This document provides comprehensive guidance on integrating Azure Firewall with Azure Virtual WAN to enhance your network security posture. Learn how to centralize firewall management, enforce security policies, and protect your virtual network traffic.
Azure Firewall is a cloud-native network security service that protects your virtual network resources. When deployed in a Virtual WAN hub, it acts as a centralized firewall for all traffic flowing through the hub, including traffic between VNets, VNet-to-Internet, and VNet-to-On-premises. This approach simplifies management and provides consistent security across your Azure network.
Deploying Azure Firewall into your Virtual WAN hub is a critical step for centralizing security. This section outlines the deployment process and configuration considerations.
Effective security relies on robust firewall rule management. Azure Firewall offers network rules and application rules to precisely control traffic flow.
Network rules operate at Layer 3 and Layer 4. They allow or deny traffic based on IP addresses, ports, and protocols.
Example: Allowing outbound HTTPS traffic to a specific set of FQDN tags for software updates.
{
    "ruleCollection": "AllowWebAccess",
    "ruleCollectionType": "NetworkRule",
    "rules": [
        {
            "name": "AllowHTTPS_UpdateServers",
            "protocols": [ "TCP:443" ],
            "sourceAddresses": [ "*" ],
            "destinationFqdnTags": [ "WindowsUpdate", "MicrosoftUpdate" ]
        }
    ]
}
        Application rules operate at Layer 7 and allow you to filter traffic based on Fully Qualified Domain Names (FQDNs). This provides more context-aware security.
Example: Allowing access to internal SharePoint sites while blocking general internet browsing.
{
    "ruleCollection": "AllowInternalApps",
    "ruleCollectionType": "ApplicationRule",
    "rules": [
        {
            "name": "AllowSharePoint",
            "protocols": [ "http:80", "https:443" ],
            "sourceAddresses": [ "10.1.0.0/16" ],
            "targetFqdns": [ "*.contoso.com", "*.sharepoint.internal" ]
        }
    ]
}
        Azure Firewall in Virtual WAN supports advanced features for comprehensive security management.
Enable threat intelligence-based filtering to automatically block traffic to and from known malicious IP addresses and domains, based on Microsoft's Threat Intelligence feed. This is a crucial defense layer.
Azure Firewall can be configured with a private IP address, allowing it to process traffic destined for private IP address ranges. This is essential for securing internal network communications.
Monitor your Azure Firewall logs and alerts within Azure Security Center for security posture management. Integrate logs with Azure Sentinel for advanced threat detection and response.