As enterprises adopt Microsoft Azure for large-scale workloads, securing network traffic becomes a critical part of the platform foundation. Azure’s Well-Architected Framework provides the blueprint for enterprise-scale Landing Zone design and deployments, and while Azure Firewall is a built-in PaaS option, some organizations prefer third-party firewall appliances for familiarity, feature depth, and vendor alignment.
This blog explains the basic design patterns, key configurations, and best practices when deploying third-party firewalls (Palo Alto, Fortinet, Check Point, etc.) as part of an Azure Landing Zone.
1. Landing Zone Architecture and Firewall Role
The Azure Landing Zone is Microsoft’s recommended enterprise-scale architecture for adopting cloud at scale. It provides a standardized, modular design that organizations can use to deploy and govern workloads consistently across subscriptions and regions.
At its core, the Landing Zone follows a hub-and-spoke topology:
- Hub (Connectivity Subscription):
- Central place for shared services like DNS, private endpoints, VPN/ExpressRoute gateways, Azure Firewall (or third-party firewall appliances), Bastion, and monitoring agents.
- Provides consistent security controls and connectivity for all workloads.
- Firewalls are deployed here to act as the traffic inspection and enforcement point.
- Spokes (Workload Subscriptions):
- Application workloads (e.g., SAP, web apps, data platforms) are placed in spoke VNets.
- Additional specialized spokes may exist for Identity, Shared Services, Security, or Management.
- These are isolated for governance and compliance, but all connectivity back to other workloads or on-premises routes through the hub.
Traffic Flows Through Firewalls
- North-South Traffic:
- Inbound connections from the Internet (e.g., customer access to applications).
- Outbound connections from Azure workloads to Internet services.
- Hybrid connectivity to on-premises datacenters or other clouds.
- Routed through the external firewall set for inspection and policy enforcement.
- East-West Traffic:
- Lateral traffic between spokes (e.g., Application VNet to Database VNet).
- Communication across environments like Dev → Test → Prod (if allowed).
- Routed through an internal firewall set to apply segmentation, zero-trust principles, and prevent lateral movement of threats.
Why Firewalls Matter in the Landing Zone
While Azure provides NSGs (Network Security Groups) and Route Tables for basic packet filtering and routing, these are not sufficient for advanced security scenarios. Firewalls add:
- Deep packet inspection (DPI) and application-level filtering.
- Intrusion Detection/Prevention (IDS/IPS) capabilities.
- Centralized policy management across multiple spokes.
- Segmentation of workloads to reduce blast radius of potential attacks.
- Consistent enforcement of enterprise security baselines across hybrid and multi-cloud.
Organizations May Choose
Depending on security needs, cost tolerance, and operational complexity, organizations typically adopt one of two models for third party firewalls:
- Two sets of firewalls
- One set dedicated for north-south traffic (external to Azure).
- Another set for east-west traffic (between VNets and spokes).
- Provides the highest security granularity, but comes with higher cost and management overhead.
- Single set of firewalls
- A consolidated deployment where the same firewall cluster handles both east-west and north-south traffic.
- Simpler and more cost-effective, but may introduce complexity in routing and policy segregation.
This design choice is usually made during Landing Zone design, balancing security requirements, budget, and operational maturity.
2. Why Choose Third-Party Firewalls Over Azure Firewall?
While Azure Firewall provides simplicity as a managed service, customers often choose third-party solutions due to:
- Advanced features – Deep packet inspection, IDS/IPS, SSL decryption, threat feeds.
- Vendor familiarity – Network teams trained on Palo Alto, Fortinet, or Check Point.
- Existing contracts – Enterprise license agreements and support channels.
- Hybrid alignment – Same vendor firewalls across on-premises and Azure.
Azure Firewall is a fully managed PaaS service, ideal for customers who want a simple, cloud-native solution without worrying about underlying infrastructure. However, many enterprises continue to choose third-party firewall appliances (Palo Alto, Fortinet, Check Point, etc.) when implementing their Landing Zones. The decision usually depends on capabilities, familiarity, and enterprise strategy.
