You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/choose-firewall-sku.md
+30-8Lines changed: 30 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,27 +5,49 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: concept-article
8
-
ms.date: 04/03/2024
8
+
ms.date: 03/17/2025
9
9
ms.author: duau
10
10
---
11
11
12
12
# Choose the right Azure Firewall version to meet your needs
13
13
14
-
Azure Firewall now supports three different versions to cater to a wide range of customer use cases and preferences.
14
+
Azure Firewall offers three versions to meet various customer needs:
15
15
16
-
- Azure Firewall Premium is recommended to secure highly sensitive applications (such as payment processing). It supports advanced threat protection capabilities like malware and TLS inspection.
17
-
- Azure Firewall Standard is recommended for customers looking for Layer 3–Layer 7 firewall and needs autoscaling to handle peak traffic periods of up to 30 Gbps. It supports enterprise features like threat intelligence, DNS proxy, custom DNS, and web categories.
18
-
- Azure Firewall Basic is recommended for SMB customers with throughput needs of 250 Mbps.
16
+
-**Azure Firewall Premium**: Ideal for securing highly sensitive applications, such as payment processing. It includes advanced threat protection features like malware and TLS inspection.
17
+
-**Azure Firewall Standard**: Suitable for customers requiring Layer 3–Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS proxy, custom DNS, and web categories.
18
+
-**Azure Firewall Basic**: Designed for SMB customers with throughput requirements up to 250 Mbps.
19
19
20
20
## Feature comparison
21
21
22
-
Take a closer look at the features across the three Azure Firewall versions:
22
+
Compare the features of the three Azure Firewall versions:
:::image type="content" source="media/choose-firewall-sku/azure-firewall-sku-table.png" alt-text="Table of Azure Firewall version features." lightbox="media/choose-firewall-sku/azure-firewall-sku-table-large.png":::
25
47
26
48
## Flow chart
27
49
28
-
You can use the following flow chart to help you choose the Azure Firewall version that best fits you needs.
50
+
Use the following flow chart to determine the best Azure Firewall version for your needs.
29
51
30
52
<!-- Art Library Source# ConceptArt-0-000-011 -->
31
53
:::image type="content" source="media/choose-firewall-sku/firewall-sku-flow.svg" alt-text="Flow chart to help you choose a firewall version." lightbox="media/choose-firewall-sku/firewall-sku-flow.svg":::
Copy file name to clipboardExpand all lines: articles/firewall/firewall-multi-hub-spoke.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,45 +5,44 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: concept-article
8
-
ms.date: 05/30/2023
8
+
ms.date: 03/17/2025
9
9
ms.author: maroja
10
10
---
11
11
12
12
# Use Azure Firewall to route a multi hub and spoke topology
13
13
14
-
The hub and spoke topology is a common network architecture pattern in Azure. The hub is a virtual network (VNet) in Azure that acts as a central point of connectivity to your on-premises network. The spokes are VNets that peer with the hub, and can be used to isolate workloads. The hub can be used to isolate and secure traffic between spokes. The hub can also be used to route traffic between spokes. The hub can be used to route traffic between spokes using various methods.
14
+
The hub and spoke topology is a common network architecture pattern in Azure. In this setup, the hub is a virtual network (VNet) that serves as a central point of connectivity to your on-premises network. The spokes are VNets that peer with the hub and can be used to isolate workloads. The hub can secure and route traffic between spokesusing various methods.
15
15
16
-
For example, you can use Azure Route Server with dynamic routing and network virtual appliances (NVAs) to route traffic between spokes. This can be a fairly complex deployment. A less complex method uses Azure Firewall and static routes to route traffic between spokes.
16
+
For instance, you can use Azure Route Server with dynamic routing and network virtual appliances (NVAs) to route traffic between spokes, though this can be complex. A simpler method involves using Azure Firewall and static routes.
