Skip to content

Commit e814857

Browse files
Merge pull request #215820 from vhorne/fw-rules
add info from Issue # 99780
2 parents d20d5d6 + afa2a70 commit e814857

File tree

1 file changed

+12
-4
lines changed

1 file changed

+12
-4
lines changed

articles/firewall/policy-rule-sets.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 09/12/2022
8+
ms.date: 10/25/2022
99
ms.author: victorh
1010
---
1111

@@ -51,24 +51,32 @@ A rule belongs to a rule collection, and it specifies which traffic is allowed o
5151

5252
For application rules, the traffic is processed by our built-in [infrastructure rule collection](infrastructure-fqdns.md) before it's denied by default.
5353

54+
### Inbound vs. outbound
55+
56+
An **inbound** firewall rule protects your network from threats that originate from outside your network (traffic sourced from the Internet) and attempts to infiltrate your network inwardly.
57+
58+
An **outbound** firewall rule protects against nefarious traffic that originates internally (traffic sourced from a private IP address within Azure) and travels outwardly. This is usually traffic from within Azure resources being redirected via the Firewall before reaching a destination.
59+
60+
### Rule types
61+
5462
There are three types of rules:
5563

5664
- DNAT
5765
- Network
5866
- Application
5967

60-
### DNAT rules
68+
#### DNAT rules
6169

6270
DNAT rules allow or deny inbound traffic through the firewall public IP address(es).
6371
You can use a DNAT rule when you want a public IP address to be translated into a private IP address. The Azure Firewall public IP addresses can be used to listen to inbound traffic from the Internet, filter the traffic and translate this traffic to internal resources in Azure.
6472

65-
### Network rules
73+
#### Network rules
6674

6775
Network rules allow or deny inbound, outbound, and east-west traffic based on the network layer (L3) and transport layer (L4).
6876
You can use a network rule when you want to filter traffic based on IP addresses, any ports, and any protocols.
6977

7078

71-
### Application rules
79+
#### Application rules
7280

7381
Application rules allow or deny outbound and east-west traffic based on the application layer (L7).
7482
You can use an application rule when you want to filter traffic based on fully qualified domain names (FQDNs), URLs, and HTTP/HTTPS protocols.

0 commit comments

Comments
 (0)