Skip to content

Commit 49aa67b

Browse files
committed
fix links
1 parent 586ae4c commit 49aa67b

File tree

3 files changed

+2
-9
lines changed

3 files changed

+2
-9
lines changed

articles/load-balancer/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,6 @@ landingContent:
6868
url: load-balancer-multivip-overview.md
6969
- linkListType: how-to-guide
7070
links:
71-
- text: Configure load balancing and outbound rules in Load Balancer (Azure CLI)
72-
url: ./quickstart-load-balancer-standard-public-cli.md#create-outbound-rule-configuration
7371
- text: Create an Internet facing load balancer with IPv6 (PowerShell)
7472
url: load-balancer-ipv6-internet-ps.md
7573
- text: Configure the distribution mode

articles/site-recovery/azure-to-azure-troubleshoot-network-connectivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Try to access the DNS server from the virtual machine. If the DNS server isn't a
4646
### Issue 2: Site Recovery configuration failed (151196)
4747

4848
> [!NOTE]
49-
> If the VMs are behind a **Standard** internal load balancer, by default, it wouldn't have access to the Microsoft 365 IPs such as `login.microsoftonline.com`. Either change it to **Basic** internal load balancer type or create outbound access as mentioned in the article [Configure load balancing and outbound rules in Standard Load Balancer using Azure CLI](../load-balancer/quickstart-load-balancer-standard-public-cli.md?tabs=option-1-create-load-balancer-standard#create-outbound-rule-configuration).
49+
> If the VMs are behind a **Standard** internal load balancer, by default, it wouldn't have access to the Microsoft 365 IPs such as `login.microsoftonline.com`. For outbound access create an Azure NAT gateway. For more information see [Tutorial: Create a NAT gateway - Azure CLI](../virtual-network/nat-gateway/tutorial-create-nat-gateway-cli.md).
5050
5151
#### Possible cause
5252

articles/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -94,12 +94,7 @@ The configuration would look like:
9494
2. Create Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
9595
1. Select the Virtual network
9696
1. Select the VMs and their IP addresses and add them to the backend pool
97-
3. [Create outbound rules](../../../load-balancer/quickstart-load-balancer-standard-public-cli.md?tabs=option-1-create-load-balancer-standard%3ftabs%3doption-1-create-load-balancer-standard#create-outbound-rule-configuration). Currently it is not possible to create outbound rules from the Azure portal. You can create outbound rules with [Azure CLI](../../../cloud-shell/overview.md).
98-
99-
```azurecli
100-
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
101-
```
102-
97+
3. Create a NAT gateway. For more information see [Tutorial: Create a NAT gateway - Azure CLI](../virtual-network/nat-gateway/tutorial-create-nat-gateway-cli.md).
10398
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to enable access to the Azure management API:
10499
1. Navigate to the Network Security Group
105100
1. Click Outbound Security Rules

0 commit comments

Comments
 (0)