Skip to content

Commit 050b525

Browse files
Merge pull request #291766 from brianlehr/minorchangesbranch
Minorchangesbranch
2 parents 0548b5e + e1cacb8 commit 050b525

File tree

2 files changed

+7
-14
lines changed

2 files changed

+7
-14
lines changed

articles/load-balancer/load-balancer-floating-ip.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,10 +145,11 @@ sudo ufw allow 80/tcp
145145
```
146146
</details>
147147

148-
## <a name = "limitations"></a>Limitations
148+
## <a name = "limitations"></a>Limitations
149149

150150
- With Floating IP enabled on a load balancing rule, your application must use the primary IP configuration of the network interface for outbound.
151151
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound won't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).
152+
- You can't use Floating IP on secondary IP configurations for Load Balancing scenarios. This limitation doesn't apply to Public load balancers where the secondary IP configuration is IPv6 an part of a dual-stack configuration or to architectures that utilize a NAT Gateway for outbound connectivity.
152153

153154
## Next steps
154155

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -71,33 +71,27 @@ There are multiple ways to turn off default outbound access. The following secti
7171
7272
* Creating a subnet to be Private prevents any virtual machines on the subnet from utilizing default outbound access to connect to public endpoints.
7373

74-
* The parameter to create a Private subnet can only be set during the creation of a subnet.
75-
7674
* VMs on a Private subnet can still access the Internet using explicit outbound connectivity.
7775

7876
> [!NOTE]
7977
> Certain services won't function on a virtual machine in a Private Subnet without an explicit method of egress (examples are Windows Activation and Windows Updates).
8078
8179
#### Add the Private subnet feature
8280

83-
* From the Azure portal, ensure the option to enable Private subnet is selected when creating a subnet as part of the Virtual Network create experience as shown below:
81+
* From the Azure portal, ensure the option to enable Private subnet is selected as part of the Virtual Network subnet create/modify experience as shown below:
8482

8583
:::image type="content" source="./media/default-outbound-access/private-subnet-portal.png" alt-text="Screenshot of Azure portal showing Private subnet option.":::
8684

87-
* Using PowerShell, when creating a subnet with [New-AzVirtualNetworkSubnetConfig](/powershell/module/az.network/new-azvirtualnetworksubnetconfig), use the `DefaultOutboundAccess` option and choose "$false"
85+
* Using PowerShell, when creating a subnet with [New-AzVirtualNetworkSubnetConfig](/powershell/module/az.network/new-azvirtualnetworksubnetconfig), use the `DefaultOutboundAccess` option and choose "$false". After creation, a subnet can be set using [Set-AzVirtualNetworkSubnetConfig](/powershell/module/az.network/set-azvirtualnetworksubnetconfig).
8886

89-
* Using CLI, when creating a subnet with [az network vnet subnet create](/cli/azure/network/vnet/subnet#az-network-vnet-subnet-create), use the `--default-outbound` option and choose "false"
87+
* Using CLI, when creating a subnet with [az network vnet subnet create](/cli/azure/network/vnet/subnet#az-network-vnet-subnet-create), use the `--default-outbound` option and choose "false". After creation, a subnet can be set using [az network vnet subnet update](/cli/azure/network/vnet/subnet?view=azure-cli-latest#az-network-vnet-subnet-update).
9088

91-
* Using an Azure Resource Manager template, set the value of `defaultOutboundAccess` parameter to be "false"
89+
* Using an Azure Resource Manager template, set the value of `defaultOutboundAccess` parameter to be "false".
9290

9391
#### Private subnet limitations
9492

9593
* In order to utilize to activate/update virtual machine operation systems, including Windows, it's a requirement to have an explicit outbound connectivity method.
9694

97-
* Delegated subnets can't be marked as Private.
98-
99-
* Existing subnets can't currently be converted to Private.
100-
10195
* In configurations using a User Defined Route (UDR) with a default route (0/0) that sends traffic to an upstream firewall/network virtual appliance, any traffic that bypasses this route (for example, to Service Tagged destinations) breaks in a Private subnet.
10296

10397
### Add an explicit outbound connectivity method
@@ -115,14 +109,12 @@ There are multiple ways to turn off default outbound access. The following secti
115109
>[!Important]
116110
> When a load balancer backend pool is configured by IP address, it will use default outbound access due to an ongoing known issue. For secure by default configuration and applications with demanding outbound needs, associate a NAT gateway to the VMs in your load balancer's backend pool to secure traffic. See more on existing [known issues](../../load-balancer/whats-new.md#known-issues).
117111
118-
## If I need outbound access, what is the recommended way?
112+
## If I need outbound access, what is the recommended way?
119113

120114
NAT gateway is the recommended approach to have explicit outbound connectivity. A firewall can also be used to provide this access.
121115

122116
## Constraints
123117

124-
* Public connectivity is required for Windows Activation and Windows Updates. It's recommended to set up an explicit form of public outbound connectivity.
125-
126118
* Default outbound access IP doesn't support fragmented packets.
127119

128120
* Default outbound access IP doesn't support ICMP pings.

0 commit comments

Comments
 (0)