Azure Firewall known issues and limitations (2024)

DNAT support for private IP addresses limited to Standard and Premium versionsSupport for DNAT on Azure Firewall private IP address is intended for enterprises, so is limited to the Standard and Premium Firewall versions.NoneNetwork filtering rules for non-TCP/UDP protocols (for example ICMP) don't work for Internet bound trafficNetwork filtering rules for non-TCP/UDP protocols don't work with SNAT to your public IP address. Non-TCP/UDP protocols are supported between spoke subnets and VNets.Azure Firewall uses the Standard Load Balancer, which doesn't support SNAT for IP protocols today. We're exploring options to support this scenario in a future release.Missing PowerShell and CLI support for ICMPAzure PowerShell and CLI don't support ICMP as a valid protocol in network rules.It's still possible to use ICMP as a protocol via the portal and the REST API. We're working to add ICMP in PowerShell and CLI soon.FQDN tags require a protocol: port to be setApplication rules with FQDN tags require port: protocol definition.You can use https as the port: protocol value. We're working to make this field optional when FQDN tags are used.Moving a firewall to a different resource group or subscription isn't supportedMoving a firewall to a different resource group or subscription isn't supported.Supporting this functionality is on our road map. To move a firewall to a different resource group or subscription, you must delete the current instance and recreate it in the new resource group or subscription.Threat intelligence alerts might get maskedNetwork rules with destination 80/443 for outbound filtering masks threat intelligence alerts when configured to alert only mode.Create outbound filtering for 80/443 using application rules. Or, change the threat intelligence mode to Alert and Deny.With secured virtual hubs, availability zones can only be configured during deployment.You can't configure Availability Zones after a firewall with secured virtual hubs is deployed.This is by design.SNAT on inbound connectionsIn addition to DNAT, connections via the firewall public IP address (inbound) are SNATed to one of the firewall private IPs. This requirement today (also for Active/Active NVAs) to ensure symmetric routing.To preserve the original source for HTTP/S, consider using XFF headers. For example, use a service such as Azure Front Door or Azure Application Gateway in front of the firewall. You can also add WAF as part of Azure Front Door and chain to the firewall.SQL FQDN filtering support only in proxy mode (port 1433)For Azure SQL Database, Azure Synapse Analytics, and Azure SQL Managed Instance:

SQL FQDN filtering is supported in proxy-mode only (port 1433).

For Azure SQL IaaS:

If you're using nonstandard ports, you can specify those ports in the application rules.

For SQL in redirect mode (the default if connecting from within Azure), you can instead filter access using the SQL service tag as part of Azure Firewall network rules.Outbound SMTP traffic on TCP port 25 is blockedOutbound email messages that are sent directly to external domains (like outlook.com and gmail.com) on TCP port 25 is blocked by the Azure platform. This is the default platform behavior in Azure. Azure Firewall doesn't introduce any more specific restriction.Use authenticated SMTP relay services, which typically connect through TCP port 587, but also supports other ports. For more information, see Troubleshoot outbound SMTP connectivity problems in Azure.

Another option is to deploy Azure Firewall in a standard Enterprise Agreement (EA) subscription. Azure Firewall in an EA subscription can communicate with public IP addresses using outbound TCP port 25. Currently, it might also work in other subscription types, but it's not guaranteed to work. For private IP addresses like virtual networks, VPNs, and Azure ExpressRoute, Azure Firewall supports an outbound connection on TCP port 25.

SNAT port exhaustionAzure Firewall currently supports 2,496 ports per Public IP address per backend Virtual Machine Scale Set instance. By default, there are two Virtual Machine Scale Set instances. So, there are 4,992 ports per flow (destination IP, destination port and protocol (TCP or UDP). The firewall scales up to a maximum of 20 instances.This is a platform limitation. You can work around the limits by configuring Azure Firewall deployments with a minimum of five public IP addresses for deployments susceptible to SNAT exhaustion. This increases the SNAT ports available by five times. Allocate from an IP address prefix to simplify downstream permissions. For a more permanent solution, you can deploy a NAT gateway to overcome the SNAT port limits. This approach is supported for virtual network deployments.

For more information, see Scale SNAT ports with Azure Virtual Network NAT.

