You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/firewall-faq.yml
+38-73Lines changed: 38 additions & 73 deletions
Original file line number
Diff line number
Diff line change
@@ -17,17 +17,17 @@ sections:
17
17
questions:
18
18
- question: What is Azure Firewall?
19
19
answer: |
20
-
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
20
+
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
21
21
22
22
- question: What capabilities does Azure Firewall support?
23
23
answer: |
24
24
For a detailed list of Azure Firewall features, see [Azure Firewall features](features.md).
25
25
26
26
- question: What is the typical deployment model for Azure Firewall?
27
27
answer: |
28
-
Azure Firewall can be deployed on any virtual network. However, it is typically deployed on a central virtual network in a hub-and-spoke model, with other virtual networks peered to it. The default route from the peered virtual networks is set to point to this central firewall virtual network. While global VNet peering is supported, it is not recommended due to potential performance and latency issues across regions. For optimal performance, deploy one firewall per region.
28
+
Azure Firewall can be deployed on any virtual network. However, it's typically deployed on a central virtual network in a hub-and-spoke model, with other virtual networks peered to it. The default route from the peered virtual networks is set to point to this central firewall virtual network. While global virtual network peering is supported, it isn't recommended due to potential performance and latency issues across regions. For optimal performance, deploy one firewall per region.
29
29
30
-
This model allows centralized control over multiple spoke VNets across different subscriptions and offers cost savings by avoiding the need to deploy a firewall in each VNet. Cost savings should be evaluated against the associated peering costs based on traffic patterns.
30
+
This model allows centralized control over multiple spoke VNets across different subscriptions and offers cost savings by avoiding the need to deploy a firewall in each virtual network. Cost savings should be evaluated against the associated peering costs based on traffic patterns.
31
31
32
32
- question: How can I deploy Azure Firewall?
33
33
answer: |
@@ -50,19 +50,19 @@ sections:
50
50
51
51
- question: How does Azure Firewall differ from NVAs in the marketplace?
52
52
answer: |
53
-
Azure Firewall is a managed, cloud-based network security service that protects virtual network resources. It is a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. It is pre-integrated with third-party security-as-a-service (SECaaS) providers to enhance security for virtual network and branch Internet connections. For more details, see [Azure network security](../networking/security/index.yml).
53
+
Azure Firewall is a managed, cloud-based network security service that protects virtual network resources. It's a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. It's preintegrated with third-party security-as-a-service (SECaaS) providers to enhance security for virtual network and branch Internet connections. For more information, see [Azure network security](../networking/security/index.yml).
54
54
55
55
- question: What is the difference between Application Gateway WAF and Azure Firewall?
56
56
answer: |
57
-
Application Gateway WAF provides centralized inbound protection for web applications against common exploits and vulnerabilities. Azure Firewall provides inbound protection for non-HTTP/S protocols (e.g., RDP, SSH, FTP), outbound network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.
57
+
Application Gateway WAF provides centralized inbound protection for web applications against common exploits and vulnerabilities. Azure Firewall provides inbound protection for non-HTTP/S protocols (for example, RDP, SSH, FTP), outbound network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.
58
58
59
59
- question: How does Azure Firewall complement Network Security Groups (NSGs)?
60
60
answer: |
61
61
Azure Firewall complements NSGs to provide better "defense-in-depth" network security. NSGs offer distributed network layer traffic filtering to limit traffic within virtual networks in each subscription. Azure Firewall provides centralized, fully stateful network and application-level protection across subscriptions and virtual networks.
62
62
63
63
- question: Are NSGs supported on the AzureFirewallSubnet?
64
64
answer: |
65
-
Azure Firewall is a managed service with multiple protection layers, including platform protection with NIC-level NSGs (not viewable). Subnet-level NSGs are not required on the AzureFirewallSubnet and are disabled to prevent service interruptions.
65
+
Azure Firewall is a managed service with multiple protection layers, including platform protection with NIC-level NSGs (not viewable). Subnet-level NSGs aren't required on the AzureFirewallSubnet and are disabled to prevent service interruptions.
66
66
67
67
- question: What is the pricing for Azure Firewall?
68
68
answer: |
@@ -74,11 +74,11 @@ sections:
74
74
75
75
- question: Where does Azure Firewall store customer data?
76
76
answer: |
77
-
Azure Firewall does not move or store customer data outside the region where it is deployed.
77
+
Azure Firewall doesn't move or store customer data outside the region where it's deployed.
78
78
79
79
- question: Is Azure Firewall in secured virtual hubs (vWAN) supported in Qatar?
