Skip to content

Commit 887396a

Browse files
committed
some copy edits
1 parent d43e986 commit 887396a

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/firewall/firewall-best-practices.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 11/16/2023
8+
ms.date: 11/17/2023
99
ms.author: victorh
1010
---
1111

@@ -17,7 +17,7 @@ To maximize the [performance](firewall-performance.md) of your Azure Firewall an
1717

1818
- **Exceeding rule limitations**
1919

20-
If you exceed limitations, such as using over 20,000 unique source/destination combinations in rules, can affect firewall traffic processing and cause latency. Even though this is a soft limit, if you surpass this value it can affect overall firewall performance. For more information, see the [documented limits](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
20+
If you exceed limitations, such as using over 20,000 unique source/destination combinations in rules, it can affect firewall traffic processing and cause latency. Even though this is a soft limit, if you surpass this value it can affect overall firewall performance. For more information, see the [documented limits](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
2121

2222
- **High traffic throughput**
2323

@@ -39,16 +39,16 @@ To maximize the [performance](firewall-performance.md) of your Azure Firewall an
3939
- Use [IP Groups](ip-groups.md) or IP prefixes to reduce the number of IP table rules.
4040
- Prioritize rules with the highest number of hits.
4141
- Ensure that you are within the following [rule limitations](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
42-
- **Use or migrate to Azure Firewall Premium version**
43-
- The Azure Firewall Premium version uses advanced hardware and offers a higher-performing underlying engine.
42+
- **Use or migrate to Azure Firewall Premium**
43+
- Azure Firewall Premium uses advanced hardware and offers a higher-performing underlying engine.
4444
- Best for heavier workloads and higher traffic volumes.
4545
- It also includes built-in accelerated networking software, which can achieve throughput of up to 100 Gbps, unlike the Standard version.
4646
- **Add multiple public IP addresses to the firewall to prevent SNAT port exhaustion**
4747
- To prevent SNAT port exhaustion, consider adding multiple public IP addresses (PIPs) to your firewall. Azure Firewall provides [2,496 SNAT ports per each additional PIP](../nat-gateway/tutorial-hub-spoke-nat-firewall.md).
4848
- If you prefer not to add more PIPs, you can add an Azure NAT Gateway to scale SNAT port usage. This provides advanced SNAT port allocation capabilities.
4949
- **Start with IDPS Alert mode before you enable Alert + Deny mode**
50-
- While the Alert + Deny mode offers enhanced security by blocking suspicious traffic, it can also introduce more processing overhead. If you disable this mode, you might observe performance improvement, especially in scenarios where the firewall is primarily used for routing and not deep packet inspection.
51-
- It's essential to remember that traffic through the firewall is denied by default until you explicitly configure *allow* rules. Therefore, even when IDPS Alert + Deny mode is disabled, your network remains protected, and only explicitly permitted traffic is allowed to pass through the firewall. It can be a strategic choice to disable this mode to optimize performance without compromising the core security features provided by the Azure Firewall.
50+
- While the *Alert + Deny* mode offers enhanced security by blocking suspicious traffic, it can also introduce more processing overhead. If you disable this mode, you might observe performance improvement, especially in scenarios where the firewall is primarily used for routing and not deep packet inspection.
51+
- It's essential to remember that traffic through the firewall is denied by default until you explicitly configure *allow* rules. Therefore, even when IDPS *Alert + Deny* mode is disabled, your network remains protected, and only explicitly permitted traffic is allowed to pass through the firewall. It can be a strategic choice to disable this mode to optimize performance without compromising the core security features provided by the Azure Firewall.
5252

5353
## Testing and monitoring
5454

@@ -65,9 +65,9 @@ Use the following best practices for testing and monitoring:
6565
- **Measure data processed**
6666
- Keep track of the *data processed* metric to assess the volume of data processed by the firewall.
6767
- **Identify rule hits and performance spikes**
68-
- Look for spikes in network performance or latency. Correlate rule hit timestamps, such as application rules hit count and network rules hit count, to determine if rule processing is a significant factor contributing to performance or latency issues. By analyzing these patterns, you can identify specific rules or configurations that might need optimization.
68+
- Look for spikes in network performance or latency. Correlate rule hit timestamps, such as application rules hit count and network rules hit count, to determine if rule processing is a significant factor contributing to performance or latency issues. By analyzing these patterns, you can identify specific rules or configurations that you might need to optimize.
6969
- **Add alerts to key metrics**
70-
- In addition to regular monitoring, it's crucial to set up alerts for key firewall metrics. This ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](logs-and-metrics.md#alert-on-azure-firewall-metrics) for detailed instructions on setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
70+
- In addition to regular monitoring, it's crucial to set up alerts for key firewall metrics. This ensures that you're promptly notified when specific metrics surpass predefined thresholds. To configure alerts, see [Azure Firewall logs and metrics](logs-and-metrics.md#alert-on-azure-firewall-metrics) for detailed instructions about setting up effective alerting mechanisms. Proactive alerting enhances your ability to respond swiftly to potential issues and maintain optimal firewall performance.
7171

7272
## Next steps
7373

0 commit comments

Comments
 (0)