Skip to content

Commit 64ca823

Browse files
Merge pull request #230169 from rdeltcheva/ilb-out-smallfix
Change NAT GW to outbound ILB rules
2 parents 209a126 + b8de303 commit 64ca823

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: sap-vm-workloads
1313
ms.topic: article
1414
ms.tgt_pltfrm: vm-windows
1515
ms.workload: infrastructure-services
16-
ms.date: 12/01/2020
16+
ms.date: 3/9/2023
1717
ms.author: radeltch
1818

1919
---
@@ -95,7 +95,11 @@ The configuration would look like:
9595
2. Create Backend pool **MyBackendPoolOfPublicILB** and add the VMs.
9696
1. Select the Virtual network
9797
1. Select the VMs and their IP addresses and add them to the backend pool
98-
3. Create a NAT gateway for outbound internet access. For more information see [Quickstart: Create a NAT gateway - Azure CLI](../../virtual-network/nat-gateway/quickstart-create-nat-gateway-cli.md).
98+
3. Create [outbound rules](../../load-balancer/egress-only.md#create-a-public-load-balancer-outbound-rule).
99+
100+
```azurecli
101+
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
102+
99103
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to enable access to the Azure management API:
100104
1. Navigate to the Network Security Group
101105
1. Click Outbound Security Rules

0 commit comments

Comments
 (0)