Skip to content

Commit 2e4f9d5

Browse files
authored
Merge pull request #110501 from vhorne/fw-overview
update port range
2 parents 9a32a34 + a390110 commit 2e4f9d5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

includes/firewall-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 04/03/2020
8+
ms.date: 04/07/2020
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -16,7 +16,7 @@
1616
|Rules|10,000. All rule types combined.|
1717
|Maximum DNAT rules|298<br>If a rule's protocol is configured for both TCP and UDP, it counts as two rules.|
1818
|Minimum AzureFirewallSubnet size |/26|
19-
|Port range in network and application rules|0-64,000. Work is in progress to relax this limitation.|
19+
|Port range in network and application rules|1 - 65535|
2020
|Public IP addresses|100 maximum (Currently, SNAT ports are added only for the first five public IP addresses.)|
2121
|IP Groups IP addresses|50 IP Groups or less: maximum 5000 individual IP addresses each per firewall instance.<br>51 - 100 IP Groups: 500 individual IP address each per firewall instance.<br><br>For more information see [IP Groups (preview) in Azure Firewall](../articles/firewall/ip-groups.md#ip-address-limits)
2222
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|

0 commit comments

Comments
 (0)