You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/firewall-preview.md
+2-8Lines changed: 2 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: concept-article
8
-
ms.date: 01/15/2025
8
+
ms.date: 03/20/2025
9
9
ms.author: duau
10
10
---
11
11
@@ -43,12 +43,6 @@ For more information, see [Resource Health overview](/azure/service-health/resou
43
43
44
44
You can configure Azure Firewall to autolearn both registered and private ranges every 30 minutes. For information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md#auto-learn-snat-routes-preview).
45
45
46
-
### Parallel IP Group updates (preview)
47
-
48
-
You can now update multiple IP Groups in parallel at the same time. This is useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM template, CLI, and PowerShell).
49
-
50
-
For more information, see [IP Groups in Azure Firewall](ip-groups.md#parallel-ip-group-updates-preview).
51
-
52
46
### Private IP address DNAT rules (preview)
53
47
54
48
You can now configure a DNAT rule on Azure Firewall Policy with the private IP address of the Azure Firewall as the destination. Previously, DNAT rules only worked with Azure Firewall Public IP addresses.
@@ -67,4 +61,4 @@ For more information, see [Customer provided public IP address support in secure
67
61
68
62
## Next steps
69
63
70
-
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).
64
+
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).
Copy file name to clipboardExpand all lines: articles/firewall/ip-groups.md
+21-34Lines changed: 21 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,40 +57,27 @@ You can see all the IP addresses in the IP Group and the rules or resources that
57
57
58
58
You can now select **IP Group** as a **Source type** or **Destination type** for the IP address(es) when you create Azure Firewall DNAT, application, or network rules.
59
59
60
-
## Parallel IP Group updates (preview)
61
-
62
-
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
63
-
64
-
With this support, you can now:
65
-
66
-
- Update 50 IP Groups at a time
67
-
- Update the firewall and firewall policy during IP Group updates
68
-
- Use the same IP Group in parent and child policy
69
-
- Update multiple IP Groups referenced by firewall policy or classic firewall simultaneously
70
-
- Receive new and improved error messages
71
-
- Fail and succeed states
72
-
73
-
For example, if there is an error with one IP Group update out of 20 parallel updates, the other updates proceed, and the errored IP Group fails. In addition, if the IP Group update fails, and the firewall is still healthy, the firewall remains in a *Succeeded* state. To check if the IP Group update has failed or succeeded, you can view the status on the IP Group resource.
74
-
75
-
To activate Parallel IP Group support, you can register the feature using either Azure PowerShell or the Azure portal.
76
-
77
-
### Azure PowerShell
78
-
79
-
Use the following Azure PowerShell commands:
80
-
81
-
```azurepowershell
82
-
Connect-AzAccount
83
-
Select-AzSubscription -Subscription <subscription_id> or <subscription_name>
It can take several minutes for this to take effect. Once the feature is completely registered, consider performing an update on Azure Firewall for the change to take effect immediately.
88
-
89
-
### Azure portal
90
-
91
-
1. Navigate to **Preview features** in the Azure portal.
92
-
1. Search and register **AzureFirewallParallelIPGroupUpdate**.
93
-
1. Ensure the feature is enabled.
60
+
## Parallel IP Group updates
61
+
62
+
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for environments requiring faster changes at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
63
+
64
+
With this support, you can perform the following:
65
+
66
+
-**Update 20 IP Groups at a time:** Perform simultaneous updates up to 20 IP Groups in one operation, referenced by firewall policy or classic firewall.
67
+
-**Update Azure Firewall and IP Groups together:** You can update IP Groups simultaneously with the firewall or with firewall policies.
68
+
-**Improved efficiency:** Parallel IP Group updates now run twice as fast.
69
+
-**Receive new and improved error messages:**
70
+
71
+
|Error message |Description |Recommended action|
72
+
|---------|---------|---------|
73
+
|**In failed state (skipping update)**|Azure Firewall or Firewall Policy is in a failed state. Updates cannot proceed until the resource is healthy. |Review previous operations and correct any misconfigurations to ensure the resource is healthy.|
74
+
|**Backend server could not update Firewall at this time**| The backend server was unable to successfully process the request.| Create a support request.|
75
+
|**Error occurred during FW update**| The error is related to the underlying backend servers.| Retry the operation or create a support request if the issue persists.|
76
+
|**Internal server error**| An unexpected backend error has occurred. | Retry the operation or create a support request.|
77
+
78
+
Additionally, note the following status updates:
79
+
-**One or more IP Group failure:** If one IP Group update (out of 20 parallel updates) fails, the provisioning state changes to "Failed" while the remaining IP Groups will continue to update and succeed.
80
+
-**Status update:** If an IP Group update fails, and if the firewall remains healthy, its state will still show as "Succeeded." To verify, check the status on the IP Group resource itself.
0 commit comments