Azure Firewall: Architecture, SKUs, Deployment, Best Practices, and Operational Guidance


Azure Firewall: Architecture, SKUs, Deployment, Best Practices, and Operational Guidance

Azure Firewall is a Cloud-Native Network Security Service designed to protect Azure Virtual Networks and Hybrid Environments. It provides Stateful Packet Inspection, Application-Level Filtering, Threat Intelligence Integration, and Centralized Network Security Management.

Azure Firewall is commonly deployed in Enterprise Environments using a Hub-and-Spoke Architecture where the Firewall resides in the Hub Network and Inspects Traffic Flowing Between Spokes, the Internet, and On-Premises Networks.

This article explains Azure Firewall SKUs, Configuration Best Practices, Deployment Steps using the Azure Portal, Azure CLI, and Terraform, and Operational Recommendations for Production Environments.

1.) Azure Firewall Overview

Azure Firewall is a Fully Managed, Highly Available, and Scalable Firewall Service that protects Azure Workloads.

Key capabilities include:

Stateful Packet Filtering
Application-Level Filtering
FQDN Filtering
Threat Intelligence Filtering
TLS Inspection (Premium)
Intrusion Detection and Prevention System (Premium)
High Availability without additional Load Balancers

Azure Firewall integrates with:

Azure Virtual Network
Azure Monitor
Azure Policy
Azure Sentinel
Azure Route Tables

In most Enterprise Environments, Azure Firewall is deployed inside a Dedicated Subnet Named:

AzureFirewallSubnet

This Subnet Must Exist before the Firewall is created.

 2.) Azure Firewall SKUs

Azure Firewall is available in three SKUs designed for different Security Requirements.

Basic
Standard
Premium

The following Table compares the capabilities of each SKU.

 Azure Firewall SKU Comparison

Feature

Basic

Standard

Premium

Intended Use

Small environments and labs

Enterprise workloads

Advanced security environments

Stateful Packet Filtering

Yes

Yes

Yes

Network Rules

Yes

Yes

Yes

Application Rules

Yes

Yes

Yes

FQDN Filtering

Yes

Yes

Yes

Threat Intelligence Filtering

No

Yes

Yes

TLS Inspection

No

No

Yes

Intrusion Detection and Prevention (IDPS)

No

No

Yes

URL Filtering

No

Yes

Yes

Web Categories Filtering

No

No

Yes

High Availability

Yes

Yes

Yes

Availability Zones

No

Yes

Yes

Recommended Usage

Dev/Test environments

Production workloads

High-security enterprise workloads

Most enterprise deployments use either the Standard or Premium SKU.

3.) Azure Firewall Architecture

A typical enterprise firewall deployment uses a Hub-and-Spoke Network Model.

- Hub Network

- Azure Firewall
- VPN Gateway
- Shared DNS
- Monitoring Services

- Spoke Networks

- Application workloads
- Database workloads
- Development environments

raffic Flow

Spoke Hub Firewall Internet
Spoke
Hub Firewall Spoke
On-premises
VPN Gateway Firewall Spoke

User-Defined Routes Force Traffic through the Firewall for Inspection.

4.) Azure Firewall Best Practices

Follow these practices when designing Azure Firewall deployments:

- Use a Hub Network

- Always deploy Azure Firewall in a Hub Virtual Network where it can inspect traffic between

   Spokes and External Networks.

- Use Dedicated Firewall Subnet

- The Subnet must be named AzureFirewallSubnet and should be at least /26.

- Implement User Defined Routes

- Route Tables should Direct Outbound Traffic through the Firewall.

- Enable Diagnostic Logging

- Enable logs for Monitoring and Auditing.

- Use Azure Firewall Policy

- Manage Firewall Rules Centrally using Firewall Policies instead of direct Rule Configuration.

- Separate Rule Types

Use separate collections for:

- Network Rules
- Application Rules
- DNAT Rules

- Use Availability Zones

- Deploy Firewalls Across Availability Zones to improve Resiliency.

- Use Private IPs for Internal Traffic

Ensure Traffic between Internal Networks flows through the Firewall using Private Addressing.

5.) Azure Firewall Deployment Using Azure Portal

Step 1 Create Virtual Network

Navigate to Azure Portal
Create a Virtual Network

Address Space Example: 10.0.0.0/16

Create Subnet: AzureFirewallSubnet

Address Example: 10.0.1.0/26

Step 2 Create Public IP Address

Navigate to Public IP Addresses

Create a new Public IP

Name: Firewall-Public-IP

SKU: Standard

Assignment: Static

Step 3 Deploy Azure Firewall

Navigate to

Create Resource
Search Azure Firewall

Configure the following settings.

Firewall Name: contoso-firewall

Region: Same region as VNet

SKU: Standard or Premium

Firewall Management

Firewall Policy

Select the previously created Virtual Network and AzureFirewallSubnet.

