Skip to content

Commit 1a260c8

Browse files
authored
Merge pull request #230726 from MicrosoftDocs/release-ga-azure-firewall-basic
Release ga azure firewall basic--scheduled release at 10AM of 3/15
2 parents 0a1c696 + 31e1220 commit 1a260c8

File tree

7 files changed

+135
-72
lines changed

7 files changed

+135
-72
lines changed

articles/firewall/basic-features.md

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
---
2+
title: Azure Firewall Basic features
3+
description: Learn about Azure Firewall Basic features
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: conceptual
8+
ms.date: 03/15/2023
9+
ms.author: victorh
10+
---
11+
12+
# Azure Firewall Basic features
13+
14+
[Azure Firewall](overview.md) Basic is a managed, cloud-based network security service that protects your Azure Virtual Network resources.
15+
16+
:::image type="content" source="media/overview/firewall-basic-diagram.png" alt-text="Diagram showing Firewall Basic.":::
17+
18+
Azure Firewall Basic includes the following features:
19+
- Built-in high availability
20+
- Availability Zones
21+
- Application FQDN filtering rules
22+
- Network traffic filtering rules
23+
- FQDN tags
24+
- Service tags
25+
- Threat intelligence in alert mode
26+
- Outbound SNAT support
27+
- Inbound DNAT support
28+
- Multiple public IP addresses
29+
- Azure Monitor logging
30+
- Certifications
31+
32+
## Built-in high availability
33+
34+
High availability is built in, so no extra load balancers are required and there's nothing you need to configure.
35+
36+
## Availability Zones
37+
38+
Azure Firewall can be configured during deployment to span multiple Availability Zones for increased availability. You can also associate Azure Firewall to a specific zone for proximity reasons. For more information on availability, see the Azure Firewall [Service Level Agreement (SLA)](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1).
39+
40+
There's no extra cost for a firewall deployed in more than one Availability Zone. However, there are added costs for inbound and outbound data transfers associated with Availability Zones. For more information, see [Bandwidth pricing details](https://azure.microsoft.com/pricing/details/bandwidth/).
41+
42+
Azure Firewall Availability Zones are available in regions that support Availability Zones. For more information, see [Regions that support Availability Zones in Azure](../reliability/availability-zones-service-support.md).
43+
44+
## Application FQDN filtering rules
45+
46+
You can limit outbound HTTP/S traffic or Azure SQL traffic to a specified list of fully qualified domain names (FQDN) including wild cards. This feature doesn't require TLS termination.
47+
48+
## Network traffic filtering rules
49+
50+
You can centrally create allow or deny network filtering rules by source and destination IP address, port, and protocol. Azure Firewall is fully stateful, so it can distinguish legitimate packets for different types of connections. Rules are enforced and logged across multiple subscriptions and virtual networks.
51+
52+
Azure Firewall supports stateful filtering of Layer 3 and Layer 4 network protocols. Layer 3 IP protocols can be filtered by selecting Any protocol in the Network rule and select the wild-card * for the port.
53+
54+
## FQDN tags
55+
56+
[FQDN tags](fqdn-tags.md) make it easy for you to allow well-known Azure service network traffic through your firewall. For example, say you want to allow Windows Update network traffic through your firewall. You create an application rule and include the Windows Update tag. Now network traffic from Windows Update can flow through your firewall.
57+
58+
## Service tags
59+
60+
A [service tag](service-tags.md) represents a group of IP address prefixes to help minimize complexity for security rule creation. You can't create your own service tag, nor specify which IP addresses are included within a tag. Microsoft manages the address prefixes encompassed by the service tag, and automatically updates the service tag as addresses change.
61+
62+
## Threat intelligence
63+
64+
[Threat intelligence-based filtering](threat-intel.md) can be enabled for your firewall to alert traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed.
65+
66+
## Outbound SNAT support
67+
68+
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation). You can identify and allow traffic originating from your virtual network to remote Internet destinations. Azure Firewall doesn't SNAT when the destination IP is a private IP range per [IANA RFC 1918](https://www.rfc-editor.org/rfc/rfc1918).
69+
70+
If your organization uses a public IP address range for private networks, Azure Firewall will SNAT the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to not SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
71+
72+
You can monitor SNAT port utilization in Azure Firewall metrics. Learn more and see our recommendation on SNAT port utilization in our [firewall logs and metrics documentation](logs-and-metrics.md#metrics).
73+
74+
## Inbound DNAT support
75+
76+
Inbound Internet network traffic to your firewall public IP address is translated (Destination Network Address Translation) and filtered to the private IP addresses on your virtual networks.
77+
78+
## Multiple public IP addresses
79+
80+
You can associate [multiple public IP addresses](deploy-multi-public-ip-powershell.md) with your firewall.
81+
82+
This enables the following scenarios:
83+
84+
- DNAT - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
85+
- SNAT - More ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
86+
87+
## Azure Monitor logging
88+
89+
All events are integrated with Azure Monitor, allowing you to archive logs to a storage account, stream events to your event hub, or send them to Azure Monitor logs. For Azure Monitor log samples, see [Azure Monitor logs for Azure Firewall](firewall-workbook.md).
90+
91+
For more information, see [Tutorial: Monitor Azure Firewall logs and metrics](firewall-diagnostics.md).
92+
93+
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis. You can use it to create rich visual reports within the Azure portal. For more information, see [Monitor logs using Azure Firewall Workbook](firewall-workbook.md).
94+
95+
## Certifications
96+
97+
Azure Firewall is Payment Card Industry (PCI), Service Organization Controls (SOC), and International Organization for Standardization (ISO) compliant. For more information, see [Azure Firewall compliance certifications](compliance-certifications.md).
98+
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Choosing the right Azure Firewall SKU to meet your needs
3+
description: Learn about the different Azure Firewall SKUs and how to choose the right one for your needs.
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: conceptual
8+
ms.date: 03/15/2023
9+
ms.author: victorh
10+
---
11+
12+
# Choosing the right Azure Firewall SKU to meet your needs
13+
14+
Azure Firewall now supports three different SKUs to cater to a wide range of customer use cases and preferences.
15+
16+
- Azure Firewall Premium is recommended to secure highly sensitive applications (such as payment processing). It supports advanced threat protection capabilities like malware and TLS inspection.
17+
- Azure Firewall Standard is recommended for customers looking for Layer 3–Layer 7 firewall and needs auto-scaling to handle peak traffic periods of up to 30 Gbps. It supports enterprise features like threat intelligence, DNS proxy, custom DNS, and web categories.
18+
- Azure Firewall Basic is recommended for SMB customers with throughput needs of 250 Mbps.
19+
- Let’s take a closer look at the features across the three Azure Firewall SKUs.
20+
21+
:::image type="content" source="media/choose-firewall-sku/azure-firewall-sku-table.png" alt-text="Table of Azure Firewall Sku features." lightbox="media/choose-firewall-sku/azure-firewall-sku-table-large.png":::

