Skip to content

Commit 5ed247d

Browse files
committed
Updates based on GH Issues requests
1 parent 8bb181d commit 5ed247d

File tree

2 files changed

+72
-7
lines changed

2 files changed

+72
-7
lines changed

articles/firewall/firewall-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ There are three types of rule collections:
4949

5050
## Does Azure Firewall support inbound traffic filtering?
5151

52-
Azure Firewall supports inbound and outbound filtering. Inbound protection is typically used for non-HTTP/S protocols. For example RDP, SSH, and FTP protocols. For best inbound HTTP/S protection, use a web application firewall such as [Azure Web Application Firewall on Azure Application Gateway](../web-application-firewall/ag/ag-overview.md).
52+
Azure Firewall supports inbound and outbound filtering. Inbound protection is typically used for non-HTTP/S protocols. For example RDP, SSH, and FTP protocols. For best inbound HTTP/S protection, use a web application firewall such as [Azure Web Application Firewall (WAF)](../web-application-firewall/overview.md).
5353

5454
## Which logging and analytics services are supported by the Azure Firewall?
5555

articles/firewall/rule-processing.md

Lines changed: 71 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,85 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 11/19/2018
8+
ms.date: 02/25/2020
99
ms.author: victorh
1010
---
1111

1212
# Azure Firewall rule processing logic
13-
Azure Firewall has NAT rules, network rules, and applications rules. The rules are processed according to the rule type.
13+
You can configure NAT rules, network rules, and applications rules on Azure Firewall. The rules are processed according to the rule type.
1414

15+
> [!NOTE]
16+
> If you have enabled threat intelligence-based filtering, those rules are highest priority and are always processed first. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
1517
16-
## Network rules and applications rules
17-
Network rules are applied first, then application rules. The rules are terminating. So if a match is found in network rules, then application rules are not processed. If there is no network rule match, and if the packet protocol is HTTP/HTTPS, the packet is then evaluated by the application rules. If still no match is found, then the packet is evaluated against the infrastructure rule collection. If there is still no match, then the packet is denied by default.
18+
## Outbound
1819

19-
## NAT rules
20-
Inbound connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal](tutorial-firewall-dnat.md). DNAT rules are applied first. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. No application rules are applied for these connections.
20+
### Network rules and applications rules
21+
If you have configured network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are not processed. If there is no network rule match, and if the protocol is HTTP/HTTPS, the the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
2122

23+
## Inbound
24+
25+
### NAT rules
26+
27+
Inbound connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal](tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic.
28+
29+
Application rules are not applied for inbound connections. So if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall?](../web-application-firewall/overview.md)
30+
31+
## Examples
32+
33+
The following examples show the results of some of these rule combinations.
34+
35+
### Example 1
36+
37+
Connection to google.com is allowed because of a matching network rule.
38+
39+
**Network rule**
40+
41+
- Action: Allow
42+
43+
44+
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
45+
|---------|---------|---------|---------|----------|----------|--------|
46+
|Allow-web |TCP|IP address|*|IP address|*|80,443
47+
48+
**Application rule**
49+
50+
- Action: Deny
51+
52+
|name |Source type |Source |Protocol:Port|Target FQDNs|
53+
|---------|---------|---------|---------|----------|----------|
54+
|Deny-google |IP address|*|http:80,https:443|google.com
55+
56+
**Result**
57+
58+
The connection to google.com is allowed because the packet matches the *Allow-web* network rule. Rule processing stops at this point.
59+
60+
### Example 2
61+
62+
Web traffic is denied because a higher priority *Deny* network rule collection blocks it.
63+
64+
**Network rule collection 1**
65+
66+
- Name: Allow-collection
67+
- Priority: 200
68+
- Action: Allow
69+
70+
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
71+
|---------|---------|---------|---------|----------|----------|--------|
72+
|Allow-web |TCP|IP address|*|IP address|*|80,443
73+
74+
**Network rule collection 2**
75+
76+
- Name: Deny-collection
77+
- Priority: 100
78+
- Action: Deny
79+
80+
|name |Protocol |Source type |Source |Destination type |Destination address |Destination ports|
81+
|---------|---------|---------|---------|----------|----------|--------|
82+
|Deny-web |TCP|IP address|*|IP address|*|80,443
83+
84+
**Result**
85+
86+
Connections to web sites are denied because a higher priority network rule collection blocks it. Rule processing stops at this point.
2287

2388
## Next steps
2489

0 commit comments

Comments
 (0)