Skip to content

Commit 234a628

Browse files
committed
acrolinx checks
1 parent 830e1eb commit 234a628

File tree

1 file changed

+38
-73
lines changed

1 file changed

+38
-73
lines changed

articles/firewall/firewall-faq.yml

Lines changed: 38 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@ sections:
1717
questions:
1818
- question: What is Azure Firewall?
1919
answer: |
20-
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
20+
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
2121
2222
- question: What capabilities does Azure Firewall support?
2323
answer: |
2424
For a detailed list of Azure Firewall features, see [Azure Firewall features](features.md).
2525
2626
- question: What is the typical deployment model for Azure Firewall?
2727
answer: |
28-
Azure Firewall can be deployed on any virtual network. However, it is typically deployed on a central virtual network in a hub-and-spoke model, with other virtual networks peered to it. The default route from the peered virtual networks is set to point to this central firewall virtual network. While global VNet peering is supported, it is not recommended due to potential performance and latency issues across regions. For optimal performance, deploy one firewall per region.
28+
Azure Firewall can be deployed on any virtual network. However, it's typically deployed on a central virtual network in a hub-and-spoke model, with other virtual networks peered to it. The default route from the peered virtual networks is set to point to this central firewall virtual network. While global virtual network peering is supported, it isn't recommended due to potential performance and latency issues across regions. For optimal performance, deploy one firewall per region.
2929
30-
This model allows centralized control over multiple spoke VNets across different subscriptions and offers cost savings by avoiding the need to deploy a firewall in each VNet. Cost savings should be evaluated against the associated peering costs based on traffic patterns.
30+
This model allows centralized control over multiple spoke VNets across different subscriptions and offers cost savings by avoiding the need to deploy a firewall in each virtual network. Cost savings should be evaluated against the associated peering costs based on traffic patterns.
3131
3232
- question: How can I deploy Azure Firewall?
3333
answer: |
@@ -50,19 +50,19 @@ sections:
5050
5151
- question: How does Azure Firewall differ from NVAs in the marketplace?
5252
answer: |
53-
Azure Firewall is a managed, cloud-based network security service that protects virtual network resources. It is a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. It is pre-integrated with third-party security-as-a-service (SECaaS) providers to enhance security for virtual network and branch Internet connections. For more details, see [Azure network security](../networking/security/index.yml).
53+
Azure Firewall is a managed, cloud-based network security service that protects virtual network resources. It's a fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability. It's preintegrated with third-party security-as-a-service (SECaaS) providers to enhance security for virtual network and branch Internet connections. For more information, see [Azure network security](../networking/security/index.yml).
5454
5555
- question: What is the difference between Application Gateway WAF and Azure Firewall?
5656
answer: |
57-
Application Gateway WAF provides centralized inbound protection for web applications against common exploits and vulnerabilities. Azure Firewall provides inbound protection for non-HTTP/S protocols (e.g., RDP, SSH, FTP), outbound network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.
57+
Application Gateway WAF provides centralized inbound protection for web applications against common exploits and vulnerabilities. Azure Firewall provides inbound protection for non-HTTP/S protocols (for example, RDP, SSH, FTP), outbound network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.
5858
5959
- question: How does Azure Firewall complement Network Security Groups (NSGs)?
6060
answer: |
6161
Azure Firewall complements NSGs to provide better "defense-in-depth" network security. NSGs offer distributed network layer traffic filtering to limit traffic within virtual networks in each subscription. Azure Firewall provides centralized, fully stateful network and application-level protection across subscriptions and virtual networks.
6262
6363
- question: Are NSGs supported on the AzureFirewallSubnet?
6464
answer: |
65-
Azure Firewall is a managed service with multiple protection layers, including platform protection with NIC-level NSGs (not viewable). Subnet-level NSGs are not required on the AzureFirewallSubnet and are disabled to prevent service interruptions.
65+
Azure Firewall is a managed service with multiple protection layers, including platform protection with NIC-level NSGs (not viewable). Subnet-level NSGs aren't required on the AzureFirewallSubnet and are disabled to prevent service interruptions.
6666
6767
- question: What is the pricing for Azure Firewall?
6868
answer: |
@@ -74,11 +74,11 @@ sections:
7474
7575
- question: Where does Azure Firewall store customer data?
7676
answer: |
77-
Azure Firewall does not move or store customer data outside the region where it is deployed.
77+
Azure Firewall doesn't move or store customer data outside the region where it's deployed.
7878
7979
- question: Is Azure Firewall in secured virtual hubs (vWAN) supported in Qatar?
8080
answer: |
81-
