Skip to content

Commit 8223636

Browse files
committed
docs: fix metadata, fix broken metrics.md links, style fixes
1 parent 141d135 commit 8223636

1 file changed

Lines changed: 16 additions & 17 deletions

File tree

articles/firewall/firewall-best-practices.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Azure Firewall best practices for performance
3-
description: Learn how to configure Azure Firewall to maximize performance
4-
services: firewall
3+
description: Learn how to configure Azure Firewall to maximize performance and minimize latency using best practices for rules, SNAT, IDPS, and monitoring.
54
author: duongau
65
ms.service: azure-firewall
76
ms.topic: concept-article
8-
ms.date: 01/13/2025
7+
ms.date: 03/28/2026
98
ms.author: duau
109
# Customer intent: As a network administrator, I want to implement best practices for Azure Firewall configuration, so that I can optimize its performance and ensure efficient network traffic management while maintaining security.
1110
---
@@ -14,39 +13,39 @@ ms.author: duau
1413

1514
To maximize the [performance](firewall-performance.md) of your Azure Firewall and Firewall policy, it’s important to follow best practices. However, certain network behaviors or features can affect the firewall’s performance and latency, despite its performance optimization capabilities.
1615

17-
## Performance issues common causes
16+
## Common causes of performance problems
1817

1918
- **Exceeding rule limitations**
2019

21-
If you exceed limitations, such as using over 20,000 unique source/destination combinations in rules, it can affect firewall traffic processing and cause latency. Even though this is a soft limit, if you surpass this value it can affect overall firewall performance. For more information, see the [documented limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
20+
If you exceed limitations, such as using more than 20,000 unique source or destination combinations in rules, you can affect firewall traffic processing and cause latency. Even though this limit is soft, surpassing it can affect overall firewall performance. For more information, see the [documented limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
2221

2322
- **High traffic throughput**
2423

25-
Azure Firewall Standard supports up to 30 Gbps, while Premium supports up to 100 Gbps. For more information, see the [throughput limitations](firewall-performance.md#performance-data). You can monitor your throughput or data processing in Azure Firewall metrics. For more information, see [Azure Firewall metrics and alerts](metrics.md).
24+
Azure Firewall Standard supports up to 30 Gbps, while Premium supports up to 100 Gbps. For more information, see the [throughput limitations](firewall-performance.md#performance-data). You can monitor your throughput or data processing in Azure Firewall metrics. For more information, see [Azure Firewall metrics and alerts](monitor-firewall-reference.md).
2625

27-
- **High Number of Connections**
26+
- **High number of connections**
2827

2928
An excessive number of connections passing through the firewall can lead to SNAT (Source Network Address Translation) port exhaustion.
3029

31-
- **IDPS Alert + Deny Mode**
30+
- **IDPS Alert + Deny mode**
3231

33-
If you enable IDPS Alert + Deny Mode, the firewall drops packets that match an IDPS signature. This affects performance.
32+
If you enable IDPS Alert + Deny mode, the firewall drops packets that match an IDPS signature. This action affects performance.
3433