Attach the Public IP Address.

Deployment will take approximately 5 to 10 minutes.

6. ) Azure Firewall Rule Configuration

After deployment, configure firewall rules.

Rule types include:

Network Rules: Layer 3 and Layer 4 Filtering Based on IP and Port.

Application Rules: Allow or Deny Outbound Access based on FQDN.

DNAT Rules: Allow Inbound Access to Internal Services.

Example Application Rule

Allow Outbound Access to Microsoft Update Services:

Source: 10.1.0.0/16

Protocol: HTTP/HTTPS

Destination: windowsupdate.microsoft.com

7.) Azure Firewall Deployment Using Azure CLI

reate Resource Group

az group create \
--name rg-firewall \
--location eastus

Create Virtual Network

az network vnet create \
--name vnet-hub \
--resource-group rg-firewall \
--address-prefix 10.0.0.0/16

Create Firewall Subnet

az network vnet subnet create \
--resource-group rg-firewall \
--vnet-name vnet-hub \
--name AzureFirewallSubnet \
--address-prefix 10.0.1.0/26

Create Public IP

az network public-ip create \
--resource-group rg-firewall \
--name firewall-pip \
--sku Standard

Create Firewall

az network firewall create \
--name contoso-firewall \
--resource-group rg-firewall \
--location eastus

Assign Public IP

az network firewall ip-config create \
--firewall-name contoso-firewall \
--name firewall-config \
--public-ip-address firewall-pip \
--resource-group rg-firewall \
--vnet-name vnet-hub

8.) Azure Firewall Deployment Using Terraform

Provider Configuration

provider "azurerm" {
  features {}
}

Create Resource Group

resource "azurerm_resource_group" "firewall_rg" {
  name     = "rg-firewall"
  location = "East US"
}

Create Virtual Network

resource "azurerm_virtual_network" "hub_vnet" {
  name                = "vnet-hub"
  location            = azurerm_resource_group.firewall_rg.location
  resource_group_name = azurerm_resource_group.firewall_rg.name
  address_space       = ["10.0.0.0/16"]
}

Create Firewall Subnet

resource "azurerm_subnet" "firewall_subnet" {
  name                 = "AzureFirewallSubnet"
  resource_group_name  = azurerm_resource_group.firewall_rg.name
  virtual_network_name = azurerm_virtual_network.hub_vnet.name
  address_prefixes     = ["10.0.1.0/26"]
}

Create Public IP

resource "azurerm_public_ip" "firewall_pip" {
  name                = "firewall-pip"
  location            = azurerm_resource_group.firewall_rg.location
  resource_group_name = azurerm_resource_group.firewall_rg.name
  allocation_method   = "Static"
  sku          
      = "Standard"
}

Deploy Azure Firewall

resource "azurerm_firewall" "firewall" {
  name                = "contoso-firewall"
  location            = azurerm_resource_group.firewall_rg.location
  resource_group_name = azurerm_resource_group.firewall_rg.name

  ip_configuration {
    name                 = "configuration"
    subnet_id            = azurerm_subnet.firewall_subnet.id
    public_ip_address_id = azurerm_public_ip.firewall_pip.id
  }
}

9.) Monitoring Azure Firewall

Monitoring Tools Include:

Azure Monitor
Log Analytics
Network Watcher
Azure Sentinel

Logs include:

Application Rule Logs
Network Rule Logs
Threat Intelligence Logs

These Logs Help Identify Blocked Traffic and Potential Security Threats.

 

10.) Azure Firewall Do and Don'ts

Do

Deploy firewall in hub network
Use route tables to force traffic through firewall
Use Azure Firewall Policy for rule management
Enable diagnostics and monitoring
Use Premium SKU for advanced security requirements

 Don't

Do not deploy firewall in spoke networks
Do not use small firewall subnets
Do not allow unrestricted outbound traffic
Do not manage firewall rules manually across multiple firewalls
Do not disable logging

 

Conclusion

Azure Firewall provides a Powerful and Scalable Security Solution for protecting Azure Workloads and Hybrid Environments. By implementing Azure Firewall using a Hub-and-Spoke Architecture, Organizations can Centralize Network Security Controls and Enforce Consistent Policies across Multiple Application Networks.

Using Infrastructure as Code Tools such as Terraform allows organizations to Automate Firewall deployment and Maintain Consistent Configurations across Environments. When combined with Monitoring, Logging, and Security Best Practices, Azure Firewall becomes a Critical Component of Enterprise Cloud Security Architecture.

For readers interested in Deeper Technical Coverage of Azure Architecture, Infrastructure Automation, and Enterprise Cloud Security Deployment Strategies, additional resources and Books are available on ITCloudAcademy.net.

0 comments

Leave a comment

Please note, comments need to be approved before they are published.