No, Azure Firewall in secured virtual hubs (vWAN) is not currently supported in Qatar.
81+
No, Azure Firewall in secured virtual hubs (vWAN) isn't currently supported in Qatar.
8282
8383
- name: Supported capabilities and features
8484
questions:
@@ -98,7 +98,7 @@ sections:
9898
9999
- question: Does Azure Firewall support BGP peering?
100100
answer: |
101-
No, Azure Firewall doesn't natively support BGP peering. However, the [Auto-learn SNAT routes feature](../firewall/snat-private-range.md#auto-learn-snat-routes-preview) indirectly leverages BGP through Azure Route Server.
101+
No, Azure Firewall doesn't natively support BGP peering. However, the [Autolearn SNAT routes feature](../firewall/snat-private-range.md#auto-learn-snat-routes-preview) indirectly uses BGP through Azure Route Server.
102102
103103
- name: Management and configuration
104104
questions:
@@ -153,12 +153,12 @@ sections:
153153
```
154154
155155
> [!NOTE]
156-
> When stopping and starting the firewall, billing stops and starts accordingly. However, the private IP address may change, which can affect connectivity if route tables are configured.
156+
> When stopping and starting the firewall, billing stops and starts accordingly. However, the private IP address might change, which can affect connectivity if route tables are configured.
157157
158158
- question: How can I configure availability zones after deployment?
159159
answer: |
160160
It's recommended to configure availability zones during initial deployment. However, you can reconfigure them after deployment if:
161-
- The firewall is deployed in a VNet (not supported in secured virtual hubs).
161+
- The firewall is deployed in a virtual network (not supported in secured virtual hubs).
162162
- The region supports availability zones.
163163
- All attached public IP addresses are configured with the same zones.
164164
@@ -180,16 +180,16 @@ sections:
180180
Set-AzFirewall -AzureFirewall $azfw
181181
```
182182
183-
- question: Are there any firewall resource group restrictions?
183+
- question: Are there any Azure firewall resource group restrictions?
184184
answer: |
185185
Yes:
186-
- The firewall and VNet must be in the same resource group.
186+
- The Azure Firewall and virtual network must be in the same resource group.
187187
- The public IP address can be in a different resource group.
188-
- All resources (firewall, VNet, public IP) must be in the same subscription.
188+
- All resources (Azure firewall, virtual network, public IP) must be in the same subscription.
189189
190190
- question: What does provisioning state **Failed** mean?
191191
answer: |
192-
A **Failed** provisioning state indicates that a configuration update failed on one or more backend instances. The firewall remains operational, but the configuration may be inconsistent. Retry the update until the provisioning state changes to **Succeeded**.
192+
A **Failed** provisioning state indicates that a configuration update failed on one or more backend instances. The Azure Firewall remains operational, but the configuration might be inconsistent. Retry the update until the provisioning state changes to **Succeeded**.
193193
194194
- question: How does Azure Firewall handle planned maintenance and unplanned failures?
195195
answer: |
@@ -201,7 +201,7 @@ sections:
201201
202202
- question: Why does Azure Firewall need a /26 subnet size?
203203
answer: |
204-
A /26 subnet ensures sufficient IP addresses for scaling as the firewall provisions additional virtual machine instances.
204+
A /26 subnet ensures sufficient IP addresses for scaling as the Azure Firewall provisions extra virtual machine instances.
205205
206206
- question: Does the firewall subnet size need to change as the service scales?
207207
answer: |
@@ -215,6 +215,24 @@ sections:
215215
answer: |
216216
Yes. For details, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
217217
218+
- question: Can I move an IP Group to another resource group?
219+
answer: |
220+
No, moving an IP Group to another resource group isn't currently supported.
221+
222+
- question: What is the TCP Idle Timeout for Azure Firewall?
223+
answer: |
224+
A standard behavior of a network firewall is to ensure TCP connections are kept alive and to promptly close them if there's no activity. Azure Firewall TCP Idle Timeout is four minutes. This setting isn't user configurable, but you can contact Azure Support to increase the Idle Timeout for inbound and outbound connections up to 15 minutes. Idle Timeout for east-west traffic can't be changed.
225+
226+
If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained. A common practice is to use a TCP keep-alive. This practice keeps the connection active for a longer period. For more information, see the [.NET examples](/dotnet/api/system.net.servicepoint.settcpkeepalive).
227+
228+
- question: Can I deploy Azure Firewall without a public IP address?
229+
answer: |
230+
Yes, but you must configure the firewall in Forced Tunneling Mode. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. This public IP address is for management traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
231+
232+
- question: Is there a way to automatically back up Azure Firewall and policies?
233+
answer: |
234+
Yes. For more information, see [Backup Azure Firewall and Azure Firewall Policy with Logic Apps](https://techcommunity.microsoft.com/t5/azure-network-security-blog/backup-azure-firewall-and-azure-firewall-policy-with-logic-apps/ba-p/3613928).
235+
218236
- name: Connectivity and routing
219237
questions:
220238

