Logged Traffic in Azure Firewall does not match Source and Destination defined in Rules

Lukas Lohrsträter 0 Reputation points
2024-11-19T15:34:02.0066667+00:00

When checking the Logs of our Azure Firewall in Premium SKU I noticed very strange behavior.

The source AND destination for allowed traffic do not match the defined rule that allegedly allowed the traffic.

Example:

I defined a rule like this:

Name Source Type Source Protocol Destination Ports Destination
TestRule IP Address 10.100.10.0/23 TCP 443 10.100.14.0/24

I then checked the Azure Firewall Logs:

AZFWNetworkRule
| union AZFWApplicationRule, AZFWNatRule, AZFWThreatIntel, AZFWIdpsSignature
| where Rule == "TestRule"
| take 100

The results I get look like this:

Protocol Source IP Destination IP Destination Port Rule
TCP 10.100.34.111 10.100.65.46 443 TestRule

I am not comfortable sharing the actual addresses but the logs do show completely different source and destination in the logs which do not match the source and destination defined in the rule.

There are multiple rules showing this behavior which is a really big problem especially for firewall logs. In my opinion this can only be classified as a bug. Can anyone come up with a different explanation? I am out of ideas at this point.

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
685 questions
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.