17
17
18
-
This article shows you how you can use Azure Firewall with static userdefined routes (UDRs) to route a multi hub and spoke topology. The following diagram shows the topology:
18
+
This article demonstrates how to use Azure Firewall with static user-defined routes (UDRs) to route traffic in a multi hub and spoke topology. The following diagram illustrates the topology:
Azure Firewall secures and inspects network traffic, but it also routes traffic between VNets. It's a managed resource that automatically creates [system routes](../virtual-network/virtual-networks-udr-overview.md#system-routes) to the local spokes, hub, and the on-premises prefixes learned by its local Virtual Network Gateway. Placing an NVA on the hub and querying the effective routes would result in a route table that resembles what is found within the Azure Firewall.
24
+
Azure Firewall not only secures and inspects network traffic but also routes traffic between VNets. Itautomatically creates [system routes](../virtual-network/virtual-networks-udr-overview.md#system-routes) to local spokes, the hub, and on-premises prefixes learned by its local Virtual Network Gateway. Placing an NVA on the hub and querying the effective routes would show a route table similar to that within Azure Firewall.
26
25
27
-
Since this is a static routing architecture, the shortest path to another hub can be done by using global VNet peering between the hubs. So the hubs know about each other, and each local firewall contains the route table of each directly connected hub. However, the local hubs only know about their local spokes. Additionally, these hubs can be in the same region or a different region.
26
+
In this static routing architecture, the shortest path to another hub is achieved using global VNet peering between hubs. Each hub knows about the other hubs, and each local firewall contains the route table of each directly connected hub. However, local hubs only know about their local spokes. These hubs can be in the same or different regions.
28
27
29
28
## Routing on the firewall subnet
30
29
31
-
Each local firewall needs to know how to reach the other remote spokes, so you must create UDRs in the firewall subnets. To do this, you first need to create a default route of any type, which then allows you to create more specific routes to the other spokes. For example, the following screenshots show the route table for the two hub VNets:
30
+
Each local firewall needs to know how to reach remote spokes, so you must create UDRs in the firewall subnets. Start by creating a default route, then add more specific routes to the other spokes. The following screenshots show the route tables for the two hub VNets:
32
31
33
32
> [!NOTE]
34
-
> The address prefix in the hub virtual route table should encompass the two spoke virtual network address spaces.
33
+
> The address prefix in the hub virtual route table should encompass the address spaces of the two spoke virtual networks.
35
34
36
35
**Hub-01 route table**
37
36
:::image type="content" source="media/firewall-multi-hub-spoke/hub-01-route-table.png" alt-text="Screenshot showing the route table for Hub-01.":::
38
37
39
38
**Hub-02 route table**
40
-
:::image type="content" source="media/firewall-multi-hub-spoke/hub-02-route-table.png" alt-text="Screenshot showing the route table for Hub-02.":::
39
+
:::image type="content" source="media/firewall-multi-hub-spoke/hub-02-route-table.png" alt-text="Screenshot showing the route table for Hub-02.":::
41
40
42
41
## Routing on the spoke subnets
43
42
44
-
The benefit of implementing this topology is that with traffic going from one hub to another, you can reach the next hop that is directly connected via the global peering.
43
+
This topology allows traffic to move from one hub to another, reaching the next hop directly connected via global peering.
45
44
46
-
As illustrated in the diagram, it's better to place a UDR in the spoke subnets that have a 0/0 route (default gateway) with the local firewall as the next hop. This locks in the single next hop exit point as the local firewall. It also reduces the risk of asymmetric routing if it learns more specific prefixes from your on-premises environment that might cause the traffic to bypass the firewall. For more information, see [Don’t let your Azure Routes bite you](https://blog.cloudtrooper.net/2020/11/28/dont-let-your-azure-routes-bite-you/).
