Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you would like to know about IDPS Filtering with Azure App gateway with Azure Firewall integration.
The below two observations are correct,
- AGWAF NAT's inbound to come from a private address (App GW subnet).
- Firewall IDPS settings include IANA RFC 1918 ranges
However,
Traffic from the AGWAF will be considered as internal (East-West).
Refer : IDPS Private IP ranges
Traffic sent from a private IP address range to a private IP address range is considered internal
Now, to address your queries,
1.Therefore, does the Azure Firewall bypass IDPS filtering of this traffic?
- No.
- The rules with direction "Internal" gets applied to this traffic.
- The IDPS Bypass List is a separate feature that allows you to explicitly specify not to filter traffic to any of the IP addresses, ranges, and subnets specified in the bypass list
2.If so, is there any downside to editing these and removing the AGWAF internal address from the private range, hence being considered as Inbound?
- You can edit the private ranges to exclude the App gateway subnet from Private Address Range
- There should not be any issue/downside.
With respect to Threat Protection , I shall check if this supports inspection of X-forwarded-for header internally and let you know
Cheers,
Kapil.