Skip to content

Commit a1fc880

Browse files
Merge pull request #292403 from halkazwini/azf
Azure Firewall performance data
2 parents 5b35eef + ae3093f commit a1fc880

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/firewall/firewall-performance.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: azure-firewall
77
ms.topic: conceptual
8-
ms.date: 01/30/2024
8+
ms.date: 12/26/2024
99
ms.author: victorh
1010
---
1111

@@ -39,12 +39,12 @@ The following set of performance results demonstrates the maximal Azure Firewall
3939

4040
|Firewall type and use case |TCP/UDP bandwidth (Gbps) |HTTP/S bandwidth (Gbps) |
4141
|---------|---------|---------|
42-
|Basic|0.25|0.25|
43-
|Standard |30|30|
44-
|Premium (no TLS/IDPS) |100|100|
45-
|Premium with TLS (no IDS/IPS) |-|100|
46-
|Premium with TLS and IDS |100|100|
47-
|Premium with TLS and IPS |10|10|
42+
|Basic SKU |0.25|0.25|
43+
|Standard SKU |30|30|
44+
|Premium SKU with both TLS disabled and IDPS disabled |100|100|
45+
|Premium SKU with TLS inspection enabled and IDPS disabled |-|100|
46+
|Premium SKU with TLS enabled and IDPS enabled in Alert only mode |100|100|
47+
|Premium SKU with TLS enabled and IDPS enabled in Deny mode |10|10|
4848

4949
> [!NOTE]
5050
> IPS (Intrusion Prevention System) takes place when one or more signatures are configured to *Alert and Deny* mode.
@@ -73,6 +73,7 @@ When performance testing, make sure you test for at least 10 to 15 minutes, and
7373
> [!NOTE]
7474
> Azure Firewall Basic doesn't autoscale.
7575
76-
## Next steps
76+
## Next step
7777

78-
- Learn how to [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md).
78+
> [!div class="nextstepaction"]
79+
> [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md)

0 commit comments

Comments
 (0)