You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/snat-private-range.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,9 +177,9 @@ You can use the Azure portal to specify private IP address ranges for the firewa
177
177
178
178
## Auto-learn SNAT routes (preview)
179
179
180
-
You can configure Azure Firewall to auto-learn both registered and private ranges every 30 minutes. These learned address ranges are considered to be internal to the network and hence traffic to destinations in the learned ranges aren't SNATed. Configure auto-learn SNAT ranges requires Azure Route Server to be deployed in the same VNet as the Azure Firewall. The Firewall must be associated with the Azure Route Server and configured to auto-learn SNAT ranges in the Azure Firewall Policy. You can currently use JSON, Azure PowerShell, or the Azure portal to configure auto-learn SNAT routes.
180
+
You can configure Azure Firewall to auto-learn both registered and private ranges every 30 minutes. These learned address ranges are considered to be internal to the network, so traffic to destinations in the learned ranges aren't SNATed. Auto-learn SNAT ranges requires Azure Route Server to be deployed in the same VNet as the Azure Firewall. The firewall must be associated with the Azure Route Server and configured to auto-learn SNAT ranges in the Azure Firewall Policy. You can currently use an ARM template, Azure PowerShell, or the Azure portal to configure auto-learn SNAT routes.
181
181
182
-
### Configure using JSON
182
+
### Configure using an ARM template
183
183
184
184
You can use the following JSON to configure auto-learn. Azure Firewall must be associated with an Azure Route Server.
185
185
@@ -284,14 +284,15 @@ Use the following JSON to associate an Azure Route Server:
284
284
285
285
You can use the portal to associate a Route Server with Azure Firewall to configure auto-learn SNAT routes (preview).
286
286
287
-
1. Select your resource group, and then select your firewall.
288
-
2. Select **Overview**.
289
-
3. Add a Route Server.
287
+
Use the portal to complete the following tasks:
290
288
291
-
Review learned routes:
292
-
293
-
1. Select your resource group, and then select your firewall.
294
-
2. Select **Learned SNAT IP Prefixes (preview)** in the **Settings** column.
289
+
- Add a subnet named **RouteServerSubnet** to your existing firewall VNet. The size of the subnet should be at least /27.
290
+
- Deploy a Route Server into the existing firewall VNet. For information about Azure Route Server, see [Quickstart: Create and configure Route Server using the Azure portal](../route-server/quickstart-configure-route-server-portal.md).
291
+
- Modify your firewall policy to enable **Auto-learn IP prefixes (preview)** in the **Private IP ranges (SNAT)** section.
0 commit comments