Building a POC for TLS inspection in Azure Firewall (2024)

Authored by - Deepak Maheshwari

This blog post will provide a step-by-step guide to build a Proof of Concept (POC) Lab that uses the Transport Layer Security (TLS) Inspection feature of Azure Firewall Premium by using the Certification Auto-Generationmechanism,which automatically creates the following three resources for you:

  • Managed Identity
  • Key Vault
  • Self-signed Root CA certificate

Azure Firewall TLS Inspection requires Public Key Infrastructure (PKI) to issue certificates. Setting up a PKI system is a complex process, as it requires deploying some additional resources such as Windows Virtual machine(s) to host Active Directory Certificate Services (ADCS) - to issue certificates - and additional configurations to set up the environment. This makes it a non-ideal solution for a POC where time to value is limited. The full process of generating, exporting, and configuring PKI certificates for Azure Firewall is documented in this article -Deploy and configure Enterprise CA certificates for Azure Firewall Premium. Azure Firewall also supports Self-Signedcertificates,but this configuration also requires some additional steps.

What is TLS Inspection in Azure Firewall Premium?

Azure Firewall Premium provides TLS inspection capability by decrypting the outbound traffic, inspecting it, processing it, and then re-encrypting the data and sending it to the destination. Azure Firewall Premium intercepts outbound HTTPS traffic and auto-generates a server certificate for the URL that you are trying to access. End-user browsers and the client applications must trust your organization’s Root CA certificate or intermediate CA certificate for this procedure to work.

Building a POC for TLS inspection in Azure Firewall (1)

Additionally, Azure Firewall Premium supports TLS inspection for East-West traffic and inbound traffic (when an Application Gateway is deployed before Azure Firewall Premium). For more information on the supported use cases refer to-Azure Firewall TLS Inspection.

Why TLS inspection is important

Encrypted traffic has a security risk, as it can hide illegal user activity and malicious traffic. Azure Firewall without TLS inspection has no visibility into the data that flows in the encrypted TLS tunnel, and so it cannot provide full protection coverage for the outbound traffic.

  • Azure Firewall without TLS Inspection:

Building a POC for TLS inspection in Azure Firewall (2)

  • Azure Firewall with TLS Inspection:

Building a POC for TLS inspection in Azure Firewall (3)

How TLS inspection works in Azure Firewall Premium

TLS inspection is achieved by using an Intermediate CA certificate. An intermediate certificate works as a substitute of a root certificate. Intermediate certificates are also used as a stand-in for a root certificate by playing a “Chain of Trust” between an end entity certificate and a root.

Building a POC for TLS inspection in Azure Firewall (4)

How to Enable TLS Inspection in Azure Firewall Premium with auto-generate new certification feature in a POC environment:

  1. Navigate to the Azure Firewall Premium Policy you want to enable TLS inspection.
  2. From the left menu pane, Select - TLS Inspection - and click on the Enabled option.
  3. In the Key Vault section, under Managed identity, select(New) Managed Identity Name.

Building a POC for TLS inspection in Azure Firewall (5)

  1. The following new resources with a random name will be created
    1. Managed Identity
    2. Key Vault
    3. Self-signed Root CA certificate

    Building a POC for TLS inspection in Azure Firewall (6)

    4. Click on Save button at the bottom of the page to commit the changes.

    5.Oncesaved, a new Managed identity and new Azure Key vault will be created along with a new root certificate (You can view the certificate under the certificates section).

    Building a POC for TLS inspection in Azure Firewall (7)

    6. Once you click on certificate, you will get an option to download the certificate in both PFX/PEM and CER format. Download the certificate in .CER format and copy it to the end user’s machine from where you would like to access a secure public website.

    Building a POC for TLS inspection in Azure Firewall (8)

    7. Configure an Application Rule in the Azure firewall policy to allow the outbound web traffic from the end user’s machine. Since TLS inspection is enabled in this outbound rule, all outbound traffic will be inspected by the Azure Firewall. An example of an application rule created for our test can be seen in the following figure:

    Building a POC for TLS inspection in Azure Firewall (9)

    8. Now let’s try to access a secure website such as https://bing.com from the end user’s machine. If you do not have the newly downloaded .CER certificate installed in your trusted root certificate store on your machine, you will receive the following error message

    Building a POC for TLS inspection in Azure Firewall (10)

    9. Import the downloaded .CER certificate to the “Trusted Root Certification Authority” on the end user’s machine from where you are trying to access https://bing.com.

