Skip to content

Commit 7e0176d

Browse files
authored
Merge pull request #296465 from duongau/fwfreshness1
Azure Firewall - Freshness review (Batch 1 - March 2025)
2 parents 9548aa8 + 06d0106 commit 7e0176d

13 files changed

+409
-410
lines changed

articles/firewall/choose-firewall-sku.md

Lines changed: 30 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,27 +5,49 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 04/03/2024
8+
ms.date: 03/17/2025
99
ms.author: duau
1010
---
1111

1212
# Choose the right Azure Firewall version to meet your needs
1313

14-
Azure Firewall now supports three different versions to cater to a wide range of customer use cases and preferences.
14+
Azure Firewall offers three versions to meet various customer needs:
1515

16-
- Azure Firewall Premium is recommended to secure highly sensitive applications (such as payment processing). It supports advanced threat protection capabilities like malware and TLS inspection.
17-
- Azure Firewall Standard is recommended for customers looking for Layer 3–Layer 7 firewall and needs autoscaling to handle peak traffic periods of up to 30 Gbps. It supports enterprise features like threat intelligence, DNS proxy, custom DNS, and web categories.
18-
- Azure Firewall Basic is recommended for SMB customers with throughput needs of 250 Mbps.
16+
- **Azure Firewall Premium**: Ideal for securing highly sensitive applications, such as payment processing. It includes advanced threat protection features like malware and TLS inspection.
17+
- **Azure Firewall Standard**: Suitable for customers requiring Layer 3–Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS proxy, custom DNS, and web categories.
18+
- **Azure Firewall Basic**: Designed for SMB customers with throughput requirements up to 250 Mbps.
1919

2020
## Feature comparison
2121

22-
Take a closer look at the features across the three Azure Firewall versions:
22+
Compare the features of the three Azure Firewall versions:
23+
24+
| Category | Feature | Firewall Basic | Firewall Standard | Firewall Premium |
25+
| --- | --- | --- | --- | --- |
26+
| **L3-L7 filtering** | Application level FQDN filtering (SNI based) for HTTPS/SQL ||||
27+
| | Network level FQDN filtering – all ports and protocols | |||
28+
| | Stateful firewall (5 tuple rules) ||||
29+
| | Network address translation (SNAT+DNAT) ||||
30+
| **Reliability & performance** | Availability zones ||||
31+
| | Built-in HA ||||
32+
| | Cloud scalability (auto-scale as traffic grows) | Up to 250Mbps | Up to 30 Gbps | Up to 100 Gbps |
33+
| | Fat flow support | N/A | 1 Gbps | 10 Gbps |
34+
| **Ease of management** | Central management via firewall manager ||||
35+
| | Policy analytics (rule management over time) ||||
36+
| **Enterprise integration** | Full logging including SIEM integration ||||
37+
| | Service tags and FQDN tags for easy policy management ||||
38+
| | Easy DevOps integration using REST/PowerShell/CLI/templates/Terraform ||||
39+
| | Web content filtering (web categories) | |||
40+
| | DNS proxy + custom DNS | |||
41+
| **Advanced threat protection** | Threat intelligence-based filtering (known malicious IP address/domains) | Alert |||
42+
| | Inbound TLS termination (TLS reverse proxy) | | | Using Azure Application Gateway |
43+
| | Outbound TLS termination (TLS forward proxy) | | ||
44+
| | Fully managed IDPS | | ||
45+
| | URL filtering (full path - including SSL termination) | | ||
2346

24-
:::image type="content" source="media/choose-firewall-sku/azure-firewall-sku-table.png" alt-text="Table of Azure Firewall version features." lightbox="media/choose-firewall-sku/azure-firewall-sku-table-large.png":::
2547

2648
## Flow chart
2749

28-
You can use the following flow chart to help you choose the Azure Firewall version that best fits you needs.
50+
Use the following flow chart to determine the best Azure Firewall version for your needs.
2951

3052
<!-- Art Library Source# ConceptArt-0-000-011 -->
3153
:::image type="content" source="media/choose-firewall-sku/firewall-sku-flow.svg" alt-text="Flow chart to help you choose a firewall version." lightbox="media/choose-firewall-sku/firewall-sku-flow.svg":::

articles/firewall/firewall-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.service: azure-firewall
88
ms.custom: devx-track-azurepowershell
99
ms.topic: faq
10-
ms.date: 02/29/2024
10+
ms.date: 03/17/2025
1111
ms.author: duau
1212
title: Azure Firewall FAQ
1313
summary: |

articles/firewall/firewall-multi-hub-spoke.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,45 +5,44 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 05/30/2023
8+
ms.date: 03/17/2025
99
ms.author: maroja
1010
---
1111

