107769,
-0.033429209142923355,
-0.051611851900815964,
-... | {
"azure_component": "security",
"chunk_index": 110,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "99",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Explicit proxy (preview)
Article • 08/11/2023
Azure Firewall operates in a transparent proxy mode by default. In this mode, traffic is
sent to the firewall using a user defined route (UDR) configuration. The firewall
intercepts that traffic inline and passes it to the destination.
With Explicit proxy set... | [
-0.014216386713087559,
-0.025185994803905487,
0.004567577037960291,
0.016912681981921196,
0.04324989765882492,
-0.023125527426600456,
0.05743613839149475,
0.018148090690374374,
0.014761577360332012,
-0.06375077366828918,
-0.04312019422650337,
-0.039606768637895584,
-0.0533689521253109,
0.0... | {
"azure_component": "security",
"chunk_index": 111,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "100",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Next, to allow the traffic to pass through the Firewall, create an application rule in
the Firewall policy to allow this traffic.
To use the Proxy autoconfiguration (PAC) file, select Enable proxy auto-
configuration.
First, upload the PAC file to a storage container that you create. Then, on the
Enable explicit proxy ... | [
0.0004589768941514194,
-0.009967032819986343,
0.008065632544457912,
0.008331282995641232,
0.08805692940950394,
-0.03185763210058212,
0.048040952533483505,
-0.03413659334182739,
0.0006400792626664042,
-0.04990694671869278,
-0.015560084953904152,
-0.021373050287365913,
-0.04970480874180794,
... | {
"azure_component": "security",
"chunk_index": 112,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "101",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To learn more about Explicit proxy, see Demystifying Explicit proxy: Enhancing
Security with Azure Firewall
.
To learn how to deploy an Azure Firewall, see Deploy and configure Azure Firewall
using Azure PowerShell.
Next steps | [
0.009903340600430965,
-0.0027409791946411133,
-0.022114450111985207,
0.04757489264011383,
0.07374351471662521,
-0.01007386390119791,
0.05722296983003616,
-0.027557818219065666,
0.0015169732505455613,
-0.04464147612452507,
-0.036669015884399414,
-0.01494654268026352,
-0.042057689279317856,
... | {
"azure_component": "security",
"chunk_index": 113,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "102",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Use Azure Firewall to route a multi hub
and spoke topology
Article • 03/19/2025
The hub and spoke topology is a common network architecture pattern in Azure. In this
setup, the hub is a virtual network (VNet) that serves as a central point of connectivity to
your on-premises network. The spokes are VNets that peer with... | [
0.05500296875834465,
-0.004273397382348776,
0.020533300936222076,
0.036338649690151215,
0.018734674900770187,
0.021236583590507507,
0.04014921560883522,
0.03755320981144905,
0.004800694994628429,
-0.06765039265155792,
-0.003182588843628764,
-0.03405836969614029,
-0.08624080568552017,
0.067... | {
"azure_component": "security",
"chunk_index": 114,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "103",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
local firewall contains the route table of each directly connected hub. However, local
hubs only know about their local spokes. These hubs can be in the same or different
regions.
Each local firewall needs to know how to reach remote spokes, so you must create UDRs
in the firewall subnets. Start by creating a default r... | [
0.016753798350691795,
0.011175823397934437,
0.025132015347480774,
0.03233052045106888,
0.06704139709472656,
0.0030584358610212803,
0.05175694823265076,
0.014647352509200573,
0.013658701442182064,
-0.05662769079208374,
-0.004188180901110172,
-0.007512520533055067,
-0.0582963228225708,
0.039... | {
"azure_component": "security",
"chunk_index": 115,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "104",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Hub-02 route table
This topology allows traffic to move from one hub to another, reaching the next hop
directly connected via global peering.
As shown in the diagram, it's best to place a UDR in the spoke subnets with a 0/0 route
(default gateway) pointing to the local firewall as the next hop. This ensures a single ex... | [
0.009531952440738678,
-0.01709062047302723,
0.007324648089706898,
0.007675498258322477,
0.04515824839472771,
-0.007129658944904804,
0.06428023427724838,
0.047847408801317215,
0.012724188156425953,
-0.060694411396980286,
0.02314898371696472,
-0.056065574288368225,
-0.07984156161546707,
0.04... | {
"azure_component": "security",
"chunk_index": 116,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "105",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Learn how to deploy and configure an Azure Firewall.