Key Reasons to Choose Third-Party Firewalls
- Feature Depth and Advanced Security
- Third-party vendors offer advanced capabilities such as:
- Deep Packet Inspection (DPI) for application-aware filtering.
- Intrusion Detection and Prevention (IDS/IPS).
- SSL/TLS decryption and inspection.
- Advanced threat feeds, malware protection, sandboxing, and botnet detection.
- While Azure Firewall continues to evolve, these vendors have a longer track record in advanced threat protection.
- Third-party vendors offer advanced capabilities such as:
- Operational Familiarity and Skills
- Network and security teams often have years of experience managing Palo Alto, Fortinet, or Check Point appliances on-premises.
- Adopting the same technology in Azure reduces the learning curve and ensures faster troubleshooting, smoother operations, and reuse of existing playbooks.
- Integration with Existing Security Ecosystem
- Many organizations already use vendor-specific management platforms (e.g., Panorama for Palo Alto, FortiManager for Fortinet, or SmartConsole for Check Point).
- Extending the same tools into Azure allows centralized management of policies across on-premises and cloud, ensuring consistent enforcement.
- Compliance and Regulatory Requirements
- Certain industries (finance, healthcare, government) require proven, certified firewall vendors for security compliance.
- Customers may already have third-party solutions validated by auditors and prefer extending those to Azure for consistency.
- Hybrid and Multi-Cloud Alignment
- Many enterprises run a hybrid model, with workloads split across on-premises, Azure, AWS, or GCP.
- Third-party firewalls provide a common security layer across environments, simplifying multi-cloud operations and governance.
- Customization and Flexibility
- Unlike Azure Firewall, which is a managed service with limited backend visibility, third-party firewalls give admins full control over operating systems, patching, advanced routing, and custom integrations.
- This flexibility can be essential when supporting complex or non-standard workloads.
- Licensing Leverage (BYOL)
- Enterprises with existing enterprise agreements or volume discounts can bring their own firewall licenses (BYOL) to Azure.
- This often reduces cost compared to pay-as-you-go Azure Firewall pricing.
When Azure Firewall Might Still Be Enough
- Organizations with simple security needs (basic north-south inspection, FQDN filtering).
- Cloud-first teams that prefer managed services with minimal infrastructure overhead.
- Customers who want to avoid manual scaling and VM patching that comes with IaaS appliances.
In practice, many large organizations use a hybrid approach: Azure Firewall for lightweight scenarios or specific environments, and third-party firewalls for enterprise workloads that require advanced inspection, vendor alignment, and compliance certifications.
3. Deployment Models in Azure
Third-party firewalls in Azure are primarily IaaS-based appliances deployed as virtual machines (VMs). Leading vendors publish Azure Marketplace images and ARM/Bicep templates, enabling rapid, repeatable deployments across multiple environments. These firewalls allow organizations to enforce advanced network security policies, perform deep packet inspection, and integrate with Azure-native services such as Virtual Network (VNet) peering, Azure Monitor, and Azure Sentinel.
Note: Some vendors now also release PaaS versions of their firewalls, offering managed firewall services with simplified operations. However, for the purposes of this blog, we will focus mainly on IaaS-based firewall deployments.
Common Deployment Modes
- Active-Active
- Description: In this mode, multiple firewall VMs operate simultaneously, sharing the traffic load. An Azure Load Balancer distributes inbound and outbound traffic across all active firewall instances.
- Use Cases: Ideal for environments requiring high throughput, resilience, and near-zero downtime, such as enterprise data centers, multi-region deployments, or mission-critical applications.
- Considerations:
- Requires careful route and policy synchronization between firewall instances to ensure consistent traffic handling.
- Typically involves BGP or user-defined routes (UDRs) for optimal traffic steering.
- Scaling is easier: additional firewall VMs can be added behind the load balancer to handle traffic spikes.
- Active-Passive
- Description: One firewall VM handles all traffic (active), while the secondary VM (passive) stands by for failover. When the active node fails, Azure service principals manage IP reassignment and traffic rerouting.
