Skip to content

Commit f56e380

Browse files
authored
Added multiple subdomain wildcard example
1 parent 6339f69 commit f56e380

File tree

1 file changed

+41
-41
lines changed

1 file changed

+41
-41
lines changed

articles/firewall/firewall-faq.yml

Lines changed: 41 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -21,35 +21,35 @@ sections:
2121
- question: What capabilities are supported in Azure Firewall?
2222
answer: |
2323
To learn about Azure Firewall features, see [Azure Firewall features](features.md).
24-
24+
2525
- question: What is the typical deployment model for Azure Firewall?
2626
answer: |
2727
You can deploy Azure Firewall on any virtual network, but customers typically deploy it on a central virtual network and peer other virtual networks to it in a hub-and-spoke model. You can then set the default route from the peered virtual networks to point to this central firewall virtual network. Global VNet peering is supported, but it isn't recommended because of potential performance and latency issues across regions. For best performance, deploy one firewall per region.
28-
28+
2929
The advantage of this model is the ability to centrally exert control on multiple spoke VNETs across different subscriptions. There are also cost savings as you don't need to deploy a firewall in each VNet separately. The cost savings should be measured versus the associate peering cost based on the customer traffic patterns.
30-
30+
3131
- question: How can I install the Azure Firewall?
3232
answer: |
3333
You can set up Azure Firewall by using the Azure portal, PowerShell, REST API, or by using templates. See [Tutorial: Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md) for step-by-step instructions.
34-
34+
3535
- question: What are some Azure Firewall concepts?
3636
answer: |
3737
Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.
38-
38+
3939
There are three types of rule collections:
40-
40+
4141
* *Application rules*: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
4242
* *Network rules*: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
4343
* *NAT rules*: Configure DNAT rules to allow incoming Internet connections.
44-
44+
4545
- question: Does Azure Firewall support inbound traffic filtering?
4646
answer: |
4747
Azure Firewall supports inbound and outbound filtering. Inbound protection is typically used for non-HTTP/S protocols. For example RDP, SSH, and FTP protocols. For best inbound HTTP/S protection, use a web application firewall such as [Azure Web Application Firewall (WAF)](../web-application-firewall/overview.md).
48-
48+
4949
- question: Which logging and analytics services are supported by the Azure Firewall?
5050
answer: |
5151
Azure Firewall is integrated with Azure Monitor for viewing and analyzing firewall logs. Logs can be sent to Log Analytics, Azure Storage, or Event Hubs. They can be analyzed in Log Analytics or by different tools such as Excel and Power BI. For more information, see [Tutorial: Monitor Azure Firewall logs](./firewall-diagnostics.md).
52-
52+
5353
- question: How does Azure Firewall work differently from existing services such as NVAs in the marketplace?
5454
answer: Azure Firewall is a managed, cloud-based network security service that protects your virtual network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It is pre-integrated with third-party security as a service (SECaaS) providers to provide advanced security for your virtual network and branch Internet connections.
5555

@@ -65,34 +65,34 @@ sections:
6565
- question: How do I set up Azure Firewall with my service endpoints?
6666
answer: |
6767
For secure access to PaaS services, we recommend service endpoints. You can choose to enable service endpoints in the Azure Firewall subnet and disable them on the connected spoke virtual networks. This way you benefit from both features: service endpoint security and central logging for all traffic.
68-
68+
6969
- question: What is the pricing for Azure Firewall?
7070
answer: |
7171
See [Azure Firewall Pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
72-
72+
7373
- question: How can I stop and start Azure Firewall?
7474
answer: |
7575
You can use Azure PowerShell *deallocate* and *allocate* methods. For a firewall configured for forced tunneling, the procedure is slightly different.
76-
76+
7777
For example, for a firewall NOT configured for forced tunneling:
78-
78+
7979
```azurepowershell
8080
# Stop an existing firewall
8181
8282
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
8383
$azfw.Deallocate()
8484
Set-AzFirewall -AzureFirewall $azfw
8585
```
86-
86+
8787
```azurepowershell
8888
# Start the firewall
89-
89+
9090
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
9191
$vnet = Get-AzVirtualNetwork -ResourceGroupName "RG Name" -Name "VNet Name"
9292
$publicip1 = Get-AzPublicIpAddress -Name "Public IP1 Name" -ResourceGroupName "RG Name"
9393
$publicip2 = Get-AzPublicIpAddress -Name "Public IP2 Name" -ResourceGroupName "RG Name"
9494
$azfw.Allocate($vnet,@($publicip1,$publicip2))
95-
95+
9696
Set-AzFirewall -AzureFirewall $azfw
9797
```
9898
@@ -108,7 +108,7 @@ sections:
108108
109109
```azurepowershell
110110
# Start the firewall
111-
111+
112112
$azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
113113
$vnet = Get-AzVirtualNetwork -ResourceGroupName "RG Name" -Name "VNet Name"
114114
$pip= Get-AzPublicIpAddress -ResourceGroupName "RG Name" -Name "azfwpublicip"
@@ -118,14 +118,14 @@ sections:
118118
```
119119
120120
When you allocate and deallocate, [firewall billing](https://azure.microsoft.com/pricing/details/azure-firewall) stops and starts accordingly.
121-
121+
122122
> [!NOTE]
123123
> You must reallocate a firewall and public IP to the original resource group and subscription.
124124
125125
- question: What are the known service limits?
126126
answer: |
127127
For Azure Firewall service limits, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
128-
128+
129129
- question: Can Azure Firewall in a hub virtual network forward and filter network traffic between two spoke virtual networks?
130130
answer: Yes, you can use Azure Firewall in a hub virtual network to route and filter traffic between two spoke virtual network. Subnets in each of the spoke virtual networks must have a UDR pointing to the Azure Firewall as a default gateway for this scenario to work properly.
131131

