Skip to content

Commit 0e8224f

Browse files
authored
Merge pull request #109661 from vhorne/fw-faq
update for ping explanation
2 parents 47b9ff7 + b5f44b6 commit 0e8224f

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/firewall/firewall-faq.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 03/25/2020
8+
ms.date: 03/31/2020
99
ms.author: victorh
1010
---
1111

@@ -203,4 +203,8 @@ $fw.ThreatIntelWhitelist.FQDNs = @("fqdn1", "fqdn2", …)
203203
$fw.ThreatIntelWhitelist.IpAddress = @("ip1", "ip2", …)
204204
205205
Set-AzFirewall -AzureFirewall $fw
206-
```
206+
```
207+
208+
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209+
210+
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.

0 commit comments

Comments
 (0)