Azure Firewall policy rule sets (2024)

  • Article

Firewall Policy is a top-level resource that contains security and operational settings for Azure Firewall. You can use Firewall Policy to manage rule sets that the Azure Firewall uses to filter traffic. Firewall policy organizes, prioritizes, and processes the rule sets based on a hierarchy with the following components: rule collection groups, rule collections, and rules.

Azure Firewall policy rule sets (1)

Rule collection groups

A rule collection group is used to group rule collections. They're the first unit that the firewall processes, and they follow a priority order based on values. There are three default rule collection groups, and their priority values are preset by design. They're processed in the following order:

Rule collection group namePriority
Default DNAT (Destination Network Address Translation) rule collection group100
Default Network rule collection group200
Default Application rule collection group300

Even though you can't delete the default rule collection groups nor modify their priority values, you can manipulate their processing order in a different way. If you need to define a priority order that is different than the default design, you can create custom rule collection groups with your wanted priority values. In this scenario, you don't use the default rule collection groups at all and use only the ones you create to customize the processing logic.

Rule collection groups contain one or multiple rule collections, which can be of type DNAT, network, or application. For example, you can group rules belonging to the same workloads or a virtual in a rule collection group.

For rule collection group size limits, see Azure subscription and service limits, quotas, and constraints.

Rule collections

A rule collection belongs to a rule collection group, and it contains one or multiple rules. They're the second unit processed by the firewall and they follow a priority order based on values. Rule collections must have a defined action (allow or deny) and a priority value. The defined action applies to all the rules within the rule collection. The priority value determines order the rule collections are processed.

There are three types of rule collections:

  • DNAT
  • Network
  • Application

Rule types must match their parent rule collection category. For example, a DNAT rule can only be part of a DNAT rule collection.

Rules

A rule belongs to a rule collection, and it specifies which traffic is allowed or denied in your network. They're the third unit that the firewall processes and they don't follow a priority order based on values. The processing logic for rules follows a top-down approach. The firewall uses defined rules to evaluate all traffic passing through the firewall to determine whether it matches an allow or deny condition. If there's no rule that allows the traffic, then the traffic is denied by default.

Our built-in infrastructure rule collection processes traffic for application rules before denying it by default.

Inbound vs. outbound

An inbound firewall rule protects your network from threats that originate from outside your network (traffic sourced from the Internet) and attempts to infiltrate your network inwardly.

An outbound firewall rule protects against nefarious traffic that originates internally (traffic sourced from a private IP address within Azure) and travels outwardly. This is usually traffic from within Azure resources being redirected via the Firewall before reaching a destination.

Rule types

There are three types of rules:

  • DNAT
  • Network
  • Application

DNAT rules

DNAT rules allow or deny inbound traffic through one or more firewall public IP addresses.You can use a DNAT rule when you want a public IP address to be translated into a private IP address. The Azure Firewall public IP addresses can be used to listen to inbound traffic from the Internet, filter the traffic and translate this traffic to internal resources in Azure.

Network rules

Network rules allow or deny inbound, outbound, and east-west traffic based on the network layer (L3) and transport layer (L4).
You can use a network rule when you want to filter traffic based on IP addresses, any ports, and any protocols.

Application rules

Application rules allow or deny outbound and east-west traffic based on the application layer (L7).You can use an application rule when you want to filter traffic based on fully qualified domain names (FQDNs), URLs, and HTTP/HTTPS protocols.

Next steps

  • Learn more about Azure Firewall rule processing: Configure Azure Firewall rules.
Azure Firewall policy rule sets (2024)
Top Articles
Digital Asset: Meaning, Types, and Importance
What is a transaction block? | Avalanche Support
Mackenzie Rosman Leaked
What Are the Best Cal State Schools? | BestColleges
Booknet.com Contract Marriage 2
Is Sportsurge Safe and Legal in 2024? Any Alternatives?
Craigslist Kennewick Pasco Richland
Delectable Birthday Dyes
Victoria Secret Comenity Easy Pay
Costco in Hawthorne (14501 Hindry Ave)
Fallout 4 Pipboy Upgrades
Myunlb
Cvs Learnet Modules
Winterset Rants And Raves
UEQ - User Experience Questionnaire: UX Testing schnell und einfach
Summer Rae Boyfriend Love Island – Just Speak News
Byte Delta Dental
Ostateillustrated Com Message Boards
Pricelinerewardsvisa Com Activate
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
Swedestats
Vrachtwagens in Nederland kopen - gebruikt en nieuw - TrucksNL
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
Aol News Weather Entertainment Local Lifestyle
Red8 Data Entry Job
Gina Wilson Angle Addition Postulate
Apartments / Housing For Rent near Lake Placid, FL - craigslist
fft - Fast Fourier transform
1979 Ford F350 For Sale Craigslist
R Baldurs Gate 3
Lindy Kendra Scott Obituary
Cinema | Düsseldorfer Filmkunstkinos
Martins Point Patient Portal
Pfcu Chestnut Street
Petsmart Distribution Center Jobs
AsROck Q1900B ITX und Ramverträglichkeit
2008 Chevrolet Corvette for sale - Houston, TX - craigslist
Wsbtv Fish And Game Report
Cherry Spa Madison
The Banshees Of Inisherin Showtimes Near Reading Cinemas Town Square
2023 Nickstory
Updates on removal of DePaul encampment | Press Releases | News | Newsroom
Sig Mlok Bayonet Mount
Jimmy John's Near Me Open
A Man Called Otto Showtimes Near Cinemark Greeley Mall
Shannon Sharpe Pointing Gif
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Aaca Not Mine
300 Fort Monroe Industrial Parkway Monroeville Oh
Compete My Workforce
Varsity Competition Results 2022
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 6009

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.