Skip to content

Commit 26be383

Browse files
authored
Merge pull request #108443 from vhorne/fw-faq
remove scaling phrase
2 parents 8ba3faa + 45dd631 commit 26be383

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/firewall/firewall-faq.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 03/02/2020
8+
ms.date: 03/20/2020
99
ms.author: victorh
1010
---
1111

@@ -116,11 +116,11 @@ Yes, you can use Azure Firewall in a hub virtual network to route and filter tra
116116

117117
## Can Azure Firewall forward and filter network traffic between subnets in the same virtual network or peered virtual networks?
118118

119-
Yes. However, configuring the UDRs to redirect traffic between subnets in the same VNET requires additional attention. While using the VNET address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **VNET**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which dont require UDRs.
119+
Yes. However, configuring the UDRs to redirect traffic between subnets in the same VNET requires additional attention. While using the VNET address range as a target prefix for the UDR is sufficient, this also routes all traffic from one machine to another machine in the same subnet through the Azure Firewall instance. To avoid this, include a route for the subnet in the UDR with a next hop type of **VNET**. Managing these routes might be cumbersome and prone to error. The recommended method for internal network segmentation is to use Network Security Groups, which don't require UDRs.
120120

121121
## Does Azure Firewall outbound SNAT between private networks?
122122

123-
Azure Firewall doesnt SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
123+
Azure Firewall doesn't SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
124124

125125
## Is forced tunneling/chaining to a Network Virtual Appliance supported?
126126

@@ -163,7 +163,7 @@ No. Azure Firewall doesn't need a subnet bigger than /26.
163163

164164
## How can I increase my firewall throughput?
165165

166-
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out based on CPU usage and throughput. Contact Support to increase your firewall's throughput capacity if your firewall isn't scaling out to meet your needs and you need higher throughput capacity.
166+
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out based on CPU usage and throughput. Contact Support to increase your firewall's throughput capacity.
167167

168168
## How long does it take for Azure Firewall to scale out?
169169

@@ -184,13 +184,13 @@ Yes, you can use Azure PowerShell to do this:
184184
185185
$fw = Get-AzFirewall -Name "Name_of_Firewall" -ResourceGroupName "Name_of_ResourceGroup"
186186
$fw.ThreatIntelWhitelist = New-AzFirewallThreatIntelWhitelist `
187-
-FQDN @(fqdn1”, “fqdn2, …) -IpAddress @(ip1”, “ip2, …)
187+
-FQDN @("fqdn1", "fqdn2", …) -IpAddress @("ip1", "ip2", …)
188188
189189
## Or Update FQDNs and IpAddresses separately
190190
191191
$fw = Get-AzFirewall -Name "Name_of_Firewall" -ResourceGroupName "Name_of_ResourceGroup"
192-
$fw.ThreatIntelWhitelist.FQDNs = @(fqdn1”, “fqdn2, …)
193-
$fw.ThreatIntelWhitelist.IpAddress = @(ip1”, “ip2, …)
192+
$fw.ThreatIntelWhitelist.FQDNs = @("fqdn1", "fqdn2", …)
193+
$fw.ThreatIntelWhitelist.IpAddress = @("ip1", "ip2", …)
194194
195195
Set-AzFirewall -AzureFirewall $fw
196196
```

0 commit comments

Comments
 (0)