Skip to content

Commit 3c47950

Browse files
authored
Merge pull request #302516 from ZarrVenkat/prmportal
Prmportal
2 parents fff6302 + 218eeb8 commit 3c47950

File tree

3 files changed

+14
-15
lines changed

3 files changed

+14
-15
lines changed

articles/firewall-manager/secure-cloud-network-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -137,14 +137,14 @@ $AzFWRoute = New-AzVHubRoute -Name "all_traffic" -Destination @("0.0.0.0/0", "10
137137
$DefaultRT = Update-AzVHubRouteTable -Name "defaultRouteTable" -ResourceGroupName $RG -VirtualHubName $HubName -Route @($AzFWRoute)
138138
```
139139
> [!NOTE]
140-
> String "***all_traffic***" as value for parameter "-Name" in the New-AzVHubRoute command above has a special meaning: if you use this exact string, the configuration applied in this article will be properly reflected in the Azure Portal (Firewall Manager --> Virtual hubs --> [Your Hub] --> Security Configuration). If a different name will be used, the desired configuration will be applied, but will not be reflected in the Azure Portal.
140+
> String "***all_traffic***" as value for parameter "-Name" in the New-AzVHubRoute command above has a special meaning: if you use this exact string, the configuration applied in this article will be properly reflected in the Azure portal (Firewall Manager --> Virtual hubs --> [Your Hub] --> Security Configuration). If a different name will be used, the desired configuration will be applied, but will not be reflected in the Azure portal.
141141
142142
## <a name="routingintent"></a> Enabling routing intent
143143

144144
If you want to send inter-hub and inter-region traffic via Azure Firewall deployed in the Virtual WAN hub, you can instead enable the routing intent feature. For more information on routing intent, see [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md).
145145

146146
> [!NOTE]
147-
> This is the configuration deployed when securing connectivity from the Azure Portal with Azure Firewall Manager when the "Interhub" setting is set to **enabled**.
147+
> This is the configuration deployed when securing connectivity from the Azure portal with Azure Firewall Manager when the "Interhub" setting is set to **enabled**.
148148
149149
```azurepowershell
150150
# Get the Azure Firewall resource ID
@@ -154,7 +154,7 @@ $AzFWId = $(Get-AzVirtualHub -ResourceGroupName <thname> -name $HubName).AzureF
154154
$policy1 = New-AzRoutingPolicy -Name "PrivateTraffic" -Destination @("PrivateTraffic") -NextHop $firewall.Id
155155
$policy2 = New-AzRoutingPolicy -Name "PublicTraffic" -Destination @("Internet") -NextHop $firewall.Id
156156
New-AzRoutingIntent -ResourceGroupName "<rgname>" -VirtualHubName "<hubname>" -Name "hubRoutingIntent" -RoutingPolicy @($policy1, $policy2)
157-
If your Virtual WAN uses non-RFC1918 address prefixes (for example, `40.0.0.0/24` in a virtual network or on-premises), you should add an extra route to the `defaultRouteTable` after completing the routing intent configuration. Name this route **private_traffic**. If you use a different name, the route will work as expected, but the configuration will not be reflected in the Azure Portal.
157+
If your Virtual WAN uses non-RFC1918 address prefixes (for example, `40.0.0.0/24` in a virtual network or on-premises), you should add an extra route to the `defaultRouteTable` after completing the routing intent configuration. Name this route **private_traffic**. If you use a different name, the route will work as expected, but the configuration will not be reflected in the Azure portal.
158158
159159
```azurepowershell-interactive
160160
# Get the defaultRouteTable

articles/firewall/premium-portal.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,32 +13,31 @@ ms.author: duau
1313
# Azure Firewall Premium in the Azure portal
1414

1515

16-
Azure Firewall Premium is a next generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:
16+
Azure Firewall Premium is an advanced firewall designed for highly sensitive and regulated environments. It offers enhanced security features, including:
1717

18-
- **TLS inspection** - decrypts outbound traffic, processes the data, then encrypts the data and sends it to the destination.
19-
- **IDPS** - A network intrusion detection and prevention system (IDPS) allows you to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.
20-
- **URL filtering** - extends Azure Firewall’s FQDN filtering capability to consider an entire URL. For example, `www.contoso.com/a/c` instead of `www.contoso.com`.
21-
- **Web categories** - administrators can allow or deny user access to website categories such as gambling websites, social media websites, and others.
18+
- **TLS inspection**: Decrypts outbound traffic, inspects it for threats, then re-encrypts the data before sending it to its destination.
19+
- **IDPS (Intrusion Detection and Prevention System)**: Monitors network activity for malicious behavior, logs and reports incidents, and can block threats in real time.
20+
- **URL filtering**: Filters traffic based on the full URL path (for example, `www.contoso.com/a/c`), not just the domain name.
21+
- **Web categories**: Lets administrators control access to websites by category, such as social media, gambling, and more.
2222

2323
For more information, see [Azure Firewall Premium features](premium-features.md).
2424

2525
## Deploy the firewall
2626

27-
Deploying an Azure Firewall Premium is similar to deploying a standard Azure Firewall:
27+
Deploying Azure Firewall Premium follows the same steps as deploying a standard Azure Firewall:
2828

2929
:::image type="content" source="media/premium-portal/premium-portal.png" alt-text="portal deployment":::
3030

31-
For **Firewall tier**, you select **Premium** and for **Firewall policy**, you select an existing Premium policy or create a new one.
31+
For **Firewall tier**, choose **Premium**. For **Firewall policy**, either select an existing Premium policy or create a new one.
3232

3333
## Configure the Premium policy
3434

35-
Configuring a Premium firewall policy is similar to configuring a Standard firewall policy. With a Premium policy, you can configure the Premium features:
35+
Configuring a Premium firewall policy is similar to configuring a Standard firewall policy. However, with a Premium policy, you can enable advanced features such as TLS inspection, IDPS, URL filtering, and web categories to enhance your network security.
3636

3737
:::image type="content" source="media/premium-portal/premium-policy.png" alt-text="Premium policy deployment":::
3838

3939
### Rule configuration
40-
41-
When you configure application rules in a Premium policy, you can configure addition Premium features:
40+
When configuring application rules in a Premium policy, you can enable additional Premium features, such as TLS inspection, IDPS, URL filtering, and web categories.
4241

4342
:::image type="content" source="media/premium-portal/premium-application-rule.png" alt-text="Premium rule":::
4443

articles/firewall/threat-intel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ When threat intelligence-based filtering is enabled, Azure Firewall evaluates tr
2121

2222
Administrators can configure the firewall to operate in alert-only mode or in alert and deny mode when a threat intelligence rule is triggered. By default, the firewall operates in alert-only mode. This mode can be disabled or changed to alert and deny.
2323

24-
Allow lists can be defined to exempt specific FQDNs, IP addresses, ranges, or subnets from threat intelligence filtering.
24+
Allowlists can be defined to exempt specific FQDNs, IP addresses, ranges, or subnets from threat intelligence filtering.
2525

26-
For batch operations, administrators can upload a CSV file containing IP addresses, ranges, and subnets to populate the allow list.
26+
For batch operations, administrators can upload a CSV file containing IP addresses, ranges, and subnets to populate the allowlist.
2727

2828
## Logs
2929

0 commit comments

Comments
 (0)