Skip to content

Commit 4fe33f1

Browse files
authored
Update nat-overview.md
1 parent 8a2a743 commit 4fe33f1

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

articles/virtual-network/nat-gateway/nat-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,25 @@ Virtual Network NAT is a fully managed and highly resilient Network Address Tran
2222

2323
## VNet NAT benefits
2424

25-
* Fully managed, highly resilient - NAT is fully scaled out from the start. There's no ramp up or scale-out operation required. Azure manages the operation of NAT for you. NAT always has multiple fault domains and can sustain multiple failures without service outage.
26-
* Static IP addresses for outbound-only
25+
### Security
26+
With NAT, individual VMs (or other compute resources) do not need public IP addresses and can remain fully private. Such resources without a public IP address can still reach external sources outside the VNet. You can also associate a Public IP Prefix to ensure that a contiguous set of IPs will be used for outbound. Destination firewall rules can be then configured based on this predictable IP list.
27+
28+
### Resiliency
29+
NAT is a fully managed and distributed service. It doesn't depend on any individual compute instances such as VMs or a single physical gateway device. It levergaes software defined networking making it highly resilient.
30+
31+
### Scalability
32+
NAT can be associated to a subnet and can be used by all compute resources in that subnet. Further, all subnets in a VNet can leverage the same resource. When associated to a Public Ip Prefix, it will automatically scale to the number of IP addresses needed for outbound.
33+
34+
### Performance
35+
NAT will not impact the network bandwidth of your compute resources since it is a software defined networking service. Learn more about [NAT gateway's performance](nat-gateway-resource.md#performance).
2736

2837

2938
## VNet NAT basics
3039

3140
NAT can be created in a specific Availability Zone and has redundancy built in within the specificed zone. NAT is non zonal by default. When creating [availability zones](../../availability-zones/az-overview.md) scenarios, NAT can be isolated in a specific zone. This is known as a zonal deployment.
3241

42+
NAT is fully scaled out from the start. There's no ramp up or scale-out operation required. Azure manages the operation of NAT for you. NAT always has multiple fault domains and can sustain multiple failures without service outage.
43+
3344
* Outbound connectivity can be defined for each subnet with NAT. Multiple subnets within the same virtual network can have different NATs. A subnet is configured by specifying which NAT gateway resource to use. All outbound traffic for the subnet is processed by NAT automatically without any customer configuration. User-defined routes aren't necessary. NAT takes precedence over other outbound scenarios and replaces the default Internet destination of a subnet.
3445
* NAT supports TCP and UDP protocols only. ICMP is not supported.
3546
* A NAT gateway resource can use a:

0 commit comments

Comments
 (0)