Azure Virtual WAN Networking

Comprehensive documentation and guides for building and managing your cloud network.

Managing Azure Firewall Policies with Virtual WAN

This guide provides detailed instructions on how to effectively manage Azure Firewall policies within your Azure Virtual WAN environment. Azure Firewall policies are central to defining and enforcing security rules across your virtual network resources.

What are Azure Firewall Policies?

Azure Firewall policies are a collection of security rules that control traffic flow to and from your Azure resources. They are essential for implementing a robust security posture, allowing you to granularly define what traffic is permitted or denied.

Key Concepts for Policy Management

Creating and Managing Firewall Policies

You can manage Azure Firewall policies through the Azure portal, Azure CLI, PowerShell, or ARM templates.

Using the Azure Portal

  1. Navigate to the Virtual WAN resource in the Azure portal.
  2. In the left-hand menu, select Azure Firewall under the Security + networking section.
  3. Choose the specific Azure Firewall instance you want to manage.
  4. Select Policies from the left-hand menu.
  5. Click + Create policy to create a new policy, or select an existing one to edit.
  6. Within a policy, you can manage Rule collections, Threat intelligence, and IP groups.

Azure CLI Example: Creating a Network Rule Collection

az network firewall policy rule-collection-group collection add \
    --policy-name MyFirewallPolicy \
    --resource-group MyResourceGroup \
    --collection-name AllowWebTraffic \
    --rule-collection-type NetworkRule \
    --rule-type Allow \
    --rules '[{"name": "AllowHTTP", "protocol": "TCP", "sourceAddresses": ["*"], "destinationAddresses": ["*"], "destinationPorts": ["80"], "destinationFqdns": null, "terminateTLS": false, "webCategories": null, "fqdnTags": null}]' \
    --priority 200

Azure CLI Example: Creating an Application Rule Collection

az network firewall policy rule-collection-group collection add \
    --policy-name MyFirewallPolicy \
    --resource-group MyResourceGroup \
    --collection-name AllowAppTraffic \
    --rule-collection-type ApplicationRule \
    --rule-type Allow \
    --rules '[{"name": "AllowMicrosoft365", "protocol": {"type": "HTTP", "port": 80}, "sourceAddresses": ["10.0.1.0/24"], "destinationFqdns": ["*.office365.com"], "webCategories": null, "fqdnTags": ["Office365PortsAndProtocols"]}]' \
    --priority 100

Best Practices for Policy Management

Tip: Regularly review and audit your firewall policies to ensure they align with your security requirements and remove any outdated or unnecessary rules.

Advanced Scenarios

Explore advanced topics such as integrating with Network Security Groups (NSGs), managing policies for multiple Virtual Hubs, and using Azure Policy for governance.

Further Reading