Skip to content

Commit b5b8c60

Browse files
authored
Merge pull request #204142 from vhorne/fw-perf-boost
Fw perf boost
2 parents 484c102 + 3f79113 commit b5b8c60

File tree

2 files changed

+13
-41
lines changed

2 files changed

+13
-41
lines changed

articles/firewall/firewall-performance.md

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 01/24/2022
8+
ms.date: 07/08/2022
99
ms.author: victorh
1010
---
1111

@@ -30,33 +30,30 @@ Before deploying Azure Firewall, the performance needs to be tested and evaluate
3030

3131
## Performance data
3232

33-
The following set of performance results demonstrates the maximal Azure Firewall throughput in various use cases. All use cases were measured while Threat intelligence mode was set to alert/deny.
33+
The following set of performance results demonstrates the maximal Azure Firewall throughput in various use cases. All use cases were measured while Threat intelligence mode was set to alert/deny. Azure Firewall Premium performance boost feature is enabled on all Azure Firewall premium deployments by default. This feature includes enabling Accelerated Networking on the underlying firewall virtual machines.
3434

3535

3636
|Firewall type and use case |TCP/UDP bandwidth (Gbps) |HTTP/S bandwidth (Gbps) |
3737
|---------|---------|---------|
3838
|Standard |30|30|
39-
|Premium (no TLS/IDPS) |30|30|
40-
|Premium with TLS |-|30|
41-
|Premium with IDS |30|30|
39+
|Premium (no TLS/IDPS) |30|100|
40+
|Premium with TLS |-|100|
41+
|Premium with IDS |100|100|
4242
|Premium with IPS |10|10|
4343

4444
> [!NOTE]
4545
> IPS (Intrusion Prevention System) takes place when one or more signatures are configured to *Alert and Deny* mode.
4646
47-
Azure Firewall Premium’s new performance boost functionality is now in public preview and provides you with the following enhancements to the overall firewall performance:
47+
Azure Firewall also supports the following throughput for single connections:
4848

4949

50-
|Firewall use case |Without performance boost (Gbps) |With performance boost (Gbps) |
51-
|---------|---------|---------|
52-
|Standard<br>Max bandwidth for single TCP connection |1.3|-|
53-
|Premium<br>Max bandwidth for single TCP connection |2.6|9.5|
54-
|Premium max bandwidth with TLS/IDS|30|100|
55-
56-
Performance values are calculated with Azure Firewall at full scale and with Premium performance boost enabled. Actual performance may vary depending on your rule complexity and network configuration. These metrics are updated periodically as performance continuously evolves with each release.
57-
58-
To enable the Azure Firewall Premium performance boost, see [Azure Firewall preview features](firewall-preview.md#azure-firewall-premium-performance-boost-preview).
50+
|Firewall use case |Throughput (Gbps)|
51+
|---------|---------|
52+
|Standard<br>Max bandwidth for single TCP connection |1.3|
53+
|Premium<br>Max bandwidth for single TCP connection |9.5|
54+
|Premium max bandwidth with TLS/IDS|100|
5955

56+
Performance values are calculated with Azure Firewall at full scale. Actual performance may vary depending on your rule complexity and network configuration. These metrics are updated periodically as performance continuously evolves with each release.
6057

6158
## Next steps
6259

articles/firewall/firewall-preview.md

Lines changed: 1 addition & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 05/25/2022
8+
ms.date: 07/08/2022
99
ms.author: victorh
1010
---
1111

@@ -57,31 +57,6 @@ Run the following Azure PowerShell command to turn off this feature:
5757
Unregister-AzProviderFeature -FeatureName AFWEnableNetworkRuleNameLogging -ProviderNamespace Microsoft.Network
5858
```
5959

60-
### Azure Firewall Premium performance boost (preview)
61-
62-
As more applications move to the cloud, the performance of the network elements can become a bottleneck. As the central piece of any network design, the firewall needs to support all the workloads. The Azure Firewall Premium performance boost feature allows more scalability for these deployments.
63-
64-
This feature significantly increases the throughput of Azure Firewall Premium. For more information, see [Azure Firewall performance](firewall-performance.md).
65-
66-
To enable the Azure Firewall Premium Performance boost feature, run the following commands in Azure PowerShell. Stop and start the firewall for the feature to take effect immediately. Otherwise, the firewall/s is updated with the feature within several days.
67-
68-
The Premium performance boost feature can be enabled on both the [hub virtual network](../firewall-manager/vhubs-and-vnets.md) firewall and the [secured virtual hub](../firewall-manager/vhubs-and-vnets.md) firewall. This feature has no effect on Standard Firewalls.
69-
70-
Run the following Azure PowerShell commands to configure the Azure Firewall Premium performance boost:
71-
72-
```azurepowershell
73-
Connect-AzAccount
74-
Select-AzSubscription -Subscription "subscription_id or subscription_name"
75-
Register-AzProviderFeature -FeatureName AFWEnableAccelnet -ProviderNamespace Microsoft.Network
76-
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
77-
```
78-
79-
Run the following Azure PowerShell command to turn off this feature:
80-
81-
```azurepowershell
82-
Unregister-AzProviderFeature -FeatureName AFWEnableAccelnet -ProviderNamespace Microsoft.Network
83-
```
84-
8560
### IDPS Private IP ranges (preview)
8661

8762
In Azure Firewall Premium IDPS, private IP address ranges are used to identify if traffic is inbound, outbound, or internal (East-West). Each signature is applied on specific traffic direction, as indicated in the signature rules table. By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. So traffic sent from a private IP address range to a private IP address range is considered internal. To modify your private IP addresses, you can now easily edit, remove, or add ranges as needed.

0 commit comments

Comments
 (0)