Best practice for Azure Firewall Disaster Recovery

Everett Brandeau 5 Reputation points
2023-09-14T22:59:04.2966667+00:00

We are looking into our Disaster Recovery plan and wanting to refine it for our Azure services. We currently have multiple connectors that are pointed at public IPs that are on our Azure Firewall that are DNAT'd to their perspective VMs. In the event of a regional outage, our VMs can easily be moved over to US East from US West, but we have no such plan for the Azure Firewall.

We are looking for the best practice for our firewalls in this regional outage case. Is there a way to failover our firewall to the US East region with the same public IPs?

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
725 questions
Azure Site Recovery
Azure Site Recovery
An Azure native disaster recovery service. Previously known as Microsoft Azure Hyper-V Recovery Manager.
764 questions
{count} vote

3 answers

Sort by: Most helpful
  1. KapilAnanth-MSFT 48,761 Reputation points Microsoft Employee
    2023-09-15T07:01:44.15+00:00

    @Everett Brandeau

    Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.

    I understand that you would like to know the best practices for Azure firewall with disaster recovery.

    I could not find any specific documents for Azure Firewall, however, it should be similar to any other Networking resource.

    Can I keep a public IP address after failover?

    Can I keep a private IP address after failover?

    • Yes. By default, when you enable disaster recovery for Azure VMs, Site Recovery creates target resources, based on source resource settings.
    • For Azure VMs configured with static IP addresses, Site Recovery tries to provision the same IP address for the target VM, if it's not in use

    For more information : Retain IP addresses during failover

    Now, to answer your actual query,

    Just like a VPN Gateway or any other PaaS resource in the VNet,

    • ASR can replicate the subnet configuration
    • But it will not be able to replicate the actual resource
    • You will be required to deploy it prior to the migration in the target region's VNet
      or
      Deploy it during the migration using template. (minor downtime to be expected)
    • I believe you will be using an Azure Firewall Policy.
      • The target region Firewall Policy must instead use the Public IP created in that target region
      • You can use an ARM template to
        a. either define the Firewall and Firewall Policy configuration
        b. or export the Firewall and Firewall Policy configuration from the existing one and modify the Public IP settings
      • Post which you can use this new Firewall in the target region since the Private IPs of the VMs are going to be the same.
      For 3rd party services that may be referencing the Public IP of the Firewall,
      • You can consider using Azure Traffic Manager
    • Your exact scenario is documented here : https://learn.microsoft.com/en-us/azure/site-recovery/concepts-traffic-manager-with-site-recovery#azure-to-azure-failover
    • Traffic Manager uses the Domain Name System (DNS) to direct client requests to the most appropriate endpoint, based on a traffic-routing method and the health of the endpoints.

    Traffic Manager is not a proxy or a gateway, and it does not see the traffic passing between the client and the service.

    These docs may come handy:

    Also, I came across this blog which might help you with automation : https://techcommunity.microsoft.com/t5/azure-network-security-blog/backup-azure-firewall-and-azure-firewall-policy-with-logic-apps/ba-p/3613928#:~:text=The%20Logic%20App%20runs%20every%20three%20days%20to,your%20Firewall%20and%20Firewall%20Policy%20deployments%20as%20required.

    Hope this helps.

    Thanks,

    Kapil

    0 comments No comments

  2. msrini-MSFT 9,286 Reputation points Microsoft Employee
    2023-09-17T10:37:40.15+00:00

    Hi,

    Azure Firewall doesn't support Disaster Recovery as of today. As I understand your setup, you have client application/ servers connecting to Azure Firewall's Public IP which inturn gets DNAT'd to the servers in Azure VNET. When the failover happens, you will need to update all your clients to use the failed over Azure Firewall IP address and this needs to be scripted at your end to make your scenario work.

    Let me know if you have any follow up questions.

    Regards,

    Karthik Srinivas

    0 comments No comments

  3. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.