Skip to content

Commit 5a11811

Browse files
Merge pull request #292581 from ZarrVenkat/main
Update firewall-limits.md
2 parents eecb564 + 8d83631 commit 5a11811

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/firewall-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
|Minimum AzureFirewallSubnet size |/26|
2121
|Port range in network and application rules|1 - 65535|
2222
|Public IP addresses|250 maximum. All public IP addresses can be used in DNAT rules and they all contribute to available SNAT ports.|
23-
|IP addresses in IP Groups|Maximum of 200 unique IP Groups per firewall policy.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.|
23+
|IP addresses in IP Groups|It is recommended to have a maximum of 50 unique IP Groups per classic firewall. <br>Maximum of 200 unique IP Groups per firewall policy.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.|
2424
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2525
|FQDNs in network rules|For good performance, do not exceed more than 1000 FQDNs across all network rules per firewall.|
2626
|TLS inspection timeout|120 seconds|

0 commit comments

Comments
 (0)