You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> String "***all_traffic***" as value for parameter "-Name" in the New-AzVHubRoute command above has a special meaning: if you use this exact string, the configuration applied in this article will be properly reflected in the Azure Portal (Firewall Manager --> Virtual hubs --> [Your Hub] --> Security Configuration). If a different name will be used, the desired configuration will be applied, but will not be reflected in the Azure Portal.
140
+
> String "***all_traffic***" as value for parameter "-Name" in the New-AzVHubRoute command above has a special meaning: if you use this exact string, the configuration applied in this article will be properly reflected in the Azure portal (Firewall Manager --> Virtual hubs --> [Your Hub] --> Security Configuration). If a different name will be used, the desired configuration will be applied, but will not be reflected in the Azure portal.
If you want to send inter-hub and inter-region traffic via Azure Firewall deployed in the Virtual WAN hub, you can instead enable the routing intent feature. For more information on routing intent, see [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md).
145
145
146
146
> [!NOTE]
147
-
> This is the configuration deployed when securing connectivity from the Azure Portal with Azure Firewall Manager when the "Interhub" setting is set to **enabled**.
147
+
> This is the configuration deployed when securing connectivity from the Azure portal with Azure Firewall Manager when the "Interhub" setting is set to **enabled**.
If your Virtual WAN uses non-RFC1918 address prefixes (for example, `40.0.0.0/24` in a virtual network or on-premises), you should add an extra route to the `defaultRouteTable` after completing the routing intent configuration. Name this route **private_traffic**. If you use a different name, the route will work as expected, but the configuration will not be reflected in the Azure Portal.
157
+
If your Virtual WAN uses non-RFC1918 address prefixes (for example, `40.0.0.0/24` in a virtual network or on-premises), you should add an extra route to the `defaultRouteTable` after completing the routing intent configuration. Name this route **private_traffic**. If you use a different name, the route will work as expected, but the configuration will not be reflected in the Azure portal.
Copy file name to clipboardExpand all lines: articles/firewall/premium-portal.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,32 +13,31 @@ ms.author: duau
13
13
# Azure Firewall Premium in the Azure portal
14
14
15
15
16
-
Azure Firewall Premium is a next generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:
16
+
Azure Firewall Premium is an advanced firewall designed for highly sensitive and regulated environments. It offers enhanced security features, including:
17
17
18
-
-**TLS inspection** - decrypts outbound traffic, processes the data, then encrypts the data and sends it to the destination.
19
-
-**IDPS** - A network intrusion detection and prevention system (IDPS) allows you to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.
20
-
-**URL filtering** - extends Azure Firewall’s FQDN filtering capability to consider an entire URL. For example, `www.contoso.com/a/c` instead of `www.contoso.com`.
21
-
-**Web categories** - administrators can allow or deny user access to website categories such as gambling websites, social media websites, and others.
18
+
-**TLS inspection**: Decrypts outbound traffic, inspects it for threats, then re-encrypts the data before sending it to its destination.
19
+
-**IDPS (Intrusion Detection and Prevention System)**: Monitors network activity for malicious behavior, logs and reports incidents, and can block threats in real time.
20
+
-**URL filtering**: Filters traffic based on the full URL path (for example, `www.contoso.com/a/c`), not just the domain name.
21
+
-**Web categories**: Lets administrators control access to websites by category, such as social media, gambling, and more.
22
22
23
23
For more information, see [Azure Firewall Premium features](premium-features.md).
24
24
25
25
## Deploy the firewall
26
26
27
-
Deploying an Azure Firewall Premium is similar to deploying a standard Azure Firewall:
27
+
Deploying Azure Firewall Premium follows the same steps as deploying a standard Azure Firewall:
For **Firewall tier**, you select **Premium** and for **Firewall policy**, you select an existing Premium policy or create a new one.
31
+
For **Firewall tier**, choose **Premium**. For **Firewall policy**, either select an existing Premium policy or create a new one.
32
32
33
33
## Configure the Premium policy
34
34
35
-
Configuring a Premium firewall policy is similar to configuring a Standard firewall policy. With a Premium policy, you can configure the Premium features:
35
+
Configuring a Premium firewall policy is similar to configuring a Standard firewall policy. However, with a Premium policy, you can enable advanced features such as TLS inspection, IDPS, URL filtering, and web categories to enhance your network security.
When you configure application rules in a Premium policy, you can configure addition Premium features:
40
+
When configuring application rules in a Premium policy, you can enable additional Premium features, such as TLS inspection, IDPS, URL filtering, and web categories.
Copy file name to clipboardExpand all lines: articles/firewall/threat-intel.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,9 @@ When threat intelligence-based filtering is enabled, Azure Firewall evaluates tr
21
21
22
22
Administrators can configure the firewall to operate in alert-only mode or in alert and deny mode when a threat intelligence rule is triggered. By default, the firewall operates in alert-only mode. This mode can be disabled or changed to alert and deny.
23
23
24
-
Allow lists can be defined to exempt specific FQDNs, IP addresses, ranges, or subnets from threat intelligence filtering.
24
+
Allowlists can be defined to exempt specific FQDNs, IP addresses, ranges, or subnets from threat intelligence filtering.
25
25
26
-
For batch operations, administrators can upload a CSV file containing IP addresses, ranges, and subnets to populate the allow list.
26
+
For batch operations, administrators can upload a CSV file containing IP addresses, ranges, and subnets to populate the allowlist.
0 commit comments