@@ -135,23 +135,23 @@ sections:
135135
- question: Does Azure Firewall outbound SNAT between private networks?
136136
answer: |
137137
Azure Firewall doesn't SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
138-
138+
139139
In addition, traffic processed by application rules are always SNAT-ed. If you want to see the original source IP address in your logs for FQDN traffic, you can use network rules with the destination FQDN.
140140
- question: Is forced tunneling/chaining to a Network Virtual Appliance supported?
141141
answer: |
142142
Forced tunneling is supported when you create a new firewall. You can't configure an existing firewall for forced tunneling. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
143-
143+
144144
Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override this with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity.
145-
145+
146146
If your configuration requires forced tunneling to an on-premises network and you can determine the target IP prefixes for your Internet destinations, you can configure these ranges with the on-premises network as the next hop via a user defined route on the AzureFirewallSubnet. Or, you can use BGP to define these routes.
147-
147+
148148
- question: Are there any firewall resource group restrictions?
149149
answer: Yes. The firewall, VNet, and the public IP address all must be in the same resource group.
150150

151151
- question: When configuring DNAT for inbound Internet network traffic, do I also need to configure a corresponding network rule to allow that traffic?
152152
answer: |
153153
No. NAT rules implicitly add a corresponding network rule to allow the translated traffic. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
154-
154+
155155
- question: How do wildcards work in target URLs and target FQDNs in application rules?
156156
answer: |
157157
- **URL** - Asterisks work when placed on the right-most or left-most side. If it is on the left, it can't be part of the FQDN.
@@ -164,7 +164,7 @@ sections:
164164
|---------|---------|---------|---------|
165165
|TargetURL |`www.contoso.com` |Yes|`www.contoso.com`<br>`www.contoso.com/`|
166166
|TargetURL |`*.contoso.com` |Yes|`any.contoso.com/`|
167-
|TargetURL |`*contoso.com`|Yes |`example.anycontoso.com`<br>`contoso.com`|
167+
|TargetURL |`*contoso.com`|Yes |`example.anycontoso.com`<br>`sub1.example.anycontoso.com`<br>`contoso.com`|
168168
|TargetURL |`www.contoso.com/test`|Yes|`www.contoso.com/test`<br>`www.contoso.com/test/`<br>`www.contoso.com/test?with_query=1`|
169169
|TargetURL |`www.contoso.com/test/*`|Yes|`www.contoso.com/test/anything`<br>Note - `www.contoso.com/test` will **not** match (last slash)|
170170
|TargetURL |`www.contoso.*/test/*`|No| |
@@ -178,7 +178,7 @@ sections:
178178
|TargetFQDN |`*contoso.com`|Yes|`example.anycontoso.com`<br>`contoso.com`|
179179
|TargetFQDN |`www.contoso.*`|No| |
180180
|TargetFQDN |`*.contoso.*`|No| |
181-
181+
182182
- question: |
183183
What does *Provisioning state: Failed* mean?
184184
answer: Whenever a configuration change is applied, Azure Firewall attempts to update all its underlying backend instances. In rare cases, one of these backend instances may fail to update with the new configuration and the update process stops with a failed provisioning state. Your Azure Firewall is still operational, but the applied configuration may be in an inconsistent state, where some instances have the previous configuration where others have the updated rule set. If this happens, try updating your configuration one more time until the operation succeeds and your Firewall is in a *Succeeded* provisioning state.
@@ -203,63 +203,63 @@ sections:
203203

