diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/availableDelegations.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/availableDelegations.json index 77843d6a3943..aa38d3537739 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/availableDelegations.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/availableDelegations.json @@ -169,7 +169,7 @@ "items": { "type": "string" }, - "description": "Describes the actions permitted to the service upon delegation." + "description": "The actions permitted to the service upon delegation." } }, "description": "The serviceName of an AvailableDelegation indicates a possible delegation for a subnet." diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/azureFirewall.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/azureFirewall.json index 860fb665d169..785d50d34aaa 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/azureFirewall.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/azureFirewall.json @@ -141,6 +141,9 @@ }, "Get Azure Firewall With Additional Properties": { "$ref": "./examples/AzureFirewallGetWithAdditionalProperties.json" + }, + "Get Azure Firewall With IpGroups": { + "$ref": "./examples/AzureFirewallGetWithIpGroups.json" } } }, @@ -213,6 +216,9 @@ }, "Create Azure Firewall With Additional Properties": { "$ref": "./examples/AzureFirewallPutWithAdditionalProperties.json" + }, + "Create Azure Firewall With IpGroups": { + "$ref": "./examples/AzureFirewallPutWithIpGroups.json" } }, "x-ms-long-running-operation": true, @@ -421,6 +427,21 @@ }, "description": "Public IP Address associated with azure firewall." }, + "AzureFirewallIpGroups": { + "properties": { + "id": { + "type": "string", + "readOnly": true, + "description": "Resource ID." + }, + "changeNumber": { + "type": "string", + "readOnly": true, + "description": "The iteration number." + } + }, + "description": "IpGroups associated with azure firewall." + }, "HubIPAddresses": { "properties": { "publicIPAddresses": { @@ -437,6 +458,13 @@ }, "description": "IP addresses associated with azure firewall." }, + "IpGroups": { + "type": "array", + "description": "List of IpGroups associated with azure firewall.", + "items": { + "$ref": "#/definitions/AzureFirewallIpGroups" + } + }, "AzureFirewallPropertiesFormat": { "properties": { "applicationRuleCollections": { @@ -489,6 +517,11 @@ "description": "IP addresses associated with AzureFirewall.", "$ref": "#/definitions/HubIPAddresses" }, + "ipGroups": { + "readOnly": true, + "description": "IpGroups associated with AzureFirewall.", + "$ref": "#/definitions/IpGroups" + }, "sku": { "description": "The Azure Firewall Resource SKU.", "$ref": "#/definitions/AzureFirewallSku" diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGet.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGet.json index dc544f6f0084..78b8c38a305d 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGet.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGet.json @@ -168,6 +168,7 @@ } } ], + "ipGroups": [], "additionalProperties": {} } } diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithIpGroups.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithIpGroups.json new file mode 100644 index 000000000000..f153d3097dd7 --- /dev/null +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithIpGroups.json @@ -0,0 +1,189 @@ +{ + "parameters": { + "api-version": "2019-11-01", + "subscriptionId": "subid", + "resourceGroupName": "rg1", + "azureFirewallName": "azurefirewall" + }, + "responses": { + "200": { + "body": { + "name": "azurefirewall", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azurefirewall", + "type": "Microsoft.Network/azureFirewalls", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "location": "West US", + "zones": [], + "tags": { + "key1": "value1" + }, + "properties": { + "provisioningState": "Succeeded", + "sku": { + "name": "AZFW_VNet", + "tier": "Standard" + }, + "threatIntelMode": "Alert", + "ipConfigurations": [ + { + "name": "azureFirewallIpConfiguration", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azurefirewallgw/ipConfigurations/azureFirewallIpConfiguration", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "properties": { + "provisioningState": "Succeeded", + "privateIPAddress": "10.0.0.0", + "subnet": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/AzureFirewallSubnet" + }, + "publicIPAddress": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/publicIPAddresses/pipName" + } + } + } + ], + "applicationRuleCollections": [ + { + "name": "apprulecoll", + "properties": { + "priority": 110, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "rule1", + "description": "Deny inbound rule", + "protocols": [ + { + "protocolType": "Https", + "port": 443 + } + ], + "targetFqdns": [ + "www.test.com" + ], + "sourceIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1" + ] + } + ] + } + } + ], + "natRuleCollections": [ + { + "name": "natrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Dnat" + }, + "rules": [ + { + "name": "DNAT-HTTPS-traffic", + "description": "D-NAT all outbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "443" + ], + "protocols": [ + "TCP" + ], + "translatedAddress": "1.2.3.5", + "translatedPort": "8443" + }, + { + "name": "DNAT-HTTP-traffic-With-FQDN", + "description": "D-NAT all inbound web traffic for inspection", + "sourceIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "80" + ], + "protocols": [ + "TCP" + ], + "translatedFqdn": "internalhttpserver", + "translatedPort": "880" + } + ] + } + } + ], + "networkRuleCollections": [ + { + "name": "netrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "L4-traffic", + "description": "Block traffic based on source IPs and ports", + "sourceAddresses": [ + "192.168.1.1-192.168.1.12", + "10.1.4.12-10.1.