You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-about-networking.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: About networking in Azure VM disaster recovery with Azure Site Recovery
2
+
title: About networking in Azure VM disaster recovery with Azure Site Recovery
3
3
description: Provides an overview of networking for replication of Azure VMs using Azure Site Recovery.
4
4
services: site-recovery
5
5
author: sujayt
@@ -41,7 +41,7 @@ Typically, networks are protected using firewalls and network security groups (N
41
41
If you are using a URL-based firewall proxy to control outbound connectivity, allow these Site Recovery URLs:
42
42
43
43
44
-
**URL** | **Details**
44
+
**URL** | **Details**
45
45
--- | ---
46
46
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
47
47
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
@@ -50,11 +50,11 @@ login.microsoftonline.com | Required for authorization and authentication to the
50
50
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
51
51
*.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
52
52
53
-
## Outbound connectivity for IP address ranges
53
+
## Outbound connectivity using Service Tags
54
54
55
55
If you are using an NSG to control outbound connectivity, these service tags need to be allowed.
56
56
57
-
-All IP address ranges that correspond to the storage accounts in source region
57
+
-For the storage accounts in source region:
58
58
- Create a [Storage service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for the source region.
59
59
- Allow these addresses so that data can be written to the cache storage account, from the VM.
60
60
- Create a [Azure Active Directory (AAD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to AAD
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-troubleshoot-replication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ Following are some of the most common issues.
93
93
94
94
#### Known issue in SQL Server 2016 and 2017
95
95
96
-
**How to fix**: Refer to the article [Error occurs when you back up a virtual machine with non-component based backup in SQL Server 2016 and 2017](https://support.microsoft.com/help/4493364/fix-error-occurs-when-you-back-up-a-virtual-machine-with-non-component).
96
+
**How to fix**: Refer to the article [Error occurs when you back up a virtual machine with non-component based backup in SQL Server 2016 and 2017](https://support.microsoft.com/en-us/help/4508218/cumulative-update-16-for-sql-server-2017).
97
97
98
98
#### You're using Azure Storage Spaces Direct Configuration
0 commit comments