Options for Retaining or Use the Existing Public IP of Azure firewall without zone redundancy while Deploying a New Azure Firewall with HA

$@chin 150 Reputation points
2025-03-04T19:10:00.09+00:00

Hi,

I am looking for a way to retain the existing public IP of the Azure Firewall, which currently does not have zone redundancy, while planning to implement zone redundancy. To achieve this, I need to create a new firewall instance, as zone redundancy cannot be enabled on the current Azure Firewall due to its integration with secured hub. The plan is to create the new Azure Firewall, un-associate the Azure Firewall policy from the old instance, and then attach it to the new one.

My question is, using Firewall Manager, is it possible to retain or reassign the public IP from the old Azure Firewall to the new instance?

Alternatively, if I delete the existing firewall, the public IP would be released. Upon deploying the new Azure Firewall, I could select the option to use the existing public IP. However, how can I minimize downtime and reduce service disruption, considering that the private IP will also change? any other option ?

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
731 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Sai Prasanna Sinde 4,335 Reputation points Microsoft External Staff
    2025-03-05T12:06:45.47+00:00

    Hi @$@chin

    Welcome to the Microsoft Q&A Platform! Thank you for asking your question here.

    You can consider the dual firewall approach as it is recommended for minimal downtime:

    • Deploy the new Azure Firewall with zone redundancy in parallel with your existing firewall and attach the existing Azure Firewall Policy to the new firewall and configure all necessary routing and network rules on the new firewall. Please refer the document for more information.
    • Thoroughly test the new firewall in a staging or test environment to ensure its functioning correctly.
    • If you are using DNS to resolve to the public IP of the firewall, reduce the TTL of your DNS records well in advance of the cutover. This will minimize the time it takes for DNS changes to propagate.
    • Modify your routing tables and network configurations to direct traffic to the new firewall's public IP. This can be done by updating UDRs in your virtual networks and if the firewall is used to secure outbound traffic from Virtual Machines, then you will need to update the User Defined Routes on the subnet of those Virtual Machines.
    • Carefully monitor traffic flow and firewall logs after the cutover to ensure everything is working as expected and once you're confident that the new firewall is stable, delete the old firewall.
    • Use ARM templates, Azure CLI, or PowerShell to automate the deployment and configuration of the new firewall. This will reduce the risk of errors and speed up the process. Please refer the document. For more information: Best practices for Azure Firewall. Manage a public IP address by using Azure Firewall

    -I hope this has been helpful!

    Your feedback is important so please take a moment to accept answers.

    If you still have questions, please let us know what is needed in the comments so the question can be answered.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.