Skip to content

Commit e0af9c2

Browse files
committed
docs: Rename vnet resource name to myVirtualNetwork to avoid variable name confusion, fix list bullet indentation
1 parent ecefca5 commit e0af9c2

1 file changed

Lines changed: 19 additions & 19 deletions

File tree

articles/firewall/deploy-multi-public-ip-powershell.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,56 @@
11
---
22
title: Deploy Azure Firewall with multiple public IP addresses using PowerShell
3-
description: In this article, you learn how to deploy an Azure Firewall with multiple public IP addresses using the Azure PowerShell.
4-
services: firewall
3+
description: Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell.
54
author: duongau
5+
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 10/24/2022
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
ms.custom: devx-track-azurepowershell
1110
# Customer intent: "As a network administrator, I want to deploy Azure Firewall with multiple public IP addresses using PowerShell, so that I can efficiently manage incoming and outgoing network traffic while ensuring high availability and reducing port exhaustion."
1211
---
1312

14-
# Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell
13+
# Deploy an Azure Firewall with multiple public IP addresses by using Azure PowerShell
1514

1615
This feature enables the following scenarios:
1716

1817
- **DNAT** - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
19-
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and selects another public IP after ports from the first IP have been exhausted. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
20-
21-
Azure Firewall with multiple public IP addresses is available via the Azure portal, Azure PowerShell, Azure CLI, REST, and templates.
22-
You can deploy an Azure Firewall in a Hub VNET with up to 250 public IP addresses, however DNAT destination rules will also count toward the 250 maximum.
23-
The limit for an Azure Firewall in a VHUB deployment with Bring your own Public IP is 250 addresses and for classic VHUB deployment is 80 public IP addresses.
18+
- **SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and selects another public IP after ports from the first IP are exhausted. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
19+
20+
You can access Azure Firewall with multiple public IP addresses through the Azure portal, Azure PowerShell, Azure CLI, REST, and templates.
21+
You can deploy an Azure Firewall in a hub virtual network with up to 250 public IP addresses. However, DNAT destination rules also count toward the 250 maximum.
22+
The limit for an Azure Firewall in a VHUB deployment with Bring your own Public IP is 250 addresses, and for classic VHUB deployment, it's 80 public IP addresses.
2423

2524
> [!NOTE]
26-
> In scenarios with high traffic volume and throughput, it is recommended to use a [NAT Gateway](/azure/nat-gateway/nat-overview) to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
25+
> In scenarios with high traffic volume and throughput, use a [NAT Gateway](/azure/nat-gateway/nat-overview) to provide outbound connectivity. NAT Gateway dynamically allocates SNAT ports across all public IPs associated with it. For more information, see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
2726
2827
The following Azure PowerShell examples show how you can configure, add, and remove public IP addresses for Azure Firewall.
2928

3029
> [!IMPORTANT]
31-
> You can't remove the first ipConfiguration from the Azure Firewall public IP address configuration page. If you want to modify the IP address, you can use Azure PowerShell.
30+
> You can't remove the first IP configuration from the Azure Firewall public IP address configuration page. If you want to modify the IP address, use Azure PowerShell.
31+
3232

3333
## Create a firewall with two or more public IP addresses
3434

35-
This example creates a firewall attached to virtual network *vnet* with two public IP addresses.
35+
This example creates a firewall attached to virtual network *myVirtualNetwork* with two public IP addresses. Use [Get-AzVirtualNetwork](/powershell/module/az.network/get-azvirtualnetwork) to retrieve the existing virtual network, [New-AzPublicIpAddress](/powershell/module/az.network/new-azpublicipaddress) to create each public IP address, and [New-AzFirewall](/powershell/module/az.network/new-azfirewall) to deploy the firewall with both IPs.
3636

3737
```azurepowershell
3838
$rgName = "resourceGroupName"
3939
4040
$vnet = Get-AzVirtualNetwork `
41-
-Name "vnet" `
41+
-Name "myVirtualNetwork" `
4242
-ResourceGroupName $rgName
4343
4444
$pip1 = New-AzPublicIpAddress `
4545
-Name "AzFwPublicIp1" `
46-
-ResourceGroupName "rg" `
46+
-ResourceGroupName $rgName `
4747
-Sku "Standard" `
4848
-Location "centralus" `
4949
-AllocationMethod Static
5050
5151
$pip2 = New-AzPublicIpAddress `
5252
-Name "AzFwPublicIp2" `
53-
-ResourceGroupName "rg" `
53+
-ResourceGroupName $rgName `
5454
-Sku "Standard" `
5555
-Location "centralus" `
5656
-AllocationMethod Static
@@ -65,7 +65,7 @@ New-AzFirewall `
6565

6666
## Add a public IP address to an existing firewall
6767

68-
In this example, the public IP address *azFwPublicIp1* is attached to the firewall.
68+
In this example, the public IP address *azFwPublicIp1* is attached to the firewall. Use [New-AzPublicIpAddress](/powershell/module/az.network/new-azpublicipaddress) to create the new IP, [Get-AzFirewall](/powershell/module/az.network/get-azfirewall) to retrieve the existing firewall object, and [Set-AzFirewall](/powershell/module/az.network/set-azfirewall) to save the updated configuration.
6969

7070
```azurepowershell
7171
$pip = New-AzPublicIpAddress `
@@ -86,7 +86,7 @@ $azFw | Set-AzFirewall
8686

8787
## Remove a public IP address from an existing firewall
8888

89-
In this example, the public IP address *azFwPublicIp1* is detached from the firewall.
89+
In this example, the public IP address *azFwPublicIp1* is detached from the firewall. Use [Get-AzPublicIpAddress](/powershell/module/az.network/get-azpublicipaddress) to retrieve the existing IP, [Get-AzFirewall](/powershell/module/az.network/get-azfirewall) to retrieve the firewall object, and [Set-AzFirewall](/powershell/module/az.network/set-azfirewall) to save the updated configuration.
9090

9191
```azurepowershell
9292
$pip = Get-AzPublicIpAddress `
@@ -104,4 +104,4 @@ $azFw | Set-AzFirewall
104104

105105
## Next steps
106106

107-
* [Quickstart: Create an Azure Firewall with multiple public IP addresses - Resource Manager template](quick-create-multiple-ip-template.md)
107+
- [Quickstart: Create an Azure Firewall with multiple public IP addresses - Resource Manager template](quick-create-multiple-ip-template.md)

0 commit comments

Comments
 (0)