Skip to content

Commit 46dab05

Browse files
committed
Add information for 3rd party firewall
1 parent 8e3e81b commit 46dab05

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: vm-windows
1616
ms.workload: infrastructure-services
17-
ms.date: 02/07/2020
17+
ms.date: 05/12/2020
1818
ms.author: radeltch
1919

2020
---
@@ -136,6 +136,9 @@ The architecture would look like:
136136
>[!TIP]
137137
>Where possible, use [Service tags](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) to reduce the complexity of the Azure Firewall rules.
138138
139+
>[!TIP]
140+
>If using third party firewall, make sure the firewall configuration allows outbound connectivity to Azure management API: `https://management.azure.com` and `https://login.microsoftonline.com`
141+
139142
### Deployment steps
140143

141144
1. The deployment steps assume that you already have Virtual network and subnet defined for your VMs.
@@ -174,7 +177,7 @@ You could use proxy to allow Pacemaker calls to the Azure management API public
174177
### Important considerations
175178

176179
- If there is already corporate proxy in place, you could route outbound calls to public end points through it. Outbound calls to public end points will go through the corporate control point.
177-
- Make sure the proxy configuration allows outbound connectivity to Azure management API: `https://management.azure.com`
180+
- Make sure the proxy configuration allows outbound connectivity to Azure management API: `https://management.azure.com` and `https://login.microsoftonline.com`
178181
- Make sure there is a route from the VMs to the Proxy
179182
- Proxy will handle only HTTP/HTTPS calls. If there is additional need to make outbound calls to public end point over different protocols (like RFC), alternative solution will be needed
180183
- The Proxy solution must be highly available, to avoid instability in the Pacemaker cluster

0 commit comments

Comments
 (0)