@@ -228,7 +246,7 @@ sections:
228246
229247
- question: Can Azure Firewall forward and filter network traffic between subnets in the same virtual network or peered virtual networks?
230248
answer: |
231-
Yes. However, configuring the UDRs to redirect traffic between subnets in the same VNET requires more attention. While using the VNET address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **VNET**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which don't require UDRs.
249+
Yes. However, configuring the UDRs to redirect traffic between subnets in the same virtual network requires more attention. While using the virtual network address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **virtual network**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which don't require UDRs.
232250
233251
- question: Does Azure Firewall outbound SNAT between private networks?
234252
answer: |
@@ -271,23 +289,9 @@ sections:
271289
| TargetFQDN | `www.contoso.*` | No | |
272290
| TargetFQDN | `*.contoso.*` | No | |
273291
274-
- question: Can I move an IP Group to another resource group?
275-
answer: |
276-
No, moving an IP Group to another resource group isn't currently supported.
277-
278-
- question: What is the TCP Idle Timeout for Azure Firewall?
279-
answer: |
280-
A standard behavior of a network firewall is to ensure TCP connections are kept alive and to promptly close them if there's no activity. Azure Firewall TCP Idle Timeout is four minutes. This setting isn't user configurable, but you can contact Azure Support to increase the Idle Timeout for inbound and outbound connections up to 15 minutes. Idle Timeout for east-west traffic can't be changed.
281-
282-
If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained. A common practice is to use a TCP keep-alive. This practice keeps the connection active for a longer period. For more information, see the [.NET examples](/dotnet/api/system.net.servicepoint.settcpkeepalive).
283-
284-
- question: Can I deploy Azure Firewall without a public IP address?
285-
answer: |
286-
Yes, but you must configure the firewall in Forced Tunneling Mode. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. This public IP address is for management traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
287-
288-
- question: Is there a way to automatically back up Azure Firewall and policies?
292+
- question: Does Azure Firewall allow access to Active Directory by default?
289293
answer: |
290-
Yes. For more information, see [Backup Azure Firewall and Azure Firewall Policy with Logic Apps](https://techcommunity.microsoft.com/t5/azure-network-security-blog/backup-azure-firewall-and-azure-firewall-policy-with-logic-apps/ba-p/3613928).
294+
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
291295
292296
- question: Can I exclude an FQDN or an IP address from Azure Firewall Threat Intelligence based filtering?
293297
answer: |
@@ -341,43 +345,4 @@ sections:
341345
- question: How does Azure Firewall handle idle timeouts?
342346
answer: |
343347
When a connection has an Idle Timeout (four minutes of no activity), Azure Firewall gracefully terminates the connection by sending a TCP RST packet.
344-
345-
346-
347-
348-
349-
350-
351-
352-
353-
354-
355-
356-
357-
358-
359-
360-
361-
362-
363-
364-
- question: Does Azure Firewall allow access to Active Directory by default?
365-
answer: |
366-
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
367-
368-
369-
370-
371-
372-
373-
374-
375-
376-
377-
- question: How many parallel connections can Azure Firewall support?
378-
answer: |
379-
Azure Firewall uses Azure Virtual Machines underneath that have a [hard limit number of connections](/azure/virtual-network/virtual-machine-network-throughput#flow-limits-and-active-connections-recommendations). The total number of active connections per virtual machine is 250k.
380-
381-
The total limit per firewall is the virtual machine connection limit (250k) x the number of virtual machines in the firewall backend pool. Azure Firewall starts with two virtual machines and scales out based on CPU usage and throughput.
382-
383-
348+

0 commit comments

Comments
 (0)