What is Azure Firewall?
Azure Firewall is a managed firewall service for Azure virtual networks. Microsoft describes it as a managed, cloud-based, fully stateful firewall-as-a-service with built-in high availability and unrestricted cloud scalability.
In simple terms, Azure Firewall is the service you use when you want centralized inspection and control for inbound, outbound, and east-west traffic patterns in Azure.
It is commonly used in hub-and-spoke designs, centralized egress control, internet publishing scenarios, and enterprise landing zones where traffic policy should be managed from one place.
Why Azure Firewall matters
Azure networking grows more complex as environments scale. Teams often need more than simple subnet-level filtering. Azure Firewall matters because it gives central visibility and control over how traffic moves between Azure workloads, to the internet, and to hybrid-connected networks.
Centralized control
Policies and inspection logic can be managed in one place instead of being scattered across many subnets.
Stateful inspection
Azure Firewall is fully stateful and understands connection context rather than applying only simple stateless filtering.
Inbound publishing
DNAT rules can translate and filter inbound traffic to internal workloads.
Outbound control
It helps reduce data exfiltration risk and shape outbound internet access intentionally.
Hub-and-spoke fit
It is commonly deployed in a hub VNet or secured virtual hub to inspect traffic from many spokes.
Enterprise policy model
Firewall Policy lets teams standardize firewall behavior across regions, subscriptions, and multiple firewall instances.
Azure Firewall in the 5 Ws
What is Azure Firewall?
It is a managed, fully stateful firewall service for Azure virtual network resources.
Why do teams use it?
Teams use it for centralized inspection, outbound filtering, DNAT publishing, hub-and-spoke security, and enterprise policy standardization.
When should you use it?
Use Azure Firewall when network security should be centralized and controlled beyond what local NSGs alone can reasonably provide.
Where does it fit?
It commonly fits in a hub VNet, shared services VNet, or secured virtual hub, where it can inspect traffic between spokes, the internet, and hybrid destinations.
Who works with it?
Cloud engineers, network engineers, platform teams, security teams, Azure administrators, and architects all work with Azure Firewall in real enterprise designs.
How does it work?
Azure Firewall evaluates rule collections and policies to inspect matching traffic and then allows, denies, translates, or routes it according to the configured logic.
Azure Firewall SKUs
Microsoft documents three Azure Firewall SKUs: Basic, Standard, and Premium. The capabilities differ by SKU, so choosing the right one depends on the traffic patterns, inspection depth, and security features your design needs.
| SKU | Best fit | Simple explanation |
|---|---|---|
| Basic | Smaller environments and cost-sensitive workloads | Entry-level managed firewall features for simpler scenarios. |
| Standard | Most enterprise network security patterns | General-purpose Azure Firewall SKU for common production designs. |
| Premium | Advanced inspection and higher security requirements | Extended capabilities for deeper traffic inspection and stronger enterprise controls. |
Firewall Policy
Microsoft recommends Firewall Policy as the preferred way to configure Azure Firewall. Firewall Policy is a global resource that can be reused across multiple Azure Firewall instances, including hub VNets and secured virtual hubs, and it works across subscriptions and regions.
In practical terms, Firewall Policy helps teams avoid treating each firewall instance as a completely separate configuration island.
Why it matters
It helps standardize rule logic and security behavior across multiple firewalls.
Where it helps
It is especially useful in enterprise environments with shared policies, multiple subscriptions, or regional deployments.
Rule types: DNAT, network rules, and application rules
Azure Firewall uses three main rule types: DNAT, network rules, and application rules.
| Rule type | Main purpose | Typical use |
|---|---|---|
| DNAT | Translate and filter inbound traffic | Publish internal services through the firewall’s public IPs |
| Network rules | Filter traffic using IPs, ports, and protocols | Control lower-level traffic patterns such as app-to-db or hybrid flows |
| Application rules | Filter traffic using higher-level application logic such as FQDNs | Control web and outbound internet access patterns |
DNAT
DNAT rules manage inbound traffic through one or more firewall public IP addresses. Microsoft documents that DNAT rules translate a public IP and port to a private IP and port, and they implicitly add a corresponding network rule to allow the translated traffic.
Network rules
Network rules are useful when traffic should be controlled using IP ranges, ports, and protocols such as TCP or UDP.
Application rules
Application rules are useful for outbound web and application-aware filtering patterns where controlling destinations by FQDN or web context matters.
DNS proxy and DNS settings
Azure Firewall can use Azure DNS by default, or you can configure a custom DNS server. Microsoft also documents DNS proxy support, which is disabled by default and can be enabled when you want the firewall to proxy DNS requests.
DNS behavior matters a lot when application rules, FQDN logic, private services, or hybrid name resolution are involved.
Default behavior
Azure Firewall uses Azure DNS unless you configure custom DNS settings.
Why DNS proxy matters
It can help centralize DNS behavior and make name-resolution-dependent firewall logic more predictable.
Forced tunneling
Azure Firewall supports forced tunneling, which Microsoft documents as routing internet-bound traffic to another firewall or network virtual appliance for further processing instead of going directly to the internet.
This is especially useful when an organization wants outbound traffic to pass through an on-premises edge firewall or another centralized inspection point.