articles/firewall/deploy-firewall-basic-portal-policy.md

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Deploy & configure Azure Firewall Basic (preview) and policy using the Azure portal'
3-
description: In this how-to, you learn how to deploy and configure Azure Firewall Basic (preview) and policy rules using the Azure portal.
2+
title: 'Deploy & configure Azure Firewall Basic and policy using the Azure portal'
3+
description: In this how-to, you learn how to deploy and configure Azure Firewall Basic and policy rules using the Azure portal.
44
services: firewall
55
author: vhorne
66
ms.service: firewall
@@ -11,11 +11,7 @@ ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
1212
---
1313

14-
# Deploy and configure Azure Firewall Basic (preview) and policy using the Azure portal
15-
16-
> [!IMPORTANT]
17-
> Azure Firewall Basic is currently in PREVIEW.
18-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
14+
# Deploy and configure Azure Firewall Basic and policy using the Azure portal
1915

2016
Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is recommended to deploy the [Standard SKU](tutorial-firewall-deploy-portal-policy.md) for environments with more than 250 Mbps throughput requirements and the [Premium SKU](premium-portal.md) for advanced threat protection.
2117

@@ -35,6 +31,9 @@ For this how-to, you create a simplified single VNet with three subnets for easy
3531
* **AzureFirewallManagementSubnet** - for service management traffic.
3632
* **Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
3733

