Skip to content

Commit 7f3d266

Browse files
authored
Add FAQ entry about TCP ping and logging behavior
1 parent 56bd148 commit 7f3d266

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

articles/firewall/firewall-faq.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -333,6 +333,10 @@ sections:
333333
TCP ping is a unique use case where if there's no allowed rule, the Firewall itself responds to the client's TCP ping request even though the TCP ping doesn't reach the target IP address/FQDN. In this case, the event isn't logged. If there's a network rule that allows access to the target IP address/FQDN, then the ping request reaches the target server and its response is relayed back to the client. This event is logged in the Network rules log.
334334
335335
336+
- question: Why the TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but are not observed in the logs of the Azure Firewall?
337+
answer: |
338+
The Azure Firewall acts as a passive listener for the ports 80, 443, and 1433. The TCP SYN packets on these ports are not logged unless there is application traffic. The HTTP GET request and TLS client hello will be logged in Azure Firewall.
339+
336340
- question: Are there limits for the number of IP addresses supported by IP Groups?
337341
answer: |
338342
Yes. For more information, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)

0 commit comments

Comments
 (0)