Hi @$@chin
Welcome to the Microsoft Q&A Platform! Thank you for asking your question here.
You can consider the dual firewall approach as it is recommended for minimal downtime:
- Deploy the new Azure Firewall with zone redundancy in parallel with your existing firewall and attach the existing Azure Firewall Policy to the new firewall and configure all necessary routing and network rules on the new firewall. Please refer the document for more information.
- Thoroughly test the new firewall in a staging or test environment to ensure its functioning correctly.
- If you are using DNS to resolve to the public IP of the firewall, reduce the TTL of your DNS records well in advance of the cutover. This will minimize the time it takes for DNS changes to propagate.
- Modify your routing tables and network configurations to direct traffic to the new firewall's public IP. This can be done by updating UDRs in your virtual networks and if the firewall is used to secure outbound traffic from Virtual Machines, then you will need to update the User Defined Routes on the subnet of those Virtual Machines.
- Carefully monitor traffic flow and firewall logs after the cutover to ensure everything is working as expected and once you're confident that the new firewall is stable, delete the old firewall.
- Use ARM templates, Azure CLI, or PowerShell to automate the deployment and configuration of the new firewall. This will reduce the risk of errors and speed up the process. Please refer the document. For more information: Best practices for Azure Firewall. Manage a public IP address by using Azure Firewall
-I hope this has been helpful!
Your feedback is important so please take a moment to accept answers.
If you still have questions, please let us know what is needed in the comments so the question can be answered.