Skip to content

Commit e6485ed

Browse files
authored
Merge pull request #232812 from vhorne/fw-explicit-proxy
Fw-explicit-proxy
2 parents ebf67b0 + 866b805 commit e6485ed

File tree

6 files changed

+55
-0
lines changed

6 files changed

+55
-0
lines changed

articles/firewall/explicit-proxy.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Azure Firewall Explicit proxy (preview)
3+
description: Learn about Azure Firewall's Explicit Proxy setting.
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: conceptual
8+
ms.date: 03/30/2023
9+
ms.author: magakman
10+
---
11+
12+
# Azure Firewall Explicit proxy (preview)
13+
14+
> [!IMPORTANT]
15+
> Explicit proxy is currently in PREVIEW.
16+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17+
18+
Azure Firewall operates in a transparent proxy mode by default. In this mode, traffic is sent to the firewall using a user defined route (UDR) configuration. The firewall intercepts that traffic inline and passes it to the destination.
19+
20+
With Explicit proxy set on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without the using a UDR.
21+
22+
With the Explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
23+
24+
## Configuration
25+
26+
Once the feature is enabled, the following screen shows on portal:
27+
28+
:::image type="content" source="media/explicit-proxy/enable-explicit-proxy.png" alt-text="Screenshot showing the Enable explicit proxy setting.":::
29+
30+
> [!NOTE]
31+
> The HTTP and HTTPS ports can't be the same.
32+
33+
Next, to allow the traffic to pass through the Firewall, create an application rule in the Firewall policy to allow this traffic.
34+
35+
To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
36+
37+
:::image type="content" source="media/explicit-proxy/proxy-auto-configuration.png" alt-text="Screenshot showing the proxy autoconfiguration file setting.":::
38+
39+
First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy** page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
40+
41+
The SAS URL must have READ permissions so the firewall can upload the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.
42+
43+
:::image type="content" source="media/explicit-proxy/shared-access-signature.png" alt-text="Screenshot showing generate shared access signature.":::
44+
## Next steps
45+
46+
To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall using Azure PowerShell](deploy-ps.md).

articles/firewall/firewall-preview.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,13 @@ For more information, see [Azure Structured Firewall Logs (preview)](firewall-st
4242

4343
Policy Analytics provides insights, centralized visibility, and control to Azure Firewall. IT teams today are challenged to keep Firewall rules up to date, manage existing rules, and remove unused rules. Any accidental rule updates can lead to a significant downtime for IT teams.
4444

45+
### Explicit proxy (preview)
46+
47+
With the Azure Firewall Explicit proxy set on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from a sending application goes to the firewall's private IP address, and therefore egresses directly from the firewall without using a user defined route (UDR).
48+
49+
For more information, see [Azure Firewall Explicit proxy (preview)](explicit-proxy.md).
50+
51+
4552
## Next steps
4653

4754
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).
52.1 KB
Loading
16 KB
Loading
170 KB
Loading

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,8 @@ items:
107107
href: long-running-sessions.md
108108
- name: Easy upgrade/downgrade
109109
href: easy-upgrade.md
110+
- name: Explicit Proxy
111+
href: explicit-proxy.md
110112
- name: How-to guides
111113
items:
112114
- name: Deploy and configure - classic

0 commit comments

Comments
 (0)