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups2" + ], + "protocols": [ + "TCP" + ] + }, + { + "name": "L4-traffic-with-FQDN", + "description": "Block traffic based on source IPs and ports to amazon", + "sourceIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups3" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationFqdns": [ + "www.amazon.com" + ], + "protocols": [ + "TCP" + ] + } + ] + } + } + ], + "ipGroups": [ + { + "id": "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1", + "changeNumber": "5" + }, + { + "id": "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups2", + "changeNumber": "4" + }, + { + "id": "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups3", + "changeNumber": "1" + } + ], + "additionalProperties": {} + } + } + } + } +} diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithZones.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithZones.json index 12f77bc209af..5df9ca1de3e1 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithZones.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallGetWithZones.json @@ -172,6 +172,7 @@ } } ], + "ipGroups": [], "additionalProperties": {} } } diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListByResourceGroup.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListByResourceGroup.json index 934b87f9cd0f..714a71735f8d 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListByResourceGroup.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListByResourceGroup.json @@ -165,6 +165,7 @@ } } ], + "ipGroups": [], "additionalProperties": { "key1": "value1", "key2": "value2" diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListBySubscription.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListBySubscription.json index 77b2869e9921..81efdb6f082a 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListBySubscription.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallListBySubscription.json @@ -164,6 +164,7 @@ } } ], + "ipGroups": [], "additionalProperties": { "key1": "value1", "key2": "value2" diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPut.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPut.json index e0d38586a4ee..28c960aa2b3f 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPut.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPut.json @@ -322,6 +322,7 @@ } } ], + "ipGroups": [], "additionalProperties": {} } } diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutInHub.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutInHub.json index 1b21a81243da..59ec308532a2 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutInHub.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutInHub.json @@ -94,6 +94,7 @@ ], "privateIPAddress": "10.0.0.0" }, + "ipGroups": [], "additionalProperties": {} } } diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithAdditionalProperties.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithAdditionalProperties.json index 7c0f5555e274..7c99a1d68aac 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithAdditionalProperties.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithAdditionalProperties.json @@ -156,6 +156,7 @@ } } ], + "ipGroups": [], "additionalProperties": { "key1": "value1", "key2": "value2" diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithIpGroups.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithIpGroups.json new file mode 100644 index 000000000000..d9837dcff08b --- /dev/null +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithIpGroups.json @@ -0,0 +1,505 @@ +{ + "parameters": { + "api-version": "2019-11-01", + "subscriptionId": "subid", + "resourceGroupName": "rg1", + "azureFirewallName": "azurefirewall", + "parameters": { + "tags": { + "key1": "value1" + }, + "location": "West US", + "zones": [], + "properties": { + "sku": { + "name": "AZFW_VNet", + "tier": "Standard" + }, + "threatIntelMode": "Alert", + "ipConfigurations": [ + { + "name": "azureFirewallIpConfiguration", + "properties": { + "subnet": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/AzureFirewallSubnet" + }, + "publicIPAddress": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/publicIPAddresses/pipName" + } + } + } + ], + "applicationRuleCollections": [ + { + "name": "apprulecoll", + "properties": { + "priority": 110, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "rule1", + "description": "Deny inbound rule", + "protocols": [ + { + "protocolType": "Https", + "port": 443 + } + ], + "targetFqdns": [ + "www.test.com" + ], + "sourceAddresses": [ + "216.58.216.164", + "10.0.0.0/24" + ] + } + ] + } + } + ], + "natRuleCollections": [ + { + "name": "natrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Dnat" + }, + "rules": [ + { + "name": "DNAT-HTTPS-traffic", + "description": "D-NAT all outbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "443" + ], + "protocols": [ + "TCP" + ], + "translatedAddress": "1.2.3.5", + "translatedPort": "8443" + }, + { + "name": "DNAT-HTTP-traffic-With-FQDN", + "description": "D-NAT all inbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "80" + ], + "protocols": [ + "TCP" + ], + "translatedFqdn": "internalhttpserver", + "translatedPort": "880" + } + ] + } + } + ], + "networkRuleCollections": [ + { + "name": "netrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "L4-traffic", + "description": "Block traffic based on source IPs and ports", + "sourceAddresses": [ + "192.168.1.1-192.168.1.12", + "10.1.4.12-10.1.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationAddresses": [ + "*" + ], + "protocols": [ + "TCP" + ] + }, + { + "name": "L4-traffic-with-FQDN", + "description": "Block traffic based on source IPs and ports to amazon", + "sourceAddresses": [ + "10.2.4.12-10.2.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationFqdns": [ + "www.amazon.com" + ], + "protocols": [ + "TCP" + ] + } + ] + } + } + ] + } + } + }, + "responses": { + "200": { + "body": { + "name": "azurefirewall", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azurefirewall", + "type": "Microsoft.Network/azureFirewalls", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "location": "West US", + "zones": [], + "tags": { + "key1": "value1" + }, + "properties": { + "provisioningState": "Succeeded", + "sku": { + "name": "AZFW_VNet", + "tier": "Standard" + }, + "threatIntelMode": "Alert", + "ipConfigurations": [ + { + "name": "azureFirewallIpConfiguration", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azfirewallgw/ipConfigurations/azureFirewallIpConfiguration", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "properties": { + "provisioningState": "Succeeded", + "privateIPAddress": "10.0.0.0", + "subnet": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/AzureFirewallSubnet" + }, + "publicIPAddress": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/publicIPAddresses/pipName" + } + } + } + ], + "applicationRuleCollections": [ + { + "name": "apprulecoll", + "properties": { + "priority": 110, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "rule1", + "description": "Deny inbound rule", + "protocols": [ + { + "protocolType": "Https", + "port": 443 + } + ], + "targetFqdns": [ + "www.test.com" + ], + "sourceAddresses": [ + "216.58.216.164", + "10.0.0.0/24" + ] + } + ] + } + } + ], + "natRuleCollections": [ + { + "name": "natrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Dnat" + }, + "rules": [ + { + "name": "DNAT-HTTPS-traffic", + "description": "D-NAT all outbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "443" + ], + "protocols": [ + "TCP" + ], + "translatedAddress": "1.2.3.5", + "translatedPort": "8443" + }, + { + "name": "DNAT-HTTP-traffic-With-FQDN", + "description": "D-NAT all inbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "80" + ], + "protocols": [ + "TCP" + ], + "translatedPort": "880", + "translatedFqdn": "internalhttpserver" + } + ] + } + } + ], + "networkRuleCollections": [ + { + "name": "netrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "L4-traffic", + "description": "Block traffic based on source IPs and ports", + "sourceAddresses": [ + "192.168.1.1-192.168.1.12", + "10.1.4.12-10.1.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationAddresses": [ + "*" + ], + "protocols": [ + "TCP" + ] + }, + { + "name": "L4-traffic-with-FQDN", + "description": "Block traffic based on source IPs and ports to amazon", + "sourceAddresses": [ + "10.2.4.12-10.2.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "protocols": [ + "TCP" + ], + "destinationFqdns": [ + "www.amazon.com" + ] + } + ] + } + } + ], + "additionalProperties": {} + } + } + }, + "201": { + "body": { + "name": "azurefirewall", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azurefirewall", + "type": "Microsoft.Network/azureFirewalls", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "location": "West US", + "zones": [], + "tags": { + "key1": "value1" + }, + "properties": { + "provisioningState": "Succeeded", + "sku": { + "name": "AZFW_VNet", + "tier": "Standard" + }, + "threatIntelMode": "Alert", + "ipConfigurations": [ + { + "name": "azureFirewallIpConfiguration", + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/azureFirewalls/azfirewallgw/ipConfigurations/azureFirewallIpConfiguration", + "etag": "w/\\00000000-0000-0000-0000-000000000000\\", + "properties": { + "provisioningState": "Succeeded", + "privateIPAddress": "10.0.0.0", + "subnet": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/AzureFirewallSubnet" + }, + "publicIPAddress": { + "id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/publicIPAddresses/pipName" + } + } + } + ], + "applicationRuleCollections": [ + { + "name": "apprulecoll", + "properties": { + "priority": 110, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "rule1", + "description": "Deny inbound rule", + "protocols": [ + { + "protocolType": "Https", + "port": 443 + } + ], + "targetFqdns": [ + "www.test.com" + ], + "sourceIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1" + ] + } + ] + } + } + ], + "natRuleCollections": [ + { + "name": "natrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Dnat" + }, + "rules": [ + { + "name": "DNAT-HTTPS-traffic", + "description": "D-NAT all outbound web traffic for inspection", + "sourceIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "443" + ], + "protocols": [ + "TCP" + ], + "translatedAddress": "1.2.3.5", + "translatedPort": "8443" + }, + { + "name": "DNAT-HTTP-traffic-With-FQDN", + "description": "D-NAT all inbound web traffic for inspection", + "sourceAddresses": [ + "*" + ], + "destinationAddresses": [ + "1.2.3.4" + ], + "destinationPorts": [ + "80" + ], + "protocols": [ + "TCP" + ], + "translatedFqdn": "internalhttpserver", + "translatedPort": "880" + } + ] + } + } + ], + "networkRuleCollections": [ + { + "name": "netrulecoll", + "properties": { + "priority": 112, + "action": { + "type": "Deny" + }, + "rules": [ + { + "name": "L4-traffic", + "description": "Block traffic based on source IPs and ports", + "sourceAddresses": [ + "192.168.1.1-192.168.1.12", + "10.1.4.12-10.1.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationAddresses": [ + "*" + ], + "protocols": [ + "TCP" + ] + }, + { + "name": "L4-traffic-with-FQDN", + "description": "Block traffic based on source IPs and ports to amazon", + "sourceAddresses": [ + "10.2.4.12-10.2.4.255" + ], + "destinationPorts": [ + "443-444", + "8443" + ], + "destinationIpGroups": [ + "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups2" + ], + "protocols": [ + "TCP" + ] + } + ] + } + } + ], + "ipGroups": [ + { + "id": "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups1", + "changeNumber": "5" + }, + { + "id": "/subscriptions/subId/providers/Microsoft.Network/resourceGroup/myResourceGroup/ipGroups/ipGroups2", + "changeNumber": "4" + } + ], + "additionalProperties": {} + } + } + } + } +} diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithZones.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithZones.json index f14eccf0fa0d..840d42c5bc87 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithZones.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/examples/AzureFirewallPutWithZones.json @@ -330,6 +330,7 @@ } } ], + "ipGroups": [], "additionalProperties": {} } } diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/networkWatcher.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/networkWatcher.json index b898947834d0..3f128c108a16 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/networkWatcher.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/networkWatcher.json @@ -1931,7 +1931,7 @@ }, "storageLocation": { "$ref": "#/definitions/PacketCaptureStorageLocation", - "description": "Describes the storage location for a packet capture session." + "description": "The storage location for a packet capture session." }, "filters": { "type": "array", @@ -1962,7 +1962,7 @@ "description": "A valid local path on the targeting VM. Must include the name of the capture file (*.cap). For linux virtual machine it must start with /var/captures. Required if no storage ID is provided, otherwise optional." } }, - "description": "Describes the storage location for a packet capture session." + "description": "The storage location for a packet capture session." }, "PacketCaptureFilter": { "properties": { @@ -2049,7 +2049,7 @@ "$ref": "#/definitions/PacketCaptureParameters" } ], - "description": "Describes the properties of a packet capture session." + "description": "The properties of a packet capture session." }, "PacketCaptureQueryStatusResult": { "properties": { @@ -2372,11 +2372,11 @@ "properties": { "source": { "$ref": "#/definitions/ConnectivitySource", - "description": "Describes the source of the connection." + "description": "The source of the connection." }, "destination": { "$ref": "#/definitions/ConnectivityDestination", - "description": "Describes the destination of connection." + "description": "The destination of connection." }, "protocol": { "type": "string", @@ -2646,7 +2646,7 @@ "description": "The value in HTTP header." } }, - "description": "Describes the HTTP header." + "description": "The HTTP header." }, "AzureReachabilityReportParameters": { "properties": { diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/usage.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/usage.json index 019dfd0f981b..ebd7a496d0b4 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/usage.