80
80
answer: |
81
-
No, Azure Firewall in secured virtual hubs (vWAN) is not currently supported in Qatar.
81
+
No, Azure Firewall in secured virtual hubs (vWAN) isn't currently supported in Qatar.
82
82
83
83
- name: Supported capabilities and features
84
84
questions:
@@ -98,7 +98,7 @@ sections:
98
98
99
99
- question: Does Azure Firewall support BGP peering?
100
100
answer: |
101
-
No, Azure Firewall doesn't natively support BGP peering. However, the [Auto-learn SNAT routes feature](../firewall/snat-private-range.md#auto-learn-snat-routes-preview) indirectly leverages BGP through Azure Route Server.
101
+
No, Azure Firewall doesn't natively support BGP peering. However, the [Autolearn SNAT routes feature](../firewall/snat-private-range.md#auto-learn-snat-routes-preview) indirectly uses BGP through Azure Route Server.
102
102
103
103
- name: Management and configuration
104
104
questions:
@@ -153,12 +153,12 @@ sections:
153
153
```
154
154
155
155
> [!NOTE]
156
-
> When stopping and starting the firewall, billing stops and starts accordingly. However, the private IP address may change, which can affect connectivity if route tables are configured.
156
+
> When stopping and starting the firewall, billing stops and starts accordingly. However, the private IP address might change, which can affect connectivity if route tables are configured.
157
157
158
158
- question: How can I configure availability zones after deployment?
159
159
answer: |
160
160
It's recommended to configure availability zones during initial deployment. However, you can reconfigure them after deployment if:
161
-
- The firewall is deployed in a VNet (not supported in secured virtual hubs).
161
+
- The firewall is deployed in a virtual network (not supported in secured virtual hubs).
162
162
- The region supports availability zones.
163
163
- All attached public IP addresses are configured with the same zones.
164
164
@@ -180,16 +180,16 @@ sections:
180
180
Set-AzFirewall -AzureFirewall $azfw
181
181
```
182
182
183
-
- question: Are there any firewall resource group restrictions?
183
+
- question: Are there any Azure firewall resource group restrictions?
184
184
answer: |
185
185
Yes:
186
-
- The firewall and VNet must be in the same resource group.
186
+
- The Azure Firewall and virtual network must be in the same resource group.
187
187
- The public IP address can be in a different resource group.
188
-
- All resources (firewall, VNet, public IP) must be in the same subscription.
188
+
- All resources (Azure firewall, virtual network, public IP) must be in the same subscription.
189
189
190
190
- question: What does provisioning state **Failed** mean?
191
191
answer: |
192
-
A **Failed** provisioning state indicates that a configuration update failed on one or more backend instances. The firewall remains operational, but the configuration may be inconsistent. Retry the update until the provisioning state changes to **Succeeded**.
192
+
A **Failed** provisioning state indicates that a configuration update failed on one or more backend instances. The Azure Firewall remains operational, but the configuration might be inconsistent. Retry the update until the provisioning state changes to **Succeeded**.
193
193
194
194
- question: How does Azure Firewall handle planned maintenance and unplanned failures?
195
195
answer: |
@@ -201,7 +201,7 @@ sections:
201
201
202
202
- question: Why does Azure Firewall need a /26 subnet size?
203
203
answer: |
204
-
A /26 subnet ensures sufficient IP addresses for scaling as the firewall provisions additional virtual machine instances.
204
+
A /26 subnet ensures sufficient IP addresses for scaling as the Azure Firewall provisions extra virtual machine instances.
205
205
206
206
- question: Does the firewall subnet size need to change as the service scales?
207
207
answer: |
@@ -215,6 +215,24 @@ sections:
215
215
answer: |
216
216
Yes. For details, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
217
217
218
+
- question: Can I move an IP Group to another resource group?
219
+
answer: |
220
+
No, moving an IP Group to another resource group isn't currently supported.
221
+
222
+
- question: What is the TCP Idle Timeout for Azure Firewall?
223
+
answer: |
224
+
A standard behavior of a network firewall is to ensure TCP connections are kept alive and to promptly close them if there's no activity. Azure Firewall TCP Idle Timeout is four minutes. This setting isn't user configurable, but you can contact Azure Support to increase the Idle Timeout for inbound and outbound connections up to 15 minutes. Idle Timeout for east-west traffic can't be changed.
225
+
226
+
If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained. A common practice is to use a TCP keep-alive. This practice keeps the connection active for a longer period. For more information, see the [.NET examples](/dotnet/api/system.net.servicepoint.settcpkeepalive).
