Azure Firewall Integration with Virtual WAN

This document details how to integrate Azure Firewall with Azure Virtual WAN to provide centralized network security and advanced threat protection for your virtual networks.

Note: Azure Firewall is a managed, cloud-native network security service that protects your Azure Virtual WAN resources. It's a highly available, scalable, and stateful firewall-as-a-service.

Key Benefits of Integration

Deployment Scenarios

1. Firewall in a Hub Virtual Network

This is the most common scenario. Azure Firewall is deployed in the Virtual WAN hub's virtual network. All traffic from spokes, on-premises networks, and other connections transits through the hub and is inspected by the firewall.

Traffic Flow:

To achieve this, you need to configure routing in your spoke virtual networks to direct traffic to the Virtual WAN hub. Azure Firewall is then configured within the hub to inspect this traffic.

2. Firewall in a Spoke Virtual Network (Less Common for Centralized Security)

While possible, deploying Azure Firewall in a spoke is generally not recommended for achieving centralized security for the entire WAN. It would typically be used to protect resources within that specific spoke.

Configuration Steps

Prerequisites:

Steps:

  1. Deploy Azure Firewall: Deploy an Azure Firewall instance within your Virtual WAN hub's virtual network. During deployment, associate it with the Virtual WAN hub.
  2. Configure Hub Route Table: Ensure that the hub route table is configured to send traffic from spokes and other connections to the Azure Firewall's private IP address. This is typically achieved using a User Defined Route (UDR) or by leveraging Virtual WAN's automatic route propagation.
  3. Configure Firewall Policies and Rules:
    • Network Rules: Control inbound and outbound traffic based on IP addresses, ports, and protocols.
    • Application Rules: Control HTTP/S traffic based on fully qualified domain names (FQDNs), FQDN tags, and application IDs.
    • NAT Rules: Configure destination network address translation (DNAT) for inbound connections and source network address translation (SNAT) for outbound connections.
  4. Route Spoke Traffic: In each spoke virtual network, create a UDR that points the default route (0.0.0.0/0) to the Virtual WAN hub's IP address. The hub will then handle routing this traffic to the Azure Firewall for inspection. Alternatively, Virtual WAN's routing capabilities can often manage this automatically for standard transit routing.
  5. Monitor and Audit: Utilize Azure Firewall's diagnostic logs and Azure Monitor to track security events, traffic flows, and performance.

Key Concepts

Ensure proper routing is configured to guarantee that all desired traffic passes through Azure Firewall for inspection. Incorrect routing can lead to security bypasses.

Further Reading