Set-AzFirewallPolicy
Salva un criterio del firewall di Azure modificato
Sintassi
Set-AzFirewallPolicy
-Name <String>
-ResourceGroupName <String>
[-AsJob]
[-ThreatIntelMode <String>]
[-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
[-BasePolicy <String>]
[-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
[-SqlSetting <PSAzureFirewallPolicySqlSetting>]
-Location <String>
[-Tag <Hashtable>]
[-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
[-TransportSecurityName <String>]
[-TransportSecurityKeyVaultSecretId <String>]
[-SkuTier <String>]
[-UserAssignedIdentityId <String>]
[-Identity <PSManagedServiceIdentity>]
[-PrivateRange <String[]>]
[-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
[-Snat <PSAzureFirewallPolicySNAT>]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Set-AzFirewallPolicy
[-Name <String>]
-InputObject <PSAzureFirewallPolicy>
[-AsJob]
[-ThreatIntelMode <String>]
[-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
[-BasePolicy <String>]
[-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
[-SqlSetting <PSAzureFirewallPolicySqlSetting>]
[-Location <String>]
[-Tag <Hashtable>]
[-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
[-TransportSecurityName <String>]
[-TransportSecurityKeyVaultSecretId <String>]
[-SkuTier <String>]
[-UserAssignedIdentityId <String>]
[-Identity <PSManagedServiceIdentity>]
[-PrivateRange <String[]>]
[-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
[-Snat <PSAzureFirewallPolicySNAT>]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Set-AzFirewallPolicy
[-AsJob]
-ResourceId <String>
[-ThreatIntelMode <String>]
[-ThreatIntelWhitelist <PSAzureFirewallPolicyThreatIntelWhitelist>]
[-BasePolicy <String>]
[-DnsSetting <PSAzureFirewallPolicyDnsSettings>]
[-SqlSetting <PSAzureFirewallPolicySqlSetting>]
-Location <String>
[-Tag <Hashtable>]
[-IntrusionDetection <PSAzureFirewallPolicyIntrusionDetection>]
[-TransportSecurityName <String>]
[-TransportSecurityKeyVaultSecretId <String>]
[-SkuTier <String>]
[-UserAssignedIdentityId <String>]
[-Identity <PSManagedServiceIdentity>]
[-PrivateRange <String[]>]
[-ExplicitProxy <PSAzureFirewallPolicyExplicitProxy>]
[-Snat <PSAzureFirewallPolicySNAT>]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Descrizione
Il cmdlet Set-AzFirewallPolicy aggiorna un criterio di Firewall di Azure.
Esempio
Esempio 1
Set-AzFirewallPolicy -InputObject $fp
In questo esempio vengono impostati i criteri firewall con il nuovo valore dei criteri firewall
Esempio 2
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ThreatIntelMode "Alert"
Questo esempio imposta i criteri firewall con la nuova modalità Intel per le minacce
Esempio 3
$threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ThreatIntelWhitelist $threatIntelWhitelist
Questo esempio imposta i criteri firewall con la nuova minaccia intel allowlist
Esempio 4
$exProxy = New-AzFirewallPolicyExplicitProxy -EnableExplicitProxy -HttpPort 100 -HttpsPort 101 -EnablePacFile -PacFilePort 130 -PacFile "sampleurlfortesting.blob.core.windowsnet/nothing"
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ExplicitProxy $exProxy
BasePolicy : null
DnsSettings : null
Etag : null
ExplicitProxy
EnableExplicitProxy : true
EnablePacFile : true
HttpPort : 100
HttpsPort : 101
PacFile : "sampleurlfortesting.blob.core.windowsnet/nothing"
PacFilePort : 130
Id : null
Identity : null
IntrusionDetection : null
Location : "westcentralus"
Name : "firewallPolicy1"
PrivateRange : null
PrivateRangeText : "[]"
ProvisioningState : null
ResourceGroupName : "TestRg"
ResourceGuid : null
RuleCollectionGroups : null
Sku
Tier : "Standard"
Snat
AutoLearnPrivateRanges : null
PrivateRanges : null
SqlSetting : null
Tag : null
TagsTable : null
ThreatIntelMode : "Alert"
ThreatIntelWhitelist : null
TransportSecurity : null
Type : null
Questo esempio imposta i criteri del firewall con le impostazioni proxy esplicite
Parametri
-AsJob
Eseguire il cmdlet in background
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-BasePolicy
Criteri di base da cui ereditare
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Confirm
Richiede conferma prima di eseguire il cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
Le credenziali, l’account, il tenant e la sottoscrizione usati per comunicare con Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DnsSetting
Impostazione DNS
Type: | PSAzureFirewallPolicyDnsSettings |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExplicitProxy
Il proxy esplicito Impostazioni
Type: | PSAzureFirewallPolicyExplicitProxy |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Identity
Identità dei criteri firewall da assegnare ai criteri firewall.
Type: | PSManagedServiceIdentity |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-InputObject
Criteri di AzureFirewall
Type: | PSAzureFirewallPolicy |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-IntrusionDetection
Impostazione rilevamento intrusioni
Type: | PSAzureFirewallPolicyIntrusionDetection |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Location
posizione.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Name
Nome della risorsa.
Type: | String |
Aliases: | ResourceName |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | True |
-PrivateRange
Intervallo IP privato
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ResourceGroupName
Il nome del gruppo di risorse.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | True |
-ResourceId
ID risorsa.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | True |
-SkuTier
Livello SKU dei criteri firewall
Type: | String |
Accepted values: | Standard, Premium, Basic |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Snat
Gli indirizzi IP privati/intervalli IP a cui il traffico non sarà SNAT nei criteri del firewall.
Type: | PSAzureFirewallPolicySNAT |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SqlSetting
Impostazione correlata a SQL
Type: | PSAzureFirewallPolicySqlSetting |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Tag
Tabella hash che rappresenta i tag delle risorse.
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-ThreatIntelMode
Modalità operativa per Intelligence per le minacce.
Type: | String |
Accepted values: | Alert, Deny, Off |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-ThreatIntelWhitelist
Elenco di elementi consentiti per Intelligence per le minacce
Type: | PSAzureFirewallPolicyThreatIntelWhitelist |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-TransportSecurityKeyVaultSecretId
ID segreto (pfx non crittografato con codifica Base 64) 'Secret' o 'Certificate' oggetto archiviato in KeyVault
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-TransportSecurityName
Nome della sicurezza del trasporto
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-UserAssignedIdentityId
ResourceId dell'identità assegnata dall'utente da assegnare a Criteri firewall.
Type: | String |
Aliases: | UserAssignedIdentity |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Mostra gli effetti dell'esecuzione del cmdlet. Il cmdlet non viene eseguito.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Input
Output
Collegamenti correlati
Commenti e suggerimenti
https://aka.ms/ContentUserFeedback.
Presto disponibile: Nel corso del 2024 verranno gradualmente disattivati i problemi di GitHub come meccanismo di feedback per il contenuto e ciò verrà sostituito con un nuovo sistema di feedback. Per altre informazioni, vedereInvia e visualizza il feedback per