A cloud-based, managed network security service that is used to protect your Azure Virtual Network resources and filter allow and deny traffic flow is called Azure Firewall. Azure Firewall provides built-in availability and unrestricted cloud scalability because Azure Firewall is a fully stateful Firewall service. Using the azure Firewall user can create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
The static public IP address is used by Azure for your virtual network resources allow outside firewalls to identify traffic originating from your virtual network. Azure provides a fully integrated service with Azure Monitor which is used for logging and analytics.
Azure Firewall includes the following features:
Azure provides high availability so no additional load balance is required and no need to configure.
For increasing availability, Azure Firewall can be configured during deployment to span multiple Availability Zones. Using Availability Zones, availability increases to 99.99% uptime. when two or more Availability Zones are selected then a 99.99% uptime Service Level Agreement (SLA) is offered. Using the service standard 99.95% SLA, you can also associate Azure Firewall to a specific zone just for proximity reasons.
According to network traffic flows Azure Firewall can be scaled up as much as you need. There is no need to budget for your peak traffic.
Outbound HTTP/S traffic or Azure SQL traffic can be limit to a specified list of fully qualified domain names (FQDN) including wild cards.
A allow or deny network filtering rules can be created centrally by source and destination IP address, port, and protocol. Azure Firewall can distinguish legitimate packets for different types of connections because Azure Firewall is fully stateful.
Using FQDN tags makes it easier for you to allow well-known Azure service network traffic through your firewall. Using a Firewall, you can create an application rule and include the Windows Update tag.
A service tag is used to represents a group of IP address prefixes which helps to minimize complexity for security rule creation. Address prefixes are managed by Microsoft and automatically updates the service tag as addresses changes.
Threat intelligence based filtering can be used for the firewall to alert and deny traffic from known malicious IP addresses and domains. The Microsoft Threat Intelligence feed provide the IP addresses and domains.
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation) so that you can identify and allow traffic originating from your virtual network to remote Internet destinations. When the destination IP is a private IP range per IANA RFC 1918 Azure Firewall doesn't SNAT.
Using Azure Firewall, Inbound Internet network traffic public IP address is translated and filtered to the private IP addresses on virtual networks.
Multiple public IP addresses (up to 250) can be associated with your firewall.
This enables the following scenarios:
Azure Monitor allows you to archive logs to a storage account, stream events to your Event Hub or send them to Azure Monitor logs.
Flexible canvas is provided by Azure Firewall Workbook for Azure Firewall data analysis so that you can create rich visual reports within the Azure portal.
Using force tunnelling, Azure Firewall can be configured to route all Internet-bound traffic to a designated next hop instead of going directly to the Internet. To process network traffic before it's passed to the Internet Azure Firewall provide an on-premises edge firewall or other networks virtual appliance (NVA).
Azure Firewall has certification of Payment Card Industry (PCI), Service Organization Controls (SOC), and International Organization for Standardization (ISO), and ICSA Labs compliant.
Azure Firewall launched in September 2018 and Azure DNS is hardcoded for ensuring the service which can be reliably resolve its outbound dependencies. Azure Firewall can be configured to use your own DNS server or Firewall outbound dependencies that are still resolved with Azure DNS using custom DNS support. In Azure Firewall and Firewall Policy DNS settings a single DNS server or multiple servers can be configured.
Using Azure Private DNS Azure Firewall can resolve names. The Virtual Network must be linked to the Azure Private Zone which resides on Azure Firewall.
If DNS proxy is enabled, Azure Firewall can process and forward DNS queries from a Virtual Network(s) to your desired DNS server. The DNS proxy is required to have reliable FQDN filtering in network rules because this functionality is crucial and required to have reliable FQDN filtering in network rules.
Using the following step, you can enable DNS proxy in Azure Firewall and Firewall Policy settings.
Figure 1. Custom DNS and DNS proxy settings
In Azure Firewall and Firewall Policy, you can now use fully qualified domain names (FQDNs) in network rules based on DNS resolution.
Based on your firewall DNS settings, the specified FQDNs are translated to IP addresses. Using FQDNs with any TCP/UDP protocol (including NTP, SSH, RDP, and more) allows you to filter outbound traffic. FQDN filtering is based on DNS resolution, so it is highly recommended you to enable the DNS proxy to ensure name resolution is consistent for your virtual machines and firewall.
Figure 2. FQDN filtering in network rules.
Azure Private Link is used to connect to Microsoft PaaS services, including storage accounts, app services, and more, over a private connection, using private endpoints.
A private endpoint is a network interface used to connect you privately and securely to a PaaS service powered by Azure Private Link.
The advantage of Azure Private Link is that it has the ability to consume Microsoft PaaS services over hybrid connections.
Each Azure PaaS service FQDN that is mapped and stored in an Azure Private DNS zone is provided to Private Link. Requests to Azure DNS Private Zones go to the platform address of 168.63.129.16 which is only reachable from inside of Azure. So that if the DNS request originates from outside of Azure, there is a requirement to proxy the DNS request via a service inside of a Virtual Network.
In the above blog, we have discussed the Azure firewall and features of the Azure firewall. We have also discussed the new enhanced features of the Azure firewall.
July 29, 2021
July 22, 2021
July 20, 2021
July 16, 2021
Well do everything we can to make our next best project!
Check out our most recent blogs
July 29, 2021
What is Angular? Angular is a frontend development framework used for building single-page client applications using HTML and Typescript. It is written in Typescript. What...
July 22, 2021
What is a Compiler? A compiler is nothing but a part of code that converts one programming language to another. If we talk about some simple programming languages like C, C++,...
July 20, 2021
Introduction Angular is a remarkable framework that may be used to create mobile and desktop web apps with spectacular UIs. It's made with JavaScript. we can utilize HTML, CSS,...
Well do everything we can to make our next best project!