204204
- question: How long does it take for Azure Firewall to scale out?
205205
answer: |
206-
Azure Firewall gradually scales when average throughput or CPU consumption is at 60%. A default deployment maximum throughput is approximately 2.5 - 3 Gbps and starts to scale out when it reaches 60% of that number. Scale out takes five to seven minutes.
207-
206+
Azure Firewall gradually scales when average throughput or CPU consumption is at 60%. A default deployment maximum throughput is approximately 2.5 - 3 Gbps and starts to scale out when it reaches 60% of that number. Scale out takes five to seven minutes.
207+
208208
When performance testing, make sure you test for at least 10 to 15 minutes, and start new connections to take advantage of newly created Firewall nodes.
209209
210210
- question: How does Azure Firewall handle idle timeouts?
211211
answer: |
212212
When a connection has an idle timeout (four minutes of no activity), Azure Firewall gracefully terminates the connection by sending a TCP RST packet.
213213
214214
- question: How does Azure Firewall handle VM instance shutdowns during virtual machine scale set scale in (scale down) or fleet software upgrades?
215-
answer: |
216-
An Azure Firewall VM instance shutdown may occur during virtual machine scale set scale in (scale down) or during fleet software upgrade. In these cases, new incoming connections are load balanced to the remaining firewall instances and are not forwarded to the down firewall instance. After 45 seconds the firewall starts rejecting existing connections by sending TCP RST packets. After an additional 45 seconds the firewall VM shuts down. For more information, see [Load Balancer TCP Reset and Idle Timeout](../load-balancer/load-balancer-tcp-reset.md).
217-
215+
answer: |
216+
An Azure Firewall VM instance shutdown may occur during virtual machine scale set scale in (scale down) or during fleet software upgrade. In these cases, new incoming connections are load balanced to the remaining firewall instances and are not forwarded to the down firewall instance. After 45 seconds the firewall starts rejecting existing connections by sending TCP RST packets. After an additional 45 seconds the firewall VM shuts down. For more information, see [Load Balancer TCP Reset and Idle Timeout](../load-balancer/load-balancer-tcp-reset.md).
217+
218218
- question: Does Azure Firewall allow access to Active Directory by default?
219219
answer: |
220220
No. Azure Firewall blocks Active Directory access by default. To allow access, configure the AzureActiveDirectory service tag. For more information, see [Azure Firewall service tags](service-tags.md).
221-
221+
222222
- question: Can I exclude an FQDN or an IP address from Azure Firewall Threat Intelligence based filtering?
223223
answer: |
224224
Yes, you can use Azure PowerShell to do it:
225-
225+
226226
```azurepowershell
227227
# Add a Threat Intelligence allowlist to an Existing Azure Firewall
228228
229229
# Create the allowlist with both FQDN and IPAddresses
230230
$fw = Get-AzFirewall -Name "Name_of_Firewall" -ResourceGroupName "Name_of_ResourceGroup"
231231
$fw.ThreatIntelWhitelist = New-AzFirewallThreatIntelWhitelist `
232232
-FQDN @("fqdn1", "fqdn2", …) -IpAddress @("ip1", "ip2", …)
233-
233+
234234
# Or Update FQDNs and IpAddresses separately
235235
$fw = Get-AzFirewall -Name $firewallname -ResourceGroupName $RG
236236
$fw.ThreatIntelWhitelist.IpAddresses = @($fw.ThreatIntelWhitelist.IpAddresses + $ipaddresses)
237237
$fw.ThreatIntelWhitelist.fqdns = @($fw.ThreatIntelWhitelist.fqdns + $fqdns)
238-
239-
238+
239+
240240
Set-AzFirewall -AzureFirewall $fw
241241
```
242-
242+
243243
- question: Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
244244
answer: |
245245
A TCP ping isn't actually connecting to the target FQDN. Azure Firewall doesn't allow a connection to any target IP address/FQDN unless there is an explicit rule that allows it.
246-
246+
247247
TCP ping is a unique use case where if there is no allowed rule, the Firewall itself responds to the client's TCP ping request even though the TCP ping doesn't reach the target IP address/FQDN. In this case, the event is not logged. If there is a network rule that allows access to the target IP address/FQDN, then the ping request reaches the target server and its response is relayed back to the client. This event is logged in the Network rules log.
248248
249249
250250
- question: Are there limits for the number of IP addresses supported by IP Groups?
251251
answer: |
252252
Yes. For more information, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)
253-
253+
254254
- question: Can I move an IP Group to another resource group?
255255
answer: No, moving an IP Group to another resource group isn't currently supported.
256256

257257
- question: What is the TCP Idle Timeout for Azure Firewall?
258258
answer: |
259259
A standard behavior of a network firewall is to ensure TCP connections are kept alive and to promptly close them if there's no activity. Azure Firewall TCP Idle Timeout is four minutes. This setting isn't user configurable, but you can contact Azure Support to increase the idle timeout up to 30 minutes.
260-
260+
261261
If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained. A common practice is to use a TCP keep-alive. This practice keeps the connection active for a longer period. For more information, see the [.NET examples](/dotnet/api/system.net.servicepoint.settcpkeepalive).
262-
262+
263263
- question: Can I deploy Azure Firewall without a public IP address?
264264
answer: No, currently you must deploy Azure Firewall with a public IP address.
265265

0 commit comments

Comments
 (0)