Skip to content

Commit 18bab1e

Browse files
authored
Update concepts-design-public-internet-access.md
1 parent 4673f30 commit 18bab1e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/azure-vmware/concepts-design-public-internet-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ There are three primary patterns for creating outbound access to the Internet fr
1212

1313
- [Internet Service hosted in Azure](#internet-service-hosted-in-azure)
1414
- [Azure VMware Solution Managed SNAT](#azure-vmware-solution-managed-snat)
15-
- [Public IP to NSX edge](#public-ip-to-nsx-edge)
15+
- [Azure Public IPv4 address to NSX-T Data Center Edge](#azure-public-ipv4-address-to-nsx-t-data-center-edge)
1616

1717
Your requirements for security controls, visibility, capacity, and operations drive the selection of the appropriate method for delivery of Internet access to the Azure VMware Solution private cloud.
1818

@@ -41,7 +41,7 @@ A Managed SNAT service provides a simple method for outbound internet access fro
4141
- Two Public IPs are used and rotated to support up to 128k simultaneous outbound connections.
4242
- No inbound DNAT capability is available with the Azure VMware Solution Managed SNAT.
4343

44-
## Public IP to NSX Edge
44+
## Azure Public IPv4 address to NSX-T Data Center Edge
4545

4646
This option brings an allocated Azure Public IPv4 address directly to the NSX-T Data Center Edge for consumption. It allows the Azure VMware Solution private cloud to directly consume and apply public network addresses in NSX-T Data Center as required. These addresses are used for the following types of connections:
4747
- Outbound SNAT

0 commit comments

Comments
 (0)