34+
> [!NOTE]
35+
> As the Azure Firewall Basic has limited traffic compared to the Azure Firewall Standard or Premium SKU, it requires the **AzureFirewallManagementSubnet** to separate customer traffic from Microsoft management traffic to ensure no disruptions on it. This management traffic is needed for updates and health metrics communication that occurs automatically to and from Microsoft only. No other connections are allowed on this IP.
36+
3837
For production deployments, a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) is recommended, where the firewall is in its own VNet. The workload servers are in peered VNets in the same region with one or more subnets.
3938

4039
In this how-to, you learn how to:
@@ -54,17 +53,6 @@ If you prefer, you can complete this procedure using [Azure PowerShell](deploy-p
5453

5554
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
5655

57-
### Enable Firewall Basic
58-
59-
For the preview, you must enable the Firewall Basic feature on your subscription.
60-
61-
```azurepowershell
62-
Connect-AzAccount
63-
Select-AzSubscription -Subscription "subscription_id or subscription_name"
64-
Register-AzProviderFeature -FeatureName AzureFirewallBasic -ProviderNamespace Microsoft.Network
65-
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
66-
```
67-
6856
## Create a resource group
6957

7058
The resource group contains all the resources for the how-to.
@@ -92,7 +80,7 @@ Deploy the firewall and create associated network infrastructure.
9280
|Resource group |**Test-FW-RG** |
9381
|Name |**Test-FW01**|
9482
|Region |Select the same location that you used previously|
95-
|Firewall Tier|**Basic (Preview)**|
83+
|Firewall Tier|**Basic**|
9684
|Firewall management|**Use a Firewall Policy to manage this firewall**|
9785
|Firewall policy|**Add new**:<br>**fw-test-pol**<br>Your selected region<br>Policy tier should default to **Basic**
9886
|Choose a virtual network |**Create new**<br> Name: **Test-FW-VN**<br>Address space: **10.0.0.0/16**<br>Subnet address space: **10.0.0.0/26**|
432 KB
Loading
78.4 KB
Loading

articles/firewall/overview.md

Lines changed: 5 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -37,66 +37,18 @@ To learn about Firewall Standard features, see [Azure Firewall Standard features
3737

3838
To learn about Firewall Premium features, see [Azure Firewall Premium features](premium-features.md).
3939

40-
## Azure Firewall Basic (preview)
41-
42-
> [!IMPORTANT]
43-
> Azure Firewall Basic is currently in PREVIEW.
44-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
40+
## Azure Firewall Basic
4541

4642
Azure Firewall Basic is intended for small and medium size (SMB) customers to secure their Azure cloud
4743
environments. It provides the essential protection SMB customers need at an affordable price point.
4844

4945
:::image type="content" source="media/overview/firewall-basic-diagram.png" alt-text="Diagram showing Firewall Basic.":::
5046

51-
Azure Firewall Basic is similar to Firewall Standard, but has the following limitations:
47+
Azure Firewall Basic is similar to Firewall Standard, but has the following main limitations:
5248

5349
- Supports Threat Intel *alert mode* only.
5450
- Fixed scale unit to run the service on two virtual machine backend instances.
55-
- Recommended for environments with maximum throughput of 250 Mbps. The throughput may increase for feature general availability (GA).
56-
57-
### Supported regions
58-
59-
Azure Firewall Basic is available in the following regions during the preview:
60-
61-
- East US
62-
- East US 2
63-
- West US
64-
- West US 2
65-
- West US 3
66-
- Central US
67-
- North Central US
68-
- South Central US
69-
- West Central US
70-
- East US 2 EUAP
71-
- Central US EUAP
72-
- North Europe
73-
- West Europe
74-
- East Asia
75-
- Southeast Asia
76-
- Japan East
77-
- Japan West
78-
- Australia East
79-
- Australia Southeast
80-
- Australia Central
81-
- Brazil South
82-
- South India
83-
- Central India
84-
- West India
85-
- Canada Central
86-
- Canada East
87-
- UK South
88-
- UK West
89-
- Korea Central
90-
- Korea South
91-
- France Central
92-
- South Africa North
93-
- UAE North
94-
- Switzerland North
95-
- Germany West Central
96-
- Norway East
97-
- Jio India West
98-
- Sweden Central
99-
- Qatar Central
51+
- Recommended for environments with an estimated throughput of 250 Mbps.
10052

10153
To deploy a Basic Firewall, see [Deploy and configure Azure Firewall Basic (preview) and policy using the Azure portal](deploy-firewall-basic-portal-policy.md).
10254

