You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Description
Implement Firewall Premium features, as this has high security impact and would allow to free up more websites, as there is the option to do URL filtering, i.e. you can restrict on entire URLs. Details here: https://docs.microsoft.com/en-us/azure/firewall/premium-features
New or Affected Resource(s)
azurerm_firewall_policy
(azurerm_firewall) # if you would implement azurerm_firewall_policy as sub resource of azurerm_firewall
Potential Terraform Configuration
resource"azurerm_firewall_policy""example" {
name="example"resource_group_name="example"location="West Europe"sku="Premium"dns={
servers =...
proxy_enabled =...
}
threat_intelligence_mode="Deny"threat_intelligence_allow_list={
ip_addresses = [172.0.2.1]
fqdns = ["www.google.com"]
}
intrusion_detection={
mode ="off"# "Alert", "Deny"
configuration = {
signature_overrides = {
state ="off"# "Alert", "Deny"
id = signature_id
}
bypass_traffic_settings = {
name ="bypass_traffic_setting_1"
description =""
protocol ="TCP"
source_addresses ="*"
destination_addresses ="*"
destination_ports ="*"
source_ip_groups ="*"
destination_ip_groups ="*"
}
}
}
transport_security={
certificate_authority = {
key_vault_secret_id ="..."// KeyVaultSecretID - Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
name ="..."// Name - Name of the CA certificate.
}
}
}
The intrusion_detection and transport_security blocks would be the new additions to the azurerm_firewall_policy resource. Alternatively, one could also integrate the azurerm_firewall_policy as a sub resource into the azurerm_firewall.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Community Note
Description
Implement Firewall Premium features, as this has high security impact and would allow to free up more websites, as there is the option to do URL filtering, i.e. you can restrict on entire URLs. Details here: https://docs.microsoft.com/en-us/azure/firewall/premium-features
New or Affected Resource(s)
Potential Terraform Configuration
The
intrusion_detection
andtransport_security
blocks would be the new additions to theazurerm_firewall_policy
resource. Alternatively, one could also integrate theazurerm_firewall_policy
as a sub resource into theazurerm_firewall
.References
Firewall Policy Structure
General Firewall Policy Properties Format
Intrusion Detection Parameter
https://pkg.go.dev/github.com/Azure/azure-sdk-for-go@v55.7.0+incompatible/services/network/mgmt/2020-11-01/network#FirewallPolicyIntrusionDetection
https://pkg.go.dev/github.com/Azure/azure-sdk-for-go@v55.7.0+incompatible/services/network/mgmt/2020-11-01/network#FirewallPolicyIntrusionDetectionConfiguration
https://pkg.go.dev/github.com/Azure/azure-sdk-for-go@v55.7.0+incompatible/services/network/mgmt/2020-11-01/network#FirewallPolicyIntrusionDetectionBypassTrafficSpecifications
Transport Layer Security Parameter
https://pkg.go.dev/github.com/Azure/azure-sdk-for-go@v55.7.0+incompatible/services/network/mgmt/2020-11-01/network#FirewallPolicyTransportSecurity
https://pkg.go.dev/github.com/Azure/azure-sdk-for-go@v55.7.0+incompatible/services/network/mgmt/2020-11-01/network#FirewallPolicyCertificateAuthority
The text was updated successfully, but these errors were encountered: