Skip to content

Commit 8ca6a28

Browse files
committed
add TLS Inspection timeout
1 parent 3ca055b commit 8ca6a28

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

includes/firewall-limits.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 06/02/2022
8+
ms.date: 06/27/2022
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -22,4 +22,5 @@
2222
|Public IP addresses|250 maximum. All public IP addresses can be used in DNAT rules and they all contribute to available SNAT ports.|
2323
|IP addresses in IP Groups|Maximum of 100 IP Groups per firewall.<br>Maximum 5000 individual IP addresses or IP prefixes per each IP Group.
2424
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
25-
|FQDNs in network rules|For good performance, do not exceed more than 1000 FQDNs across all network rules per firewall.|
25+
|FQDNs in network rules|For good performance, do not exceed more than 1000 FQDNs across all network rules per firewall.|
26+
|TLS inspection timeout|120 seconds|

0 commit comments

Comments
 (0)