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/usage.json @@ -138,7 +138,7 @@ "limit", "name" ], - "description": "Describes network resource usage." + "description": "The network resource usage." }, "UsagesListResult": { "properties": { diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/virtualNetwork.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/virtualNetwork.json index 045e40fa8a17..0180878fbfc3 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/virtualNetwork.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/virtualNetwork.json @@ -1357,7 +1357,7 @@ "items": { "type": "string" }, - "description": "Describes the actions permitted to the service upon delegation." + "description": "The actions permitted to the service upon delegation." }, "provisioningState": { "readOnly": true, diff --git a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/webapplicationfirewall.json b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/webapplicationfirewall.json index 8a9fb4d7ffec..6f6258785e47 100644 --- a/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/webapplicationfirewall.json +++ b/specification/network/resource-manager/Microsoft.Network/stable/2019-11-01/webapplicationfirewall.json @@ -319,11 +319,11 @@ ], "properties": { "policySettings": { - "description": "Describes policySettings for policy.", + "description": "The PolicySettings for policy.", "$ref": "#/definitions/PolicySettings" }, "customRules": { - "description": "Describes custom rules inside the policy.", + "description": "The custom rules inside the policy.", "type": "array", "items": { "$ref": "#/definitions/WebApplicationFirewallCustomRule" @@ -411,14 +411,14 @@ "items": { "$ref": "#/definitions/OwaspCrsExclusionEntry" }, - "description": "Describes the Exclusions that are applied on the policy." + "description": "The Exclusions that are applied on the policy." }, "managedRuleSets": { "type": "array", "items": { "$ref": "#/definitions/ManagedRuleSet" }, - "description": "Describes the ruleSets that are associated with the policy." + "description": "The managed rule sets that are associated with the policy." } } }, @@ -426,7 +426,7 @@ "description": "Defines contents of a web application firewall global configuration.", "properties": { "state": { - "description": "Describes if the policy is in enabled state or disabled state.", + "description": "The state of the policy.", "type": "string", "enum": [ "Disabled", @@ -438,7 +438,7 @@ } }, "mode": { - "description": "Describes if it is in detection mode or prevention mode at policy level.", + "description": "The mode of the policy.", "type": "string", "enum": [ "Prevention", @@ -491,11 +491,11 @@ "description": "A unique read-only string that changes whenever the resource is updated." }, "priority": { - "description": "Describes priority of the rule. Rules with a lower value will be evaluated before rules with a higher value.", + "description": "Priority of the rule. Rules with a lower value will be evaluated before rules with a higher value.", "type": "integer" }, "ruleType": { - "description": "Describes type of rule.", + "description": "The rule type.", "type": "string", "enum": [ "MatchRule", @@ -529,7 +529,7 @@ } }, "Transform": { - "description": "Describes what transforms applied before matching.", + "description": "Transforms applied before matching.", "type": "string", "enum": [ "Lowercase", @@ -569,7 +569,7 @@ } }, "selector": { - "description": "Describes field of the matchVariable collection.", + "description": "The selector of match variable.", "type": "string" } } @@ -590,7 +590,7 @@ } }, "operator": { - "description": "Describes operator to be matched.", + "description": "The operator to be matched.", "type": "string", "enum": [ "IPMatch", @@ -611,7 +611,7 @@ } }, "negationConditon": { - "description": "Describes if this is negate condition or not.", + "description": "Whether this is negate condition or not.", "type": "boolean" }, "matchValues": { @@ -662,7 +662,7 @@ ], "properties": { "ruleGroupName": { - "description": "Describes the managed rule group to override.", + "description": "The managed rule group to override.", "type": "string" }, "rules": { @@ -685,7 +685,7 @@ "type": "string" }, "state": { - "description": "Describes the state of the managed rule. Defaults to Disabled if not specified.", + "description": "The state of the managed rule. Defaults to Disabled if not specified.", "type": "string", "enum": [ "Disabled" diff --git a/specification/network/resource-manager/readme.java.md b/specification/network/resource-manager/readme.java.md index 080746b18a65..4187b998d1a7 100644 --- a/specification/network/resource-manager/readme.java.md +++ b/specification/network/resource-manager/readme.java.md @@ -22,12 +22,6 @@ batch: - tag: package-2019-06 - tag: package-2019-04 - tag: package-2019-02 - - tag: package-2018-12 - - tag: package-2018-08 - - tag: package-2018-07 - - tag: package-2018-06 - - tag: package-2018-04 - - tag: package-2017-10 ``` ### Tag: package-2019-09 and java