3534
## Recommendations
3635

3736
- **Optimize rule configuration and processing**
3837

39-
- Organize rules using firewall policy into Rule Collection Groups and Rule Collections, prioritizing them based on their use frequency.
38+
- Organize rules by using firewall policy into Rule Collection Groups and Rule Collections, and prioritize them based on how often they're used.
4039
- Use [IP Groups](ip-groups.md) or IP prefixes to reduce the number of IP table rules.
4140
- Prioritize rules with the highest number of hits.
42-
- Ensure that you are within the following [rule limitations](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
41+
- Make sure you're within the following [rule limitations](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits).
4342
- **Use or migrate to Azure Firewall Premium**
4443
- Azure Firewall Premium uses advanced hardware and offers a higher-performing underlying engine.
45-
- Best for heavier workloads and higher traffic volumes.
44+
- It's best for heavier workloads and higher traffic volumes.
4645
- It also includes built-in accelerated networking software, which can achieve throughput of up to 100 Gbps, unlike the Standard version.
4746
- **Add multiple public IP addresses to the firewall to prevent SNAT port exhaustion**
48-
- To prevent SNAT port exhaustion, consider adding multiple public IP addresses (PIPs) to your firewall. Azure Firewall provides [2,496 SNAT ports per each additional PIP](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
49-
- If you prefer not to add more PIPs, you can add an Azure NAT Gateway to scale SNAT port usage. This provides advanced SNAT port allocation capabilities.
47+
- To prevent SNAT port exhaustion, consider adding multiple public IP addresses (PIPs) to your firewall. Azure Firewall provides [2,496 SNAT ports per each additional PIP](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
48+
- If you prefer not to add more PIPs, you can add an Azure NAT Gateway to scale SNAT port usage. This solution provides advanced SNAT port allocation capabilities.
5049
- **Start with IDPS Alert mode before you enable Alert + Deny mode**
5150
- While the *Alert + Deny* mode offers enhanced security by blocking suspicious traffic, it can also introduce more processing overhead. If you disable this mode, you might observe performance improvement, especially in scenarios where the firewall is primarily used for routing and not deep packet inspection.
5251
- It's essential to remember that traffic through the firewall is denied by default until you explicitly configure *allow* rules. Therefore, even when IDPS *Alert + Deny* mode is disabled, your network remains protected, and only explicitly permitted traffic is allowed to pass through the firewall. It can be a strategic choice to disable this mode to optimize performance without compromising the core security features provided by the Azure Firewall.
@@ -56,7 +55,7 @@ To maximize the [performance](firewall-performance.md) of your Azure Firewall an
5655
5756
## Testing and monitoring
5857

59-
To ensure optimal performance for your Azure Firewall, you should continuously and proactively monitor it. It's crucial to regularly assess the health and key metrics of your firewall to identify potential issues and maintain efficient operation, especially during configuration changes.
58+
To ensure optimal performance for your Azure Firewall, continuously and proactively monitor it. Regularly assess the health and key metrics of your firewall to identify potential issues and maintain efficient operation, especially during configuration changes.
6059

6160
Use the following best practices for testing and monitoring:
6261

@@ -65,13 +64,13 @@ Use the following best practices for testing and monitoring:
6564
- **Measure firewall latency using latency probe metrics**
6665
- Use the *latency probe* metric to measure the average latency of the Azure Firewall. This metric provides an indirect metric of the firewall’s performance. Remember that intermittent latency spikes are normal.
6766
- **Measure traffic throughput metric**
68-
- Monitor the *traffic throughput* metric to understand how much data passes through the firewall. This helps you gauge the firewalls capacity and its ability to handle the network traffic.
67+
- Monitor the *traffic throughput* metric to understand how much data passes through the firewall. This metric helps you gauge the firewall's capacity and its ability to handle the network traffic.
6968
- **Measure data processed**
7069
- Keep track of the *data processed* metric to assess the volume of data processed by the firewall.
7170
- **Identify rule hits and performance spikes**
7271
- Look for spikes in network performance or latency. Correlate rule hit timestamps, such as application rules hit count and network rules hit count, to determine if rule processing is a significant factor contributing to performance or latency issues. By analyzing these patterns, you can identify specific rules or configurations that you might need to optimize.
7372
- **Add alerts to key metrics**
74-
- In addition to regular monitoring, it's crucial to set up alerts for key firewall metrics. This ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](metrics.md#alert-on-azure-firewall-metrics) for detailed instructions about setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
73+
- In addition to regular monitoring, set up alerts for key firewall metrics. This step ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](monitor-firewall.md#alert-on-azure-firewall-metrics) for detailed instructions about setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
7574
- **Implement governance and compliance**
7675
- Use [Azure Policy](firewall-azure-policy.md) to enforce consistent configuration standards across your Azure Firewall deployments, including explicit proxy settings and other security configurations.
7776
- Track configuration changes using [Azure Resource Graph](rule-set-change-tracking.md) to maintain compliance and operational visibility.

0 commit comments

Comments
 (0)