Next steps
Yes
No | [
0.058912016451358795,
-0.0018794346833601594,
0.029149603098630905,
0.012248587794601917,
0.046318408101797104,
-0.0008146966574713588,
0.05022808536887169,
0.01442551426589489,
0.03102625161409378,
-0.047319382429122925,
-0.03337084874510765,
-0.02172052673995495,
-0.05308503285050392,
0.... | {
"azure_component": "security",
"chunk_index": 117,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "106",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall central management
Article • 07/13/2020
If you manage multiple firewalls, you know that continuously changing firewall rules
make it difficult to keep them in sync. Central IT teams need a way to define base
firewall policies and enforce them across multiple business units. At the same time,
DevOps teams... | [
0.0027839101385325193,
-0.02197922021150589,
0.0398896187543869,
0.01061219722032547,
0.05160531401634216,
-0.001762119703926146,
0.027302689850330353,
0.007032577879726887,
0.014038482680916786,
-0.0406704805791378,
-0.02762894704937935,
-0.01830807514488697,
-0.049049776047468185,
0.0670... | {
"azure_component": "security",
"chunk_index": 118,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "107",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The following leading third-party solutions support Azure Firewall central management
using standard Azure REST APIs. Each of these solutions has its own unique
characteristics and features:
AlgoSec CloudFlow
Barracuda Cloud Security Guardian
Tufin Orca
For more information about Azure Firewall Manager, see What is Azu... | [
0.0023141587153077126,
-0.04249333590269089,
0.018538303673267365,
0.009870823472738266,
0.03553305193781853,
-0.005330634769052267,
0.019655533134937286,
0.031922996044158936,
-0.009974943473935127,
-0.05001264438033104,
-0.011112380772829056,
-0.027560792863368988,
-0.039223503321409225,
... | {
"azure_component": "security",
"chunk_index": 119,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "108",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Integrate Azure Firewall with Azure
Standard Load Balancer
Article • 03/04/2025
You can integrate an Azure Firewall into a virtual network with either a public or internal
Azure Standard Load Balancer.
The preferred design is to use an internal load balancer with your Azure Firewall, as it
simplifies the setup. If you ... | [
0.011829392053186893,
-0.03094543144106865,
0.00483958562836051,
0.008786915801465511,
0.025092076510190964,
-0.012752367183566093,
0.04989716410636902,
0.02484491467475891,
0.0033210408873856068,
-0.06818781048059464,
0.0020110285840928555,
-0.06100205332040787,
-0.04648358002305031,
0.00... | {
"azure_component": "security",
"chunk_index": 120,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "109",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
The issue arises when packets arrive at the firewall's public IP address but return via the
private IP address (using the default route).
To prevent asymmetric routing, add a specific route for the firewall's public IP address.
Packets intended for the firewall's public IP address are directed through the Internet,
byp... | [
-0.025402765721082687,
-0.03751695528626442,
-0.03919749706983566,
0.008863617666065693,
0.017845457419753075,
-0.02084735408425331,
0.06295879930257797,
0.029801134020090103,
-0.0010943750385195017,
-0.05279853567481041,
-0.004261364229023457,
-0.06162535026669502,
-0.052395086735486984,
... | {
"azure_component": "security",
"chunk_index": 121,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "110",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
When a NAT Gateway is associated with the Azure Firewall subnet, inbound traffic from
the internet lands on the Azure Firewall's public IP address. The Azure Firewall then
changes (SNAT) the source IP to the NAT Gateway's public IP address before forwarding
the traffic to the load balancer's public IP address.
Without ... | [
-0.039215438067913055,
-0.014537779614329338,
-0.01219460740685463,
0.0006995555013418198,
0.026251016184687614,
-0.005782115738838911,
0.05075263977050781,
0.007549327798187733,
-0.007100720424205065,
-0.01334033627063036,
-0.027051862329244614,
-0.030655693262815475,
-0.05074762925505638,
... | {
"azure_component": "security",
"chunk_index": 122,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "111",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You must add a route for the return path to use the NAT Gateway public IP address
instead of the Azure Firewall public IP address with Internet as the next hop.
