Skip to content

Commit 03792ab

Browse files
authored
Merge pull request #107100 from vhorne/fw-ruleproc
update for rule change behavior
2 parents e26ed28 + ea662bf commit 03792ab

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/firewall/rule-processing.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 02/26/2020
8+
ms.date: 03/10/2020
99
ms.author: victorh
1010
---
1111

@@ -19,15 +19,15 @@ You can configure NAT rules, network rules, and applications rules on Azure Fire
1919

2020
### Network rules and applications rules
2121

22-
If you configure network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP,HTTPS, or MSSQL, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
22+
If you configure network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP, HTTPS, or MSSQL, then the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
2323

2424
## Inbound
2525

2626
### NAT rules
2727

2828
Inbound Internet connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal](tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic.
2929

30-
Application rules are not applied for inbound connections. So if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall?](../web-application-firewall/overview.md)
30+
Application rules aren't applied for inbound connections. So if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall?](../web-application-firewall/overview.md)
3131

3232
## Examples
3333

@@ -86,6 +86,10 @@ SSH traffic is denied because a higher priority *Deny* network rule collection b
8686

8787
SSH connections are denied because a higher priority network rule collection blocks it. Rule processing stops at this point.
8888

89+
## Rule changes
90+
91+
If you change a rule to deny previously allowed traffic, any relevant existing sessions are dropped.
92+
8993
## Next steps
9094

9195
- Learn how to [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md).

0 commit comments

Comments
 (0)