Skip to content

Commit fe8d6f5

Browse files
authored
Merge pull request #114061 from vhorne/fw-multi-ip
update for 250 public IP addresses
2 parents 510f04b + ce78c66 commit fe8d6f5

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/firewall/deploy-multi-public-ip-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 04/14/2020
8+
ms.date: 05/06/2020
99
ms.author: victorh
1010
---
1111

@@ -14,9 +14,9 @@ ms.author: victorh
1414
This feature enables the following scenarios:
1515

1616
- **DNAT** - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
17-
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall.
17+
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/public-ip-address-prefix.md) to simplify this configuration.
1818

19-
Azure Firewall with multiple public IP addresses is available via the Azure portal, Azure PowerShell, Azure CLI, REST, and templates. You can deploy an Azure Firewall with up to 100 public IP addresses.
19+
Azure Firewall with multiple public IP addresses is available via the Azure portal, Azure PowerShell, Azure CLI, REST, and templates. You can deploy an Azure Firewall with up to 250 public IP addresses.
2020

2121
The following Azure PowerShell examples show how you can configure, add, and remove public IP addresses for Azure Firewall.
2222

articles/firewall/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: firewall
66
services: firewall
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 04/23/2020
9+
ms.date: 05/06/2020
1010
ms.author: victorh
1111
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1212
---
@@ -78,12 +78,12 @@ Inbound Internet network traffic to your firewall public IP address is translate
7878

7979
## Multiple public IP addresses
8080

81-
You can associate multiple public IP addresses (up to 100) with your firewall.
81+
You can associate multiple public IP addresses (up to 250) with your firewall.
8282

8383
This enables the following scenarios:
8484

8585
- **DNAT** - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
86-
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall.
86+
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. At this time, Azure Firewall randomly selects the source public IP address to use for a connection. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/public-ip-address-prefix.md) to simplify this configuration.
8787

8888
## Azure Monitor logging
8989

includes/firewall-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: vhorne
66
ms.service: firewall
77
ms.topic: include
8-
ms.date: 04/07/2020
8+
ms.date: 05/06/2020
99
ms.author: victorh
1010
ms.custom: include file
1111
---
@@ -17,7 +17,7 @@
1717
|Maximum DNAT rules|298<br>If a rule's protocol is configured for both TCP and UDP, it counts as two rules.|
1818
|Minimum AzureFirewallSubnet size |/26|
1919
|Port range in network and application rules|1 - 65535|
20-
|Public IP addresses|100 maximum (Currently, SNAT ports are added only for the first five public IP addresses.)|
20+
|Public IP addresses|250 maximum for both DNAT and SNAT ports.|
2121
|IP Groups IP addresses|50 IP Groups or less: maximum 5000 individual IP addresses each per firewall instance.<br>51 - 100 IP Groups: 500 individual IP address each per firewall instance.<br><br>For more information see [IP Groups (preview) in Azure Firewall](../articles/firewall/ip-groups.md#ip-address-limits)
2222
|Route table|By default, AzureFirewallSubnet has a 0.0.0.0/0 route with the NextHopType value set to **Internet**.<br><br>Azure Firewall must have direct Internet connectivity. If your AzureFirewallSubnet learns a default route to your on-premises network via BGP, you must override that with a 0.0.0.0/0 UDR with the **NextHopType** value set as **Internet** to maintain direct Internet connectivity. By default, Azure Firewall doesn't support forced tunneling to an on-premises network.<br><br>However, if your configuration requires forced tunneling to an on-premises network, Microsoft will support it on a case by case basis. Contact Support so that we can review your case. If accepted, we'll allow your subscription and ensure the required firewall Internet connectivity is maintained.|
2323

0 commit comments

Comments
 (0)