For example, the following route table shows routes for a NAT Gateway with a public IP
address of 198.51.100.101 and a firewall with a private IP address of 10... | [
-0.016840282827615738,
-0.015694284811615944,
-0.02830723114311695,
0.02225833386182785,
0.027891770005226135,
-0.018828807398676872,
0.0628177747130394,
0.024408891797065735,
0.012894179672002792,
-0.04822935909032822,
0.01832442358136177,
-0.03222547844052315,
-0.036788586527109146,
0.02... | {
"azure_component": "security",
"chunk_index": 123,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "112",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
return to the firewall's private IP address using the same path.
Deploy this scenario similarly to the public load balancer scenario, but without needing
the firewall public IP address host route.
Virtual machines in the backend pool can have outbound Internet connectivity through
the Azure Firewall. Configure a user-d... | [
0.008655160665512085,
-0.03524548560380936,
-0.0025571936275810003,
0.0060808090493083,
0.04109903797507286,
0.00658547505736351,
0.04697289317846298,
0.017553605139255524,
-0.031080076470971107,
-0.05928155407309532,
-0.018307963386178017,
-0.03594207391142845,
-0.05236511677503586,
0.007... | {
"azure_component": "security",
"chunk_index": 124,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "113",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
Learn how to deploy and configure an Azure Firewall.
Next steps
Yes
No | [
0.058912016451358795,
-0.0018794346833601594,
0.029149603098630905,
0.012248587794601917,
0.046318408101797104,
-0.0008146966574713588,
0.05022808536887169,
0.01442551426589489,
0.03102625161409378,
-0.047319382429122925,
-0.03337084874510765,
-0.02172052673995495,
-0.05308503285050392,
0.... | {
"azure_component": "security",
"chunk_index": 125,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "114",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Basic features
Article • 06/14/2024
Azure Firewall Basic is a managed, cloud-based network security service that protects
your Azure Virtual Network resources.
Azure Firewall Basic includes the following features:
Built-in high availability
Availability Zones
Application FQDN filtering rules
Network traf... | [
-0.013153772801160812,
0.020176757127046585,
0.04482179507613182,
0.011963252909481525,
0.052707500755786896,
-0.0004710157518275082,
0.05230700969696045,
-0.002534291474148631,
-0.012240630574524403,
-0.03436647355556488,
-0.03134841471910477,
-0.020355062559247017,
-0.037315331399440765,
... | {
"azure_component": "security",
"chunk_index": 126,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "115",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
To compare Azure Firewall features for all Firewall versions, see Choose the right Azure
Firewall version to meet your needs.
High availability is built in, so no extra load balancers are required and there's nothing
you need to configure.
Azure Firewall can be configured during deployment to span multiple Availability... | [
0.0028935440350323915,
-0.008019326254725456,
0.014744221232831478,
0.03391992673277855,
0.07981313019990921,
-0.023085404187440872,
0.01264235470443964,
0.006661004852503538,
-0.007311120629310608,
-0.05149120092391968,
-0.04319000989198685,
-0.042090244591236115,
-0.07684680819511414,
0.... | {
"azure_component": "security",
"chunk_index": 127,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "116",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall supports stateful filtering of Layer 3 and Layer 4 network protocols. Layer
3 IP protocols can be filtered by selecting Any protocol in the Network rule and select
the wild-card * for the port.
FQDN tags make it easy for you to allow well-known Azure service network traffic
through your firewall. For exa... | [
0.004643326159566641,
-0.004044516943395138,
0.00216182810254395,
-0.026343369856476784,
0.04876561462879181,
-0.031695131212472916,
0.02538837492465973,
-0.019185587763786316,
-0.015340721234679222,
-0.04441026970744133,
-0.024189895018935204,
-0.03328379988670349,
-0.07176882773637772,
0... | {
"azure_component": "security",
"chunk_index": 128,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "117",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more detailed information about Azure Firewall NAT behaviors, see Azure Firewall
NAT Behaviors
.
Inbound Internet network traffic to your firewall public IP address is translated
(Destination Network Address Translation) and filtered to the private IP addresses on
your virtual networks.
