If the hub-and-spoke is the café itself, Azure Firewall Premium is the barista making sure every shot pulled (packet inspected) is clean, safe, and consistent. You can run hub‑and‑spoke without it, but would you trust your flat white to a dodgy apprentice? Exactly.
What is Azure Firewall Premium?
Azure Firewall Premium is Microsoft’s managed, cloud-native next-gen firewall service. It’s not just packet filtering; it brings in deeper traffic inspection that usually required third-party NVAs. Its main feature set includes:
- TLS Inspection: Decrypt and inspect HTTPS traffic.
- IDPS (Intrusion Detection & Prevention System): Detects and blocks malicious activity in both inbound (north-south) and internal (east-west) flows.
- Threat Intelligence-Based Filtering: Blocks or alerts on traffic to/from known malicious IPs/domains.
- Web Categories: Allows policy setting by application category (e.g. block “Gambling” in corporate networks).
How it Works
-
North-South Traffic (Internet ↔ Workloads)
Routes all inbound/outbound through Azure Firewall Premium. TLS inspection and IDPS help catch suspicious connections before they hit your apps. -
East-West Traffic (Spoke ↔ Spoke or VNet ↔ VNet)
Use UDRs to force inter‑VNet traffic through the hub firewall. This enables inspection of internal movement (lateral traffic) and is critical for Zero Trust. -
Policy Enforcement
Azure Firewall uses Firewall Policy objects (separate resource) for consistent, reusable rule configuration. Policies can be shared across multiple firewalls in different regions.
Here’s what the secure traffic flow looks like:
Real-World Impact
Think of these scenarios:
- Ransomware: Malware spreads laterally between spokes. With east-west inspection enabled, the firewall can detect and block suspicious SMB traffic.
- Phishing: An internal VM gets popped and tries calling a C2 (command-and-control) endpoint. Threat intelligence filtering stops the outbound connection.
- Compliance: TLS inspection ensures sensitive data flows are logged and inspected, satisfying regulatory requirements.
Without these features, most orgs would need an NVA like Palo Alto, Fortinet, or Check Point. Azure Firewall Premium narrows that gap.
Implementation Examples
Azure Portal
- Create a Firewall Policy (Premium).
- Enable TLS Inspection with a Key Vault certificate.
- Turn on IDPS in Alert or Alert+Block mode.
- Enable Threat Intelligence Mode (Alert or Deny).
- Attach the Firewall Policy to your Azure Firewall Premium instance.
- Add Application Rules (e.g. allow HTTPS, block categories).
- Add Network Rules for traffic needing explicit control.
Bicep Example — Firewall Policy with TLS Inspection, IDPS & Threat Intel
To continue on our previous post where we split things into modules we have created a few new resources in order to enable this feature set.
📂 Folder Structure (recommended)
|
|
🔹 main.bicep
— Root deployment updated
|
|
🔹 modules/keyvault.bicep
— Deploy a KeyVault & Certificate for TLS Inspection
|
|
🔹 modules/azfwpolicypremium.bicep
— Deploy a new Firewall Policy on premium Tier
|
|
Gotchas & Edge Cases
- TLS Inspection + Certificates: You’ll need to manage a trusted root CA in Key Vault and distribute the cert to clients. Miss that and apps will break.
- Performance Overhead: TLS decryption eats into throughput and adds latency. Size accordingly.
- IDPS Tuning: Default signatures can be noisy. You’ll likely need to tune exclusions.
- Costs: Firewall Policy Premium and TLS inspection certificate handling do add to bills. Don’t enable everything blindly.
Best Practices
- Attach multiple firewalls to the same Policy for consistent management.
- Start IDPS in Alert mode before jumping into block. Get a baseline, then tighten up.
- Use categories where possible (e.g. block “High Risk Domains”) to reduce rule sprawl.
- Instrument with Log Analytics immediately – you’ll want visibility into which inspection rules are firing.
Azure Firewall Premium isn’t perfect — NVAs from big vendors still win on advanced integrations. But for most enterprises in Azure, especially if you’re centralising security in a hub-and-spoke, Premium gets you 80% of the way with far less operational sweat.
Your mileage? Depends on whether you need user‑identity controls and advanced VPN terminations — if not, Azure Firewall Premium is usually the better roast.