You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 11/14/2023
8
+
ms.date: 01/24/2025
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -88,14 +88,14 @@ This virtual network has two subnets.
88
88
1. For **Name**, type **fw-pip** and select **OK**.
89
89
1. Select **Next**.
90
90
1. For **Address space**, accept the default **10.0.0.0/16**.
91
-
1. Under **Subnet**, select **default** and change the **Name** to **Workload-SN**.
91
+
1. Under **Subnets**, select **default** and change the **Name** to **Workload-SN**.
92
92
1. For **Starting address**, change it to **10.0.2.0/24**.
93
93
1. Select **Save**.
94
94
1. Select **Review + create**.
95
95
1. Select **Create**.
96
96
97
97
> [!NOTE]
98
-
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it is recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
98
+
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it's recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more, see [Scale SNAT ports with Azure NAT Gateway](/azure/firewall/integrate-with-nat-gateway).
99
99
100
100
### Create a virtual machine
101
101
@@ -130,8 +130,8 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
130
130
131
131
## Examine the firewall
132
132
133
-
7. Go to the resource group and select the firewall.
134
-
8. Note the firewall private and public IP addresses. You use these addresses later.
133
+
1. Go to the resource group and select the firewall.
134
+
1. Note the firewall private and public IP addresses. You use these addresses later.
135
135
136
136
## Create a default route
137
137
@@ -141,7 +141,7 @@ As a result, there's no need create another user defined route to include the Az
141
141
142
142
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
143
143
144
-
1. On the Azure portal search for **Route tables**.
144
+
1. On the Azure portal, search for **Route tables**.
145
145
1. Select **Route tables** in the results pane.
146
146
1. Select **Create**.
147
147
1. For **Subscription**, select your subscription.
@@ -204,7 +204,7 @@ This is the network rule that allows outbound access to two IP addresses at port
204
204
2. For **Destination type** select **IP address**.
205
205
3. For **Destination address**, type **209.244.0.3,209.244.0.4**
206
206
207
-
These are public DNS servers operated by Level3.
207
+
These addresses are public DNS servers operated by Level3.
0 commit comments