You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this article, you learn how to connect a Azure VMware Solution Generation 2 (Gen 2) private cloud to other Gen 2 private clouds.
16
+
In this article, you learn how to connect an Azure VMware Solution Generation 2 (Gen 2) private cloud to other Gen 2 private clouds.
17
17
18
18
## Prerequisite
19
19
20
20
Have multiple Azure VMware Solution Gen 2 private clouds deployed successfully.
21
21
22
-
## Connect multiple Azure VMware Solution Gen 2
22
+
## Use Virtual Network peering to connect multiple private clouds
23
23
24
-
Private clouds deployed in different Azure Virtual Networks can be connected using Virtual Network peering. The Virtual Network peering provides the best possible throughput and latency between Azure VMware Solution private clouds in the same region. For more information about how to do Azure Virtual Network peering, see [Create, change, or delete a Virtual Network peering](/azure/virtual-network/virtual-network-peering-overview).
24
+
You can connect private clouds deployed in different Azure Virtual Networks using virtual network peering. The virtual network peering provides the best possible throughput and latency between Azure VMware Solution private clouds in the same region. For more information about how to do Azure Virtual Network peering, see [Create, change, or delete a Virtual Network peering](/azure/virtual-network/virtual-network-peering-overview).
25
25
26
26
Depending on the location of the private cloud, you may require local Virtual Network peering or a global Virtual Network peering.
27
27
28
-
:::image type="content" source="./media/native-connectivity/native-connect-multiple-solutions-on-premises.png" alt-text="Diagram of an multiple Azure VMware Solution Gen 2 private clouds connected together." lightbox="media/native-connectivity/native-connect-multiple-solutions-on-premises.png":::
28
+
:::image type="content" source="./media/native-connectivity/native-connect-multiple-solutions-on-premises.png" alt-text="Diagram of multiple Azure VMware Solution Gen 2 private clouds connected together." lightbox="media/native-connectivity/native-connect-multiple-solutions-on-premises.png":::
29
29
30
30
## Related topics
31
31
-[Connectivity to an Azure Virtual Network](native-network-connectivity.md)
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-dns-forward-lookup-zone.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ In this article, you learn how to configure a Domain Name System (DNS) forward l
14
14
15
15
## Prerequisite
16
16
17
-
Gen 2 private cloud successfully deployed.
17
+
Gen 2 private cloud is successfully deployed.
18
18
19
19
## DNS forward lookup zone configuration options
20
20
@@ -28,44 +28,44 @@ DNS forward lookup zone can be configured at the time of creation or changed aft
28
28
29
29
:::image type="content" source="./media/native-connectivity/native-connect-dns-lookup.png" alt-text="Diagram showing an Azure VMware Solution Gen 2 DNS forward lookup." lightbox="media/native-connectivity/native-connect-dns-lookup.png":::
30
30
31
-
## Configuring Private DNS for your Azure VMware Solution Generation 2 Private Cloud
31
+
## Configure private DNS for your Azure VMware Solution Generation 2 private cloud
32
32
33
33
If you select the Private DNS option, the private cloud will be resolvable from the Virtual Network where the private cloud is provisioned. This is done by linking the private DNS zone to your Virtual Network. If you need to enable this zone to be resolvable outside of this Virtual Network, such as in your on-premises environment, you need to configure an Azure DNS Private Resolver, or deploy your own DNS server in your Virtual Network. Private DNS will use the Azure DNS Service (168.63.129.16) to resolve your private cloud FQDNs. This section explains configuring an Azure DNS Private Resolver.
34
34
35
35
### Prerequisite
36
-
37
-
First, create two /28 subnets to delegate to the Azure DNS Private Resolver service. As an example. They can be named dns-in and dns-out.
38
-
36
+
37
+
Create two /28 subnets to delegate to the Azure DNS Private Resolver service. As an example, they can be named ```dns-in``` and ```dns-out```.
38
+
39
39
### Deploy Azure DNS Private Resolver
40
40
41
-
In your Resource Group, deploy the Private DNS Resolver.
41
+
In the Resource Group, deploy the Private DNS Resolver.
