You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/modeling-simulation-workbench/concept-connector.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.date: 01/01/2023
12
12
---
13
13
# Connectors in Azure Modeling and Simulation Workbench
14
14
15
-
Connectors define the network access method between users and the Azure Modeling and Simulation Workbench chamber. Connectors support connectivity through allowlisted public IPs, VPN, or Azure ExpressRoute. A chamber can have only one connector configured at a time. Connectors also configure copy-paste functionality into chamber VMs. Connector types are immutable and once created can't be changed to another access model. Connectors are part of the Idle mode setting to reduce cost.
15
+
Connectors define the network access method between users and the Azure Modeling and Simulation Workbench chamber. Connectors support connectivity through allowlisted public IPs, VPN, or Azure ExpressRoute. A chamber can have only one connector configured at a time. Connectors also configure copy-paste functionality for all workload VMs in the chamber. Connector types are immutable and once created can't be changed to another access model. Connectors are part of the Idle mode setting that reduce cost.
16
16
17
17
## Public IP access via allowlist
18
18
@@ -30,7 +30,7 @@ A VPN connector can be created which deploys infrastructure specifically for VPN
30
30
31
31
[Azure ExpressRoute](/azure/expressroute/expressroute-introduction) provides secure, dedicated, encrypted connectivity from on-premises to an Azure landing zone. A Workbench Owner must create a connector expressly for ExpressRoute, providing the necessary virtual network, supporting network infrastructure, and peer the appropriate vnets.
32
32
33
-
## Next step
33
+
## Resources
34
34
35
-
> [!div class="nextstepaction"]
36
-
>[Create a connector](./how-to-guide-set-up-networking.md)
35
+
*[Create a public connector](./how-to-guide-public-network.md)
36
+
*[Create a private network connector](./how-to-guide-private-network.md)
title: "Networking: Azure Modeling and Simulation Workbench"
3
+
description: About networking architecture in the Azure Modeling and Simulation Workbench.
4
+
author: yousefi-msft
5
+
ms.author: yousefi
6
+
ms.service: modeling-simulation-workbench
7
+
ms.topic: concept-article
8
+
ms.date: 10/13/2024
9
+
10
+
#CustomerIntent: As an administrator, I want to understand the networking architecture and capabilities in Azure Modeling and Simulation Workbench.
11
+
---
12
+
13
+
# Networking overview
14
+
15
+
The Modeling and Simulation Workbench is a managed, cloud-based platform-as-a-service (PaaS) with an isolated network infrastructure. [Chambers](./concept-chamber.md) are designed for confidentiality and each is a self-contained, private work environment. No connections to the internet or to other chambers are possible. The network allows only remote desktop connections to chamber virtual machines (VM). No file mounts, SSH, or custom connections are possible from or into a chamber.
16
+
17
+
This article provides an overview of the Modeling and Simulation Workbench network architecture and provides references to guides for managing those resources.
18
+
19
+
## Chamber networking
20
+
21
+
[Chambers](./concept-chamber.md) are isolated environments where users in the same enterprise or organization can collaborate. Every virtual machine in the same chamber is connected to the same subnet and can directly communicate to other VMs in the same chamber. Chamber VMs can't communicate with the internet, VMs in other chambers, or on-premises infrastructure. Chamber-to-chamber communication is only achieved using [shared storage](./concept-storage.md#workbench-tier-shared-storage). Virtual machines can only be connected to using a specially provisioned remote desktop client.
22
+
23
+
### Desktop service
24
+
25
+
A remote desktop client is required to communicate with chamber VMs. Users can't initiate SSH connections to VMs from outside a chamber, but can SSH between VMs after connecting to the desktop service. The desktop client prohibits file shares, printer, and removable storage access. Refer to the [Quickstart: Connect to desktop](quickstart-connect-desktop.md) article to learn how to connect to a VM.
26
+
27
+
### Chamber license service
28
+
29
+
Every chamber has its own [license service](./concept-license-service.md). License servers are automatically provisioned with each chamber for the four major Electronic Design Automation (EDA) vendors. The license servers are only accessible by VMs from within the chamber and can't integrate with license servers in other chambers or on-premises license servers.
30
+
31
+
### Red Hat package repository
32
+
33
+
Azure maintains a private mirror of the official Red Hat Update Infrastructure (RHUI). Chamber VMs can access the Azure RHUI using the Red Hat's `yum` and `dnf` package managers to install packages distributed in the official mirrors. Learn more about Red Hat package management at [Linux package management with YUM and RPM](https://www.redhat.com/sysadmin/how-manage-packages) on the Red Hat site.
