You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn about Azure Firewall's Explicit Proxy setting.
4
-
services: firewall
5
-
author: duau
2
+
title: Azure Firewall explicit proxy (preview)
3
+
description: Learn about Azure Firewall's explicit proxy setting.
4
+
author: duongau
6
5
ms.service: azure-firewall
7
6
ms.topic: concept-article
8
-
ms.date: 03/30/2023
9
-
ms.author: magakman
7
+
ms.date: 03/28/2026
8
+
ms.author: duau
10
9
ms.custom: sfi-image-nochange
11
10
# Customer intent: As a network administrator, I want to configure an explicit proxy on Azure Firewall, so that I can manage outbound traffic efficiently without using a user-defined route.
12
11
---
13
12
14
-
# Azure Firewall Explicit proxy (preview)
13
+
# Azure Firewall explicit proxy (preview)
15
14
16
15
> [!IMPORTANT]
17
16
> Explicit proxy is currently in PREVIEW.
18
17
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19
18
20
-
Azure Firewall operates in a transparent proxy mode by default. In this mode, traffic is sent to the firewall using a userdefined route (UDR) configuration. The firewall intercepts that traffic inline and passes it to the destination.
19
+
Azure Firewall operates in a transparent proxy mode by default. In this mode, you use a user-defined route (UDR) configuration to send traffic to the firewall. The firewall intercepts that traffic inline and passes it to the destination.
21
20
22
-
With Explicit proxy set on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without the using a UDR.
21
+
When you set up explicit proxy on the outbound path, you can configure a proxy setting on the sending application (such as a web browser) with Azure Firewall configured as the proxy. As a result, traffic from the sending application goes to the firewall's private IP address and therefore egresses directly from the firewall without using a UDR.
23
22
24
-
With the Explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
23
+
With the explicit proxy mode (supported for HTTP/S), you can define proxy settings in the browser to point to the firewall private IP address. You can manually configure the IP address on the browser or application, or you can configure a proxy auto config (PAC) file. The firewall can host the PAC file to serve the proxy requests after you upload it to the firewall.
25
24
26
25
## Configuration
27
26
28
-
-Once the feature is enabled, the following screen shows on the portal:
27
+
-After you enable the feature, the following screen appears on the portal:
29
28
30
29
:::image type="content" source="media/explicit-proxy/enable-explicit-proxy.png" alt-text="Screenshot showing the Enable explicit proxy setting.":::
31
30
32
31
> [!NOTE]
33
32
> The HTTP and HTTPS ports can't be the same.
34
33
35
-
- Next, to allow the traffic to pass through the Firewall, create an **application** rule in the Firewall policy to allow this traffic.
36
-
> [!IMPORTANT]
37
-
> You must use an application rule. A network rule won't work.
34
+
1. Next, to allow the traffic through the firewall, create an **application** rule in the firewall policy to allow this traffic.
38
35
36
+
> [!IMPORTANT]
37
+
> You must use an application rule. A network rule doesn't work.
39
38
40
-
-To use the Proxy autoconfiguration (PAC) file, select **Enable proxy auto-configuration**.
39
+
-Select **Enable proxy auto-configuration** to use the Proxy autoconfiguration (PAC) file.
41
40
42
-
- First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy**page, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
41
+
1. First, upload the PAC file to a storage container that you create. Then, on the **Enable explicit proxy**pane, configure the shared access signature (SAS) URL. Configure the port where the PAC is served from, and then select **Apply** at the bottom of the page.
43
42
44
-
The SAS URL must have READ permissions so the firewall can download the file. If changes are made to the PAC file, a new SAS URL needs to be generated and configured on the firewall **Enable explicit proxy** page.
43
+
The SAS URL must have **READ** permissions so the firewall can download the file. If you make changes to the PAC file, you need to generate a new SAS URL and configure it on the firewall **Enable explicit proxy** page.
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, you can use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
49
+
To ensure consistent configuration of explicit proxy settings across your Azure Firewall deployments, use Azure Policy definitions. The following policies are available to govern explicit proxy configurations:
51
50
52
51
-**Enforce Explicit Proxy Configuration for Firewall Policies**: Ensures that all Azure Firewall policies have explicit proxy configuration enabled.
53
52
-**Enable PAC file configuration while using Explicit Proxy**: Audits that when explicit proxy is enabled, the PAC (Proxy Auto-Configuration) file is also properly configured.
@@ -56,5 +55,5 @@ For more information about these policies and how to implement them, see [Use Az
56
55
57
56
## Next steps
58
57
59
-
- To learn more about Explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
60
-
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall using Azure PowerShell](deploy-ps.md).
58
+
- To learn more about explicit proxy, see [Demystifying Explicit proxy: Enhancing Security with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/demystifying-explicit-proxy-enhancing-security-with-azure/ba-p/3873445).
59
+
- To learn how to deploy an Azure Firewall, see [Deploy and configure Azure Firewall by using Azure PowerShell](deploy-ps.md).
0 commit comments