Azure Virtual WAN

Securely connect and manage your Azure and on-premises networks.

How to Configure Firewall for Azure Virtual WAN

This guide provides step-by-step instructions on integrating and configuring Azure Firewall with your Azure Virtual WAN hub to secure your branch and VNet traffic.

Prerequisites

Step 1: Deploy Azure Firewall in the Virtual WAN Hub

If you haven't already deployed Azure Firewall into your Virtual WAN hub, follow these steps:

  1. Navigate to your Virtual WAN resource in the Azure portal.
  2. Under "Connectivity," select "Hubs."
  3. Click on your hub, then select "Azure Firewall."
  4. Click "Create Firewall" and follow the wizard to deploy a new Azure Firewall instance within the hub. Choose the appropriate SKU (Standard or Premium) and configure networking settings.

Step 2: Configure Firewall Policy and Rules

Once Azure Firewall is deployed, you need to define its policies and rules to control traffic flow. You can manage these through Firewall Manager or directly on the Azure Firewall resource.

Using Azure Firewall Manager (Recommended)

  1. Navigate to "Azure Firewall Manager" in the Azure portal.
  2. Under "Security management," select "Firewall policies."
  3. Click "Create firewall policy."
  4. Associate the policy with your Virtual WAN hub.
  5. Define "Network rules" to allow or deny traffic based on IP addresses, ports, and protocols.
  6. Define "Application rules" to allow or deny traffic to specific FQDNs (Fully Qualified Domain Names).
  7. Define "NAT rules" to translate destination IP addresses and ports for incoming connections.

Directly on Azure Firewall Resource

Alternatively, you can configure rules directly on the Azure Firewall resource associated with the hub:

  1. Navigate to your deployed Azure Firewall resource in the Azure portal.
  2. Select "Firewall policy" or navigate to "Rules" directly.
  3. Configure Network, Application, and NAT rules as described above.

Step 3: Configure Route Tables for Hub Routing

To enforce traffic inspection through Azure Firewall, you need to configure the route tables within your Virtual WAN hub.

  1. Navigate back to your Virtual WAN hub in the Azure portal.
  2. Under "Connectivity," select "Route tables."
  3. Select the default route table or create a new one.
  4. For each connection (e.g., VNet connection, VPN/ExpressRoute connection), associate it with the route table that has Azure Firewall as the next hop for relevant traffic.
  5. Add routes to direct traffic from your spokes (VNets) and on-premises sites to the Azure Firewall private IP address.
Note: Ensure that the route for Azure Firewall's private IP address is configured in the route tables associated with the relevant connections to guarantee traffic flows through the firewall.

Step 4: Validate Firewall Configuration

After configuring rules and routes, it's crucial to validate that traffic is being inspected as expected.

Key Considerations

Tip: For highly secure environments, consider deploying Azure Firewall Premium to leverage advanced threat protection features.
Azure Virtual WAN Firewall Architecture Diagram

Conclusion

By following these steps, you can effectively integrate Azure Firewall with your Azure Virtual WAN to establish a robust security posture, centralize network traffic inspection, and protect your cloud and hybrid network resources.