Skip to content

Commit 7d40c04

Browse files
authored
Merge pull request #292701 from mbender-ms/ip-config-fw
ip services | freshness | configure-public-ip-firewall.md
2 parents 2e2cb03 + af824b5 commit 7d40c04

File tree

5 files changed

+16
-21
lines changed

5 files changed

+16
-21
lines changed

articles/virtual-network/ip-services/configure-public-ip-firewall.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,7 @@ ms.author: mbender
77
ms.service: azure-virtual-network
88
ms.subservice: ip-services
99
ms.topic: how-to
10-
ms.date: 08/24/2023
11-
ms.custom: FY23 content-maintenance
10+
ms.date: 01/07/2025
1211
---
1312

1413
# Manage a public IP address by using Azure Firewall
@@ -31,7 +30,7 @@ In this section, you create an Azure firewall. Use the first IP address you crea
3130

3231
1. In the [Azure portal](https://portal.azure.com/), search for and select *Firewalls*.
3332

34-
2. On the **Firewalls page**, select **Create**.
33+
2. On the **Azure Firewalls** page, select **+ Create**.
3534

3635
3. In **Create firewall**, enter or select the following information.
3736

@@ -52,21 +51,18 @@ In this section, you create an Azure firewall. Use the first IP address you crea
5251
| Address space | Enter **10.0.0.0/16**. |
5352
| Subnet address space | Enter **10.0.0.0/26**. |
5453
| Public IP address | Select **myStandardPublicIP-1** or your public IP. |
55-
| Forced tunneling | Leave the default of **Disabled**. |
56-
57-
54+
| **Firewall Management NIC** | |
55+
| Enable Firewall Management NIC | Uncheck the box. |
56+
5857
4. Select **Review + create**.
5958

6059
5. Select **Create**.
6160

6261
The following image shows the **Create firewall** page with the example information.
6362

64-
:::image type="content" source="./media/create-public-ip-firewall/create-azure-firewall.png" alt-text="Screenshot that shows the Create firewall page with the example information." lightbox="./media/create-public-ip-firewall/create-azure-firewall-lightbox.png":::
65-
66-
6763
## Change the public IP address for a firewall
6864

69-
In this section, you change the public IP address associated with the firewall. A firewall must have at least one public IP address associated with its configuration. You can't update the IP address if the firewall's existing IP has any destination network address translation (DNAT) rules associated with it.
65+
In this section, you change the public IP address associated with the firewall. A firewall must have at least one public IP address associated with its configuration. You can't update the IP address if the firewall's existing IP has any destination network address translation (DNAT) rules associated with it.
7066

7167
1. In the Azure portal, search for and select *Firewalls*.
7268

@@ -76,12 +72,12 @@ In this section, you change the public IP address associated with the firewall.
7672

7773
4. In **Public IP configuration**, select **myStandardPublicIP-1**.
7874

79-
5. In the **Edit public IP configuration** window, select the **Public IP address** dropdown, and then select **myStandardPublicIP-2**.
75+
5. In the **Edit public IP configuration** window, select **myStandardPublicIP-2** from the dropdown.
8076
6. Select **Save**.
8177

8278
## Add a public IP configuration to a firewall
8379

84-
In this section, you add a public IP configuration to Azure Firewall. For more information about multiple IPs, see [Multiple public IP addresses](../../firewall/features.md#multiple-public-ip-addresses).
80+
In this section, you add a public IP configuration to Azure Firewall. For more information about multiple IPs, see [Multiple public IP addresses](../../firewall/features.md#multiple-public-ip-addresses).
8581

8682
1. In the Azure portal, search for and select *Firewalls*.
8783

@@ -105,7 +101,7 @@ In this section, you add a public IP configuration to Azure Firewall. For more i
105101
This example is a simple deployment of Azure Firewall. For advanced configuration and setup, see [Tutorial: Deploy and configure Azure Firewall and policy by using the Azure portal](../../firewall/tutorial-firewall-deploy-portal-policy.md). When associated with multiple public IPs, Azure Firewall randomly selects the first source Public IP for outbound connectivity and only uses the next available Public IP after no more connections can be made from the current public IP due to SNAT port exhaustion. You can associate a [network address translation (NAT) gateway](/azure/nat-gateway/nat-overview) to a Firewall subnet to extend the scalability of source network address translation (SNAT). With this configuration, all outbound traffic uses the public IP address or addresses of the NAT gateway. For more information, see [Scale SNAT ports with Azure Virtual Network NAT](../../firewall/integrate-with-nat-gateway.md).
106102

