You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/firewall-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: conceptual
8
-
ms.date: 04/10/2020
8
+
ms.date: 05/11/2020
9
9
ms.author: victorh
10
10
---
11
11
@@ -124,7 +124,7 @@ Azure Firewall doesn't SNAT when the destination IP address is a private IP rang
124
124
125
125
## Is forced tunneling/chaining to a Network Virtual Appliance supported?
126
126
127
-
Forced tunneling is supported. For more information, see [Azure Firewall forced tunneling (preview)](forced-tunneling.md).
127
+
Forced tunneling is supported. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
128
128
129
129
Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
Copy file name to clipboardExpand all lines: articles/firewall/forced-tunneling.md
+4-9Lines changed: 4 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,25 +5,20 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: article
8
-
ms.date: 02/24/2020
8
+
ms.date: 05/11/2020
9
9
ms.author: victorh
10
10
---
11
11
12
-
# Azure Firewall forced tunneling (preview)
12
+
# Azure Firewall forced tunneling
13
13
14
14
You can configure Azure Firewall to route all Internet-bound traffic to a designated next hop instead of going directly to the Internet. For example, you may have an on-premises edge firewall or other network virtual appliance (NVA) to process network traffic before it's passed to the Internet.
15
15
16
-
> [!IMPORTANT]
17
-
> Azure Firewall forced tunneling is currently in public preview.
18
-
>
19
-
> This public preview is provided without a service-level agreement and shouldn't be used for production workloads. Certain features might not be supported, might have constrained capabilities, or might not be available in all Azure locations. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20
-
21
16
By default, forced tunneling isn't allowed on Azure Firewall to ensure all its outbound Azure dependencies are met. User Defined Route (UDR) configurations on the *AzureFirewallSubnet* that
22
17
have a default route not going directly to the Internet are disabled.
23
18
24
19
## Forced tunneling configuration
25
20
26
-
To support forced tunneling, service management traffic is separated from customer traffic. An additional dedicated subnet named *AzureFirewallManagementSubnet* (minimum subnet size /26) is required with its own associated public IP address. The only route allowed on this subnet is a default route to the Internet, and BGP route propagation must be disabled.
21
+
To support forced tunneling, Service Management traffic is separated from customer traffic. An additional dedicated subnet named *AzureFirewallManagementSubnet* (minimum subnet size /26) is required with its own associated public IP address. The only route allowed on this subnet is a default route to the Internet, and BGP route propagation must be disabled.
27
22
28
23
If you have a default route advertised via BGP to force traffic to on-premises, you must create the *AzureFirewallSubnet* and *AzureFirewallManagementSubnet* before deploying your firewall and have a UDR with a default route to the Internet, and **Virtual network gateway route propagation** disabled.
29
24
@@ -37,4 +32,4 @@ Once you configure Azure Firewall to support forced tunneling, you can't undo th
37
32
38
33
## Next steps
39
34
40
-
-[Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure portal](tutorial-hybrid-portal.md)
35
+
-[Tutorial: Deploy and configure Azure Firewall in a hybrid network using the Azure portal](tutorial-hybrid-portal.md)
Copy file name to clipboardExpand all lines: articles/firewall/overview.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: firewall
6
6
services: firewall
7
7
ms.topic: overview
8
8
ms.custom: mvc
9
-
ms.date: 05/06/2020
9
+
ms.date: 05/11/2020
10
10
ms.author: victorh
11
11
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
12
12
---
@@ -89,6 +89,10 @@ This enables the following scenarios:
89
89
90
90
All events are integrated with Azure Monitor, allowing you to archive logs to a storage account, stream events to your Event Hub, or send them to Azure Monitor logs.
91
91
92
+
## Forced tunneling
93
+
94
+
You can configure Azure Firewall to route all Internet-bound traffic to a designated next hop instead of going directly to the Internet. For example, you may have an on-premises edge firewall or other network virtual appliance (NVA) to process network traffic before it's passed to the Internet. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
95
+
92
96
## Certifications
93
97
94
98
Azure Firewall is Payment Card Industry (PCI), Service Organization Controls (SOC), International Organization for Standardization (ISO), and ICSA Labs compliant. For more information, see [Azure Firewall compliance certifications](compliance-certifications.md).
Copy file name to clipboardExpand all lines: articles/firewall/sql-fqdn-filtering.md
+2-7Lines changed: 2 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,17 +5,12 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: article
8
-
ms.date: 07/19/2019
8
+
ms.date: 05/11/2020
9
9
ms.author: victorh
10
10
---
11
11
12
12
# Configure Azure Firewall application rules with SQL FQDNs
13
13
14
-
> [!IMPORTANT]
15
-
> Azure Firewall application rules with SQL FQDNs is currently in public preview.
16
-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
17
-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18
-
19
14
You can now configure Azure Firewall application rules with SQL FQDNs. This allows you to limit access from your virtual networks to only the specified SQL server instances.
20
15
21
16
With SQL FQDNs, you can filter traffic:
@@ -24,7 +19,7 @@ With SQL FQDNs, you can filter traffic:
24
19
- From on-premises to Azure SQL Managed Instances or SQL IaaS running in your VNets.
25
20
- From spoke-to-spoke to Azure SQL Managed Instances or SQL IaaS running in your VNets.
26
21
27
-
During the public preview, SQL FQDN filtering is supported in [proxy-mode](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-architecture#connection-policy) only (port 1433). If you use SQL in the default redirect mode, you can filter access using the SQL service tag as part of [network rules](overview.md#network-traffic-filtering-rules).
22
+
SQL FQDN filtering is supported in [proxy-mode](https://docs.microsoft.com/azure/sql-database/sql-database-connectivity-architecture#connection-policy) only (port 1433). If you use SQL in the default redirect mode, you can filter access using the SQL service tag as part of [network rules](overview.md#network-traffic-filtering-rules).
28
23
If you use non-default ports for SQL IaaS traffic, you can configure those ports in the firewall application rules.
29
24
30
25
Application rules with SQL FQDNs is currently available in all regions via the Azure portal, Azure CLI, REST, and templates.
0 commit comments