You can associate multiple p... | [
-0.006418062373995781,
-0.007522116880863905,
-0.0029171574860811234,
-0.014981023967266083,
0.037535473704338074,
0.007927455939352512,
0.02010434679687023,
0.007535470183938742,
-0.0008858800283633173,
-0.02690650336444378,
-0.0324079766869545,
-0.03818804770708084,
-0.06599382311105728,
... | {
"azure_component": "security",
"chunk_index": 129,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "118",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
see Azure Firewall compliance certifications.
Yes
No | [
0.07841720432043076,
-0.006726071238517761,
0.04932907223701477,
0.01572350226342678,
0.042640574276447296,
0.019305700436234474,
0.045169420540332794,
0.030103622004389763,
0.02017989754676819,
-0.009901387616991997,
0.01898813247680664,
0.016390670090913773,
-0.0466313473880291,
0.039020... | {
"azure_component": "security",
"chunk_index": 130,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "119",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Deploy and configure Azure Firewall
Basic and policy using the Azure portal
Article • 03/15/2023
Azure Firewall Basic provides the essential protection SMB customers need at an
affordable price point. This solution is recommended for SMB customer environments
with less than 250 Mbps throughput requirements. It is recom... | [
-0.02595735713839531,
-0.023073634132742882,
0.030626073479652405,
0.0006562948110513389,
0.06426145136356354,
-0.016438981518149376,
0.02917935885488987,
-0.019608493894338608,
-0.004352328833192587,
-0.022242948412895203,
-0.032965585589408875,
-0.02725459635257721,
-0.058205053210258484,
... | {
"azure_component": "security",
"chunk_index": 131,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "120",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For production deployments, a hub and spoke model is recommended, where the
firewall is in its own VNet. The workload servers are in peered VNets in the same region
with one or more subnets.
In this how-to, you learn how to:
If you prefer, you can complete this procedure using Azure PowerShell.
If you don't have an Azu... | [
0.028422627598047256,
-0.02411090023815632,
0.03543233498930931,
0.029927678406238556,
0.0647067129611969,
0.01391107589006424,
0.048360053449869156,
0.031146768480539322,
0.006716768257319927,
-0.059296201914548874,
-0.03188936412334442,
-0.007201049942523241,
-0.06716429442167282,
0.0116... | {
"azure_component": "security",
"chunk_index": 132,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "121",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. On the Azure portal menu or from the Home page, select Create a resource.
2. Type firewall in the search box and press Enter.
3. Select Firewall and then select Create.
4. On the Create a Firewall page, use the following table to configure the firewall:
Setting
Value
Subscription
<your subscription>
Resource group
T... | [
0.012472307309508324,
0.01270454004406929,
0.013334772549569607,
-0.0023530253674834967,
0.0689348429441452,
0.0217298474162817,
0.05088839307427406,
0.006165408529341221,
0.004921517800539732,
-0.04937618225812912,
-0.03158232569694519,
-0.006511883344501257,
-0.06811941415071487,
0.01206... | {
"azure_component": "security",
"chunk_index": 133,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "122",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
8. Note the firewall private and public IP (fw-pip) addresses. You'll use these
addresses later.
Next, create a subnet for the workload server.
1. Go to the Test-FW-RG resource group and select the Test-FW-VN virtual network.
2. Select Subnets.
3. Select Subnet.
4. For Subnet name, type Workload-SN.
5. For Subnet addre... | [
0.02400321327149868,
-0.006347740069031715,
0.008142959326505661,
0.019170299172401428,
0.07960738241672516,
0.03858882561326027,
0.04013102129101753,
0.002659654011949897,
-0.00014188518980517983,
-0.0481204017996788,
0.010267783887684345,
-0.016012080013751984,
-0.05199812725186348,
0.01... | {
"azure_component": "security",
"chunk_index": 134,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "123",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
8. For Public IP, select None.
9. Accept the other defaults and select Next: Management.
10. Select Next: Monitoring.
11. Select Disable to disable boot diagnostics. Accept the other defaults and select
Review + create.
