From 3c59c59e68587bc8a13f2ea0d774c85e0d3392f8 Mon Sep 17 00:00:00 2001 From: Thomas Vuylsteke Date: Mon, 10 Feb 2020 13:46:04 +0100 Subject: [PATCH] Adding info on IANAPrivateRanges --- src/Network/Network/help/New-AzFirewall.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/Network/Network/help/New-AzFirewall.md b/src/Network/Network/help/New-AzFirewall.md index 6aac9adac349..93471be49f76 100644 --- a/src/Network/Network/help/New-AzFirewall.md +++ b/src/Network/Network/help/New-AzFirewall.md @@ -178,10 +178,10 @@ $rgName = "resourceGroupName" $vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet" $pip = Get-AzPublicIpAddress -ResourceGroupName $rgName -Name "publicIpName" -New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetwork $vnet -PublicIpAddress $pip -PrivateRange @("99.99.99.0/24", "66.66.0.0/16") +New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetwork $vnet -PublicIpAddress $pip -PrivateRange @("IANAPrivateRanges", "99.99.99.0/24", "66.66.0.0/16") ``` -This example creates a Firewall that treats "99.99.99.0/24" and "66.66.0.0/16" as private ip ranges and won't snat traffic to those addresses +This example creates a Firewall that treats "99.99.99.0/24" and "66.66.0.0/16" as private ip ranges and won't snat traffic to those addresses. The entry "IANAPrivateRanges" will ensure all traffic to IANA Private Ranges won't snat. When the PrivateRange parameter is not specified traffic to IANA Private Ranges won't snat. ### 12: Create a Firewall with a management subnet and Public IP address ``` @@ -364,7 +364,7 @@ Accept wildcard characters: False ``` ### -PrivateRange -The private IP ranges to which traffic won't be SNAT'ed +The private IP ranges to which traffic won't be SNAT'ed. Include "IANAPrivateRanges" as a value to ensure traffic to IANA Private Ranges won't snat. ```yaml Type: System.String[]