Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
Your observation is correct. "Internet" Service Tag is currently not available to use with Azure Firewall.
There are quite a few service tags that are not supported in Azure Firewall.
- Just mentioning the "Internet" tag would not add a value.
- Hence, the document Azure Firewall service tags has the section "Supported service tags"
As a Best practice,
- It's better to have generic rules at last. (with IP ranges 0.0.0.0/0)
- However, the implementation you mentioned should also work without any issue.
- For Network Rules, yes, Source IP will always be a private IP. However, I would suggest you be always define specific IPs in rules wherever possible.
- As address space increases, you can either edit the rule to include the additional address space or add new rule.
Applying the above to your scenario,
Outgoing
Priority 100:
- Source IP: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
- Source Port : *
- Destination: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
- Destination Port: *
Priority 110
- Source IP: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
- Source Port : *
- Destination: 0.0.0.0/0
- Destination Port: 80
Kindly let us know if this helps or you need further assistance on this issue.
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.