45
+
As shown in the diagram, it's best to place a UDR in the spoke subnets with a 0/0 route (default gateway) pointing to the local firewall as the next hop. This ensures a single exit point through the local firewall and reduces the risk of asymmetric routing if more specific prefixes from your on-premises environment cause traffic to bypass the firewall. For more information, see [Don’t let your Azure Routes bite you](https://blog.cloudtrooper.net/2020/11/28/dont-let-your-azure-routes-bite-you/).
47
46
48
47
Here's an example route table for the spoke subnets connected to Hub-01:
Copy file name to clipboardExpand all lines: articles/firewall/fqdn-filtering-network-rules.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,32 +5,32 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: concept-article
8
-
ms.date: 05/10/2024
8
+
ms.date: 03/17/2025
9
9
ms.author: duau
10
10
ms.custom: engagement-fy23
11
11
---
12
12
13
13
# Use FQDN filtering in network rules
14
14
15
-
A fully qualified domain name (FQDN) represents a domain name of a host or one or more IP addresses. You can use FQDNs in network rules based on DNS resolution in Azure Firewall and Firewall policy. This capability allows you to filter outbound traffic with any TCP/UDP protocol (including NTP, SSH, RDP, and more). You must enable DNS Proxy to use FQDNs in your network rules. For more information, see [Azure Firewall DNS settings](dns-settings.md).
15
+
A fully qualified domain name (FQDN) represents the complete domain name of a host or one or more IP addresses. In Azure Firewall and Firewall policy, you can use FQDNs in network rules based on DNS resolution. This feature allows you to filter outbound traffic using any TCP/UDP protocol, including NTP, SSH, and RDP. To use FQDNs in your network rules, you must enable DNS Proxy. For more information, see [Azure Firewall DNS settings](dns-settings.md).
16
16
17
17
> [!NOTE]
18
-
> By design, FQDN filtering in network rules doesn’t support wildcards
18
+
> FQDN filtering in network rules doesn't support wildcards by design.
19
19
20
20
## How it works
21
21
22
-
Once you define which DNS server your organization needs (Azure DNS or your own custom DNS), Azure Firewall translates the FQDN to an IP address or addresses based on the selected DNS server. This translation happens for both application and network rule processing.
22
+
First, define the DNS server your organization uses (either Azure DNS or a custom DNS). Azure Firewall then translates the FQDN to an IP address or addresses based on the chosen DNS server. This translation applies to both application and network rule processing.
23
23
24
-
When a new DNS resolution takes place, new IP addresses are added to firewall rules. Old IP addresses expire in 15 minutes when the DNS server no longer returns them. Azure Firewall rules are updated every 15 seconds from DNS resolution of the FQDNs in network rules.
24
+
When a new DNS resolution occurs, new IP addresses are added to the firewall rules. Old IP addresses expire after 15 minutes if the DNS server no longer returns them. Azure Firewall updates its rules every 15 seconds based on the DNS resolution of the FQDNs in network rules.
25
25
26
-
### Differences in application rules vs. network rules
26
+
### Differences between application rules and network rules
27
27
28
-
- FQDN filtering in application rules for HTTP/S and MSSQL is based on an applicationlevel transparent proxy and the SNI header. As such, it can discern between two FQDNs that are resolved to the same IP address. This isn't the case with FQDN filtering in network rules.
28
+
- FQDN filtering in application rules for HTTP/S and MSSQL relies on an application-level transparent proxy and the SNI header. This allows it to differentiate between two FQDNs that resolve to the same IP address. This capability isn't available with FQDN filtering in network rules.
29
29
30
-
Always use application rules when possible:
31
-
-If the protocol is HTTP/S or MSSQL, use application rules for FQDN filtering.
30
+
Always use application rules when possible:
31
+
-For HTTP/S or MSSQL protocols, use application rules for FQDN filtering.
32
32
- For services like AzureBackup and HDInsight, use application rules with FQDN tags.
33
-
- For any other protocols, you can use network rules for FQDN filtering.
33
+
- For other protocols, use network rules for FQDN filtering.
0 commit comments