Skip to content

Commit 2c824f1

Browse files
authored
Merge pull request #97546 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 8e35712 + 46abcde commit 2c824f1

File tree

3 files changed

+7
-3
lines changed

3 files changed

+7
-3
lines changed

articles/azure-government/compliance/secure-azure-computing-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ We recommend this architecture because it meets SCCA requirements. It’s highly
152152

153153
## Automated SACA deployment options
154154

155-
As previously mentioned, Microsoft has partnered with two vendors to create an automated SACA infrastructure template. Both templates deploy the following Azure components:
155+
As previously mentioned, Microsoft has partnered with two vendors to create an automated SACA infrastructure template. Both templates deploy the following Azure components:
156156

157157
- SACA virtual network
158158
- Management subnet

articles/bastion/bastion-nsg.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,8 @@ If you create and apply an NSG to ***AzureBastionSubnet***, make sure you have a
5353
* **Diagnostics logging and others:** Outbound on 443 to AzureCloud. Regional tags within this service tag are not supported yet.
5454
* **Target VM:** Outbound for 3389 and 22 to VirtualNetwork
5555

56-
An NSG rule example is available for reference in this [quickstart template](https://github.com/Azure/azure-quickstart-templates/tree/master/101-azure-bastion).
56+
An NSG rule example is available for reference in this [quickstart template](https://github.com/Azure/azure-quickstart-templates/tree/master/101-azure-bastion-nsg).
5757

5858
## Next steps
5959

60-
For more information about Azure Bastion, see the [FAQ](bastion-faq.md).
60+
For more information about Azure Bastion, see the [FAQ](bastion-faq.md).

includes/bastion-faq-include.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,3 +51,7 @@ A session should be initiated only from the Azure portal. Sign in to the Azure p
5151

5252
Azure Bastion currently supports en-us-qwerty keyboard layout inside the VM. Support for other locales for keyboard layout is work in progress.
5353

54+
### <a name="udr"></a>Is user-defined routing (UDR) supported on an Azure Bastion subnet?
55+
56+
No. UDR is not supported on an Azure Bastion subnet.
57+
For scenarios that include both Azure Bastion and Azure Firewall/Network Virtual Appliance (NVA) in the same virtual network, you don’t need to force traffic from an Azure Bastion subnet to Azure Firewall because the communication between Azure Bastion and your VMs is private. For more details, see [Accessing VMs behind Azure Firewall with Bastion](https://azure.microsoft.com/blog/accessing-virtual-machines-behind-azure-firewall-with-azure-bastion/).

0 commit comments

Comments
 (0)