Skip to content

Commit cd1ffdc

Browse files
Merge pull request #293544 from vhorne/fw--tut-deploy
freshness review
2 parents eb03835 + 7fe4190 commit cd1ffdc

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 11/14/2023
8+
ms.date: 01/24/2025
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -88,14 +88,14 @@ This virtual network has two subnets.
8888
1. For **Name**, type **fw-pip** and select **OK**.
8989
1. Select **Next**.
9090
1. For **Address space**, accept the default **10.0.0.0/16**.
91-
1. Under **Subnet**, select **default** and change the **Name** to **Workload-SN**.
91+
1. Under **Subnets**, select **default** and change the **Name** to **Workload-SN**.
9292
1. For **Starting address**, change it to **10.0.2.0/24**.
9393
1. Select **Save**.
9494
1. Select **Review + create**.
9595
1. Select **Create**.
9696

9797
> [!NOTE]
98-
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it is recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
98+
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it's recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more, see [Scale SNAT ports with Azure NAT Gateway](/azure/firewall/integrate-with-nat-gateway).
9999
100100
### Create a virtual machine
101101

@@ -130,8 +130,8 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
130130

131131
## Examine the firewall
132132

133-
7. Go to the resource group and select the firewall.
134-
8. Note the firewall private and public IP addresses. You use these addresses later.
133+
1. Go to the resource group and select the firewall.
134+
1. Note the firewall private and public IP addresses. You use these addresses later.
135135

136136
## Create a default route
137137

@@ -141,7 +141,7 @@ As a result, there's no need create another user defined route to include the Az
141141

142142
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
143143

144-
1. On the Azure portal search for **Route tables**.
144+
1. On the Azure portal, search for **Route tables**.
145145
1. Select **Route tables** in the results pane.
146146
1. Select **Create**.
147147
1. For **Subscription**, select your subscription.
@@ -204,7 +204,7 @@ This is the network rule that allows outbound access to two IP addresses at port
204204
2. For **Destination type** select **IP address**.
205205
3. For **Destination address**, type **209.244.0.3,209.244.0.4**
206206

207-
These are public DNS servers operated by Level3.
207+
These addresses are public DNS servers operated by Level3.
208208
1. For **Destination Ports**, type **53**.
209209
2. Select **Add**.
210210

0 commit comments

Comments
 (0)