Skip to content

Commit b5f44b6

Browse files
committed
update for ping explanation
1 parent 4f251c2 commit b5f44b6

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/firewall/firewall-faq.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 03/25/2020
8+
ms.date: 03/31/2020
99
ms.author: victorh
1010
---
1111

@@ -203,4 +203,8 @@ $fw.ThreatIntelWhitelist.FQDNs = @("fqdn1", "fqdn2", …)
203203
$fw.ThreatIntelWhitelist.IpAddress = @("ip1", "ip2", …)
204204
205205
Set-AzFirewall -AzureFirewall $fw
206-
```
206+
```
207+
208+
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209+
210+
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.

0 commit comments

Comments
 (0)