Skip to content

Commit 4c0d381

Browse files
authored
removed preview on DNAT
1 parent 52fcb9c commit 4c0d381

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,18 @@
22
title: Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the portal
33
description: In this article, you learn how to deploy and configure Azure Firewall DNAT using the Azure portal.
44
services: firewall
5-
author: duongau
5+
author: varunkalyana
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 03/17/2025
9-
ms.author: duau
8+
ms.date: 05/07/2025
9+
ms.author: varunkalyana
1010
ms.custom: mvc
11-
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
11+
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound internet access to resources located in a subnet.
1212
---
1313

1414
# Filter inbound Internet or intranet traffic with Azure Firewall DNAT using the Azure portal
1515

16-
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets or intranet traffic between private networks (preview). When you configure DNAT, the NAT rule collection action is set to **DNAT**. Each rule in the NAT rule collection can then be used to translate your firewall's public or private IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, it's recommended to add a specific source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
16+
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound internet traffic to your subnets or intranet traffic between private networks. When you configure DNAT, the NAT rule collection action is set to **DNAT**. Each rule in the NAT rule collection can then be used to translate your firewall's public or private IP address and port to a private IP address and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. For security reasons, it's recommended to add a specific source to allow DNAT access to the network and avoid using wildcards. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
1717

1818
> [!NOTE]
1919
> This article uses classic Firewall rules to manage the firewall. The preferred method is to use [Firewall Policy](../firewall-manager/policy-overview.md). To complete this procedure using Firewall Policy, see [Tutorial: Filter inbound Internet traffic with Azure Firewall policy DNAT using the Azure portal](tutorial-firewall-dnat-policy.md).

0 commit comments

Comments
 (0)