Skip to content

Commit 06236c3

Browse files
authored
Merge pull request #190287 from asudbring/outbound-art
Added options diagram to load balancer outbound connections
2 parents b79bd03 + 51c63ce commit 06236c3

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

articles/load-balancer/load-balancer-outbound-connections.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 03/01/2022
1111
ms.author: allensu
1212
---
1313

14-
# Using Source Network Address Translation (SNAT) for outbound connections
14+
# Use Source Network Address Translation (SNAT) for outbound connections
1515

1616
Certain scenarios require virtual machines or compute instances to have outbound connectivity to the internet. The frontend IPs of a public load balancer can be used to provide outbound connectivity to the internet for backend instances. This configuration uses **source network address translation (SNAT)** to translate virtual machine's private IP into the load balancer's public IP address. SNAT maps the IP address of the backend to the public IP address of your load balancer. SNAT prevents outside sources from having a direct address to the backend instances.
1717

@@ -21,12 +21,14 @@ The following methods are used to enable outbound connectivity in Azure:
2121

2222
| # | Method | Type of port allocation | Production-grade? | Rating |
2323
| ------------ | ------------ | ------ | ------------ | ------------ |
24-
| 1 | Using the frontend IP address(es) of a load balancer for outbound via outbound rules | Static, explicit | Yes, but not at scale | OK |
25-
| 2 | Associating a NAT gateway to the subnet | Dynamic, explicit | Yes | Best |
26-
| 3 | Assigning a public IP to the virtual machine | Static, explicit | Yes | OK |
27-
| 4 | Using [default outbound access](../virtual-network/ip-services/default-outbound-access.md) | Implicit | No | Worst |
24+
| 1 | Use the frontend IP address(es) of a load balancer for outbound via outbound rules | Static, explicit | Yes, but not at scale | OK |
25+
| 2 | Associate a NAT gateway to the subnet | Dynamic, explicit | Yes | Best |
26+
| 3 | Assign a public IP to the virtual machine | Static, explicit | Yes | OK |
27+
| 4 | [Default outbound access](../virtual-network/ip-services/default-outbound-access.md) use | Implicit | No | Worst |
2828

29-
## <a name="outboundrules"></a>1. Using the frontend IP address of a load balancer for outbound via outbound rules
29+
:::image type="content" source="./media/load-balancer-outbound-connections/outbound-options.png" alt-text="Diagram of Azure outbound options.":::
30+
31+
## <a name="outboundrules"></a>1. Use the frontend IP address of a load balancer for outbound via outbound rules
3032

3133
:::image type="content" source="./media/load-balancer-outbound-connections/public-load-balancer-outbound.png" alt-text="Diagram public load balancer with outbound rules.":::
3234

@@ -52,7 +54,7 @@ If you have Virtual Machine Scale Sets in the backend, it's recommended to alloc
5254

5355
For more information about outbound rules, see [Outbound rules](outbound-rules.md).
5456

55-
## 2. Associating a NAT gateway to the subnet
57+
## 2. Associate a NAT gateway to the subnet
5658

5759
:::image type="content" source="./media/load-balancer-outbound-connections/nat-gateway.png" alt-text="Diagram of a NAT gateway and public load balancer.":::
5860

@@ -62,7 +64,7 @@ Using a NAT gateway is the best method for outbound connectivity. A NAT gateway
6264

6365
For more information about Azure Virtual Network NAT, see [What is Azure Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md).
6466

65-
## 3. Assigning a public IP to the virtual machine
67+
## 3. Assign a public IP to the virtual machine
6668

6769
:::image type="content" source="./media/load-balancer-outbound-connections/instance-level-public-ip.png" alt-text="Diagram of virtual machines with instance level public IP addresses.":::
6870

@@ -120,7 +122,7 @@ The following <a name="snatporttable"></a>table shows the SNAT port preallocatio
120122
| 401-800 | 64 |
121123
| 801-1,000 | 32 |
122124

123-
## Exhausting ports
125+
## Port exhaustion
124126

125127
Every connection to the same destination IP and destination port will use a SNAT port. This connection maintains a distinct **traffic flow** from the backend instance or **client** to a **server**. This process gives the server a distinct port on which to address traffic. Without this process, the client machine is unaware of which flow a packet is part of.
126128

84.3 KB
Loading

0 commit comments

Comments
 (0)