πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-700 Domain 5
Domain 5 β€” Module 3 of 5 60%
24 of 26 overall

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)
Domain 5: Network Security Services Premium ⏱ ~13 min read

Azure Firewall: SKUs and Deployment

Master Azure Firewall SKU comparison (Basic, Standard, Premium), rule types and processing order, FQDN filtering, and hub VNet deployment patterns.

Azure Firewall: SKUs and Deployment

Azure Firewall is a managed, cloud-native, stateful firewall service. Unlike NSGs (which filter at the subnet/NIC level), Azure Firewall sits in the hub VNet and inspects all traffic flowing through it β€” including east-west (VNet-to-VNet) and north-south (internet-to-VNet).

🎬 Video coming soon

Azure Firewall SKUs and Rules

Azure Firewall SKUs and Rules

~13:00
β˜• Simple explanation

Azure Firewall is a security guard at the front gate of your network β€” it inspects every packet and decides whether to allow it. Unlike NSGs (subnet/NIC level), Azure Firewall sits at the network perimeter providing centralised control: URL filtering, threat intelligence, FQDN filtering, and NAT.

Azure Firewall is a managed, stateful firewall-as-a-service with built-in HA and cloud scalability. Provides L3-L7 filtering, threat intelligence, FQDN-based filtering, and NAT. Deployed in AzureFirewallSubnet (/26 minimum) of a hub VNet. Three SKUs: Basic, Standard, Premium.

Azure Firewall SKUs

Azure Firewall SKU Comparison
FeatureBasicStandardPremium
Throughput250 Mbps30 Gbps100 Gbps
Threat intelligenceAlert onlyAlert and denyAlert and deny
FQDN filteringYesYesYes
Network rules (L3/L4)YesYesYes
Application rules (L7)LimitedYesYes
DNS proxyNoYesYes
TLS inspectionNoNoYes
IDPS (intrusion detection)NoNoYes
URL filteringBasicFQDN-basedFull URL with categories
Web categoriesNoNoYes
Forced tunnelingNoYesYes
Best forSmall/dev workloadsProduction workloadsHighly regulated environments

Exam Tip: The three Premium-only features to remember: TLS inspection, IDPS (Intrusion Detection and Prevention System), and web categories with full URL filtering. If the exam mentions inspecting encrypted traffic or detecting intrusions, the answer is Premium.

Rule Types and Processing Order

Azure Firewall processes rules in this strict order:

1. DNAT rules (highest priority) Destination NAT rules translate incoming traffic from the firewall’s public IP to backend private IPs. Think: inbound port forwarding.

2. Network rules (middle priority) Layer 3/4 rules based on source IP, destination IP, port, and protocol. Allow or deny traffic.

3. Application rules (lowest priority) Layer 7 rules based on FQDNs. Can filter by domain name (e.g., allow *.microsoft.com) or FQDN tag.

Within each rule type, rule collections are processed by priority (lowest number first, like NSGs). Within a collection, rules are processed by priority.

Important processing behaviour:

  • If a network rule allows traffic, application rules are not evaluated for that traffic
  • Application rules only evaluate traffic that wasn’t matched by network rules
  • DNAT rules always process first for inbound traffic to the firewall’s public IPs

Example processing:

  1. Inbound to firewall public IP on port 443 β†’ DNAT rule translates to backend 10.20.1.5:443
  2. VM at 10.20.1.10 wants to reach 10.30.1.20 on port 1433 (SQL) β†’ Network rule allows
  3. VM at 10.20.1.10 wants to reach update.microsoft.com on port 443 β†’ Application rule allows (FQDN tag)
ℹ️ FQDN Tags vs FQDNs

FQDN tags are predefined groups of FQDNs maintained by Microsoft:

FQDN TagWhat It Includes
WindowsUpdateAll FQDNs needed for Windows Update
AzureBackupFQDNs for Azure Backup service
WindowsDiagnosticsWindows diagnostic data endpoints
MicrosoftActiveProtectionServiceWindows Defender endpoints
AzureKubernetesServiceAKS required endpoints

Individual FQDNs let you specify exact domains:

  • *.github.com β€” wildcard matching
  • update.microsoft.com β€” exact match

Use FQDN tags when available β€” Microsoft maintains the list as endpoints change. Use individual FQDNs for custom application needs.

