Welcome to the Microsoft Q&A forum.
If I have understood the question correctly you have an application gateway with azure app services as backend now you wish to add a Azure Firewall after your application gateway and you want to know which routes and network rules need to be specified.
Based on my understanding above, you can refer to this similar architecture here (added diagram as a reference)
On the Application Gateway you will have to add a route which directs the traffic to your backend pool via Azure Firewall's private IP (In this case 192.168.1.0 -> 192.168.100.4).
Azure Firewall doesn't SNAT the traffic, because the traffic is going to a private IP address. It forwards the traffic to the application VM if rules allow it. I think you will have to create a network rule in Azure Firewall allowing communication via AppGwSubnet.
Since your backend is a web app I think you can use Network routing to route the outbound traffic from the app as discussed here and you also need to allow the source ip here in your Azure Firewall for outbound connection.
Hope this helps! Please let me know if you have any additional questions. Thank you!
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.