Skip to content

Commit a2cb4c1

Browse files
authored
Merge pull request #110947 from vhorne/fw-faq
Fw faq
2 parents 660b731 + 590f3a1 commit a2cb4c1

File tree

1 file changed

+4
-10
lines changed

1 file changed

+4
-10
lines changed

articles/firewall/firewall-faq.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 03/31/2020
8+
ms.date: 04/10/2020
99
ms.author: victorh
1010
---
1111

@@ -167,17 +167,11 @@ No. Azure Firewall doesn't need a subnet bigger than /26.
167167

168168
## How can I increase my firewall throughput?
169169

170-
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out based on CPU usage and throughput. Contact Support to increase your firewall's throughput capacity.
170+
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out automatically based on CPU usage and throughput.
171171

172172
## How long does it take for Azure Firewall to scale out?
173173

174-
It takes from five to seven minutes for Azure Firewall to scale out. Contact Support to increase your firewall's initial throughput capacity if you have bursts that require a faster autoscale.
175-
176-
The following points should be taken into account when you test the firewall autoscale:
177-
178-
- Single TCP flow performance is limited to 1.4 Gbps. So, a performance test needs to establish multiple TCP flows.
179-
- Performance tools must continuously establish new connections for them to connect with the scaled-up backend Firewall instances. If the test establishes connections once at the start, then those will only connect with the initial backend instances. Even though the firewall scales up, you won't see any increased performance because the connections are associated with the initial instances.
180-
174+
Azure Firewall gradually scales when average throughput or CPU consumption is at 60%. Scale out takes five to seven minutes. When performance testing, make sure you test for at least 10 to 15 minutes, and initiate new connections to take advantage of newly created Firewall nodes.
181175

182176
## Does Azure Firewall allow access to Active Directory by default?
183177

@@ -207,7 +201,7 @@ Set-AzFirewall -AzureFirewall $fw
207201

208202
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209203

210-
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
204+
A TCP ping isn't actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
211205

212206
## Are there limits for the number of IP addresses supported by IP Groups?
213207

0 commit comments

Comments
 (0)