1212
# Use Azure Firewall to route a multi hub and spoke topology
1313

14-
The hub and spoke topology is a common network architecture pattern in Azure. The hub is a virtual network (VNet) in Azure that acts as a central point of connectivity to your on-premises network. The spokes are VNets that peer with the hub, and can be used to isolate workloads. The hub can be used to isolate and secure traffic between spokes. The hub can also be used to route traffic between spokes. The hub can be used to route traffic between spokes using various methods.
14+
The hub and spoke topology is a common network architecture pattern in Azure. In this setup, the hub is a virtual network (VNet) that serves as a central point of connectivity to your on-premises network. The spokes are VNets that peer with the hub and can be used to isolate workloads. The hub can secure and route traffic between spokes using various methods.
1515

16-
For example, you can use Azure Route Server with dynamic routing and network virtual appliances (NVAs) to route traffic between spokes. This can be a fairly complex deployment. A less complex method uses Azure Firewall and static routes to route traffic between spokes.
16+
For instance, you can use Azure Route Server with dynamic routing and network virtual appliances (NVAs) to route traffic between spokes, though this can be complex. A simpler method involves using Azure Firewall and static routes.
1717

18-
This article shows you how you can use Azure Firewall with static user defined routes (UDRs) to route a multi hub and spoke topology. The following diagram shows the topology:
18+
This article demonstrates how to use Azure Firewall with static user-defined routes (UDRs) to route traffic in a multi hub and spoke topology. The following diagram illustrates the topology:
1919

2020
:::image type="content" source="media/firewall-multi-hub-spoke/multi-hub-spoke-architecture.png" alt-text="Conceptual diagram showing hub and spoke architecture." lightbox="media/firewall-multi-hub-spoke/multi-hub-spoke-architecture.png":::
2121

22-
2322
## Baseline architecture
2423

25-
Azure Firewall secures and inspects network traffic, but it also routes traffic between VNets. It's a managed resource that automatically creates [system routes](../virtual-network/virtual-networks-udr-overview.md#system-routes) to the local spokes, hub, and the on-premises prefixes learned by its local Virtual Network Gateway. Placing an NVA on the hub and querying the effective routes would result in a route table that resembles what is found within the Azure Firewall.
24+
Azure Firewall not only secures and inspects network traffic but also routes traffic between VNets. It automatically creates [system routes](../virtual-network/virtual-networks-udr-overview.md#system-routes) to local spokes, the hub, and on-premises prefixes learned by its local Virtual Network Gateway. Placing an NVA on the hub and querying the effective routes would show a route table similar to that within Azure Firewall.
2625

27-
Since this is a static routing architecture, the shortest path to another hub can be done by using global VNet peering between the hubs. So the hubs know about each other, and each local firewall contains the route table of each directly connected hub. However, the local hubs only know about their local spokes. Additionally, these hubs can be in the same region or a different region.
26+
In this static routing architecture, the shortest path to another hub is achieved using global VNet peering between hubs. Each hub knows about the other hubs, and each local firewall contains the route table of each directly connected hub. However, local hubs only know about their local spokes. These hubs can be in the same or different regions.
2827

2928
## Routing on the firewall subnet
3029

31-
Each local firewall needs to know how to reach the other remote spokes, so you must create UDRs in the firewall subnets. To do this, you first need to create a default route of any type, which then allows you to create more specific routes to the other spokes. For example, the following screenshots show the route table for the two hub VNets:
30+
Each local firewall needs to know how to reach remote spokes, so you must create UDRs in the firewall subnets. Start by creating a default route, then add more specific routes to the other spokes. The following screenshots show the route tables for the two hub VNets:
3231

3332
> [!NOTE]
34-
> The address prefix in the hub virtual route table should encompass the two spoke virtual network address spaces.
33+
> The address prefix in the hub virtual route table should encompass the address spaces of the two spoke virtual networks.
3534
3635
**Hub-01 route table**
3736
:::image type="content" source="media/firewall-multi-hub-spoke/hub-01-route-table.png" alt-text="Screenshot showing the route table for Hub-01.":::
3837

3938
**Hub-02 route table**
40-
:::image type="content" source="media/firewall-multi-hub-spoke/hub-02-route-table.png" alt-text="Screenshot showing the route table for Hub-02. ":::
39+
:::image type="content" source="media/firewall-multi-hub-spoke/hub-02-route-table.png" alt-text="Screenshot showing the route table for Hub-02.":::
4140

4241
## Routing on the spoke subnets
4342

44-
The benefit of implementing this topology is that with traffic going from one hub to another, you can reach the next hop that is directly connected via the global peering.
43+
This topology allows traffic to move from one hub to another, reaching the next hop directly connected via global peering.
4544

