Skip to content

Commit 5d79921

Browse files
committed
Sub table format for outside network config
1 parent eb69f2f commit 5d79921

File tree

1 file changed

+13
-3
lines changed

1 file changed

+13
-3
lines changed

articles/databox-online/azure-stack-edge-gpu-manage-access-power-connectivity-mode.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,20 +113,30 @@ You can now connect to the PowerShell interface of the device over HTTP. For det
113113

114114
## Enable device access from outside network
115115

116-
If a user needs to be able to connect to the Azure Stack Edge appliance from an outside network, you'll need this network configuration:
116+
To be able to connect to your Azure Stack Edge device from an outside network, make sure the network for your laptop and the network for the device meet the following requirements.
117+
118+
| Traffic direction | Out-of-network requirements |
119+
|--------------------|-----------------------------|
120+
| Outbound to laptop |On the network for the Azure Stack Edge device:<ul><li>Configure the correct gateways on the device to enable traffic to reach the laptop’s network.</li><li>If you configure multiple gateways on the device, ensure that traffic can reach your laptop's network on all gateways.<br>A device ideally tries to use the network interface card (NIC) with the lowest route metric. However, there's no clear way for an Azure Stack Edge device to identify the NIC with the lowest metric. So it's best to make your laptop network reachable on all configured gateways.</li></ul>|
121+
|Inbound to device |On the network for your laptop:<ul><li>Configure a clear network route from the laptop to the network for the device, possibly through defined gateways.</li></ul>|
122+
123+
> [!NOTE]
124+
> Diagnostic tests for Azure Stack Edge return a warning if all gateways don't have internet connectivity. For diagnostics information, see [Run diagnostics](azure-stack-edge-gpu-troubleshoot.md#run-diagnostics).
125+
126+
<!--ORIGINAL PRESENTATION: If a user needs to be able to connect to the Azure Stack Edge appliance from an outside network, you'll need this network configuration:
117127
118128
- **In-bound traffic:** For in-bound traffic from the customer's laptop (in network A) to the appliance (in network B), network A should have a clear route to network B, possibly through defined gateways.
119129
120130
- **Outbound traffic:** For outbound traffic from the appliance to the customer's laptop (network B to network A):
121131
122-
- Configure the correct <!--What's meant by "correct"? Clarify, or remove "correct"?--> gateways on the appliance so that traffic can reach network A.
132+
- Configure the correct gateways on the appliance so that traffic can reach network A.
123133
124134
- If you configure multiple gateways on the appliance, ensure that traffic can reach network B on all gateways.
125135
126136
An appliance ideally tries to use the network interface card (NIC) with the lowest route metric. However, there's no clear way for an Azure Stack Edge appliance to identify the NIC with the lowest metric. So it's best to make network A reachable on all configured gateways.
127137
128138
> [!NOTE]
129-
> Diagnostic tests for Azure Stack Edge return a warning if all gateways don't have internet connectivity. For diagnostics information, see [Run diagnostics](azure-stack-edge-gpu-troubleshoot.md#run-diagnostics). <!--Terminology creep: This is the first reference to internet connectivity.-->
139+
> Diagnostic tests for Azure Stack Edge return a warning if all gateways don't have internet connectivity. For diagnostics information, see [Run diagnostics](azure-stack-edge-gpu-troubleshoot.md#run-diagnostics). Terminology creep: This is the first reference to internet connectivity.-->
130140

131141

132142
## Manage resource access

0 commit comments

Comments
 (0)