34
+
35
+
### Firewalls
36
+
37
+
The Modeling and Simulation Workbench provides the standard Azure Red Hat Enterprise Linux (RHEL) 8.8 image, with only a few modifications. The `firewalld` daemon, shipped and enabled by default on all RHEL 8.8 images, remains enabled in Modeling and Simulation Workbench chamber VMs.
38
+
39
+
> [!IMPORTANT]
40
+
> The `firewalld` service might block communications for applications and services not installed via a Red Hat package or package manager. Refer to the application's documentation and the guide to [configure firewalls](how-to-guide-configure-firewall-red-hat.md) on how to manage firewall rules. Modifying firewalls on individual VMs won't enable access to VMs located in the other chambers or on-premises infrastructure.
41
+
42
+
## Connectors
43
+
44
+
[Connectors](concept-connector.md) are connectivity resources associated with chambers and configure networking access to a chamber from outside a workbench. Connectors are created either as public IP or private network connector. [Public IP](./how-to-guide-public-network.md) connectors allow access to your chamber from the internet and control access via an IP address allowlist. [Private network](./how-to-guide-private-network.md) connectors create network endpoints on virtual network in your subscription and require you to peer with another virtual network, such as virtual private network (VPN) gateway.
45
+
46
+
## Storage and data pipelines
47
+
48
+
There are several types and tiers of [storage](./concept-storage.md) in the Modeling and Simulation Workbench. Storage local to a VM, [chamber storage](./how-to-guide-manage-chamber-storage.md), and [shared storage](./how-to-guide-manage-shared-storage.md) are accessible outside of a chamber. Storage volumes can't be mounted or accessed from the internet or on-premises infrastructure.
49
+
50
+
The [data pipeline](./concept-data-pipeline.md) is the only means of [exporting](./how-to-guide-download-data.md) or [importing](./how-to-guide-upload-data.md) into a workbench. With public networking connectors, the connector defines what IP addresses can use the data pipeline.
51
+
52
+
## Related content
53
+
54
+
*[Import data into Azure Modeling and Simulation Workbench](how-to-guide-upload-data.md)
55
+
*[Export data from Azure Modeling and Simulation Workbench](how-to-guide-download-data.md)
56
+
*[Configure firewalls in Red Hat](how-to-guide-configure-firewall-red-hat.md)
57
+
*[Set up a public IP network connector](how-to-guide-public-network.md)
58
+
*[Set up a private networking connector](how-to-guide-private-network.md)
Copy file name to clipboardExpand all lines: articles/modeling-simulation-workbench/how-to-guide-private-network.md
+39-14Lines changed: 39 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "Create a private network connector: Azure Modeling and Simulation Workbench"
3
-
description: Learn how to deploy a connector on a private virtual network.
3
+
description: Learn how to deploy a private connector for a virtual private network.
4
4
author: yousefi-msft
5
5
ms.author: yousefi
6
6
ms.service: modeling-simulation-workbench
@@ -38,7 +38,7 @@ Before you create a [connector](./concept-connector.md) for private IP networkin
38
38
39
39
## Create the private network connector
40
40
41
-
Each chamber can have only one connector. If you have a public IP connector or other type already associated with the target chamber, you must first [delete the connector](#cleaning-up-resources). In the chamber where you want to create a private network connector:
41
+
Each chamber can have only one connector. If you have a public IP connector or other type already associated with the target chamber, you must first [delete the connector](#delete-a-connector). In the chamber where you want to create a private network connector:
42
42
43
43
1. Select the **Connector** option in the **Settings** at the left.
44
44
:::image type="content" source="media/howtoguide-private-network/chamber-select-connector.png" alt-text="Screenshot of chamber overview with Connector option outlined in red rectangle.":::
@@ -53,12 +53,10 @@ Each chamber can have only one connector. If you have a public IP connector or o
53
53
1. Select **Review + create**.
54
54
1. If validation passes, select **Create**. Private networking connectors take approximately 30 minutes to deploy.
55
55
56
-
## Deployed resources
56
+
## Network interfaces and private endpoints
57
57
58
58
When the Modeling and Simulation Workbench creates a private connector, it deploys the following resources in the same resource group and location as the workbench.
