Skip to content

Commit 4ac3ffa

Browse files
Merge pull request #270223 from vhorne/fw-priv-dnat-prev
updates for private dnat preview
2 parents d074e2b + 21653af commit 4ac3ffa

File tree

6 files changed

+18
-12
lines changed

6 files changed

+18
-12
lines changed

articles/firewall/firewall-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ sections:
4040
4141
* *Application rules*: Configure fully qualified domain names (FQDNs) that can be accessed from a Virtual Network.
4242
* *Network rules*: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
43-
* *NAT rules*: Configure DNAT rules to allow incoming Internet connections.
43+
* *NAT rules*: Configure DNAT rules to allow incoming Internet or intranet (preview) connections.
4444
4545
For more information, see [Configure Azure Firewall rules](rule-processing.md).
4646

articles/firewall/firewall-known-issues.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ Azure Firewall Standard has the following known issues:
2929
|FQDN tags require a protocol: port to be set|Application rules with FQDN tags require port: protocol definition.|You can use **https** as the port: protocol value. We're working to make this field optional when FQDN tags are used.|
3030
|Moving a firewall to a different resource group or subscription isn't supported|Moving a firewall to a different resource group or subscription isn't supported.|Supporting this functionality is on our road map. To move a firewall to a different resource group or subscription, you must delete the current instance and recreate it in the new resource group or subscription.|
3131
|Threat intelligence alerts may get masked|Network rules with destination 80/443 for outbound filtering masks threat intelligence alerts when configured to alert only mode.|Create outbound filtering for 80/443 using application rules. Or, change the threat intelligence mode to **Alert and Deny**.|
32-
|Azure Firewall DNAT doesn't work for private IP destinations|Azure Firewall DNAT support is limited to Internet egress/ingress. DNAT doesn't currently work for private IP destinations. For example, spoke to spoke.|A fix is being investigated.<br><br>Private DNAT is currently in private preview. Watch the [Azure Firewall preview features](firewall-preview.md) article for the public preview announcement.|
3332
|With secured virtual hubs, availability zones can only be configured during deployment.| You can't configure Availability Zones after a firewall with secured virtual hubs has been deployed.|This is by design.|
3433
|SNAT on inbound connections|In addition to DNAT, connections via the firewall public IP address (inbound) are SNATed to one of the firewall private IPs. This requirement today (also for Active/Active NVAs) to ensure symmetric routing.|To preserve the original source for HTTP/S, consider using [XFF](https://en.wikipedia.org/wiki/X-Forwarded-For) headers. For example, use a service such as [Azure Front Door](../frontdoor/front-door-http-headers-protocol.md#from-the-front-door-to-the-backend) or [Azure Application Gateway](../application-gateway/rewrite-http-headers-url.md) in front of the firewall. You can also add WAF as part of Azure Front Door and chain to the firewall.
3534
|SQL FQDN filtering support only in proxy mode (port 1433)|For Azure SQL Database, Azure Synapse Analytics, and Azure SQL Managed Instance:<br><br>SQL FQDN filtering is supported in proxy-mode only (port 1433).<br><br>For Azure SQL IaaS:<br><br>If you're using nonstandard ports, you can specify those ports in the application rules.|For SQL in redirect mode (the default if connecting from within Azure), you can instead filter access using the SQL service tag as part of Azure Firewall network rules.

articles/firewall/firewall-preview.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Firewall preview features
3-
description: Learn about Azure Firewall preview features that are currently publicly available.
3+
description: Learn about Azure Firewall preview features that are publicly available now.
44
services: firewall
55
author: vhorne
66
ms.service: azure-firewall
@@ -49,6 +49,13 @@ You can now update multiple IP Groups in parallel at the same time. This is usef
4949

5050
For more information, see [IP Groups in Azure Firewall](ip-groups.md#parallel-ip-group-updates-preview).
5151

52+
### Private IP address DNAT rules (preview)
53+
54+
You can now configure a firewall policy DNAT rule with the private IP address of the firewall. Previously, DNAT rules only worked with Azure Firewall public IP addresses.
55+
This feature enables connectivity between overlapped IP networks, which is a common scenario for organizations when onboarding new partners to their network or integrating new acquisitions.
56+
Another scenario where the private IP address DNAT rule can be configured is for hybrid scenarios connecting on-premises networks with the Azure cloud to enable communication between private resources with no direct routing.
57+
58+
5259
## Next steps
5360

