Azure Firewall Telnet Behaviour

Andrea Longhitano 180 Reputation points
2025-10-03T20:23:27.6966667+00:00

Hello everyone,

I have a strange behavior in Azure Firewall.

Traffic from ip 192.168.1.1 to example.com is denied by default on port 443. The traffic from 192.168.1.1 pass through the firewall. If I execute the command telnet example.com 433 it works fine and I don't see any deny logs in the firewall. However, of I execute a curl command, it doesn't work as expected and I see deny on the firewall.

The question is: why the telnet works fine?

Thanks,

Andrea

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
0 comments No comments
{count} votes

Answer accepted by question author
  1. Marcin Policht 66,250 Reputation points MVP Volunteer Moderator
    2025-10-03T20:55:40.1866667+00:00

    The reason telnet works while curl is denied is that telnet only tests the TCP handshake, not actual application-layer traffic. When you run telnet example.com 443, it opens a TCP connection, which the firewall allows, so no deny logs appear. In contrast, curl https://example.com sends a full HTTPS request (TLS handshake + HTTP headers), which is subject to the firewall’s application or network rules for actual HTTPS traffic. If the firewall blocks HTTPS requests from 192.168.1.1, curl fails and a deny log is generated, even though the underlying TCP connection would succeed.

    In short, telnet only tests TCP connectivity while curl tests real HTTPS traffic, which can be blocked by the firewall.


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.