46-
As illustrated in the diagram, it's better to place a UDR in the spoke subnets that have a 0/0 route (default gateway) with the local firewall as the next hop. This locks in the single next hop exit point as the local firewall. It also reduces the risk of asymmetric routing if it learns more specific prefixes from your on-premises environment that might cause the traffic to bypass the firewall. For more information, see [Don’t let your Azure Routes bite you](https://blog.cloudtrooper.net/2020/11/28/dont-let-your-azure-routes-bite-you/).
45+
As shown in the diagram, it's best to place a UDR in the spoke subnets with a 0/0 route (default gateway) pointing to the local firewall as the next hop. This ensures a single exit point through the local firewall and reduces the risk of asymmetric routing if more specific prefixes from your on-premises environment cause traffic to bypass the firewall. For more information, see [Don’t let your Azure Routes bite you](https://blog.cloudtrooper.net/2020/11/28/dont-let-your-azure-routes-bite-you/).
4746

4847
Here's an example route table for the spoke subnets connected to Hub-01:
4948

articles/firewall/fqdn-filtering-network-rules.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,32 +5,32 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 05/10/2024
8+
ms.date: 03/17/2025
99
ms.author: duau
1010
ms.custom: engagement-fy23
1111
---
1212

1313
# Use FQDN filtering in network rules
1414

15-
A fully qualified domain name (FQDN) represents a domain name of a host or one or more IP addresses. You can use FQDNs in network rules based on DNS resolution in Azure Firewall and Firewall policy. This capability allows you to filter outbound traffic with any TCP/UDP protocol (including NTP, SSH, RDP, and more). You must enable DNS Proxy to use FQDNs in your network rules. For more information, see [Azure Firewall DNS settings](dns-settings.md).
15+
A fully qualified domain name (FQDN) represents the complete domain name of a host or one or more IP addresses. In Azure Firewall and Firewall policy, you can use FQDNs in network rules based on DNS resolution. This feature allows you to filter outbound traffic using any TCP/UDP protocol, including NTP, SSH, and RDP. To use FQDNs in your network rules, you must enable DNS Proxy. For more information, see [Azure Firewall DNS settings](dns-settings.md).
1616

1717
> [!NOTE]
18-
> By design, FQDN filtering in network rules doesnt support wildcards
18+
> FQDN filtering in network rules doesn't support wildcards by design.
1919
2020
## How it works
2121

22-
Once you define which DNS server your organization needs (Azure DNS or your own custom DNS), Azure Firewall translates the FQDN to an IP address or addresses based on the selected DNS server. This translation happens for both application and network rule processing.
22+
First, define the DNS server your organization uses (either Azure DNS or a custom DNS). Azure Firewall then translates the FQDN to an IP address or addresses based on the chosen DNS server. This translation applies to both application and network rule processing.
2323

24-
When a new DNS resolution takes place, new IP addresses are added to firewall rules. Old IP addresses expire in 15 minutes when the DNS server no longer returns them. Azure Firewall rules are updated every 15 seconds from DNS resolution of the FQDNs in network rules.
24+
When a new DNS resolution occurs, new IP addresses are added to the firewall rules. Old IP addresses expire after 15 minutes if the DNS server no longer returns them. Azure Firewall updates its rules every 15 seconds based on the DNS resolution of the FQDNs in network rules.
2525

26-
### Differences in application rules vs. network rules
26+
### Differences between application rules and network rules
2727

28-
- FQDN filtering in application rules for HTTP/S and MSSQL is based on an application level transparent proxy and the SNI header. As such, it can discern between two FQDNs that are resolved to the same IP address. This isn't the case with FQDN filtering in network rules.
28+
- FQDN filtering in application rules for HTTP/S and MSSQL relies on an application-level transparent proxy and the SNI header. This allows it to differentiate between two FQDNs that resolve to the same IP address. This capability isn't available with FQDN filtering in network rules.
2929

30-
Always use application rules when possible:
31-
- If the protocol is HTTP/S or MSSQL, use application rules for FQDN filtering.
30+
Always use application rules when possible:
31+
- For HTTP/S or MSSQL protocols, use application rules for FQDN filtering.
3232
- For services like AzureBackup and HDInsight, use application rules with FQDN tags.
33-
- For any other protocols, you can use network rules for FQDN filtering.
33+
- For other protocols, use network rules for FQDN filtering.
3434

3535
## Next steps
3636

articles/firewall/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: duongau
1212
ms.author: duau
13-
ms.date: 05/30/2024
13+
ms.date: 03/17/2025
1414
ms.custom: e2e-hybrid
1515

1616
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new
Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)