Skip to content

Commit 71722af

Browse files
Merge pull request #280504 from vhorne/fw-dnat-limit
update dnat rules workaround
2 parents 2ffa862 + 7b5a9f6 commit 71722af

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

includes/firewall-limits.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 10/10/2023
8+
ms.date: 07/10/2024
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -16,11 +16,11 @@
1616
|Rule limits|20,000 unique source/destinations in network rules <br><br> **Unique source/destinations in network** = sum of (unique source addresses * unique destination addresses for each rule)<br><br>An IP group counts as one address, regardless of how many IP addresses it contains.<br><br>You can track the Firewall Policy network rule count in the [policy analytics](../articles/firewall/policy-analytics.md) under the **Insights** tab. As a proxy, you can also monitor your Firewall Latency Probe metrics to ensure it stays within 20 ms even during peak hours.|
1717
|Total size of rules within a single Rule Collection Group| 1 MB for Firewall policies created before July 2022<br>2 MB for Firewall policies created after July 2022|
1818
|Number of Rule Collection Groups in a firewall policy|50 for Firewall policies created before July 2022<br>90 for Firewall policies created after July 2022|
19-
|Maximum DNAT rules (Maximum external destinations)|250 maximum [number of firewall public IP addresses + unique destinations (destination address, port, and protocol)]<br><br> The DNAT limitation is due to the underlying platform.<br><br>For example, you can configure 500 UDP rules to the same destination IP address and port (one unique destination), while 500 rules to the same IP address but to 500 different ports exceeds the limit (500 unique destinations).|
19+
|Maximum DNAT rules (Maximum external destinations)|250 maximum [number of firewall public IP addresses + unique destinations (destination address, port, and protocol)]<br><br> The DNAT limitation is due to the underlying platform.<br><br>For example, you can configure 500 UDP rules to the same destination IP address and port (one unique destination), while 500 rules to the same IP address but to 500 different ports exceeds the limit (500 unique destinations).<br><br>If you need more than 250, you'll need to add another firewall.|
2020
|Minimum AzureFirewallSubnet size |/26|
2121
|Port range in network and application rules|1 - 65535|
2222
|Public IP addresses|250 maximum. All public IP addresses can be used in DNAT rules and they all contribute to available SNAT ports.|
23-
|IP addresses in IP Groups|Maximum of 200 unique IP Groups per firewall.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.
23+
|IP addresses in IP Groups|Maximum of 200 unique IP Groups per firewall.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.|
2424
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2525
|FQDNs in network rules|For good performance, do not exceed more than 1000 FQDNs across all network rules per firewall.|
2626
|TLS inspection timeout|120 seconds|

0 commit comments

Comments
 (0)