You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/basic-features.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: conceptual
8
-
ms.date: 03/15/2023
8
+
ms.date: 06/14/2024
9
9
ms.author: victorh
10
10
---
11
11
12
12
# Azure Firewall Basic features
13
13
14
-
[Azure Firewall](overview.md) Basic is a managed, cloud-based network security service that protects your Azure Virtual Network resources.
14
+
[Azure Firewall Basic](overview.md#azure-firewall-basic) is a managed, cloud-based network security service that protects your Azure Virtual Network resources.
@@ -29,7 +29,7 @@ Azure Firewall Basic includes the following features:
29
29
- Azure Monitor logging
30
30
- Certifications
31
31
32
-
To compare Azure Firewall features for all Firewall SKUs, see [Choose the right Azure Firewall SKU to meet your needs](choose-firewall-sku.md).
32
+
To compare Azure Firewall features for all Firewall versions, see [Choose the right Azure Firewall version to meet your needs](choose-firewall-sku.md).
33
33
34
34
## Built-in high availability
35
35
@@ -45,7 +45,7 @@ Azure Firewall Availability Zones are available in regions that support Availabi
45
45
46
46
## Application FQDN filtering rules
47
47
48
-
You can limit outbound HTTP/S traffic or Azure SQL traffic to a specified list of fully qualified domain names (FQDN) including wild cards. This feature doesn't require TLS termination.
48
+
You can limit outbound HTTP/S traffic or Azure SQL traffic to a specified list of fully qualified domain names (FQDN) including wild cards. This feature doesn't require Transport Layer Security (TLS) termination.
49
49
50
50
The following video shows how to create an application rule: <br><br>
51
51
@@ -87,7 +87,7 @@ Inbound Internet network traffic to your firewall public IP address is translate
87
87
88
88
You can associate [multiple public IP addresses](deploy-multi-public-ip-powershell.md) with your firewall.
89
89
90
-
This enables the following scenarios:
90
+
Multiple public IP addresses enable the following scenarios:
91
91
92
92
- DNAT - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
93
93
- SNAT - More ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
0 commit comments