Skip to content

Commit 0c2e84a

Browse files
authored
Merge pull request #100593 from vhorne/fw-snat
start SNAT article
2 parents 2bafd7b + be2ebb2 commit 0c2e84a

File tree

4 files changed

+62
-3
lines changed

4 files changed

+62
-3
lines changed

articles/firewall/firewall-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Yes. However, configuring the UDRs to redirect traffic between subnets in the sa
120120

121121
## Does Azure Firewall outbound SNAT between private networks?
122122

123-
Azure Firewall doesn’t SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet.
123+
Azure Firewall doesn’t SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
124124

125125
## Is forced tunneling/chaining to a Network Virtual Appliance supported?
126126

articles/firewall/overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: firewall
66
services: firewall
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 01/28/2020
9+
ms.date: 02/18/2020
1010
ms.author: victorh
1111
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1212
---
@@ -66,7 +66,9 @@ Threat intelligence-based filtering can be enabled for your firewall to alert an
6666

6767
## Outbound SNAT support
6868

69-
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation). You can identify and allow traffic originating from your virtual network to remote Internet destinations. Azure Firewall doesn’t SNAT when the destination IP is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall will SNAT the traffic to one of the firewall private IP addresses in AzureFirewallSubnet.
69+
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation). You can identify and allow traffic originating from your virtual network to remote Internet destinations. Azure Firewall doesn’t SNAT when the destination IP is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918).
70+
71+
If your organization uses a public IP address range for private networks, Azure Firewall will SNAT the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
7072

7173
## Inbound DNAT support
7274

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Azure Firewall SNAT private IP address ranges
3+
description: You can configure IP address private ranges so the firewall won't SNAT traffic to those IP addresses.
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: article
8+
ms.date: 01/09/2020
9+
ms.author: victorh
10+
---
11+
12+
# Azure Firewall SNAT private IP address ranges
13+
14+
Azure Firewall doesn’t SNAT when the destination IP address is in a private IP address range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918).
15+
16+
If your organization uses a public IP address range for private networks, Azure Firewall will SNAT the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. However, you can configure Azure Firewall to **not** SNAT your public IP address range.
17+
18+
## Configure SNAT private IP address ranges
19+
20+
You can use Azure PowerShell to specify an IP address range that the firewall won't SNAT.
21+
22+
### New firewall
23+
24+
For a new firewall, the Azure PowerShell command is:
25+
26+
`New-AzFirewall -Name $GatewayName -ResourceGroupName $RG -Location $Location -VirtualNetworkName $vnet.Name -PublicIpName $LBPip.Name -PrivateRange @("IANAPrivateRanges","IPRange1", "IPRange2")`
27+
28+
> [!NOTE]
29+
> IANAPrivateRanges is expanded to the current defaults on Azure Firewall while the other ranges are added to it.
30+
31+
For more information, see [New-AzFirewall](https://docs.microsoft.com/powershell/module/az.network/new-azfirewall?view=azps-3.3.0).
32+
33+
### Existing firewall
34+
35+
To configure an existing firewall, use the following Azure PowerShell commands:
36+
37+
```azurepowershell
38+
$azfw = Get-AzFirewall -ResourceGroupName "Firewall Resource Group name"
39+
$azfw.PrivateRange = @(“IANAPrivateRanges”,“IPRange1”, “IPRange2”)
40+
Set-AzFirewall -AzureFirewall $azfw
41+
```
42+
43+
### Templates
44+
45+
You can add the following to the `additionalProperties` section:
46+
47+
```
48+
"additionalProperties": {
49+
"Network.SNAT.PrivateRanges": "IANAPrivateRanges , IPRange1, IPRange2"
50+
},
51+
```
52+
53+
## Next steps
54+
55+
- Learn how to [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md).

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,8 @@
6161
href: integrate-lb.md
6262
- name: Application rules with SQL FQDNs
6363
href: sql-fqdn-filtering.md
64+
- name: SNAT private ranges
65+
href: snat-private-range.md
6466
- name: Create IP Groups
6567
href: create-ip-group.md
6668
- name: Reference

0 commit comments

Comments
 (0)