107103
> [!NOTE]
108-
> It is recommended to instead use [NAT Gateway](../../nat-gateway/nat-overview.md) to provide dynamic scalability of your outbound connectivity.
104+
> It's recommended to instead use [NAT Gateway](../../nat-gateway/nat-overview.md) to provide dynamic scalability of your outbound connectivity.
109105
> Protocols other than Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) in network filter rules are unsupported for SNAT to the public IP of the firewall.
110106
> You can integrate an Azure firewall with the Standard SKU load balancer to protect backend pool resources. If you associate the firewall with a public load balancer, configure ingress traffic to be directed to the firewall public IP address. Configure egress via a user-defined route to the firewall public IP address. For more information and setup instructions, see [Integrate Azure Firewall with Azure Standard Load Balancer](../../firewall/integrate-lb.md).
111107

articles/virtual-network/ip-services/configure-public-ip-load-balancer.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,7 @@ ms.author: mbender
77
ms.service: azure-virtual-network
88
ms.subservice: ip-services
99
ms.topic: how-to
10-
ms.date: 08/24/2023
11-
ms.custom: template-how-to, engagement-fy23
10+
ms.date: 01/07/2025
1211
---
1312

1413
# Manage a public IP address with a load balancer
@@ -27,7 +26,7 @@ In this article, you learn how to:
2726
> [!div class="checklist"]
2827
> * Create a load balancer with an existing public IP address in your subscription.
2928
> * Change the current public IP associated to a load balancer.
30-
> * Change the frontend configuration of a load balancer from a public IP address to a public IP prefix.
29+
> * Change the frontend configuration of a load balancer from a public IP address to a public IP prefix.
3130
3231
Finally, the article reviews unique aspects of using public IPs and public IP prefixes with a load balancer.
3332

@@ -54,13 +53,13 @@ In this section, you create a standard SKU load balancer. You select the IP addr
5453

5554
4. Select **+ Create**.
5655

57-
5. In the **Basics** tab of **Create Load balancer**, enter or select the following information:
56+
5. In the **Basics** tab of **Create Load balancer**, enter, or select the following information:
5857

5958
| Setting | Value |
6059
| ------- | ----- |
6160
| **Project details** | |
6261
| Subscription | Select your subscription. |
63-
| Resource group | Select **Create new**. </br> Enter **myResourceGroupIP**. </br> Select **OK**. |
62+
| Resource group | Select **Create new**.</br> Enter **myResourceGroupIP**.</br> Select **OK**. |
6463
| **Instance details** | |
6564
| Name | Enter **myLoadBalancer**. |
6665
| Region | Select **(US) West US 2**. |
@@ -114,7 +113,7 @@ To change the IP, you associate a new public IP address previously created with
114113
:::image type="content" source="./media/configure-public-ip-load-balancer/verify-new-ip.png" alt-text="Screenshot of the load balancer Frontend I P configuration page showing the new public I P address.":::
115114

116115
> [!NOTE]
117-
> This technique can be utilized when transitioning from a non-zonal frontend to a zone-redundant frontend in regions that support availability zones. See [Load Balancer and Availability Zones](../../load-balancer/load-balancer-standard-availability-zones.md)
116+
> This technique can be utilized when transitioning from a non-zonal frontend to a zone-redundant frontend in regions that support availability zones. See [Load Balancer and Availability Zones](../../load-balancer/load-balancer-standard-availability-zones.md)
118117
119118
## Add public IP prefix
120119

@@ -156,9 +155,9 @@ In this section, you change the frontend configuration used for outbound connect
156155

157156
## Caveats
158157

159-
* Standard public load balancers can use standard SKU static IPv6 addresses as their frontend public IPs or public IP prefixes. Every deployment must be dual-stack with both IPv4 and IPv6 frontends. NAT64 translation is unavailable. For more information, see [Deploy an IPv6 dual stack application in Azure - PowerShell](../../load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell.md) (Basic public load balancers can use basic SKU dynamic IPv6 addresses as their frontend public IPs.).
158+
* Standard public load balancers can use standard SKU static IPv6 addresses as their frontend public IPs or public IP prefixes. Every deployment must be dual-stack with both IPv4 and IPv6 frontends. NAT64 translation is unavailable. For more information, see [Deploy an IPv6 dual stack application in Azure - PowerShell](../../load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell.md) (Basic public load balancers can use basic SKU dynamic IPv6 addresses as their frontend public IPs.).
160159

161-
* When multiple frontends are assigned to a public load balancer, there isn't a method to assign flows from particular backend instances to egress on a specific IP. For more information, see [Multiple frontends for Azure Load Balancer](../../load-balancer/load-balancer-multivip-overview.md).
160+
* When multiple frontends are assigned to a public load balancer, there isn't a method to assign flows from particular backend instances to egress on a specific IP. For more information, see [Multiple frontends for Azure Load Balancer](../../load-balancer/load-balancer-multivip-overview.md).
162161

163162
## Next steps
164163

0 commit comments

Comments
 (0)