Hello Paul
I understand that you would like clarification about geo-filtering features in Azure Firewall and whether Microsoft offers official country-level CIDR lists for use with IP Groups.
At present, Azure Firewall does not provide built-in geo-based (country or region) filtering within its NAT, Network, or Application rule configurations. Since there is no geolocation or country operator available in the rule documentation, native geo filtering is not supported in Azure Firewall. In contrast, Azure Web Application Firewall (WAF) on Azure Front Door and Application Gateway does offer this feature, allowing rules based on client IP addresses.
The web application firewall offers geo-filtering by letting you set up policies that restrict access using country codes. You can create custom rules with a match variable such as RemoteAddr or SocketAddr and use a geo-match operator.
For more details, refer to the Azure documentation
https://learn.microsoft.com/en-us/azure/web-application-firewall/afds/waf-front-door-geo-filtering
https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/geomatch-custom-rules
Regarding official country-level CIDR lists for use in IP Groups with Azure Firewall, Microsoft does not offer CIDR lists organized by country. Azure does publish Azure IP Ranges & Service Tags and provides a Service Tag Discovery API, but these resources are defined at the service or region level rather than by country.
If geo-filtering is essential for your requirements, you may want to use Azure Front Door with WAF, as it fully supports these capabilities. For country-level IP allow/deny list management, you might need to explore custom approaches or use public resources to maintain your CIDR blocks when enforcing access via Azure Firewall.
Hope the above answer helps! Please let us know do you have any further queries.
Please do not forget to “up-vote” wherever the information provided helps you, this can be beneficial to other community members.