Skip to content

Commit 0758a76

Browse files
authored
removed preview on DNAT
1 parent db68767 commit 0758a76

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/firewall/rule-processing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Azure Firewall rule processing logic
33
description: Azure Firewall has NAT rules, network rules, and applications rules. The rules are processed according to the rule type.
44
services: firewall
5-
author: duongau
5+
author: varunkalyana
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 07/02/2024
9-
ms.author: duau
8+
ms.date: 05/07/2025
9+
ms.author: varunkalyana
1010
---
1111

1212
# Configure Azure Firewall rules
@@ -135,7 +135,7 @@ If still no match is found within application rules, then the packet is evaluate
135135

136136
### DNAT rules and Network rules
137137

138-
Inbound Internet or intranet (preview) connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the Azure portal](../firewall/tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, the traffic is translated according to the DNAT rule and allowed by the firewall. So the traffic isn't subject to any further processing by other network rules. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards.
138+
Inbound Internet or intranet connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the Azure portal](../firewall/tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, the traffic is translated according to the DNAT rule and allowed by the firewall. So the traffic isn't subject to any further processing by other network rules. For security reasons, the recommended approach is to add a specific Internet source to allow DNAT access to the network and avoid using wildcards.
139139

140140
Application rules aren't applied for inbound connections. So, if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall](../web-application-firewall/overview.md)?
141141

0 commit comments

Comments
 (0)