@@ -153,11 +105,11 @@ Azure Firewall Standard has the following known issues:
153105
|NAT rules with ports between 64000 and 65535 are unsupported|Azure Firewall allows any port in the 1-65535 range in network and application rules, however NAT rules only support ports in the 1-63999 range.|This is a current limitation.
154106
|Configuration updates may take five minutes on average|An Azure Firewall configuration update can take three to five minutes on average, and parallel updates aren't supported.|A fix is being investigated.|
155107
|Azure Firewall uses SNI TLS headers to filter HTTPS and MSSQL traffic|If browser or server software doesn't support the Server Name Indicator (SNI) extension, you can't connect through Azure Firewall.|If browser or server software doesn't support SNI, then you may be able to control the connection using a network rule instead of an application rule. See [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication) for software that supports SNI.|
156-
|Can't add firewall policy tags using the portal or Azure Resource Manager (ARM) templates|Azure Firewall Policy has a patch support limitation that prevents you from adding a tag using the Azure portal or ARM templates. The following error is generated: *Could not save the tags for the resource*.|A fix is being investigated. Or, you can use the Azure PowerShell cmdlet `Set-AzFirewallPolicy` to update tags.|
108+
|Can't add firewall policy tags using the portal or Azure Resource Manager (ARM) templates|Azure Firewall Policy has a patch support limitation that prevents you from adding a tag using the Azure portal or ARM templates. The following error is generated: *Couldn't save the tags for the resource*.|A fix is being investigated. Or, you can use the Azure PowerShell cmdlet `Set-AzFirewallPolicy` to update tags.|
157109
|IPv6 not currently supported|If you add an IPv6 address to a rule, the firewall fails.|Use only IPv4 addresses. IPv6 support is under investigation.|
158110
|Updating multiple IP Groups fails with conflict error.|When you update two or more IP Groups attached to the same firewall, one of the resources goes into a failed state.|This is a known issue/limitation. <br><br>When you update an IP Group, it triggers an update on all firewalls that the IPGroup is attached to. If an update to a second IP Group is started while the firewall is still in the *Updating* state, then the IPGroup update fails.<br><br>To avoid the failure, IP Groups attached to the same firewall must be updated one at a time. Allow enough time between updates to allow the firewall to get out of the *Updating* state.|
159111
|Removing RuleCollectionGroups using ARM templates not supported.|Removing a RuleCollectionGroup using ARM templates isn't supported and results in failure.|This isn't a supported operation.|
160-
|DNAT rule for allow *any* (*) will SNAT traffic.|If a DNAT rule allows *any* (*) as the Source IP address, then an implicit Network rule will match VNet-VNet traffic and will always SNAT the traffic.|This is a current limitation.|
112+
|DNAT rule for allow *any* (*) will SNAT traffic.|If a DNAT rule allows *any* (*) as the Source IP address, then an implicit Network rule matches VNet-VNet traffic and will always SNAT the traffic.|This is a current limitation.|
161113
|Adding a DNAT rule to a secured virtual hub with a security provider isn't supported.|This results in an asynchronous route for the returning DNAT traffic, which goes to the security provider.|Not supported.|
162114
| Error encountered when creating more than 2000 rule collections. | The maximal number of NAT/Application or Network rule collections is 2000 (Resource Manager limit). | This is a current limitation. |
163115
|Unable to see Network Rule Name in Azure Firewall Logs|Azure Firewall network rule log data doesn't show the Rule name for network traffic.|Network rule name logging is in preview. For for information, see [Azure Firewall preview features](firewall-preview.md#network-rule-name-logging-preview).|

articles/firewall/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,16 @@ items:
4747
href: sample-powershell.md
4848
- name: Concepts
4949
items:
50+
- name: Azure Firewall Basic features
51+
href: basic-features.md
5052
- name: Azure Firewall Standard features
5153
href: features.md
5254
- name: Azure Firewall Premium features
5355
href: premium-features.md
5456
- name: Azure Firewall preview features
5557
href: firewall-preview.md
58+
- name: Choose an Azure Firewall SKU
59+
href: choose-firewall-sku.md
5660
- name: IDPS signature rule categories
5761
href: idps-signature-categories.md
5862
- name: Azure Firewall Premium in the portal

0 commit comments

Comments
 (0)