DNAT isn't supported with Forced Tunneling enabledFirewalls deployed with Forced Tunneling enabled can't support inbound access from the Internet because of asymmetric routing.This is by design because of asymmetric routing. The return path for inbound connections goes via the on-premises firewall, which hasn't seen the connection established.Outbound Passive FTP might not work for Firewalls with multiple public IP addresses, depending on your FTP server configuration.Passive FTP establishes different connections for control and data channels. When a Firewall with multiple public IP addresses sends data outbound, it randomly selects one of its public IP addresses for the source IP address. FTP might fail when data and control channels use different source IP addresses, depending on your FTP server configuration.An explicit SNAT configuration is planned. In the meantime, you can configure your FTP server to accept data and control channels from different source IP addresses (see an example for IIS). Alternatively, consider using a single IP address in this situation.Inbound Passive FTP might not work depending on your FTP server configurationPassive FTP establishes different connections for control and data channels. Inbound connections on Azure Firewall are SNATed to one of the firewall private IP addresses to ensure symmetric routing. FTP might fail when data and control channels use different source IP addresses, depending on your FTP server configuration.Preserving the original source IP address is being investigated. In the meantime, you can configure your FTP server to accept data and control channels from different source IP addresses.Active FTP doesn't work when the FTP client must reach an FTP server across the internet.Active FTP utilizes a PORT command from the FTP client that directs the FTP server what IP and port to use for the data channel. This PORT command utilizes the private IP of the client that can't be changed. Client-side traffic traversing the Azure Firewall is NATed for Internet-based communications, making the PORT command seen as invalid by the FTP server.This is a general limitation of Active FTP when used with client-side NAT.NetworkRuleHit metric is missing a protocol dimensionThe ApplicationRuleHit metric allows filtering based protocol, but this capability is missing in the corresponding NetworkRuleHit metric.A fix is being investigated.NAT rules with ports between 64000 and 65535 are unsupportedAzure Firewall allows any port in the 1-65535 range in network and application rules, however NAT rules only support ports in the 1-63999 range.This is a current limitation.Configuration updates might take five minutes on averageAn Azure Firewall configuration update can take three to five minutes on average, and parallel updates aren't supported.A fix is being investigated.Azure Firewall uses SNI TLS headers to filter HTTPS and MSSQL trafficIf browser or server software doesn't support the Server Name Indicator (SNI) extension, you can't connect through Azure Firewall.If browser or server software doesn't support SNI, then you might be able to control the connection using a network rule instead of an application rule. See Server Name Indication for software that supports SNI.Can't add firewall policy tags using the portal or Azure Resource Manager (ARM) templatesAzure Firewall Policy has a patch support limitation that prevents you from adding a tag using the Azure portal or ARM templates. The following error is generated: Couldn't save the tags for the resource.A fix is being investigated. Or, you can use the Azure PowerShell cmdlet Set-AzFirewallPolicy to update tags.IPv6 not currently supportedIf you add an IPv6 address to a rule, the firewall fails.Use only IPv4 addresses. IPv6 support is under investigation.Updating multiple IP Groups fails with conflict error.When you update two or more IP Groups attached to the same firewall, one of the resources goes into a failed state.This is a known issue/limitation.

When you update an IP Group, it triggers an update on all firewalls that the IPGroup is attached to. If an update to a second IP Group is started while the firewall is still in the Updating state, then the IPGroup update fails.

To avoid the failure, IP Groups attached to the same firewall must be updated one at a time. Allow enough time between updates to allow the firewall to get out of the Updating state.

Removing RuleCollectionGroups using ARM templates not supported.Removing a RuleCollectionGroup using ARM templates isn't supported and results in failure.This isn't a supported operation.DNAT rule for allow any (*) will SNAT traffic.If a DNAT rule allows any (*) as the Source IP address, then an implicit Network rule matches VNet-VNet traffic and will always SNAT the traffic.This is a current limitation.Adding a DNAT rule to a secured virtual hub with a security provider isn't supported.This results in an asynchronous route for the returning DNAT traffic, which goes to the security provider.Not supported.Error encountered when creating more than 2,000 rule collections.The maximal number of NAT/Application or Network rule collections is 2000 (Resource Manager limit).This is a current limitation.XFF header in HTTP/SXFF headers are overwritten with the original source IP address as seen by the firewall. This is applicable for the following use cases:
- HTTP requests
- HTTPS requests with TLS terminationA fix is being investigated.Can’t deploy Firewall with Availability Zones with a newly created Public IP addressWhen you deploy a Firewall with Availability Zones, you can’t use a newly created Public IP address.First create a new zone redundant Public IP address, then assign this previously created IP address during the Firewall deployment.Azure private DNS zone isn't supported with Azure FirewallAzure private DNS zone doesn't work with Azure Firewall regardless of Azure Firewall DNS settings.To achieve the desire state of using a private DNS server, use Azure Firewall DNS proxy instead of an Azure private DNS zone.Physical zone 2 in Japan East is unavailable for firewall deployments.You can’t deploy a new firewall with physical zone 2. Additionally, if you stop an existing firewall that is deployed in physical zone 2, it can't be restarted. For more information, see Physical and logical availability zones.For new firewalls, deploy with the remaining availability zones or use a different region. To configure an existing firewall, see How can I configure availability zones after deployment?.
Azure Firewall known issues and limitations (2024)
Top Articles
De 5 beste Forex Trading-apps in 2022 | Analist.nl
Tapeless Backup Strategies for IBM Power Systems - ABC
Overnight Cleaner Jobs
Find All Subdomains
Linkvertise Bypass 2023
craigslist: south coast jobs, apartments, for sale, services, community, and events
Tribune Seymour
Hello Alice Business Credit Card Limit Hard Pull
Cooktopcove Com
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Enterprise Car Sales Jacksonville Used Cars
Zoe Mintz Adam Duritz
Recap: Noah Syndergaard earns his first L.A. win as Dodgers sweep Cardinals
Long Island Jobs Craigslist
Gayla Glenn Harris County Texas Update
Grimes County Busted Newspaper
Scream Queens Parents Guide
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
John Chiv Words Worth
Dtlr Duke St
Shadbase Get Out Of Jail
Panola County Busted Newspaper
Foolproof Module 6 Test Answers
Getmnapp
Trivago Myrtle Beach Hotels
Watertown Ford Quick Lane
Hobby Lobby Hours Parkersburg Wv
Craftybase Coupon
Bfsfcu Truecar
John Deere 44 Snowblower Parts Manual
Miller Plonka Obituaries
031515 828
Have you seen this child? Caroline Victoria Teague
"Pure Onyx" by xxoom from Patreon | Kemono
new haven free stuff - craigslist
Save on Games, Flamingo, Toys Games & Novelties
Craigslist Albany Ny Garage Sales
Log in or sign up to view
Muma Eric Rice San Mateo
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
Austin Automotive Buda
Bitchinbubba Face
دانلود سریال خاندان اژدها دیجی موویز
R/Moissanite
Windshield Repair & Auto Glass Replacement in Texas| Safelite
How To Customise Mii QR Codes in Tomodachi Life?
Noga Funeral Home Obituaries
Gonzalo Lira Net Worth
Kushfly Promo Code
Nfhs Network On Direct Tv
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6262

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.