Skip to content

Commit 3702a19

Browse files
committed
IP group updates
1 parent 4d21671 commit 3702a19

File tree

2 files changed

+45
-21
lines changed

2 files changed

+45
-21
lines changed

articles/firewall/ip-groups.md

Lines changed: 43 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 02/18/2020
8+
ms.date: 04/03/2020
99
ms.author: victorh
1010
---
1111

@@ -49,7 +49,7 @@ You can see all the IP addresses in the IP Group and the rules or resources that
4949

5050
1. To view or edit the IP addresses, select **IP Addresses** under **Settings** on the left pane.
5151
2. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
52-
3. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
52+
3. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
5353
4. Finally, can export the file in the CSV file format.
5454

5555
> [!NOTE]
@@ -67,24 +67,47 @@ You can now select **IP Group** as a **Source type** or **Destination type** for
6767

6868
## Region availability
6969

70-
IP Groups are currently available in the following regions:
71-
72-
- West US
73-
- West US 2
74-
- East US
75-
- East US 2
76-
- Central US
77-
- North Central US
78-
- West Central US
79-
- South Central US
80-
- Canada Central
81-
- North Europe
82-
- West Europe
83-
- France Central
84-
- UK South
85-
- Australia East
86-
- Australia Central
87-
- Australia Southeast
70+
IP Groups are available in all public cloud regions.
71+
72+
## IP address limits
73+
74+
For 50 IP Groups or less, you can have a maximum of 5000 individual IP addresses each per firewall instance. For 51 to 100 IP Groups, you can have 500 individual IP address each per firewall instance.
75+
76+
### Examples
77+
78+
#### Example 1: supported
79+
80+
|IP Groups |# IP addresses |Notation |Rule |
81+
|---------|---------|---------|---------|
82+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
83+
|IPGroup2 |3|196.0.0.0 - 196.0.0.2|Rule1|
84+
|IPGroup3 |1|1.2.3.4|Rule1|
85+
| |**Total 8192**| | |
86+
| | | | |
87+
88+
#### Example 2: supported
89+
90+
|IP Groups |# IP addresses |Notation |Rule |
91+
|---------|---------|---------|---------|
92+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
93+
|IPGroup2 |4096|11.0.0.0/20|Rule1|
94+
| |**Total 8192**| | |
95+
96+
#### Example 3: not supported
97+
98+
|IP Groups |# IP addresses |Notation |Rule |
99+
|---------|---------|---------|---------|
100+
|IPGroup1 |8192 |10.0.0.0/20, 11.0.0.0/20 |Rule1|
101+
| |**Total 8192**|||
102+
103+
#### Example 4: supported
104+
105+
|IP Groups |# IP addresses |Notation |Rule |
106+
|---------|---------|---------|---------|
107+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
108+
|IPGroup2 |4096|11.0.0.0/20|Rule2|
109+
| |**Total 8192**| | |
110+
88111

89112
## Related Azure PowerShell cmdlets
90113

includes/firewall-limits.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 04/01/2020
8+
ms.date: 04/03/2020
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -18,6 +18,7 @@
1818
|Minimum AzureFirewallSubnet size |/26|
1919
|Port range in network and application rules|0-64,000. Work is in progress to relax this limitation.|
2020
|Public IP addresses|100 maximum (Currently, SNAT ports are added only for the first five public IP addresses.)|
21+
|IP Groups IP addresses|50 IP Groups or less: maximum 5000 individual IP addresses each per firewall instance.<br>51 - 100 IP Groups: 500 individual IP address each per firewall instance.<br><br>For more information see [IP Groups (preview) in Azure Firewall](../articles/firewall/ip-groups.md#ip-address-limits)
2122
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2223

2324
<sup>1</sup>If you need to increase these limits, contact Azure Support.

0 commit comments

Comments
 (0)