- Use Cases: Suitable for environments where simpler management and lower operational complexity are preferred over continuous load balancing.
- Considerations:
- Failover may result in a brief downtime, typically measured in seconds to a few minutes.
- Synchronization between the active and passive nodes ensures firewall policies, sessions, and configurations are mirrored.
- Recommended for smaller deployments or those with predictable traffic patterns.
Network Interfaces (NICs)
Third-party firewall VMs often include multiple NICs, each dedicated to a specific type of traffic:
- Untrust/Public NIC: Connects to the Internet or external networks. Handles inbound/outbound public traffic and enforces perimeter security policies.
- Trust/Internal NIC: Connects to private VNets or subnets. Manages internal traffic between application tiers and enforces internal segmentation.
- Management NIC: Dedicated to firewall management traffic. Keeps administration separate from data plane traffic, improving security and reducing performance interference.
- HA NIC (Active-Passive setups): Facilitates synchronization between active and passive firewall nodes, ensuring session and configuration state is maintained across failovers.
This design choice is usually made during Landing Zone design, balancing security requirements, budget, and operational maturity.
Figure 1: NICs of Palo Alto External Firewalls and FortiGate Internal Firewalls in two sets of firewall scenario4. Key Configuration Considerations
When deploying third-party firewalls in Azure, several design and configuration elements play a critical role in ensuring security, performance, and high availability. These considerations should be carefully aligned with organizational security policies, compliance requirements, and operational practices.
Routing
- User-Defined Routes (UDRs):
- Define UDRs in spoke Virtual Networks to ensure all outbound traffic flows through the firewall, enforcing inspection and security policies before reaching the Internet or other Virtual Networks.
- Centralized routing helps standardize controls across multiple application Virtual Networks.
- Depending on the architecture traffic flow design, use appropriate Load Balancer IP as the Next Hop on UDRs of spoke Virtual Networks.
- Symmetric Routing:
- Ensure traffic follows symmetric paths (i.e., outbound and inbound flows pass through the same firewall instance).
- Avoid asymmetric routing, which can cause stateful firewalls to drop return traffic.
- Leverage BGP with Azure Route Server where supported, to simplify route propagation across hub-and-spoke topologies.
Policies
- NAT Rules:
- Configure DNAT (Destination NAT) rules to publish applications securely to the Internet.
- Use SNAT (Source NAT) to mask private IPs when workloads access external resources.
- Security Rules:
- Define granular allow/deny rules for both north-south traffic (Internet to VNet) and east-west traffic (between Virtual Networks or subnets).
- Ensure least privilege by only allowing required ports, protocols, and destinations.
- Segmentation:
- Apply firewall policies to separate workloads, environments, and tenants (e.g., Production vs. Development).
- Enforce compliance by isolating workloads subject to regulatory standards (PCI-DSS, HIPAA, GDPR).
- Application-Aware Policies:
- Many vendors support Layer 7 inspection, enabling controls based on applications, users, and content (not just IP/port).
- Integrate with identity providers (Azure AD, LDAP, etc.) for user-based firewall rules.
Load Balancers
- Internal Load Balancer (ILB):
- Use ILBs for east-west traffic inspection between Virtual Networks or subnets.
- Ensures that traffic between applications always passes through the firewall, regardless of origin.
- External Load Balancer (ELB):
- Use ELBs for north-south traffic, handling Internet ingress and egress.
- Required in Active-Active firewall clusters to distribute traffic evenly across firewall nodes.
- Other Configurations:
- Configure health probes for firewall instances to ensure faulty nodes are automatically bypassed.
- Validate Floating IP configuration on Load Balancing Rules according to the respective vendor recommendations.
Identity Integration
- Azure Service Principals:
- In Active-Passive deployments, configure service principals to enable automated IP reassignment during failover.
- This ensures continuous service availability without manual intervention.
- Role-Based Access Control (RBAC):
- Integrate firewall management with Azure RBAC to control who can deploy, manage, or modify firewall configurations.
- SIEM Integration:
- Stream logs to Azure Monitor, Sentinel, or third-party SIEMs for auditing, monitoring, and incident response.