    Building a POC for TLS inspection in Azure Firewall (11)

    10. Now, reopen the https://bing.com or any other secure website. You should be able to access the website. Look at the connection security in the browser. You should now see the certificate is issued by the Azure Firewall Manager.

    Building a POC for TLS inspection in Azure Firewall (12)

    This confirms that TLS inspection is working, and all outbound traffic is inspected by the Azure Firewall.

    Conclusion

    TLS inspection in Azure Firewall Premium is a powerful tool to decrypt encrypted traffic and allow for further inspection by Application Rules or IDPS. This POC guide can be leveraged by organizations to build a POC lab to demonstrate the TLS inspection capability of Azure Firewall Premium in a non-production environment without the need of setting-up a new PKI infrastructure.

    Further reference - To generate a POC environment with Azure Firewall Premium in a single click - check out the template inDeploy and configure Azure Firewall Premium.

    Building a POC for TLS inspection in Azure Firewall (2024)

    FAQs

    How do I configure TLS inspection in Azure Firewall? ›

    Configure TLS inspection for Azure
    1. Configure the appropriate IAM role for the policy. Refer to Key Vault roles.
    2. Configure an Azure Key Vault. Learn more.
    3. Go to Policy > TLS Inspection and click Configure TLS Inspection to enter the configuration wizard.

    How to check the TLS version in Azure? ›

    On the "TLS/SSL settings" page select the Bindings tab, scroll down and under the "Protocol Settings" check the "Minimum TLS Version".

    Which use cases are supported by Azure Firewall for TLS inspection? ›

    The following use cases are supported with Azure Firewall:
    • Outbound TLS Inspection. To protect against malicious traffic that is sent from an internal client hosted in Azure to the Internet.
    • East-West TLS Inspection (includes traffic that goes from/to an on-premises network)
    Sep 12, 2023

    What are the requirements for TLS inspection? ›

    If you want to inspect TLS traffic, you must generate a server certificate for the host that the client is attempting to connect to. An organization-managed, private CA must sign this server certificate. Only clients configured to trust this private CA trust these generated server certificates.

    What is TLS inspection in Azure Firewall? ›

    In TLS inspection, the intermediary device establishes SSL/TLS connections using its own TLS server certificate with web clients within the internal network. For the original destination web server, the intermediary acts as a proxy, establishing an SSL/TLS connection on behalf of the client.

    How do I enable TLS inspection? ›

    To enable TLS inspection, select Enable TLS inspection. In the Application Match section, specify the criteria for matching the request. If you do not enable the rule for TLS inspection, then the request can only match HTTP traffic. Click Create.

    How to configure TLS in Azure? ›

    Navigate to your storage account in the Azure portal. Under Settings, select Configuration. Under Minimum TLS version, use the drop-down to select the minimum version of TLS required to access data in this storage account.

    Which Azure services use TLS? ›

    Here's a list of several Azure offerings that use TLS:
    • API Management.
    • App Service.
    • Application Gateway.
    • Azure App Service - Azure Arc.
    • Azure App Service Static Web Apps.
    • Azure Cognitive Search.
    • Azure Cosmos DB.
    • Azure Database for MariaDB.
    Nov 20, 2023

    How do I force TLS 1.2 in Azure App Service? ›

    Azure Portal

    Navigate to App Services. In the left navigation, select TLS/SSL settings. In Minimum TLS Version, select 1.2.

    Which three certificates are used in Azure firewall premium typical TLS deployment? ›

    There are three types of certificates used in a typical deployment:
    • Intermediate CA Certificate (CA Certificate) A Certificate Authority (CA) is an organization that is trusted to sign digital certificates. ...
    • Server Certificate (Website certificate) ...
    • Root CA Certificate (root certificate)
    Jul 20, 2023

    What is the difference between Azure NSG and Azure firewall? ›

    Azure Firewall and NSG are both security services offered by Azure. They both operate by securing traffic based upon a set of rules. However, that is where the similarity ends. While NSG is a classic firewall, Azure Firewall offers next-generation firewall capabilities such as packet inspection and intrusion detection.

