Skip to content

Commit 5555740

Browse files
authored
Merge pull request #116220 from vhorne/fw-over
add links
2 parents 9497e21 + cbac71f commit 5555740

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/firewall/overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: firewall
66
services: firewall
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 05/19/2020
9+
ms.date: 05/22/2020
1010
ms.author: victorh
1111
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1212
---
@@ -56,15 +56,15 @@ You can centrally create *allow* or *deny* network filtering rules by source and
5656

5757
## FQDN tags
5858

59-
FQDN tags make it easy for you to allow well-known Azure service network traffic through your firewall. For example, say you want to allow Windows Update network traffic through your firewall. You create an application rule and include the Windows Update tag. Now network traffic from Windows Update can flow through your firewall.
59+
[FQDN tags](fqdn-tags.md) make it easy for you to allow well-known Azure service network traffic through your firewall. For example, say you want to allow Windows Update network traffic through your firewall. You create an application rule and include the Windows Update tag. Now network traffic from Windows Update can flow through your firewall.
6060

6161
## Service tags
6262

63-
A service tag represents a group of IP address prefixes to help minimize complexity for security rule creation. You can't create your own service tag, nor specify which IP addresses are included within a tag. Microsoft manages the address prefixes encompassed by the service tag, and automatically updates the service tag as addresses change.
63+
A [service tag](service-tags.md) represents a group of IP address prefixes to help minimize complexity for security rule creation. You can't create your own service tag, nor specify which IP addresses are included within a tag. Microsoft manages the address prefixes encompassed by the service tag, and automatically updates the service tag as addresses change.
6464

6565
## Threat intelligence
6666

67-
Threat intelligence-based filtering can be enabled for your firewall to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed.
67+
[Threat intelligence](threat-intel.md)-based filtering can be enabled for your firewall to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed.
6868

6969
## Outbound SNAT support
7070

@@ -78,7 +78,7 @@ Inbound Internet network traffic to your firewall public IP address is translate
7878

7979
## Multiple public IP addresses
8080

81-
You can associate multiple public IP addresses (up to 250) with your firewall.
81+
You can associate [multiple public IP addresses](deploy-multi-public-ip-powershell.md) (up to 250) with your firewall.
8282

8383
This enables the following scenarios:
8484

@@ -87,7 +87,7 @@ This enables the following scenarios:
8787

8888
## Azure Monitor logging
8989

90-
All events are integrated with Azure Monitor, allowing you to archive logs to a storage account, stream events to your Event Hub, or send them to Azure Monitor logs.
90+
All events are integrated with Azure Monitor, allowing you to archive logs to a storage account, stream events to your Event Hub, or send them to Azure Monitor logs. For more information, see [Tutorial: Monitor Azure Firewall logs and metrics](tutorial-diagnostics.md).
9191

9292
## Forced tunneling
9393

0 commit comments

Comments
 (0)