This diagram illustrates a typical deployment of Azure Firewall, showcasing its integration within a Virtual Network (VNet) and its role in protecting your Azure and on-premises resources.
Key components often include:
- Hub VNet: Centralized network for management and security appliances like Azure Firewall.
- Spoke VNets: Workload VNets that peer with the hub VNet and route traffic through the firewall.
- On-premises Network: Connected via VPN Gateway or ExpressRoute, traffic can be inspected by the firewall.
- Azure Firewall: The managed, cloud-native network security service that protects your Azure VNet resources.
- Network Security Groups (NSGs): Applied at the subnet level for additional filtering.
- Route Tables: Used to force network traffic through the Azure Firewall.
- Azure Monitor: For logging and monitoring firewall activity.
This architecture provides a centralized point of control for security policies, threat intelligence, and network traffic inspection.