Hello @Ethan Hou ,
I've confirmed with the Azure Firewall Product group team and they mentioned that Azure Firewall Premium perform TLS inspection ONLY if it was explicitly configured in its application rules. TLS inspection decrypts outbound traffic, processes the data, then encrypts the data and sends it to the destination.
For Outbound TLS Inspection & East-West TLS Inspection, you need to enable the TLS inspection feature for it be active. So you need to do either of the below:
- Enable it manually on your Azure Firewall policy.
OR - Add a parent policy to your firewall policy where TLS inspection is already enabled (this will make sure that your policy will inherit rules and other settings from the selected parent policy).
Refer : https://learn.microsoft.com/en-us/azure/firewall/premium-features
But as mentioned earlier, for inbound traffic, the Azure Firewall performs both DNAT rule filtering and IDPS signature verification. We compare network traffic against more than 30000 malware signatures for security. Inbound TLS inspection is currently supported with Azure Application Gateway, which provides end-to-end encryption. So, at present Azure Firewall Premium will NOT do the TLS inspection for the incoming/inbound traffic by default or even when enabled as a feature. Per our PG team, inbound TLS inspection is in our roadmap but there is no ETA at the moment.
Kindly let us know if the above helps or you need further assistance on this issue.
----------------------------------------------------------------------------------------------------------------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.