Skip to content

Latest commit

 

History

History
41 lines (26 loc) · 2.81 KB

rule-processing.md

File metadata and controls

41 lines (26 loc) · 2.81 KB
title description services author ms.service ms.topic ms.date ms.author
Azure Firewall Manager rule processing logic
Learn about Azure Firewall rule processing logic
firewall-manager
vhorne
firewall-manager
conceptual
06/30/2020
victorh

Azure Firewall rule processing logic

Azure Firewall has NAT rules, network rules, and applications rules. The rules are processed according to the rule type.

Network rules and applications rules

Network rules are applied first, then application rules. The rules are terminating. So if a match is found in network rules, then application rules aren't processed. If no network rule matches, and if the packet protocol is HTTP/HTTPS, the packet is then evaluated by the application rules. If still no match is found, then the packet is evaluated against the infrastructure rule collection. If there's still no match, then the packet is denied by default.

General rule processing logic

Example of processing logic

Example scenario: three rule collection groups exist in a an Azure Firewall Policy. Each rule collection group has a series of application and network rules.

Rule execution order

In the illustrated diagram, the network rules are executed first, followed by the application rules due to Azure Firewall's rule processing logic stating that network rules always having execution priority before application rules.

NAT rules

Inbound connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal. DNAT rules are applied first. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. No application rules are applied for these connections.

Inherited rules

Network rule collections inherited from a parent policy are always prioritized above network rule collections that are defined as part of your new policy. The same logic also applies to application rule collections. However, network rule collections are always processed before application rule collections regardless of inheritance.

By default, your policy inherits its parent policy threat intelligence mode. You can override this by setting your threat Intelligence mode to a different value in the policy settings page. It's only possible to override with a stricter value. For example, if you parent policy is set to Alert only, you can configure this local policy to Alert and deny, but you can't turn it off.

Next steps