 
                                Filtering inbound internet traffic with Azure Firewall policy DNAT (Destination Network Address Translation) is a crucial aspect of securing your network infrastructure.
DNAT allows you to redirect traffic from a specific port or IP address on the public-facing side of the firewall to different internal resources, such as specific virtual machines or applications within a virtual network.
In this blog, you will learn how to filter out inbound internet traffic with the help of Azure Firewall DNAT using real-time hands-on labs. Let’s dive in!
What is Azure Firewall DNAT?
Azure firewall DNAT is one of the features of the Azure firewall and it helps to redirect the traffic from a specific IP address or port to a different destination within the Azure Cloud Platform. DNAT can be employed in scenarios where you want to expose internal resources to the web or change the traffic direction to specific services or servers.
Azure Firewall pricing varies based on factors such as the number of rules, data processing, and availability zones, and can be obtained from the official Azure pricing page.
The key characteristics of Azure Firewall DNAT, such as:
Azure Firewall DNAT configuration has to be done to filter out inbound internet traffic to destined subnets. Whenever the DNAT configuration is completed, then the NAT rile collection action will be changed into Dnat. Each rule specified in the NAT rule can be used to translate the firewall’s public IP address as well as port into a private IP port and address.
By configuring DNAT rules within Azure Firewall policies, you gain more control over incoming traffic, enhance security, and ensure that the right data reaches the right destination. This capability is particularly valuable for organizations looking to protect their resources while still providing necessary access to specific services.

Now, DNAT will implicitly append a network rule to permit the traffic that gets translated. For security reasons, the suggested solution is to add a specified internet source to permit the DNAT access to the network and eliminate the use of wildcards.
DNAT rules can be used to both allow or deny inbound traffic via a firewall public IP address.
You can employ a DNAT rule when you need to convert a public IP address into a private one. Azure Firewall’s public IP addresses are entry points for incoming internet traffic. They filter and transform this traffic to connect with internal resources within Azure.
How to filter inbound internet traffic with Azure Firewall policy DNAT: A step-by-step guide
Step 1: Sign in to Azure Portal
In the Azure portal, at the top, use the search box and enter Virtual network. Select Virtual Networks in the search results.

Click on "+Create" in the Virtual Networks section.

In the Create virtual network page, provide the following details in the Basics tab Resource group, Name, and Region.

 
		


In the Create Virtual Network page, enter these details in the Basics tab







In the Virtual Machines tab, click + Create, then select Azure virtual machine.
In the Create a Virtual Machine tab, provide the following values in the Basics tab




Click "Review + Create" and then Create. Your deployment will be completed in a few minutes.
In the Azure portal, enter Firewall at the top and select Firewalls from the results.

On the Firewalls page, click "Create".
In the Basics tab of the Create a Firewall page, include the following details.

Click "Review + Create" and then Create. Your deployment will be complete.

In the Azure portal, go to All services, and under Networking, select Route tables.

In Route tables, click "+ Create".
In the Create Route table page, provide the details.
Leave other settings as default and click "Review + Create". Then, click "Create".
Go to your resource group and select your firewall policy.
Under Settings, select DNAT rules and click "+ Add a rule collection".

Copy the public IP address of your firewall.

On your local computer, use Remote Desktop Connection and enter the public IP address to connect to your virtual machine.

After completing the lab steps, click the Validation button or go to the Lab Validation section to verify your progress.