12. Review the settings on the summary page, and then select Create.
13. After the deployment comple... | [
0.012565906159579754,
0.02566172182559967,
0.0009180924971587956,
-0.015904385596513748,
0.08336439728736877,
0.015651414170861244,
0.05896700173616409,
0.03517908975481987,
0.008754565380513668,
-0.06117607653141022,
-0.01661858521401882,
0.002699656179174781,
-0.060078978538513184,
0.010... | {
"azure_component": "security",
"chunk_index": 135,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "124",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
7. For Address prefix destination, select IP Addresses.
8. For Destination IP addresses/CIDR ranges, type 0.0.0.0/0.
9. For Next hop type, select Virtual appliance.
Azure Firewall is actually a managed service, but virtual appliance works in this
situation.
10. For Next hop address, type the private IP address for the ... | [
-0.003976802807301283,
0.016541695222258568,
-0.00021337182261049747,
0.00573719060048461,
0.0750260278582573,
0.02505861595273018,
0.05086960271000862,
-0.004612641409039497,
0.0141273383051157,
-0.06973932683467865,
0.0073464615270495415,
-0.032917965203523636,
-0.07294710725545883,
0.01... | {
"azure_component": "security",
"chunk_index": 136,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "125",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
3. For Name, type Net-Coll01.
4. For Priority, type 200.
5. For Rule collection action, select Allow.
6. For Rule collection group, select DefaultNetworkRuleCollectionGroup.
7. Under Rules, for Name, type Allow-DNS.
8. For Source type, select IP Address.
9. For Source, type 10.0.2.0/24.
10. For Protocol, select UDP.
11... | [
-0.00970781035721302,
-0.0030504129827022552,
-0.03620576113462448,
-0.019786247983574867,
0.05068556219339371,
-0.003403967246413231,
0.0433666817843914,
-0.01960095576941967,
0.03174271062016487,
-0.053935594856739044,
0.009207292459905148,
0.0013902890495955944,
-0.10608702152967453,
0.... | {
"azure_component": "security",
"chunk_index": 137,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "126",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
1. On the Azure portal menu, select Resource groups or search for and select
Resource groups from any page. Select the Test-FW-RG resource group.
2. Select the network interface for the Srv-Work virtual machine.
3. Under Settings, select DNS servers.
4. Under DNS servers, select Custom.
5. Type 209.244.0.3 in the Add D... | [
0.0013175082858651876,
0.04481767117977142,
0.025113051757216454,
0.00046080778702162206,
0.07315453141927719,
0.020896030589938164,
0.06434901803731918,
-0.012057255953550339,
0.01879734732210636,
-0.05871666595339775,
-0.012190010398626328,
0.00949955265969038,
-0.07438518106937408,
0.03... | {
"azure_component": "security",
"chunk_index": 138,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "127",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Azure Firewall Standard features
Article • 01/30/2025
Azure Firewall Standard is a managed, cloud-based network security service that
protects your Azure Virtual Network resources.
Azure Firewall includes the following features:
Built-in high availability
Availability Zones
Unrestricted cloud scalability
Application FQ... | [
-0.012915557250380516,
0.00046914699487388134,
0.03216475993394852,
0.017147205770015717,
0.06908862292766571,
0.02495664730668068,
0.058144498616456985,
0.012264308519661427,
-0.0023695880081504583,
-0.04809952899813652,
-0.021101271733641624,
-0.03590354695916176,
-0.04245154559612274,
0... | {
"azure_component": "security",
"chunk_index": 139,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "128",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Outbound SNAT support
Inbound DNAT support
Multiple public IP addresses
Azure Monitor logging
Forced tunneling
Web categories
Certifications
To compare Azure Firewall features for all Firewall versions, see Choose the right Azure
Firewall version to meet your needs.
High availability is built in, so no extra load balan... | [
0.0044546606950461864,
-0.007262319326400757,
0.0007205605506896973,
0.019547052681446075,
0.06728736311197281,
0.004565835930407047,
0.024647746235132217,
0.009218483231961727,
0.006123983766883612,
-0.034781649708747864,
-0.026699785143136978,
-0.04557747393846512,
-0.07423066347837448,
... | {
"azure_component": "security",
"chunk_index": 140,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "129",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more information about Availability Zones, see Regions and Availability Zones in
Azure.
Azure Firewall can scale out as much as you need to accommodate changing network
traffic flows, so you don't need to budget for your peak traffic.
