Skip to content

Commit 9407f2f

Browse files
Merge pull request #252771 from vhorne/fw-faq
add snat port reuse
2 parents 4c52de1 + 9d2cb15 commit 9407f2f

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/firewall/firewall-faq.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,3 +320,13 @@ sections:
320320
Azure Firewall uses Azure Virtual Machines underneath that have a [hard limit number of connections](/azure/virtual-network/virtual-machine-network-throughput#flow-limits-and-active-connections-recommendations). The total number of flows per virtual machine is 250k.
321321
322322
The total limit per firewall is the virtual machine connection limit (250k) x the number of virtual machines in the firewall backend pool. Azure Firewall starts with two virtual machines and scales out based on CPU usage and throughput.
323+
324+
- question: What is the SNAT TCP/UDP Port Reuse Behavior in Azure Firewall?
325+
answer: |
326+
Azure Firewall currently uses TCP/UDP source ports for outbound SNAT traffic, with no idle wait time. When a TCP/UDP connection is closed, the TCP port used is immediately seen as available for upcoming connections.
327+
328+
As a workaround for certain architectures, you can deploy and scale with [NAT Gateway with Azure Firewall](../nat-gateway/tutorial-hub-spoke-nat-firewall.md) to provide a wider pool of SNAT ports for variability and availability.
329+
330+
331+
332+

0 commit comments

Comments
 (0)