You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/oracle/oracle-db/oracle-database-network-plan.md
+29-6Lines changed: 29 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,20 +80,43 @@ The following table describes required configurations of supported network featu
80
80
|Connectivity from an Oracle database cluster to a [private endpoint](../../private-link/private-endpoint-overview.md) in a different spoke virtual network connected to a virtual WAN|Yes| Yes|
81
81
|NSG support on the Private link | No| Yes|
82
82
| Connectivity to serverless Apps like Azure functions via private endpoints | No| Yes|
83
+
| Azure SLB and ILB support for Oracle database cluster traffic | No | No |
83
84
|Dual stack (IPv4 and IPv6) virtual network|Only IPv4 is supported| Only IPv4 is supported|
84
85
| Service tags support| No | Yes |
85
86
86
87
> [!NOTE]
87
88
> When using NSGs (Network Security Groups) on the Azure side, ensure that any security rules configured on the Oracle (OCI) side are reviewed to avoid conflicts. While applying security policies on both Azure and OCI can enhance the overall security posture, it also introduces additional complexity in terms of management and requires careful manual synchronization between the two environments. Misalignment between these policies could lead to unintended access issues or operational disruptions.
88
89
89
-
> [!IMPORTANT]
90
-
> For traffic destined to Oracle Database@Azure, when routing traffic through a Network Virtual Appliance (NVA) or firewall to Oracle Database@Azure, the UDR prefix must be at least as specific as the delegated subnet of the instance.
91
-
> If the delegated subnet for your instance is x.x.x.x/27, configure the UDR on the Gateway Subnet as:
92
-
> x.x.x.x/27 (same as the subnet) ✅
93
-
> x.x.x.x/32 (more specific) ✅
94
-
> x.x.x.x/24 (too broad) ❌
95
90
91
+
### UDR requirements for routing traffic to Oracle Database@Azure
92
+
When routing traffic to Oracle Database@Azure through a Network Virtual Appliance (NVA)/firewall, the User-Defined Route (UDR) prefix **must be at least as specific as the subnet delegated to the Oracle Database@Azure instance**. Broader prefixes may cause traffic to be dropped.
93
+
94
+
If the delegated subnet for your instance is x.x.x.x/27, configure the UDR on the Gateway Subnet as:
95
+
| Route Prefix | Routing Outcome |
96
+
|--------------|-----------------|
97
+
|x.x.x.x/27 | (same as the subnet) ✅ |
98
+
|x.x.x.x/32 |(more specific) ✅|
99
+
|x.x.x.x/24 | (too broad) ❌ |
96
100
101
+
#### Topology-specific guidance
102
+
**Hub-and-spoke topology**
103
+
- Define the UDR on the gateway subnet.
104
+
- Use a route prefix of `x.x.x.x/27` or more specific.
105
+
- Set the next hop to your NVA/Firewall.
106
+
107
+
**Virtual WAN (VWAN)**
108
+
-**With Routing Intent**:
109
+
- Add the delegated subnet prefix (`x.x.x.x/27`) to the Routing Intent’s list of prefixes.
110
+
111
+
-**Without Routing Intent**:
112
+
- Add a route to the VWAN's route table for `x.x.x.x/27` and point the next hop to the NVA/firewall.
113
+
114
+
> [!Note]
115
+
> When **advanced network features are not enabled**, and for **traffic originating from the Oracle Database@Azure delegated subnet that needs to traverse a gateway** (for example, to reach on-premises networks, AVS, other clouds, etc.), you must configure specific UDRs on the delegated subnet.
116
+
>These UDRs should define the specific destination IP prefixes and set the next hop to the appropriate NVA/firewall in the hub.
117
+
> Without these routes, outbound traffic may bypass required inspection paths or fail to reach the intended destination.
0 commit comments