Skip to content

Commit 33f2aa4

Browse files
Apply suggestions from code review
Co-authored-by: Duong Au <[email protected]>
1 parent 7f3d266 commit 33f2aa4

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/firewall/firewall-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -333,9 +333,9 @@ sections:
333333
TCP ping is a unique use case where if there's no allowed rule, the Firewall itself responds to the client's TCP ping request even though the TCP ping doesn't reach the target IP address/FQDN. In this case, the event isn't logged. If there's a network rule that allows access to the target IP address/FQDN, then the ping request reaches the target server and its response is relayed back to the client. This event is logged in the Network rules log.
334334
335335
336-
- question: Why the TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but are not observed in the logs of the Azure Firewall?
336+
- question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?
337337
answer: |
338-
The Azure Firewall acts as a passive listener for the ports 80, 443, and 1433. The TCP SYN packets on these ports are not logged unless there is application traffic. The HTTP GET request and TLS client hello will be logged in Azure Firewall.
338+
Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged in Azure Firewall.
339339
340340
- question: Are there limits for the number of IP addresses supported by IP Groups?
341341
answer: |

0 commit comments

Comments
 (0)