Licensing
- Pay-As-You-Go (PAYG):
- Licenses are bundled into the VM cost when deploying from the Azure Marketplace.
- Best for short-term projects, PoCs, or variable workloads.
- Bring Your Own License (BYOL):
- Enterprises can apply existing contracts and licenses with vendors to Azure deployments.
- Often more cost-effective for large-scale, long-term deployments.
- Hybrid Licensing Models:
- Some vendors support license mobility from on-premises to Azure, reducing duplication of costs.
5. Common Challenges
Third-party firewalls in Azure provide strong security controls, but organizations often face practical challenges in day-to-day operations:
- Misconfiguration
- Incorrect UDRs, route tables, or NAT rules can cause dropped traffic or bypassed inspection.
- Asymmetric routing is a frequent issue in hub-and-spoke topologies, leading to session drops in stateful firewalls.
- Performance Bottlenecks
- Firewall throughput depends on the VM SKU (CPU, memory, NIC limits).
- Under-sizing causes latency and packet loss, while over-sizing adds unnecessary cost.
- Continuous monitoring and vendor sizing guides are essential.
- Failover Downtime
- Active-Passive models introduce brief service interruptions while IPs and routes are reassigned.
- Some sessions may be lost even with state sync, making Active-Active more attractive for mission-critical workloads.
- Backup & Recovery
- Azure Backup doesn’t support vendor firewall OS.
- Configurations must be exported and stored externally (e.g., storage accounts, repos, or vendor management tools).
- Without proper backups, recovery from failures or misconfigurations can be slow.
- Azure Platform Limits on Connections
- Azure imposes a per-VM cap of 250,000 active connections, regardless of what the firewall vendor appliance supports.
- This means even if an appliance is designed for millions of sessions, it will be constrained by Azure’s networking fabric.
- Hitting this cap can lead to unexplained traffic drops despite available CPU/memory.
- The workaround is to scale out horizontally (multiple firewall VMs behind a load balancer) and carefully monitor connection distribution.
6. Best Practices for Third-Party Firewall Deployments
To maximize security, reliability, and performance of third-party firewalls in Azure, organizations should follow these best practices:
- Deploy in Availability Zones:
Place firewall instances across different Availability Zones to ensure regional resilience and minimize downtime in case of zone-level failures. - Prefer Active-Active for Critical Workloads:
Where zero downtime is a requirement, use Active-Active clusters behind an Azure Load Balancer. Active-Passive can be simpler but introduces failover delays. - Use Dedicated Subnets for Interfaces:
Separate trust, untrust, HA, and management NICs into their own subnets. This enforces segmentation, simplifies route management, and reduces misconfiguration risk. - Apply Least Privilege Policies:
Always start with a deny-all baseline, then allow only necessary applications, ports, and protocols. Regularly review rules to avoid policy sprawl. - Standardize Naming & Tagging:
Adopt consistent naming conventions and resource tags for firewalls, subnets, route tables, and policies. This aids troubleshooting, automation, and compliance reporting. - Validate End-to-End Traffic Flows:
Test both north-south (Internet ↔ VNet) and east-west (VNet ↔ VNet/subnet) flows after deployment. Use tools like Azure Network Watcher and vendor traffic logs to confirm inspection. - Plan for Scalability:
Monitor throughput, CPU, memory, and session counts to anticipate when scale-out or higher VM SKUs are needed. Some vendors support autoscaling clusters for bursty workloads. - Maintain Firmware & Threat Signatures:
Regularly update the firewall’s software, patches, and threat intelligence feeds to ensure protection against emerging vulnerabilities and attacks. Automate updates where possible.
Conclusion
Third-party firewalls remain a core building block in many enterprise Azure Landing Zones. They provide the deep security controls and operational familiarity enterprises need, while Azure provides the scalable infrastructure to host them.
By following the hub-and-spoke architecture, carefully planning deployment models, and enforcing best practices for routing, redundancy, monitoring, and backup, organizations can ensure a secure and reliable network foundation in Azure.