Set-AzFirewallPolicy

Salva un criterio del firewall di Azure modificato

Sintassi

Set-AzFirewallPolicy
   -Name <String>
   -ResourceGroupName <String>
   [-AsJob]
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   -Location <String>
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-TransportSecurityName <String>]
   [-TransportSecurityKeyVaultSecretId <String>]
   [-SkuTier <String>]
   [-UserAssignedIdentityId <String>]
   [-Identity <PSManagedServiceIdentity>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
Set-AzFirewallPolicy
   [-Name <String>]
   -InputObject <PSAzureFirewallPolicy>
   [-AsJob]
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   [-Location <String>]
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-TransportSecurityName <String>]
   [-TransportSecurityKeyVaultSecretId <String>]
   [-SkuTier <String>]
   [-UserAssignedIdentityId <String>]
   [-Identity <PSManagedServiceIdentity>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
Set-AzFirewallPolicy
   [-AsJob]
   -ResourceId <String>
   [-ThreatIntelMode <String>]
   [-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
   [-BasePolicy <String>]
   [-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
   [-SqlSetting <PSAzureFirewallPolicySqlSetting>]
   -Location <String>
   [-Tag <Hashtable>]
   [-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
   [-TransportSecurityName <String>]
   [-TransportSecurityKeyVaultSecretId <String>]
   [-SkuTier <String>]
   [-UserAssignedIdentityId <String>]
   [-Identity <PSManagedServiceIdentity>]
   [-PrivateRange <String[]>]
   [-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
   [-Snat <PSAzureFirewallPolicySNAT>]
   [-DefaultProfile <IAzureContextContainer>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]

Descrizione

Il cmdlet Set-AzFirewallPolicy aggiorna un criterio di Firewall di Azure.

Esempio

Esempio 1

Set-AzFirewallPolicy -InputObject $fp

In questo esempio vengono impostati i criteri firewall con il nuovo valore dei criteri firewall

Esempio 2

Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ThreatIntelMode "Alert"

Questo esempio imposta i criteri firewall con la nuova modalità Intel per le minacce

Esempio 3

$threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ThreatIntelWhitelist $threatIntelWhitelist

Questo esempio imposta i criteri firewall con la nuova minaccia intel allowlist

Esempio 4

$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy  -HttpPort 100 -HttpsPort 101 -EnablePacFile  -PacFilePort 130 -PacFile "sampleurlfortesting.blob.core.windowsnet/nothing"
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ExplicitProxy $exProxy

BasePolicy	                : null	
		DnsSettings  	            : null	
		Etag	                    : null	
		ExplicitProxy	
			EnableExplicitProxy	    : true	
			EnablePacFile	        : true	
			HttpPort	            : 100	
			HttpsPort	            : 101	
			PacFile                 : "sampleurlfortesting.blob.core.windowsnet/nothing"
			PacFilePort	            : 130	
		Id	                        : null	
		Identity	                : null	
		IntrusionDetection	        : null	
		Location	                : "westcentralus"	
		Name	                    : "firewallPolicy1"	
		PrivateRange	            : null
		PrivateRangeText	        : "[]"
		ProvisioningState	        : null	
		ResourceGroupName	        : "TestRg"	
		ResourceGuid	            : null	
		RuleCollectionGroups	    : null	
		Sku	
			Tier	                : "Standard"	
		Snat	
			AutoLearnPrivateRanges	: null	
			PrivateRanges	        : null	
		SqlSetting	                : null	
		Tag	                        : null	
		TagsTable	                : null	
		ThreatIntelMode	            : "Alert"	
		ThreatIntelWhitelist	    : null	
		TransportSecurity	        : null	
		Type	                    : null

Questo esempio imposta i criteri del firewall con le impostazioni proxy esplicite

Parametri

-AsJob

Eseguire il cmdlet in background

Type:SwitchParameter
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-BasePolicy

Criteri di base da cui ereditare

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Confirm

Richiede conferma prima di eseguire il cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DefaultProfile

Le credenziali, l’account, il tenant e la sottoscrizione usati per comunicare con Azure.

Type:IAzureContextContainer
Aliases:AzContext, AzureRmContext, AzureCredential
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DnsSetting

Impostazione DNS

Type:PSAzureFirewallPolicyDnsSettings
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ExplicitProxy

Il proxy esplicito Impostazioni

Type:PSAzureFirewallPolicyExplicitProxy
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Identity

Identità dei criteri firewall da assegnare ai criteri firewall.

Type:PSManagedServiceIdentity
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-InputObject

Criteri di AzureFirewall

Type:PSAzureFirewallPolicy
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-IntrusionDetection

Impostazione rilevamento intrusioni

Type:PSAzureFirewallPolicyIntrusionDetection
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Location

posizione.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-Name

Nome della risorsa.

Type:String
Aliases:ResourceName
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-PrivateRange

Intervallo IP privato

Type:String[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResourceGroupName

Il nome del gruppo di risorse.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-ResourceId

ID risorsa.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:True

-SkuTier

Livello SKU dei criteri firewall

Type:String
Accepted values:Standard, Premium, Basic
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Snat

Gli indirizzi IP privati/intervalli IP a cui il traffico non sarà SNAT nei criteri del firewall.

Type:PSAzureFirewallPolicySNAT
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-SqlSetting

Impostazione correlata a SQL

Type:PSAzureFirewallPolicySqlSetting
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Tag

Tabella hash che rappresenta i tag delle risorse.

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-ThreatIntelMode

Modalità operativa per Intelligence per le minacce.

Type:String
Accepted values:Alert, Deny, Off
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-ThreatIntelWhitelist

Elenco di elementi consentiti per Intelligence per le minacce

Type:PSAzureFirewallPolicyThreatIntelWhitelist
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-TransportSecurityKeyVaultSecretId

ID segreto (pfx non crittografato con codifica Base 64) 'Secret' o 'Certificate' oggetto archiviato in KeyVault

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-TransportSecurityName

Nome della sicurezza del trasporto

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-UserAssignedIdentityId

ResourceId dell'identità assegnata dall'utente da assegnare a Criteri firewall.

Type:String
Aliases:UserAssignedIdentity
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Mostra gli effetti dell'esecuzione del cmdlet. Il cmdlet non viene eseguito.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Input

String

PSAzureFirewallPolicy

Hashtable

Output

PSAzureFirewall