Hello Yashas Manjunath
We understand that you're looking for a more efficient way to manage Azure Firewall rules as you implement a Hub and Spoke architecture.
Here are a few suggestions to help improve maintainability and scalability:
Azure Firewall does not currently support directly selecting VNets or subnets in rules. You must use IP Groups or manually specify address ranges. To mitigate this, it's helpful to maintain a well-documented IP address plan using CIDR notation to avoid overlaps and simplify IP Group updates. Hub-and-Spoke Topology
1.We recommend you use IP Groups Extensively:
- Create IP Groups for each spoke or logical group of VNets.
- Update IP Groups as new VNets are added.
- IP Groups can be reused across multiple rules and policies.
- rather than maintaining separate lists of IP addresses for each rule, create IP Groups for common sources and destinations. These groups can be reused across your firewall rules. You can manage IP Groups using the Azure portal, https://learn.microsoft.com/en-us/azure/firewall/ip-groups
2.Configure Firewall Policy and create a base policy with rules referencing IP Groups for common scenarios (e.g., allow DNS traffic from all spokes to 8.8.8.8).
- Create child policies for specific subscriptions or workloads, referencing the same IP Groups for consistency.
3.For application rules, use FQDNs instead of IPs where possible. This avoids hardcoding IPs and supports dynamic resolution.
I hope this helps! If these answers your query, do click the "Upvote" and click "Accept the answer" of which might be beneficial to other community members reading this thread.
If the above is unclear or you are unsure about something, please add a comment below.