227
+
228
+
- question: Can I deploy Azure Firewall without a public IP address?
229
+
answer: |
230
+
Yes, but you must configure the firewall in Forced Tunneling Mode. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. This public IP address is for management traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
231
+
232
+
- question: Is there a way to automatically back up Azure Firewall and policies?
233
+
answer: |
234
+
Yes. For more information, see [Backup Azure Firewall and Azure Firewall Policy with Logic Apps](https://techcommunity.microsoft.com/t5/azure-network-security-blog/backup-azure-firewall-and-azure-firewall-policy-with-logic-apps/ba-p/3613928).
235
+
218
236
- name: Connectivity and routing
219
237
questions:
220
238
@@ -228,7 +246,7 @@ sections:
228
246
229
247
- question: Can Azure Firewall forward and filter network traffic between subnets in the same virtual network or peered virtual networks?
230
248
answer: |
231
-
Yes. However, configuring the UDRs to redirect traffic between subnets in the same VNET requires more attention. While using the VNET address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **VNET**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which don't require UDRs.
249
+
Yes. However, configuring the UDRs to redirect traffic between subnets in the same virtual network requires more attention. While using the virtual network address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **virtual network**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which don't require UDRs.
232
250
233
251
- question: Does Azure Firewall outbound SNAT between private networks?
234
252
answer: |
@@ -271,23 +289,9 @@ sections:
271
289
| TargetFQDN | `www.contoso.*` | No | |
272
290
| TargetFQDN | `*.contoso.*` | No | |
273
291
274
-
- question: Can I move an IP Group to another resource group?
275
-
answer: |
276
-
No, moving an IP Group to another resource group isn't currently supported.
277
-
278
-
- question: What is the TCP Idle Timeout for Azure Firewall?
279
-
answer: |
280
-
A standard behavior of a network firewall is to ensure TCP connections are kept alive and to promptly close them if there's no activity. Azure Firewall TCP Idle Timeout is four minutes. This setting isn't user configurable, but you can contact Azure Support to increase the Idle Timeout for inbound and outbound connections up to 15 minutes. Idle Timeout for east-west traffic can't be changed.
281
-
282
-
If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained. A common practice is to use a TCP keep-alive. This practice keeps the connection active for a longer period. For more information, see the [.NET examples](/dotnet/api/system.net.servicepoint.settcpkeepalive).
283
-
284
-
- question: Can I deploy Azure Firewall without a public IP address?
285
-
answer: |
286
-
Yes, but you must configure the firewall in Forced Tunneling Mode. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. This public IP address is for management traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
287
-
288
-
- question: Is there a way to automatically back up Azure Firewall and policies?
292
+
- question: Does Azure Firewall allow access to Active Directory by default?
289
293
answer: |
290
-
Yes. For more information, see [Backup Azure Firewall and Azure Firewall Policy with Logic Apps](https://techcommunity.microsoft.com/t5/azure-network-security-blog/backup-azure-firewall-and-azure-firewall-policy-with-logic-apps/ba-p/3613928).
294
+
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
291
295
292
296
- question: Can I exclude an FQDN or an IP address from Azure Firewall Threat Intelligence based filtering?
293
297
answer: |
@@ -341,43 +345,4 @@ sections:
341
345
- question: How does Azure Firewall handle idle timeouts?
342
346
answer: |
343
347
When a connection has an Idle Timeout (four minutes of no activity), Azure Firewall gracefully terminates the connection by sending a TCP RST packet.
344
-
345
-
346
-
347
-
348
-
349
-
350
-
351
-
352
-
353
-
354
-
355
-
356
-
357
-
358
-
359
-
360
-
361
-
362
-
363
-
364
-
- question: Does Azure Firewall allow access to Active Directory by default?
365
-
answer: |
366
-
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
367
-
368
-
369
-
370
-
371
-
372
-
373
-
374
-
375
-
376
-
377
-
- question: How many parallel connections can Azure Firewall support?
378
-
answer: |
379
-
Azure Firewall uses Azure Virtual Machines underneath that have a [hard limit number of connections](/azure/virtual-network/virtual-machine-network-throughput#flow-limits-and-active-connections-recommendations). The total number of active connections per virtual machine is 250k.
380
-
381
-
The total limit per firewall is the virtual machine connection limit (250k) x the number of virtual machines in the firewall backend pool. Azure Firewall starts with two virtual machines and scales out based on CPU usage and throughput.
0 commit comments