You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/rule-processing.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,12 +13,13 @@ ms.author: victorh
13
13
You can configure NAT rules, network rules, and applications rules on Azure Firewall. The rules are processed according to the rule type.
14
14
15
15
> [!NOTE]
16
-
> If you have enabled threat intelligence-based filtering, those rules are highest priority and are always processed first. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
16
+
> If you enable threat intelligence-based filtering, those rules are highest priority and are always processed first. Threat-intelligence filtering may deny traffic before any configured rules are processed. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
17
17
18
18
## Outbound
19
19
20
-
### Network rules and applications rules
21
-
If you have configured network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP/HTTPS, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
20
+
### Network rules and applications rules
21
+
22
+
If you configure network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP,HTTPS, or MSSQL, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
22
23
23
24
## Inbound
24
25
@@ -59,7 +60,7 @@ The connection to google.com is allowed because the packet matches the *Allow-we
59
60
60
61
### Example 2
61
62
62
-
Web traffic is denied because a higher priority *Deny* network rule collection blocks it.
63
+
SSH traffic is denied because a higher priority *Deny* network rule collection blocks it.
63
64
64
65
**Network rule collection 1**
65
66
@@ -69,7 +70,7 @@ Web traffic is denied because a higher priority *Deny* network rule collection b
69
70
70
71
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
0 commit comments