Skip to content

Commit 1f6e818

Browse files
committed
feedback from Yair
1 parent c9c86e5 commit 1f6e818

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

articles/firewall/rule-processing.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,13 @@ ms.author: victorh
1313
You can configure NAT rules, network rules, and applications rules on Azure Firewall. The rules are processed according to the rule type.
1414

1515
> [!NOTE]
16-
> If you have enabled threat intelligence-based filtering, those rules are highest priority and are always processed first. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
16+
> If you enable threat intelligence-based filtering, those rules are highest priority and are always processed first. Threat-intelligence filtering may deny traffic before any configured rules are processed. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
1717
1818
## Outbound
1919

20-
### Network rules and applications rules
21-
If you have configured network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP/HTTPS, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
20+
### Network rules and applications rules
21+
22+
If you configure network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP,HTTPS, or MSSQL, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
2223

2324
## Inbound
2425

@@ -59,7 +60,7 @@ The connection to google.com is allowed because the packet matches the *Allow-we
5960

6061
### Example 2
6162

62-
Web traffic is denied because a higher priority *Deny* network rule collection blocks it.
63+
SSH traffic is denied because a higher priority *Deny* network rule collection blocks it.
6364

6465
**Network rule collection 1**
6566

@@ -69,7 +70,7 @@ Web traffic is denied because a higher priority *Deny* network rule collection b
6970

7071
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
7172
|---------|---------|---------|---------|----------|----------|--------|
72-
|Allow-web |TCP|IP address|*|IP address|*|80,443
73+
|Allow-SSH |TCP|IP address|*|IP address|*|22
7374

7475
**Network rule collection 2**
7576

@@ -79,11 +80,11 @@ Web traffic is denied because a higher priority *Deny* network rule collection b
7980

8081
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
8182
|---------|---------|---------|---------|----------|----------|--------|
82-
|Deny-web |TCP|IP address|*|IP address|*|80,443
83+
|Deny-SSH |TCP|IP address|*|IP address|*|22
8384

8485
**Result**
8586

86-
Connections to web sites are denied because a higher priority network rule collection blocks it. Rule processing stops at this point.
87+
SSH connections are denied because a higher priority network rule collection blocks it. Rule processing stops at this point.
8788

8889
## Next steps
8990

0 commit comments

Comments
 (0)