Next-Generation Firewalls in Azure

This document provides an overview of Next-Generation Firewalls (NGFWs) and how they can be deployed and managed within the Microsoft Azure cloud platform.

What are Next-Generation Firewalls?

Next-Generation Firewalls (NGFWs) are advanced network security devices that combine traditional firewall capabilities with additional security features. These features typically include:

NGFWs in Azure

Azure provides several options for deploying NGFWs to protect your virtual networks:

Azure Firewall Premium

Azure Firewall Premium offers robust security features for your virtual networks. Key capabilities include:

For detailed configuration and deployment guidance for Azure Firewall Premium, refer to the Azure Firewall Premium documentation.

Third-Party Network Virtual Appliances (NVAs)

Many leading security vendors offer their NGFW solutions as NVAs in the Azure Marketplace. These solutions provide a familiar interface and advanced features tailored to specific security needs.

Deploying third-party NVAs typically involves:

  1. Choosing an NVA from the Azure Marketplace.
  2. Deploying the NVA into your virtual network.
  3. Configuring routing to direct traffic through the NVA.
  4. Managing the NVA using the vendor's specific tools and interfaces.

Common vendors include Palo Alto Networks, Fortinet, Check Point, and others.

Deployment Topologies

Several common topologies exist for deploying NGFWs in Azure:

Note: Carefully plan your deployment topology based on your security requirements, traffic flow, and scalability needs.

Key Considerations

Best Practices

Example Configuration Snippet (Conceptual)

Below is a conceptual example of how you might configure routing to send traffic through an NVA.

# Example Azure CLI command (conceptual) az network route-table create --name NvaRouteTable --resource-group MyResourceGroup az network route-table route create --route-table-name NvaRouteTable --name ToNvaRoute \ --address-prefix 0.0.0.0/0 --next-hop-type VirtualAppliance \ --next-hop-ip-address --resource-group MyResourceGroup
Tip: Consult the specific documentation for your chosen NGFW vendor for detailed CLI or portal configuration instructions.

For more information on securing your Azure network infrastructure, explore the full Azure Networking documentation.