Skip to content

Commit 39b4c67

Browse files
committed
Add information for 3rd party firewall
1 parent 41b3173 commit 39b4c67

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -136,9 +136,6 @@ The architecture would look like:
136136
>[!TIP]
137137
>Where possible, use [Service tags](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) to reduce the complexity of the Azure Firewall rules.
138138
139-
>[!TIP]
140-
>If using third party firewall, make sure the firewall configuration allows outbound connectivity to Azure management API: `https://management.azure.com` and `https://login.microsoftonline.com`
141-
142139
### Deployment steps
143140

144141
1. The deployment steps assume that you already have Virtual network and subnet defined for your VMs.
@@ -221,6 +218,10 @@ To allow pacemaker to communicate with the Azure management API, perform the fol
221218
sudo pcs property set maintenance-mode=false
222219
```
223220

221+
## Other solutions
222+
223+
If outbound traffic is routed via third party firewall, make sure the firewall configuration allows outbound connectivity to the Azure management API: `https://management.azure.com` and `https://login.microsoftonline.com`.
224+
224225
## Next steps
225226

226227
* [Learn how to configure Pacemaker on SUSE in Azure](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-suse-pacemaker)

0 commit comments

Comments
 (0)