Microsoft also documents an important limitation: DNAT is not supported when forced tunneling is enabled, because inbound internet access would otherwise create asymmetric routing problems in that mode.
Common Azure Firewall use cases
Centralized outbound filtering
Control which destinations workloads can reach on the internet or in hybrid-connected environments.
Inbound publishing with DNAT
Translate and filter internet traffic to internal application or infrastructure endpoints.
Hub-and-spoke inspection
Inspect spoke traffic through a firewall deployed in the hub VNet.
Enterprise landing zones
Standardize security policy and inspection patterns across multiple subscriptions and workloads.
Hybrid connectivity control
Inspect or shape traffic between Azure and on-premises-connected environments.
Application-aware web control
Use application rules and DNS-aware logic to shape outbound access patterns more intelligently.
Real-world Azure Firewall examples
Example 1: Hub-and-spoke enterprise firewall
A platform team deploys Azure Firewall in the hub VNet and uses route tables so spoke traffic goes through the firewall for outbound inspection and centralized security control.
Example 2: Azure Firewall plus Application Gateway
Microsoft documents Azure Firewall and Application Gateway in parallel as a common design when Application Gateway protects HTTP(S) applications and Azure Firewall protects other workloads and outbound traffic.
Example 3: Controlled outbound internet design
Application workloads can reach only approved web destinations, and all other outbound attempts are denied or inspected.
Example 4: DNAT for inbound access
The firewall publishes internal services through public IPs using DNAT while still filtering and controlling how inbound traffic reaches private workloads.
Example 5: Forced tunneling to on-premises inspection
An organization routes internet-bound Azure traffic to an on-premises security stack for extra inspection before that traffic continues outward.
Azure Firewall best practices
- Use Firewall Policy as the primary configuration model for new designs.
- Keep hub-and-spoke roles clear if you use centralized inspection.
- Choose the correct rule type for the actual traffic pattern.
- Be very deliberate with route tables when forcing traffic through the firewall.
- Plan DNS behavior early, especially when application rules or DNS proxy matter.
- Understand SKU differences before choosing Basic, Standard, or Premium.
- Document why a rule exists, not only what it matches.
- Test real traffic paths instead of relying only on deployment success.
- Keep inbound DNAT, outbound control, and hybrid routing assumptions aligned.
- Regularly review policy sprawl and remove old exceptions.
Common Azure Firewall mistakes
Wrong rule type
A network rule may be used where an application rule or DNAT rule would be the correct fit.
Ignoring route tables
The firewall may be deployed correctly, but traffic never reaches it because subnet routes do not send traffic there.
DNS assumptions
Application-aware logic can fail if DNS behavior is not aligned with the intended firewall design.
Forced tunneling misunderstandings
Teams may expect DNAT or internet path behavior that does not fit forced-tunneling mode.
No policy standardization
Managing each firewall instance separately can create avoidable inconsistency and sprawl.
Confusing NSGs and Firewall roles
NSGs and Azure Firewall solve different problems and should not be treated as identical tools.
Troubleshooting Azure Firewall issues
When traffic does not behave as expected through Azure Firewall, the goal is to check the full path: route tables, rule type, DNS behavior, inbound or outbound direction, and whether the design uses forced tunneling, DNAT, or centralized inspection in a hub.
Basic troubleshooting sequence
- Check whether the workload subnet actually routes traffic to the firewall.
- Confirm the correct rule type is being used: DNAT, network, or application.
- Check rule order and policy structure.
- Review DNS assumptions if FQDN logic or DNS proxy matters.
- Validate whether forced tunneling changes the expected behavior.
- Check whether the issue is inbound, outbound, east-west, or hybrid traffic.
Useful troubleshooting questions
- Is the traffic actually reaching Azure Firewall?
- Is the chosen rule type correct for the traffic?
- Do the route tables steer traffic through the firewall?
- Is DNS resolution aligned with the intended inspection logic?
- Could asymmetric routing or forced tunneling be part of the problem?
Troubleshooting mindset
Firewall issue?
├─ Check subnet route tables
├─ Check rule type
├─ Check policy and rule order
├─ Check DNS behavior
├─ Check forced tunneling assumptions
└─ Check inbound / outbound / hybrid path
Frequently asked questions
What is Azure Firewall in simple words?
It is Microsoft’s managed, centralized firewall service for Azure virtual network traffic.
What SKUs does Azure Firewall have?
Microsoft documents Basic, Standard, and Premium SKUs.
What rule types does Azure Firewall support?
It supports DNAT rules, network rules, and application rules.
What is the recommended way to configure Azure Firewall?
Microsoft recommends using Firewall Policy.
Can Azure Firewall do forced tunneling?
Yes, Azure Firewall supports forced tunneling for routing internet-bound traffic to another inspection point.
Does Azure Firewall replace NSGs?
No. Azure Firewall and NSGs solve different problems and are often used together.
Official Microsoft Azure documentation
These official Microsoft Azure references are useful if you want deeper platform details, SKU guidance, policy behavior, and deployment patterns for Azure Firewall.
- Azure Firewall documentation hub
- Azure Firewall features by SKU
- Azure Firewall Policy overview
- Azure Firewall policy rule sets
- Azure Firewall DNS settings
- Azure Firewall forced tunneling
- Azure Firewall and Application Gateway design guidance