Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I see you have an Azure Firewall acting as a Virtual Appliance.
If you want to know if a traffic is blocked or allowed
- You have to check the Azure Firewall logs
- You can filter based on the source IP, source Port(if you are aware of it), destination IP/Hostname and destination port.
- This will tell you if the packet reached the Firewall in first place, and if it did whether or not Azure Firewall allowed or blocked the traffic.
Wrt, "Should we create a network rule and an application rule with wildcard (*) for the source, port, and destination"
- This can be done if you are in a development environment
- Make sure that you also consider other environments that might be using this Firewall for filtering and they may allow all traffic because of this rule.
- Even in this case, you can filter traffic for actual issue as mentioned above.
You may run the below query for complete Azure Firewall logs (Network + Application logs)
AzureDiagnostics
| where ResourceType == "AZUREFIREWALLS"
Cheers,
Kapil