You can configure a destination NAT rule to address inbound traffic. To simplify
management for applications requiring multiple ports, Cloud NGFW for Azure
supports mapping port ranges in a single DNAT rule, reducing management overhead
and the risk of configuration errors.
When configuring egress NAT, consider the following:
- If Egress NAT is disabled—The Firewall will use Public IP address assigned
to it as a Source for Outbound traffic.
- If Egress NAT is enabled—The selected public IP from the pool will be used
as a Source for Outbound traffic.
- You can chose more than one public IP addresses however in that case, the
traffic cannot be pined for a particular source to use a particular public
IP address. It will be randomly selected for each flow individually.