You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: "As a network administrator, I want to create and manage IP Groups for Azure Firewall, so that I can efficiently configure and enforce firewall rules based on grouped IP addresses."
13
12
---
14
13
15
14
# Create IP Groups
16
15
17
-
IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They can have a single IP address, multiple IP addresses, or one or more IP address ranges.
16
+
IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.
18
17
19
18
## Create an IP Group - Azure portal
20
19
@@ -29,13 +28,13 @@ To create an IP Group by using the Azure portal:
29
28
1. Select **Next: IP addresses**.
30
29
1. Type an IP address, multiple IP addresses, or IP address ranges.
31
30
32
-
There are two ways to enter IP addresses:
33
-
-You can manually enter them
34
-
-You can import them from a file
31
+
Enter IP addresses in one of two ways:
32
+
-Manually enter them.
33
+
-Import them from a file.
35
34
36
-
To import from a file, select **Import from a file**. You may either drag your file to the box or select **Browse for files**. If necessary, you can review and edit your uploaded IP addresses.
35
+
To import from a file, select **Import from a file**. You can either drag your file to the box or select **Browse for files**. If necessary, you can review and edit your uploaded IP addresses.
37
36
38
-
When you type an IP address, the portal validates it to check for overlapping, duplicates, and formatting issues.
37
+
When you type an IP address, the portal validates it to check for overlapping, duplicates, and formatting problems.
Copy file name to clipboardExpand all lines: articles/firewall/deploy-multi-public-ip-powershell.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,56 +1,56 @@
1
1
---
2
2
title: Deploy Azure Firewall with multiple public IP addresses using PowerShell
3
-
description: In this article, you learn how to deploy an Azure Firewall with multiple public IP addresses using the Azure PowerShell.
4
-
services: firewall
3
+
description: Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell.
5
4
author: duongau
5
+
ms.author: duau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 10/24/2022
9
-
ms.author: duau
8
+
ms.date: 03/28/2026
10
9
ms.custom: devx-track-azurepowershell
11
10
# Customer intent: "As a network administrator, I want to deploy Azure Firewall with multiple public IP addresses using PowerShell, so that I can efficiently manage incoming and outgoing network traffic while ensuring high availability and reducing port exhaustion."
12
11
---
13
12
14
-
# Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell
13
+
# Deploy an Azure Firewall with multiple public IP addresses by using Azure PowerShell
15
14
16
15
This feature enables the following scenarios:
17
16
18
17
-**DNAT** - You can translate multiple standard port instances to your backend servers. For example, if you have two public IP addresses, you can translate TCP port 3389 (RDP) for both IP addresses.
19
-
-**SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and selects another public IP after ports from the first IP have been exhausted. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
20
-
21
-
Azure Firewall with multiple public IP addresses is available via the Azure portal, Azure PowerShell, Azure CLI, REST, and templates.
22
-
You can deploy an Azure Firewall in a Hub VNET with up to 250 public IP addresses, however DNAT destination rules will also count toward the 250 maximum.
23
-
The limit for an Azure Firewall in a VHUB deployment with Bring your own Public IP is 250 addresses and for classic VHUB deployment is 80 public IP addresses.
18
+
-**SNAT** - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and selects another public IP after ports from the first IP are exhausted. If you have any downstream filtering on your network, you need to allow all public IP addresses associated with your firewall. Consider using a [public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md) to simplify this configuration.
19
+
20
+
You can access Azure Firewall with multiple public IP addresses through the Azure portal, Azure PowerShell, Azure CLI, REST, and templates.
21
+
You can deploy an Azure Firewall in a hub virtual network with up to 250 public IP addresses. However, DNAT destination rules also count toward the 250 maximum.
22
+
The limit for an Azure Firewall in a VHUB deployment with Bring your own Public IP is 250 addresses, and for classic VHUB deployment, it's 80 public IP addresses.