You can limit outbound HTTP/S traffic or Azure SQL traffic to a specified list of... | [
0.005415054503828287,
-0.03962613642215729,
0.02136688493192196,
-0.01667298562824726,
0.0755079984664917,
-0.04702186584472656,
0.038871388882398605,
-0.005783540196716785,
-0.006965084001421928,
-0.048321470618247986,
-0.032772086560726166,
-0.04582858085632324,
-0.07437849044799805,
0.0... | {
"azure_component": "security",
"chunk_index": 141,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "130",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
A service tag represents a group of IP address prefixes to help minimize complexity for
security rule creation. You can't create your own service tag, nor specify which IP
addresses are included within a tag. Microsoft manages the address prefixes
encompassed by the service tag, and automatically updates the service ta... | [
-0.015254409052431583,
-0.0025258217938244343,
0.011801679618656635,
0.004324902314692736,
0.06969369202852249,
-0.010778295807540417,
0.035429924726486206,
-0.019885944202542305,
-0.0067877694964408875,
-0.057717032730579376,
-0.03639909625053406,
-0.04104859381914139,
-0.0742093175649643,
... | {
"azure_component": "security",
"chunk_index": 142,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "131",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
proxy to ensure name resolution is consistent with your protected virtual machines and
firewall.
The Azure Firewall service requires a public IP address for operational purposes. While
secure, some deployments prefer not to expose a public IP address directly to the
Internet.
In such cases, you can deploy Azure Firewal... | [
-0.015360389836132526,
-0.020283902063965797,
-0.019355883821845055,
0.013708574697375298,
0.036284517496824265,
0.00007631684275111184,
0.05507737770676613,
0.02044699899852276,
-0.005838713143020868,
-0.0357290580868721,
-0.02959289401769638,
-0.02453853189945221,
-0.06299051642417908,
0... | {
"azure_component": "security",
"chunk_index": 143,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "132",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
If your organization uses a public IP address range for private networks, Azure Firewall
will SNAT the traffic to one of the firewall private IP addresses in AzureFirewallSubnet.
You can configure Azure Firewall to not SNAT your public IP address range. For more
information, see Azure Firewall SNAT private IP address r... | [
0.017093293368816376,
-0.016375772655010223,
-0.014954707585275173,
-0.016365351155400276,
0.034285567700862885,
0.014630078338086605,
0.03444827347993851,
0.013443215750157833,
-0.006806431338191032,
-0.03828397020697594,
-0.017796428874135017,
-0.029603447765111923,
-0.060314301401376724,
... | {
"azure_component": "security",
"chunk_index": 144,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "133",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For more information, see Tutorial: Monitor Azure Firewall logs and metrics.
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You
can use it to create rich visual reports within the Azure portal. For more information, see
Monitor logs using Azure Firewall Workbook.
You can configure ... | [
-0.004598142113536596,
0.014040302485227585,
0.0008470697794109583,
-0.015801556408405304,
0.074888214468956,
-0.03219373896718025,
0.05227915570139885,
0.008236316032707691,
0.006525615230202675,
-0.059881988912820816,
-0.044845547527074814,
-0.02725619450211525,
-0.08274027705192566,
0.0... | {
"azure_component": "security",
"chunk_index": 145,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "134",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Feedback
Was this page helpful?
Provide product feedback
| Get help at Microsoft Q&A
collection that denies Social networking with priority 200. This creates the exception for
the predefined Social networking web category.
Azure Firewall is Payment Card Industry (PCI), Service Organization Controls (SOC), and
Internat... | [
-0.029162844642996788,
-0.01245588343590498,
0.03499668836593628,
0.023091886192560196,
0.01915690489113331,
-0.014933989383280277,
0.032745733857154846,
0.011502216570079327,
0.00871790386736393,
-0.013040690682828426,
-0.015449955128133297,
-0.03018168732523918,
-0.0468275211751461,
0.04... | {
"azure_component": "security",
"chunk_index": 146,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "135",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Tutorial: Deploy and configure Azure
Firewall and policy using the Azure
portal
Article • 06/06/2024
Controlling outbound network access is an important part of an overall network security
plan. For example, you may want to limit access to web sites. Or, you may want to limit
the outbound IP addresses and ports that ca... | [
-0.01759357564151287,
-0.012882680632174015,
0.014170973561704159,
-0.01255633495748043,
0.06697746366262436,
-0.0348963662981987,
0.034678250551223755,
-0.02018432319164276,
0.0027689975686371326,
-0.04063469171524048,
-0.05079913139343262,
-0.04997219145298004,
-0.057788051664829254,
0.0... | {
"azure_component": "security",
"chunk_index": 147,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "136",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
For production deployments, a hub and spoke model is recommended, where the
firewall is in its own VNet. The workload servers are in peered VNets in the same region
with one or more subnets.
