Skip to content

Commit 083140b

Browse files
Merge pull request #273744 from vhorne/fw-top-ten
updates for GH Issue 119820
2 parents 89d4103 + d456f0b commit 083140b

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/firewall/enable-top-ten-and-flow-trace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ To check the status of the AzResourceProvider registration, you can run the Azur
141141

142142
To disable the log, you can unregister it using the following command or select unregister in the previous portal example.
143143

144-
`Get-AzProviderFeature -FeatureName "AFWEnableTcpConnectionLogging" -ProviderNamespace "Microsoft.Network"`
144+
`Unregister-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderNamespace Microsoft.Network`
145145

146146

147147
### Create a diagnostic setting and enable Resource Specific Table

includes/firewall-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
|Minimum AzureFirewallSubnet size |/26|
2121
|Port range in network and application rules|1 - 65535|
2222
|Public IP addresses|250 maximum. All public IP addresses can be used in DNAT rules and they all contribute to available SNAT ports.|
23-
|IP addresses in IP Groups|Maximum of 200 IP Groups per firewall.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.
23+
|IP addresses in IP Groups|Maximum of 200 unique IP Groups per firewall.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.
2424
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2525
|FQDNs in network rules|For good performance, do not exceed more than 1000 FQDNs across all network rules per firewall.|
2626
|TLS inspection timeout|120 seconds|

0 commit comments

Comments
 (0)