Skip to content

Commit 85d8a2d

Browse files
authored
Merge pull request #110150 from vhorne/fw-ipg
IP group updates
2 parents 2e6ee0f + 9580696 commit 85d8a2d

File tree

3 files changed

+50
-22
lines changed

3 files changed

+50
-22
lines changed

articles/firewall/firewall-faq.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,4 +207,8 @@ Set-AzFirewall -AzureFirewall $fw
207207

208208
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209209

210-
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
210+
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
211+
212+
## Are there limits for the number of IP addresses supported by IP Groups?
213+
214+
Yes. For more information, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)

articles/firewall/ip-groups.md

Lines changed: 43 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 02/18/2020
8+
ms.date: 04/03/2020
99
ms.author: victorh
1010
---
1111

@@ -49,7 +49,7 @@ You can see all the IP addresses in the IP Group and the rules or resources that
4949

5050
1. To view or edit the IP addresses, select **IP Addresses** under **Settings** on the left pane.
5151
2. To add a single or multiple IP address(es), select **Add IP Addresses**. This opens the **Drag or Browse** page for an upload, or you can enter the address manually.
52-
3. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
52+
3. Selecting the ellipses (****) to the right to edit or delete IP addresses. To edit or delete multiple IP addresses, select the boxes and select **Edit** or **Delete** at the top.
5353
4. Finally, can export the file in the CSV file format.
5454

5555
> [!NOTE]
@@ -67,24 +67,47 @@ You can now select **IP Group** as a **Source type** or **Destination type** for
6767

6868
## Region availability
6969

70-
IP Groups are currently available in the following regions:
71-
72-
- West US
73-
- West US 2
74-
- East US
75-
- East US 2
76-
- Central US
77-
- North Central US
78-
- West Central US
79-
- South Central US
80-
- Canada Central
81-
- North Europe
82-
- West Europe
83-
- France Central
84-
- UK South
85-
- Australia East
86-
- Australia Central
87-
- Australia Southeast
70+
IP Groups are available in all public cloud regions.
71+
72+
## IP address limits
73+
74+
For 50 IP Groups or less, you can have a maximum of 5000 individual IP addresses each per firewall instance. For 51 to 100 IP Groups, you can have 500 individual IP address each per firewall instance.
75+
76+
### Examples
77+
78+
#### Example 1: supported
79+
80+
|IP Groups |# IP addresses |Notation |Rule |
81+
|---------|---------|---------|---------|
82+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
83+
|IPGroup2 |3|196.0.0.0 - 196.0.0.2|Rule1|
84+
|IPGroup3 |1|1.2.3.4|Rule1|
85+
| |**Total 8192**| | |
86+
| | | | |
87+
88+
#### Example 2: supported
89+
90+
|IP Groups |# IP addresses |Notation |Rule |
91+
|---------|---------|---------|---------|
92+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
93+
|IPGroup2 |4096|11.0.0.0/20|Rule1|
94+
| |**Total 8192**| | |
95+
96+
#### Example 3: not supported
97+
98+
|IP Groups |# IP addresses |Notation |Rule |
99+
|---------|---------|---------|---------|
100+
|IPGroup1 |8192 |10.0.0.0/20, 11.0.0.0/20 |Rule1|
101+
| |**Total 8192**|||
102+
103+
#### Example 4: supported
104+
105+
|IP Groups |# IP addresses |Notation |Rule |
106+
|---------|---------|---------|---------|
107+
|IPGroup1 |4096 |10.0.0.0/20 |Rule1|
108+
|IPGroup2 |4096|11.0.0.0/20|Rule2|
109+
| |**Total 8192**| | |
110+
88111

89112
## Related Azure PowerShell cmdlets
90113

includes/firewall-limits.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 04/01/2020
8+
ms.date: 04/03/2020
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -18,6 +18,7 @@
1818
|Minimum AzureFirewallSubnet size |/26|
1919
|Port range in network and application rules|0-64,000. Work is in progress to relax this limitation.|
2020
|Public IP addresses|100 maximum (Currently, SNAT ports are added only for the first five public IP addresses.)|
21+
|IP Groups IP addresses|50 IP Groups or less: maximum 5000 individual IP addresses each per firewall instance.<br>51 - 100 IP Groups: 500 individual IP address each per firewall instance.<br><br>For more information see [IP Groups (preview) in Azure Firewall](../articles/firewall/ip-groups.md#ip-address-limits)
2122
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2223

2324
<sup>1</sup>If you need to increase these limits, contact Azure Support.

0 commit comments

Comments
 (0)