In this tutorial, you learn how to:
If you prefer, you can complete this procedure using Azure PowerShell.
If you don't have an A... | [
0.026533957570791245,
-0.019206544384360313,
0.039930928498506546,
0.04119517281651497,
0.06439731270074844,
0.01720786839723587,
0.049142368137836456,
0.02470570243895054,
0.010809139348566532,
-0.040646087378263474,
-0.04164741560816765,
-0.017523523420095444,
-0.059729523956775665,
0.01... | {
"azure_component": "security",
"chunk_index": 148,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "137",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Region
Select a region. All other resources that you create must be in the same
region.
3. Select Review + create.
4. Select Create.
This VNet will have two subnets.
1. On the Azure portal menu or from the Home page, select Create a resource.
2. Select Networking.
3. Search for Virtual network and select ... | [
0.015240057371556759,
-0.01421364489942789,
0.014328842982649803,
0.020649848505854607,
0.07851212471723557,
0.05100898817181587,
0.04911811649799347,
0.00493126455694437,
0.009398226626217365,
-0.0811261236667633,
-0.034601788967847824,
-0.01384884025901556,
-0.06726579368114471,
0.014652... | {
"azure_component": "security",
"chunk_index": 149,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "138",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
9. On the Edit subnet page, for Subnet purpose, select Azure Firewall.
The firewall will be in this subnet, and the subnet name must be
AzureFirewallSubnet.
10. For Starting address, type 10.0.1.0.
11. Select Save.
Next, create a subnet for the workload server.
1. Select Add subnet.
2. For Subnet name, type Workload-SN... | [
0.017938850447535515,
-0.014403006993234158,
-0.012158636003732681,
-0.014855784364044666,
0.07581782341003418,
0.03290347009897232,
0.040731772780418396,
-0.0030748711433261633,
0.0011794553138315678,
-0.041045814752578735,
-0.011223560199141502,
-0.03744950518012047,
-0.05767577514052391,
... | {
"azure_component": "security",
"chunk_index": 150,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "139",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
6. Accept the disk defaults and select Next: Networking.
7. Make sure that Test-FW-VN is selected for the virtual network and the subnet is
Workload-SN.
8. For Public IP, select None.
9. Accept the other defaults and select Next: Management.
10. Select Next:Monitoring.
11. Select Disable to disable boot diagnostics. Ac... | [
0.023322245106101036,
0.021267078816890717,
0.0187829677015543,
0.007776367012411356,
0.07016035914421082,
0.024612460285425186,
0.055202580988407135,
0.008994475938379765,
0.01298186369240284,
-0.0656217485666275,
-0.019067199900746346,
0.012455853633582592,
-0.055660855025053024,
0.00227... | {
"azure_component": "security",
"chunk_index": 151,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "140",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Setting
Value
Choose a virtual network
Select Use existing, and then select Test-FW-VN.
Public IP address
Select Add new, and enter fw-pip for the Name.
5. Accept the other default values, then select Next: Tags.
6. Select Next : Review + create.
7. Review the summary, and then select Create to create the firewall.
Thi... | [
0.03774784877896309,
0.016646547242999077,
0.019959988072514534,
0.013419603928923607,
0.07565314322710037,
0.04394448176026344,
0.03789452835917473,
0.013072498142719269,
0.021452227607369423,
-0.06910886615514755,
-0.028192788362503052,
0.0059250579215586185,
-0.07059396058320999,
0.0038... | {
"azure_component": "security",
"chunk_index": 152,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": true,
"service_name": "Azure Firewall",
"source": "141",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
After deployment completes, select Go to resource.
1. On the Firewall-route page, under Settings, select Subnets and then select
Associate.
