Logged Traffic in Azure Firewall does not match Source and Destination defined in Rules
When checking the Logs of our Azure Firewall in Premium SKU I noticed very strange behavior.
The source AND destination for allowed traffic do not match the defined rule that allegedly allowed the traffic.
Example:
I defined a rule like this:
Name | Source Type | Source | Protocol | Destination Ports | Destination |
---|---|---|---|---|---|
TestRule | IP Address | 10.100.10.0/23 | TCP | 443 | 10.100.14.0/24 |
I then checked the Azure Firewall Logs:
AZFWNetworkRule
| union AZFWApplicationRule, AZFWNatRule, AZFWThreatIntel, AZFWIdpsSignature
| where Rule == "TestRule"
| take 100
The results I get look like this:
Protocol | Source IP | Destination IP | Destination Port | Rule |
---|---|---|---|---|
TCP | 10.100.34.111 | 10.100.65.46 | 443 | TestRule |
I am not comfortable sharing the actual addresses but the logs do show completely different source and destination in the logs which do not match the source and destination defined in the rule.
There are multiple rules showing this behavior which is a really big problem especially for firewall logs. In my opinion this can only be classified as a bug. Can anyone come up with a different explanation? I am out of ideas at this point.