59
59
60
-
### Network interfaces and private endpoints
61
-
62
60
Six [network interfaces](/azure/virtual-network/virtual-network-network-interface) (NIC) and corresponding [private endpoints](/azure/private-link/private-endpoint-overview) are created. The NICs are all joined to the private virtual network and subnet specified during setup and given an address on the subnet. The private endpoint connects the NIC to Modeling and Simulation resources hosted in the Microsoft managed environment. The resulting connection becomes part of an [Azure Private Link](/azure/private-link/private-link-overview) service.
63
61
64
62
* Two connections are created for connection nodes. As users and virtual machines (VM) are added to a chamber, more connection nodes are created.
@@ -67,21 +65,48 @@ Six [network interfaces](/azure/virtual-network/virtual-network-network-interfac
67
65
* One connection for load balancer.
68
66
* One connection for user authentication services.
69
67
70
-
###DNS zones
68
+
## DNS zones
71
69
72
70
Modeling and Simulation Workbench creates three private domain name service (DNS) zones for a private network deployment. Each zone corresponds to one of the workbench services for file uploading, file downloading, and desktop connections. No DNS server is created. Administrators must join the zones to their own services.
| Data in pipeline endpoint | privatelink.blob.core.windows.net | privatelink.blob.core.usgovcloudapi.net |
76
+
| Data out pipeline endpoint | privatelink.file.core.windows.net | privatelink.blob.core.usgovcloudapi.net |
77
+
78
+
## Ports and IP addresses
79
+
80
+
### Ports and protocols
81
+
82
+
The Azure Modeling and Simulation Workbench require certain ports to be accessible from users workstation. Firewalls and VPNs might block access on these ports to certain destinations, when accessed from certain applications, or when connected to different networks. Check with your system administrator to ensure your client can access the service from all your work locations. All traffic to the chamber passes through the connector and the virtual network gateway or peer. Administrators can choose to implement a firewall or network security group to restrict traffic.
83
+
84
+
***53/TCP** and **53/UDP**: DNS queries.
85
+
***443/TCP**: Standard https port for accessing the VM dashboard and any Azure portal page.
86
+
***5510/TCP**: Used by the ETX client to provide VDI access for both the native and web-based client.
87
+
***8443/TCP**: Used by the ETX client to negotiate and authenticate to ETX management nodes.
88
+
89
+
### IP addresses
90
+
91
+
The private network connector doesn't deploy any public IP network interfaces or gateways. You must create your own gateway interface if connecting directly from the internet or peer the virtual network to another. The region you deploy your gateway interface to determines from which pool of Azure public IP addresses your gateway IP is chosen. Azure IP addresses are taken from Azure's IP ranges for the location in which the Workbench was deployed. A list of all Azure IP addresses and Service tags is available at [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519&msockid=1b155eb894cc6c3600a84ac5959a6d3f).
92
+
93
+
The private IP addresses for the private networking connector are implemented as private network interface connections (NIC) on the virtual network's subnet you specified during initial deployment.
94
+
95
+
Unlike the public connector, the network interfaces are deployed into your customer subscription and you can associate a network security group (NSG) with the interfaces, the virtual network, or configure a firewall on the virtual network or gateway.
96
+
97
+
## Immediately terminate access
98
+
99
+
Access to the chambers can be immediately terminated by [stopping the connector](./how-to-guide-start-stop-restart.md).
100
+
101
+
## Idle the connector
102
+
103
+
Idle mode sets the chambers into a preserved, but inactive state. Costs are reduced while still maintaining your configuration and settings. Learn more about idle mode in the [Manage chamber idle mode](how-to-guide-chamber-idle.md) article.
79
104
80
-
## Starting, stopping, or restarting a connector
105
+
## Start, stop, or restart a connector
81
106
82
-
Connectors are controllable resources that can be stopped, started, restarted as needed. Instructions on how to are included in [Start, stop, and restart chambers, connectors, and VMs](how-to-guide-start-stop-restart.md). Stopping or restarting the connector interrupts desktop services for all users of the chamber. Stopping the connector is required to [idle a chamber](how-to-guide-chamber-idle.md) to reduce consumption costs.
107
+
Connectors are controllable resources that can be stopped, started, restarted as needed. Instructions on how to are included in [Start, stop, and restart chambers, connectors, and VMs](how-to-guide-start-stop-restart.md). Stopping or restarting the connector interrupts desktop services and data pipelines for all users of the chamber. Stopping the connector is required to [idle a chamber](how-to-guide-chamber-idle.md) to reduce consumption costs.
83
108
84
-
## Cleaning up resources
109
+
## Delete a connector
85
110
86
111
If you wish to delete the workbench or change the connector type, you must first delete the connector. Child resources must be deleted first.
0 commit comments