2. For Virtual network select Test-FW-VN.
3. For Subnet, select Workload-SN.
4. Select OK.
5. Select Routes and then select Add.
6. For Route name, enter fw-dg.
7. For Destination ... | [
0.02534424141049385,
0.02217833511531353,
0.013369807042181492,
0.0041511631570756435,
0.06863532960414886,
0.02120213396847248,
0.060184720903635025,
0.009473749436438084,
0.0026137393433600664,
-0.06779331713914871,
-0.00434383237734437,
-0.031352635473012924,
-0.06980989128351212,
0.011... | {
"azure_component": "security",
"chunk_index": 153,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "142",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
13. Select Add.
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are
allowed by default. These FQDNs are specific for the platform and can't be used for
other purposes. For more information, see Infrastructure FQDNs.
This is the network rule that allows outbound access to two IP addresse... | [
0.007617437746375799,
-0.0054174261167645454,
-0.011705891229212284,
-0.014572271145880222,
0.08162498474121094,
-0.016424626111984253,
0.03479525074362755,
-0.023961124941706657,
0.0039192382246255875,
-0.0544896237552166,
-0.012428457848727703,
-0.007722768932580948,
-0.08790389448404312,
... | {
"azure_component": "security",
"chunk_index": 154,
"contains_sku": true,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "143",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
10. For Destination Ports, enter 3389.
11. For Destination, enter the firewall public IP address.
12. For Translated type, select IP Address.
13. For Translated address, enter the Srv-work private IP address.
14. For Translated port, enter 3389.
15. Select Add.
For testing purposes in this tutorial, configure the serve... | [
-0.01660769060254097,
0.017930934205651283,
-0.007979512214660645,
-0.004844141658395529,
0.06345490366220474,
0.04086644947528839,
0.06367654353380203,
-0.002547097159549594,
0.037179138511419296,
-0.05058863386511803,
0.0042841797694563866,
-0.01767093688249588,
-0.07477455586194992,
0.0... | {
"azure_component": "security",
"chunk_index": 155,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "144",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
You can resolve DNS names using the configured external DNS server.
You can keep your firewall resources for the next tutorial, or if no longer needed, delete
the Test-FW-RG resource group to delete all firewall-related resources.
Clean up resources
Next steps
Deploy and configure Azure Firewall Premium | [
-0.011431967839598656,
0.019335713237524033,
0.010087867267429829,
0.04976436123251915,
0.06398450583219528,
0.04963618516921997,
0.020897967740893364,
-0.030582748353481293,
0.02878607250750065,
-0.03988529369235039,
-0.018130244687199593,
0.019563782960176468,
-0.08367076516151428,
0.031... | {
"azure_component": "security",
"chunk_index": 156,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "145",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Deploy and configure Azure Firewall
using Azure PowerShell
Article • 02/20/2024
Controlling outbound network access is an important part of an overall network security
plan. For example, you may want to limit access to web sites. Or, you may want to limit
the outbound IP addresses and ports that can be accessed.
One wa... | [
-0.04060397297143936,
-0.004358361940830946,
0.01363938394933939,
-0.010361487045884132,
0.0625324696302414,
-0.03377882391214371,
0.038577090948820114,
-0.00427254056558013,
0.005707878153771162,
-0.03476979210972786,
-0.07481653988361359,
-0.032384227961301804,
-0.05890919640660286,
0.01... | {
"azure_component": "security",
"chunk_index": 157,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "146",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
In this article, you learn how to:
Set up a test network environment
Deploy a firewall
Create a default route
Configure an application rule to allow access to www.google.com
Configure a network rule to allow access to external DNS servers
Test the firewall
If you prefer, you can complete this procedure using the Azure ... | [
0.013728882186114788,
0.006410337518900633,
0.012329494580626488,
0.03282298147678375,
0.07981307059526443,
-0.004805892705917358,
0.038912929594516754,
0.016926594078540802,
0.03643172234296799,
-0.04543047770857811,
-0.014674189500510693,
0.006945508532226086,
-0.06760671734809875,
0.004... | {
"azure_component": "security",
"chunk_index": 158,
"contains_sku": false,
"document_title": "Azure Firewall",
"file_path": "./azure_docs\\Azure Firewall.pdf",
"is_summary": false,
"service_name": "Azure Firewall",
"source": "147",
"source_file": "Azure Firewall.pdf",
"total_pages": 717
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.