Azure Firewall for development cost reduction - I need to keep the static IP

Avi Stokar 0 Reputation points
2024-05-01T15:27:49.18+00:00

I am in development and the app environment requires a static IP which is registered with 3rd party for their white list. This application also requires an SSL certificate for use as client certificate with this IP. I see that the Azure firewall on this environment is costing a lot of money and I would like to turn it off but I need to keep this static IP address. How can I accomplish this?

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
580 questions
{count} votes

1 answer

Sort by: Most helpful
  1. GitaraniSharma-MSFT 48,011 Reputation points Microsoft Employee
    2024-05-03T17:31:42.53+00:00

    Hello @Avi Stokar ,

    Thank you for the details but I would like to know which resource is associated to the Static IP address.

    When you say the static IP is registered with 3rd party for their whitelisting, I believe you are referring to a Static Public IP. So, is this static Public IP associated to the Azure Firewall?

    If this Static Public IP is associated to the Azure Firewall, then you need to follow the below doc:

    https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/configure-public-ip-firewall#change-the-public-ip-address-for-a-firewall

    You can change the public IP address associated with the firewall but note that a firewall must have at least one public IP address associated with its configuration. Also, you can't update the IP address if the firewall's existing IP has any destination network address translation (DNAT) rules associated with it.

    So, if you would like to retain the existing Static IP address associated with the Azure Firewall and stop the Azure Firewall for cost reduction, then you need to first change the IP address of the Azure Firewall.

    To stop Azure Firewall, refer: https://learn.microsoft.com/en-us/azure/firewall/firewall-faq#how-can-i-stop-and-start-azure-firewall

    But to make sure that the app is still accessible using the existing static IP, you would need to associate it back to a resource depending upon your requirement.

    You could either add it directly to your app if you are using an Azure App service.

    Refer: https://learn.microsoft.com/en-us/azure/app-service/overview-inbound-outbound-ips#get-a-static-inbound-ip

    https://learn.microsoft.com/en-us/azure/app-service/configure-ssl-bindings

    Or you need to introduce another resource which can help you with the inbound connections, such as Azure Application gateway, Load balancer, Front Door etc.

    If you could share your exact setup with the traffic flow from the 3rd party to the app and the new requirement, we can discuss it further.

    Kindly let us know if the above helps or you need further assistance on this issue.


    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    0 comments No comments