Skip to content

Commit 9580696

Browse files
committed
add faq
1 parent 3702a19 commit 9580696

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/firewall/firewall-faq.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,4 +207,8 @@ Set-AzFirewall -AzureFirewall $fw
207207

208208
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209209

210-
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
210+
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
211+
212+
## Are there limits for the number of IP addresses supported by IP Groups?
213+
214+
Yes. For more information, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)

0 commit comments

Comments
 (0)