    What is TLS inspection? ›

    TLS inspection is a procedure that entails analyzing SSL/TLS sessions coming into or going out of a company's networks by means of a Man-in-the-Middle (MitM) approach. This makes it possible for the company to check the traffic for harmful information like malware, phishing, and data exfiltration.

    What is TLS inspection and how does it work? ›

    With TLS inspection, a device must decrypt the traffic, inspect it for threats, and re-encrypt it before sending it on its way. All of these steps take time and resources and create network latency, especially when being performed at line speed on high-bandwidth network connections.

    How do I configure TLS in Azure? ›

    Navigate to your storage account in the Azure portal. Under Settings, select Configuration. Under Minimum TLS version, use the drop-down to select the minimum version of TLS required to access data in this storage account.

    How do I enable TLS 1.2 in Azure? ›

    Follow these steps:
    1. In the Azure portal, search for and select Microsoft Entra ID.
    2. In the Overview page menu, select Sign-in logs.
    3. Select a sign-in log entry for a user.
    4. Select the Additional details tab. ...
    5. Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True.
    Apr 11, 2024

    How to set TLS configuration? ›

    Google Chrome
    1. Open Google Chrome.
    2. Click Alt F and select Settings.
    3. Scroll down and select Show advanced settings...
    4. Scroll down to the Network section and click on Change proxy settings...
    5. Select the Advanced tab.
    6. Scroll down to Security category, manually check the option box for Use TLS 1.1 and Use TLS 1.2.
    7. Click OK.
    Nov 1, 2023

    Where we can configure TLS certificate? ›

    To configure TLS for an application, you first need to get a TLS/SSL certificate that has been signed by a Certificate Authority (CA), a trusted third party who issues certificates for this purpose. If you do not already have one, you need to obtain one from a company that sells TLS/SSL certificates.

    Top Articles
    The Guide on Analyzing a Fix and Flip Investment - Under 30 Wealth
    Reduce Your Taxes with Short-Term Rental Properties
    Zabor Funeral Home Inc
    Angela Babicz Leak
    Tyson Employee Paperless
    80 For Brady Showtimes Near Marcus Point Cinema
    Www Thechristhospital Billpay
    Buckaroo Blog
    Natureza e Qualidade de Produtos - Gestão da Qualidade
    Builders Best Do It Center
    Craigslist Pets Longview Tx
    Hartland Liquidation Oconomowoc
    6813472639
    Log in or sign up to view
    Find Such That The Following Matrix Is Singular.
    Grandview Outlet Westwood Ky
    Ibukunore
    Lawson Uhs
    How To Level Up Roc Rlcraft
    Amih Stocktwits
    Pocono Recird Obits
    Pirates Of The Caribbean 1 123Movies
    Minnick Funeral Home West Point Nebraska
    THE FINALS Best Settings and Options Guide
    Mythical Escapee Of Crete
    Pensacola Tattoo Studio 2 Reviews
    What Is a Yurt Tent?
    Evil Dead Rise Showtimes Near Sierra Vista Cinemas 16
    Pioneer Library Overdrive
    J&R Cycle Villa Park
    Scat Ladyboy
    Homewatch Caregivers Salary
    Tmj4 Weather Milwaukee
    Ark Unlock All Skins Command
    Spinning Gold Showtimes Near Emagine Birch Run
    Unity Webgl Player Drift Hunters
    Metra Schedule Ravinia To Chicago
    Dmitri Wartranslated
    Vision Source: Premier Network of Independent Optometrists
    Saybyebugs At Walmart
    Craigslist Pets Plattsburgh Ny
    Craigslist Freeport Illinois
    Weather Underground Cedar Rapids
    California Craigslist Cars For Sale By Owner
    Craigslist/Nashville
    Swoop Amazon S3
    Walmart Careers Stocker
    Noga Funeral Home Obituaries
    Dicks Mear Me
    Page 5747 – Christianity Today
    Latest Posts
    Article information

    Author: Jerrold Considine

    Last Updated:

    Views: 5768

    Rating: 4.8 / 5 (78 voted)

    Reviews: 93% of readers found this page helpful

    Author information

    Name: Jerrold Considine

    Birthday: 1993-11-03

    Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

    Phone: +5816749283868

    Job: Sales Executive

    Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

    Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.