Best Practices for Using Azure Firewall with Application Gateway

0
2
Asked By CloudChaser42 On

I'm looking to modernize a cloud environment by replacing an old IaaS firewall and WAF setup that my organization wants to move away from due to complexity and costs. We're using multiple public IPs for various applications, primarily in one region with plans for a second region for production disaster recovery. From what I've read, it seems like the ideal setup would have Azure Firewall Premium at the border, in front of an internal Application Gateway configured with WAF. This would feel more familiar since we currently have firewalls as the border devices. I also want to set up separate application gateways for different tiers of environments (production, development). If anyone has experience with this architecture, I'd love to hear any tips, concerns, or considerations!

1 Answer

Answered By TechGuru_55 On

I usually suggest positioning the Application Gateway first, followed by the firewall. This way, you can avoid needing multiple public IPs on the firewall and maintain features like geolocation that WAF on the App Gateway utilizes. SSL offloading can also be done at the App Gateway before it reaches the firewall, enhancing web traffic inspection.

NetworkNinja_88 -

What if I have non-HTTP external traffic? Would I need an IP/L4 public endpoint?

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.