Skip to content

Commit 759ffa9

Browse files
authored
Merge pull request #39931 from ShuheiUda/patch-16
add SNAT limitation
2 parents bc5882f + f98026b commit 759ffa9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/firewall-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
|Rules|10,000, all rule types combined.|
1717
|Minimum AzureFirewallSubnet size |/26|
1818
|Port range in network and application rules|0-64,000. Work is in progress to relax this limitation.|
19-
|Public IP addresses|100 maximum|
19+
|Public IP addresses|100 maximum (Currently, SNAT ports are added only for the first five public IP addresses.)|
2020
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2121

2222
<sup>1</sup>If you need to increase these limits, contact Azure Support.

0 commit comments

Comments
 (0)