Skip to content

Commit 468158e

Browse files
authored
Merge pull request #98341 from yash177/patch-3
Update enable-public-ip-nsx-edge.md
2 parents 3827cfa + 250cd91 commit 468158e

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ There are three options for configuring your reserved Public IP down to the NSX
6767
A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT) is used to allow many VMs to one SNAT service. This connection means you can provide Internet connectivity for many VMs.
6868

6969
>[!IMPORTANT]
70-
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-nat-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
70+
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-network-address-tranlation-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
7171
7272
**Add rule**
7373
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
@@ -89,15 +89,15 @@ A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT)
8989
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
9090
[NSX-T NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
9191

92-
### No NAT rule for specific address ranges
93-
94-
A No NAT rule can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass the NAT rule.
92+
### No Network Address Tranlation rule for specific address ranges
9593

94+
A No SNAT rule in NSX manager can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass existing network translation rules.
9695
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**.
97-
2. Locate your NSX-T URL and credentials.
98-
3. Log in to **VMWare NSX-T** and then select **NAT Rules**.
96+
1. Locate your NSX-T URL and credentials.
97+
1. Log in to **VMWare NSX-T** and then select **NAT Rules**.
9998
1. Select the T1 Router and then select **ADD NAT RULE**.
100-
1. The **Source IP** is the range of addreses you do not want to be translated and **Destination IP** is the range of IP addresses that you do not want the "Source IP" to reach.
99+
1. Select **NO SNAT** rule as the type of NAT rule.
100+
1. Select the **Source IP** as the range of addresses you do not want to be translated. The **Destination IP** should be any internal addresses you are reaching from the range of Source IP ranges.
101101
1. Select **SAVE**.
102102

103103
### Inbound Internet Access for VMs

0 commit comments

Comments
 (0)