24
23
25
24
> [!NOTE]
26
-
> In scenarios with high traffic volume and throughput, it is recommended to use a [NAT Gateway](/azure/nat-gateway/nat-overview) to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
25
+
> In scenarios with high traffic volume and throughput, use a [NAT Gateway](/azure/nat-gateway/nat-overview) to provide outbound connectivity. NAT Gateway dynamically allocates SNAT ports across all public IPs associated with it. For more information, see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
27
26
28
27
The following Azure PowerShell examples show how you can configure, add, and remove public IP addresses for Azure Firewall.
29
28
30
29
> [!IMPORTANT]
31
-
> You can't remove the first ipConfiguration from the Azure Firewall public IP address configuration page. If you want to modify the IP address, you can use Azure PowerShell.
30
+
> You can't remove the first IP configuration from the Azure Firewall public IP address configuration page. If you want to modify the IP address, use Azure PowerShell.
31
+
32
32
33
33
## Create a firewall with two or more public IP addresses
34
34
35
-
This example creates a firewall attached to virtual network *vnet* with two public IP addresses.
35
+
This example creates a firewall attached to virtual network *myVirtualNetwork* with two public IP addresses. Use [Get-AzVirtualNetwork](/powershell/module/az.network/get-azvirtualnetwork) to retrieve the existing virtual network, [New-AzPublicIpAddress](/powershell/module/az.network/new-azpublicipaddress) to create each public IP address, and [New-AzFirewall](/powershell/module/az.network/new-azfirewall) to deploy the firewall with both IPs.
36
36
37
37
```azurepowershell
38
38
$rgName = "resourceGroupName"
39
39
40
40
$vnet = Get-AzVirtualNetwork `
41
-
-Name "vnet" `
41
+
-Name "myVirtualNetwork" `
42
42
-ResourceGroupName $rgName
43
43
44
44
$pip1 = New-AzPublicIpAddress `
45
45
-Name "AzFwPublicIp1" `
46
-
-ResourceGroupName "rg" `
46
+
-ResourceGroupName $rgName `
47
47
-Sku "Standard" `
48
48
-Location "centralus" `
49
49
-AllocationMethod Static
50
50
51
51
$pip2 = New-AzPublicIpAddress `
52
52
-Name "AzFwPublicIp2" `
53
-
-ResourceGroupName "rg" `
53
+
-ResourceGroupName $rgName `
54
54
-Sku "Standard" `
55
55
-Location "centralus" `
56
56
-AllocationMethod Static
@@ -65,7 +65,7 @@ New-AzFirewall `
65
65
66
66
## Add a public IP address to an existing firewall
67
67
68
-
In this example, the public IP address *azFwPublicIp1* is attached to the firewall.
68
+
In this example, the public IP address *azFwPublicIp1* is attached to the firewall. Use [New-AzPublicIpAddress](/powershell/module/az.network/new-azpublicipaddress) to create the new IP, [Get-AzFirewall](/powershell/module/az.network/get-azfirewall) to retrieve the existing firewall object, and [Set-AzFirewall](/powershell/module/az.network/set-azfirewall) to save the updated configuration.
69
69
70
70
```azurepowershell
71
71
$pip = New-AzPublicIpAddress `
@@ -86,7 +86,7 @@ $azFw | Set-AzFirewall
86
86
87
87
## Remove a public IP address from an existing firewall
88
88
89
-
In this example, the public IP address *azFwPublicIp1* is detached from the firewall.
89
+
In this example, the public IP address *azFwPublicIp1* is detached from the firewall. Use [Get-AzPublicIpAddress](/powershell/module/az.network/get-azpublicipaddress) to retrieve the existing IP, [Get-AzFirewall](/powershell/module/az.network/get-azfirewall) to retrieve the firewall object, and [Set-AzFirewall](/powershell/module/az.network/set-azfirewall) to save the updated configuration.
90
90
91
91
```azurepowershell
92
92
$pip = Get-AzPublicIpAddress `
@@ -104,4 +104,4 @@ $azFw | Set-AzFirewall
104
104
105
105
## Next steps
106
106
107
-
*[Quickstart: Create an Azure Firewall with multiple public IP addresses - Resource Manager template](quick-create-multiple-ip-template.md)
107
+
-[Quickstart: Create an Azure Firewall with multiple public IP addresses - Resource Manager template](quick-create-multiple-ip-template.md)
0 commit comments