Skip to content

Commit f43ed0f

Browse files
authored
Merge pull request #185569 from vhorne/fw-known-issues
Fw known issues
2 parents 5891498 + 6d5d549 commit f43ed0f

File tree

2 files changed

+24
-19
lines changed

2 files changed

+24
-19
lines changed

articles/firewall/overview.md

Lines changed: 24 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,13 @@
22
title: What is Azure Firewall?
33
description: Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources.
44
author: vhorne
5+
ms.author: victorh
56
ms.service: firewall
67
services: firewall
78
ms.topic: overview
89
ms.custom: mvc, contperf-fy21q1
9-
ms.date: 01/19/2022
10-
ms.author: victorh
10+
ms.date: 01/20/2022
11+
1112
# Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1213
---
1314

@@ -63,7 +64,9 @@ To learn what's new with Azure Firewall, see [Azure updates](https://azure.micro
6364

6465
## Known issues
6566

66-
Azure Firewall has the following known issues:
67+
### Azure Firewall Standard
68+
69+
Azure Firewall Standard has the following known issues:
6770

6871
|Issue |Description |Mitigation |
6972
|---------|---------|---------|
@@ -100,6 +103,24 @@ Azure Firewall has the following known issues:
100103
| Firewall logs (Resource specific tables - Preview) | Resource specific log queries are in preview mode and aren't currently supported. | A fix is being investigated.|
101104
|Availability Zones for Firewall Premium in the Southeast Asia region|You can't currently deploy Azure Firewall Premium with Availability Zones in the Southeast Asia region.|Deploy the firewall in Southeast Asia without Availability Zones, or deploy in a region that supports Availability Zones.|
102105

106+
### Azure Firewall Premium
107+
108+
Azure Firewall Premium has the following known issues:
109+
110+
111+
|Issue |Description |Mitigation |
112+
|---------|---------|---------|
113+
|ESNI support for FQDN resolution in HTTPS|Encrypted SNI isn't supported in HTTPS handshake.|Today only Firefox supports ESNI through custom configuration. Suggested workaround is to disable this feature.|
114+
|Client Certificates (TLS)|Client certificates are used to build a mutual identity trust between the client and the server. Client certificates are used during a TLS negotiation. Azure firewall renegotiates a connection with the server and has no access to the private key of the client certificates.|None|
115+
|QUIC/HTTP3|QUIC is the new major version of HTTP. It's a UDP-based protocol over 80 (PLAN) and 443 (SSL). FQDN/URL/TLS inspection won't be supported.|Configure passing UDP 80/443 as network rules.|
116+
Untrusted customer signed certificates|Customer signed certificates are not trusted by the firewall once received from an intranet-based web server.|A fix is being investigated.
117+
|Wrong source IP address in Alerts with IDPS for HTTP (without TLS inspection).|When plain text HTTP traffic is in use, and IDPS issues a new alert, and the destination is a public IP address, the displayed source IP address is wrong (the internal IP address is displayed instead of the original IP address).|A fix is being investigated.|
118+
|Certificate Propagation|After a CA certificate is applied on the firewall, it may take between 5-10 minutes for the certificate to take effect.|A fix is being investigated.|
119+
|TLS 1.3 support|TLS 1.3 is partially supported. The TLS tunnel from client to the firewall is based on TLS 1.2, and from the firewall to the external Web server is based on TLS 1.3.|Updates are being investigated.|
120+
|KeyVault Private Endpoint|KeyVault supports Private Endpoint access to limit its network exposure. Trusted Azure Services can bypass this limitation if an exception is configured as described in the [KeyVault documentation](../key-vault/general/overview-vnet-service-endpoints.md#trusted-services). Azure Firewall is not currently listed as a trusted service and can't access the Key Vault.|A fix is being investigated.|
121+
|IDPS Bypass list|IDPS Bypass list doesn't support IP Groups.|A fix is being investigated.|
122+
123+
103124
## Next steps
104125

105126
- [Quickstart: Create an Azure Firewall and a firewall policy - ARM template](../firewall-manager/quick-firewall-policy.md)

articles/firewall/premium-features.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -134,22 +134,6 @@ Under the **Web Categories** tab in **Firewall Policy Settings**, you can reques
134134

135135
For the supported regions for Azure Firewall, see [Azure products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=azure-firewall).
136136

137-
## Known issues
138-
139-
Azure Firewall Premium has the following known issues:
140-
141-
142-
|Issue |Description |Mitigation |
143-
|---------|---------|---------|
144-
|ESNI support for FQDN resolution in HTTPS|Encrypted SNI isn't supported in HTTPS handshake.|Today only Firefox supports ESNI through custom configuration. Suggested workaround is to disable this feature.|
145-
|Client Certificates (TLS)|Client certificates are used to build a mutual identity trust between the client and the server. Client certificates are used during a TLS negotiation. Azure firewall renegotiates a connection with the server and has no access to the private key of the client certificates.|None|
146-
|QUIC/HTTP3|QUIC is the new major version of HTTP. It's a UDP-based protocol over 80 (PLAN) and 443 (SSL). FQDN/URL/TLS inspection won't be supported.|Configure passing UDP 80/443 as network rules.|
147-
Untrusted customer signed certificates|Customer signed certificates are not trusted by the firewall once received from an intranet-based web server.|A fix is being investigated.
148-
|Wrong source IP address in Alerts with IDPS for HTTP (without TLS inspection).|When plain text HTTP traffic is in use, and IDPS issues a new alert, and the destination is a public IP address, the displayed source IP address is wrong (the internal IP address is displayed instead of the original IP address).|A fix is being investigated.|
149-
|Certificate Propagation|After a CA certificate is applied on the firewall, it may take between 5-10 minutes for the certificate to take effect.|A fix is being investigated.|
150-
|TLS 1.3 support|TLS 1.3 is partially supported. The TLS tunnel from client to the firewall is based on TLS 1.2, and from the firewall to the external Web server is based on TLS 1.3.|Updates are being investigated.|
151-
|KeyVault Private Endpoint|KeyVault supports Private Endpoint access to limit its network exposure. Trusted Azure Services can bypass this limitation if an exception is configured as described in the [KeyVault documentation](../key-vault/general/overview-vnet-service-endpoints.md#trusted-services). Azure Firewall is not currently listed as a trusted service and can't access the Key Vault.|A fix is being investigated.|
152-
|IDPS Bypass list|IDPS Bypass list doesn't support IP Groups.|A fix is being investigated.|
153137

154138
## Next steps
155139

0 commit comments

Comments
 (0)