Skip to content

Commit 7d36f25

Browse files
authored
Merge pull request #105615 from vhorne/fw-dnat
Update DNAT to make it clear incoming Internet
2 parents 29e46b3 + 24fd811 commit 7d36f25

File tree

4 files changed

+13
-13
lines changed

4 files changed

+13
-13
lines changed

articles/firewall/firewall-faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 02/20/2020
8+
ms.date: 02/26/2020
99
ms.author: victorh
1010
---
1111

@@ -45,7 +45,7 @@ There are three types of rule collections:
4545

4646
* *Application rules*: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
4747
* *Network rules*: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
48-
* *NAT rules*: Configure DNAT rules to allow incoming connections.
48+
* *NAT rules*: Configure DNAT rules to allow incoming Internet connections.
4949

5050
## Does Azure Firewall support inbound traffic filtering?
5151

@@ -134,7 +134,7 @@ If your configuration requires forced tunneling to an on-premises network and yo
134134

135135
Yes. The firewall, VNet, and the public IP address all must be in the same resource group.
136136

137-
## When configuring DNAT for inbound network traffic, do I also need to configure a corresponding network rule to allow that traffic?
137+
## When configuring DNAT for inbound Internet network traffic, do I also need to configure a corresponding network rule to allow that traffic?
138138

139139
No. NAT rules implicitly add a corresponding network rule to allow the translated traffic. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
140140

articles/firewall/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: firewall
66
services: firewall
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 02/19/2020
9+
ms.date: 02/26/2020
1010
ms.author: victorh
1111
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1212
---
@@ -74,7 +74,7 @@ If your organization uses a public IP address range for private networks, Azure
7474

7575
## Inbound DNAT support
7676

77-
Inbound network traffic to your firewall public IP address is translated (Destination Network Address Translation) and filtered to the private IP addresses on your virtual networks.
77+
Inbound Internet network traffic to your firewall public IP address is translated (Destination Network Address Translation) and filtered to the private IP addresses on your virtual networks.
7878

7979
## Multiple public IP addresses
8080

articles/firewall/rule-processing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 02/25/2020
8+
ms.date: 02/26/2020
99
ms.author: victorh
1010
---
1111

@@ -25,7 +25,7 @@ If you configure network rules and application rules, then network rules are app
2525

2626
### NAT rules
2727

28-
Inbound connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal](tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic.
28+
Inbound Internet connectivity can be enabled by configuring Destination Network Address Translation (DNAT) as described in [Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal](tutorial-firewall-dnat.md). NAT rules are applied in priority before network rules. If a match is found, an implicit corresponding network rule to allow the translated traffic is added. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic.
2929

3030
Application rules are not applied for inbound connections. So if you want to filter inbound HTTP/S traffic, you should use Web Application Firewall (WAF). For more information, see [What is Azure Web Application Firewall?](../web-application-firewall/overview.md)
3131

articles/firewall/tutorial-firewall-dnat.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Filter inbound traffic with Azure Firewall DNAT using the portal
2+
title: Filter inbound Internet traffic with Azure Firewall DNAT using the portal
33
description: In this tutorial, you learn how to deploy and configure Azure Firewall DNAT using the Azure portal.
44
services: firewall
55
author: vhorne
6-
76
ms.service: firewall
87
ms.topic: tutorial
9-
ms.date: 11/19/2019
8+
ms.date: 02/26/2020
109
ms.author: victorh
1110
ms.custom: mvc
12-
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound access to resources located in a subnet.
11+
#Customer intent: As an administrator, I want to deploy and configure Azure Firewall DNAT so that I can control inbound Internet access to resources located in a subnet.
1312
---
14-
# Tutorial: Filter inbound traffic with Azure Firewall DNAT using the Azure portal
1513

16-
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound traffic to your subnets. When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public IP and port to a private IP and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
14+
# Tutorial: Filter inbound Internet traffic with Azure Firewall DNAT using the Azure portal
15+
16+
You can configure Azure Firewall Destination Network Address Translation (DNAT) to translate and filter inbound Internet traffic to your subnets. When you configure DNAT, the NAT rule collection action is set to **Dnat**. Each rule in the NAT rule collection can then be used to translate your firewall public IP and port to a private IP and port. DNAT rules implicitly add a corresponding network rule to allow the translated traffic. You can override this behavior by explicitly adding a network rule collection with deny rules that match the translated traffic. To learn more about Azure Firewall rule processing logic, see [Azure Firewall rule processing logic](rule-processing.md).
1717

1818
In this tutorial, you learn how to:
1919

0 commit comments

Comments
 (0)