5461
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).

articles/firewall/rule-processing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ If still no match is found within application rules, then the packet is evaluate
135135

136136
### DNAT rules and Network rules
137137

138-
Inbound Internet connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Filter inbound traffic with Azure Firewall DNAT using the Azure portal](../firewall/tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, the traffic is translated according to the DNAT rule and allowed by the firewall. So the traffic isn't subject to any further processing by other network rules. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards.
138+
Inbound Internet or intranet (preview) connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the Azure portal](../firewall/tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, the traffic is translated according to the DNAT rule and allowed by the firewall. So the traffic isn't subject to any further processing by other network rules. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards.
139139

140140
Application rules aren't applied for inbound connections. So, if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall](../web-application-firewall/overview.md)?
141141

articles/firewall/tutorial-firewall-dnat-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Filter inbound Internet traffic with Azure Firewall DNAT policy using the portal'
2+
title: 'Tutorial: Filter inbound Internet or intranet traffic with Azure Firewall DNAT policy using the portal'
33
description: In this tutorial, you learn how to deploy and configure Azure Firewall policy DNAT using the Azure portal.
44
services: firewall
55
author: vhorne
@@ -11,9 +11,9 @@ ms.custom: mvc
1111
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall policy DNAT so that I can control inbound Internet access to resources located in a subnet.
1212
---
1313

14-
# Tutorial: Filter inbound Internet traffic with Azure Firewall policy DNAT using the Azure portal
14+
# Tutorial: Filter inbound Internet or intranet traffic with Azure Firewall policy DNAT using the Azure portal
1515

16-
You can configure Azure Firewall policy Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets. When you configure DNAT, the *rule collection action* is set to **DNAT**. Each rule in the NAT rule collection can then be used to translate your firewall public IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
16+
You can configure Azure Firewall policy Destination Network Address Translation (DNAT) to translate and filter inbound Internet or intranet (preview) traffic to your subnets. When you configure DNAT, the *rule collection action* is set to **DNAT**. Each rule in the NAT rule collection can then be used to translate your firewall public or private IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
1717

1818
In this tutorial, you learn how to:
1919

@@ -209,7 +209,7 @@ This rule allows you to connect a remote desktop to the Srv-Workload virtual mac
209209
1. For **Protocol**, select **TCP**.
210210
1. For **Destination Ports**, type **3389**.
211211
1. For **Destination Type**, select **IP Address**.
212-
1. For **Destination**, type the firewall public IP address.
212+
1. For **Destination**, type the firewall public or private IP address.
213213
1. For **Translated address**, type the **Srv-Workload** private IP address.
214214
1. For **Translated port**, type **3389**.
215215
1. Select **Add**.

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Filter inbound Internet traffic with Azure Firewall DNAT using the portal
2+
title: Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the portal
33
description: In this article, you learn how to deploy and configure Azure Firewall DNAT using the Azure portal.
44
services: firewall
55
author: vhorne
@@ -11,9 +11,9 @@ ms.custom: mvc
1111
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
1212
---
1313

14-
# Filter inbound Internet traffic with Azure Firewall DNAT using the Azure portal
14+
# Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the Azure portal
1515

16-
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets. When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public IP address and port to a private/public IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
16+
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets or intranet traffic between private networks (preview). When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public or private IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, the recommended approach is to add a specific source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
1717

1818
> [!NOTE]
1919
> This article uses classic Firewall rules to manage the firewall. The preferred method is to use [Firewall Policy](../firewall-manager/policy-overview.md). To complete this procedure using Firewall Policy, see [Tutorial: Filter inbound Internet traffic with Azure Firewall policy DNAT using the Azure portal](tutorial-firewall-dnat-policy.md)
@@ -207,7 +207,7 @@ For the **SN-Workload** subnet, you configure the outbound default route to go t
207207
7. For **Protocol**, select **TCP**.
208208
1. For **Source type**, select **IP address**.
209209
1. For **Source**, type *.
210-
1. For **Destination Addresses**, type the firewall's public IP address.
210+
1. For **Destination Addresses**, type the firewall's public or private IP address.
211211
1. For **Destination ports**, type **3389**.
212212
1. For **Translated Address** type the private IP address for the Srv-Workload virtual machine.
213213
1. For **Translated port**, type **3389**.

0 commit comments

Comments
 (0)