Important: FQDN-based filtering (both tags and individual) only works in application rules, not network rules. Network rules use IP addresses and service tags.

Deployment Pattern β€” Hub VNet

πŸ”’ Aisha’s deployment: Sentinel Banking deploys Azure Firewall in the hub VNet:

Internet
    ↓
Azure Firewall (AzureFirewallSubnet, 10.10.1.0/26)
    β”‚ Private IP: 10.10.1.4
    β”œβ”€β”€ Hub VNet (10.10.0.0/16)
    β”‚     └── SharedServices subnet
    β”œβ”€β”€ Spoke 1 β€” Finance (10.20.0.0/16)
    β”‚     └── Route table: 0.0.0.0/0 β†’ 10.10.1.4
    └── Spoke 2 β€” HR (10.30.0.0/16)
          └── Route table: 0.0.0.0/0 β†’ 10.10.1.4

Configuration steps:

  1. Deploy Azure Firewall in AzureFirewallSubnet (minimum /26)
  2. Note the firewall’s private IP (automatically assigned)
  3. Create UDRs on spoke subnets: 0.0.0.0/0 β†’ Virtual appliance β†’ firewall private IP
  4. Create UDRs for spoke-to-spoke: 10.20.0.0/16 and 10.30.0.0/16 β†’ Virtual appliance β†’ firewall private IP
  5. Create firewall rules (DNAT, network, application) to allow required traffic
  6. Configure firewall diagnostic settings for logging

DNS proxy configuration: When enabled on Standard or Premium, the firewall becomes the DNS proxy for the VNet. Point VNet DNS settings to the firewall’s private IP. This enables FQDN-based network rules (normally network rules only support IPs).

Key Takeaways

  • Basic for dev/test, Standard for production, Premium for regulated (TLS inspection, IDPS)
  • Rule processing order: DNAT first, Network second, Application third
  • If a network rule matches, application rules are skipped for that traffic
  • FQDN filtering only works in application rules (not network rules β€” unless DNS proxy is enabled)
  • Deploy in hub VNet with UDRs on spoke subnets pointing to the firewall’s private IP

Test Your Knowledge

Question

What is the rule processing order in Azure Firewall?

Click or press Enter to reveal answer

Answer

1. DNAT rules (highest priority β€” inbound port forwarding). 2. Network rules (L3/L4 β€” IP, port, protocol). 3. Application rules (lowest β€” FQDN-based). If a network rule allows traffic, application rules are not evaluated.

Click to flip back

Question

Which Azure Firewall features are Premium-only?

Click or press Enter to reveal answer

Answer

TLS inspection (decrypt and inspect HTTPS), IDPS (Intrusion Detection and Prevention System), and web categories with full URL filtering. Standard has FQDN filtering but not TLS inspection or IDPS.

Click to flip back

Question

What is an FQDN tag?

Click or press Enter to reveal answer

Answer

A predefined, Microsoft-maintained group of FQDNs for a specific service (e.g., WindowsUpdate, AzureBackup). Used in application rules. Microsoft updates the list as endpoints change, so your rules stay current.

Click to flip back


Knowledge Check

Aisha needs to inspect encrypted HTTPS traffic flowing through Azure Firewall and detect intrusion attempts. Which SKU does she need?

Knowledge Check

A VM's outbound traffic to update.microsoft.com on port 443 is being blocked by Azure Firewall, even though there's an application rule allowing it. A network rule at higher priority denies port 443. Why?


Next up: Azure Firewall Manager and Policies β€” Centralise firewall management with policies, parent/child inheritance, and secure virtual hubs.

← Previous

Flow Logs, IP Flow Verify & Network Manager Security

Next β†’

Azure Firewall Manager and Policies

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.