42
42
43
-
1.Click create.
44
-
2. In the Search the Marketplace field, type Private DNS Resolver and click enter.
45
-
3.Click create for the Private DNS Resolver.
46
-
4. Ensure the Subscription, Resource group, and Region fields are correct. Enter a name and choose your Virtual Network. This network must be the same as where you deployed your private cloud, then click Next: Inbound Endpoints.
47
-
5.Click Add an Endpoint, enter a name for the Inbound endpoint, such as dns-in and select the subnet for the DNS inbound endpoint and click Save.
48
-
6.Click Next: Outbound Endpoints.
49
-
7.Click Add an Endpoint, enter a name for the Outbound endpoint, such as dns-out and select the subnet for the DNS outbound endpoint and click Save.
50
-
8.Click Next: Ruleset.
51
-
9.Click Next: Tags.
52
-
10.Click Next: Review + Create.
53
-
11. When the Validation passes, click create.
43
+
1.Select Create.
44
+
2. In the Search the Marketplace field, type Private DNS Resolver and select enter.
45
+
3.Select Create for the Private DNS Resolver.
46
+
4. Ensure the Subscription, Resource group, and Region fields are correct. Enter a name and choose your Virtual Network. This network must be the same as where you deployed your private cloud, then select Next: Inbound Endpoints.
47
+
5.Select Add an Endpoint, enter a name for the Inbound endpoint, such as dns-in and select the subnet for the DNS inbound endpoint and select Save.
48
+
6.Select Next: Outbound Endpoints.
49
+
7.Select Add an Endpoint, enter a name for the Outbound endpoint, such as dns-out and select the subnet for the DNS outbound endpoint and select Save.
50
+
8.Select Next: Ruleset.
51
+
9.Select Next: Tags.
52
+
10.Select Next: Review + Create.
53
+
11. When the Validation passes, select Create.
54
54
55
-
You can now resolve your private cloud DNS records from any workload using the Inbound endpoint of the Azure DNS Private Resolver as it’s DNS server. You should now create a conditional forwarder in your on-premesis DNS server and point it to the Inbound Endpoint of the Azure DNS Private Resolver to allow DNS resolution of your private cloud from your corporate network.
55
+
You can now resolve private cloud DNS records from any workload using the Inbound endpoint of the Azure DNS Private Resolver as it’s DNS server. You should now create a conditional forwarder in your on-premises DNS server and point it to the Inbound Endpoint of the Azure DNS Private Resolver to allow DNS resolution of the private cloud from your corporate network.
56
56
57
-
### Enable Resolution for private cloud Workload Virtual Machines
57
+
### Enable Resolution for private cloud workload virtual machines
58
58
59
-
If you need workload Virtual Machines deployed in your private cloud to resolve the private cloud management components you must add a forwarder to VMware NSX.
59
+
If you need workload virtual machines deployed in your private cloud to resolve the private cloud management components you must add a forwarder to VMware NSX.
60
60
61
61
1. In your Resource group, open your private cloud.
62
-
2. Expand Workload Networking and click on DNS.
63
-
3.Click the Add button, select FQDN zone, enter your private cloud’s DNS zone name and Domain, for IP address enter the IP address of the inbound endpoint of your Azure DNS Private Resolver and click OK.
64
-
4.Click on DNS Service.
65
-
5.Click Edit.
66
-
6. Select the zone you just created in the FQDN zones dropdown and click OK.
67
-
68
-
Your workload Virtual Machines can now resolve the private cloud management components.
62
+
2. Expand Workload Networking and select DNS.
63
+
3.Select the Add button, select FQDN zone, enter your private cloud’s DNS zone name and Domain. For IP address enter the IP address of the inbound endpoint of your Azure DNS Private Resolver and select OK.
64
+
4.Select DNS Service.
65
+
5.Select Edit.
66
+
6. Select the zone you just created in the FQDN zones dropdown and select OK.
67
+
68
+
Your workload virtual machines can now resolve the private cloud management components.
69
69
70
70
## Related topics
71
71
-[Connectivity to an Azure Virtual Network](native-network-connectivity.md)
0 commit comments