Skip to content

Commit 69db2ef

Browse files
author
Michael Bender
committed
acrolinx
1 parent 4e0fefa commit 69db2ef

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

articles/virtual-network-manager/how-to-deploy-spoke-to-spoke-topology-two-hubs.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,20 +11,20 @@ ms.topic: how-to
1111

1212
# How to deploy Spoke-to-Spoke topology with two hubs
1313

14-
In this article, you'll learn how to deploy a Spoke-to-Spoke topology with two hubs using Virtual Network Manager. This scenario is useful when you have a hub and spoke architecture in multiple Azure regions. In the past, customers with firewalls or network virtual appliances performed many manual operations to do cross-hub and spoke in the past. Users needed many user-defined routes to be set up by hand, and when there were changes in spoke virtual networks, such as adding new spoke virtual networks and subnets, they also needed to change user-defined routes and route tables. UDR management with Virtual Network Manager can help you automate these tasks.
14+
In this article, you learn how to deploy a Spoke-to-Spoke topology with two hubs using Virtual Network Manager. This scenario is useful when you have a hub and spoke architecture in multiple Azure regions. In the past, customers with firewalls or network virtual appliances performed many manual operations to do cross-hub and spoke in the past. Users needed many user-defined routes(UDRs) to be set up by hand, and when there were changes in spoke virtual networks, such as adding new spoke virtual networks and subnets, they also needed to change user-defined routes and route tables. UDR management with Virtual Network Manager can help you automate these tasks.
1515

1616
## Prerequisites
1717

18-
:::image type="content" source="media/how-to-deploy-spoke-to-spoke-topology-two-hubs/spoke-to-spoke-two-hubs-topology-network-manager.png" alt-text="Diagram of spoke to spoke topology with two hub and spoke networks and resources.":::
18+
:::image type="content" source="media/how-to-deploy-spoke-to-spoke-topology-two-hubs/spoke-to-spoke-two-hubs-topology-network-manager.png" alt-text="Diagram of a multi-hub topology with hub-and-spoke virtual network topologies.":::
1919

2020
- An Azure subscription with a Virtual Network Manager deployed with UDR management enabled.
21-
- Two hub and spoke topologies deployed in different Azure regions.
21+
- Two hub-and-spoke topologies deployed in different Azure regions.
2222
- Azure firewall instances deployed in each regional hub - total of two instances.
2323
- Hub virtual networks in each region are peered with each other.
2424
- Virtual machines deployed in the spoke virtual networks in each region to confirm network connectivity across regions.
2525

2626
> [!NOTE]
27-
> For this scenario, you need to have two hub and spoke topologies deployed in different Azure regions. Examples in this scenario will use **West US 2** as **Region 1** and **West US 3** as **Region 2**. You may use any other Azure regions as needed.
27+
> For this scenario, you have hub-and-spoke topologies deployed in two different Azure regions. Examples in this scenario will use **West US 2** as **Region 1** and **West US 3** as **Region 2**. You may use any other Azure regions as needed.
2828
2929
## Create network groups
3030

@@ -54,12 +54,12 @@ In this step, you add the spoke virtual networks and Azure Firewall subnets to t
5454

5555
1. In the network manager instance, navigate to **Network groups** under **Settings**.
5656
2. Select the network group for the spoke virtual networks in region 1 - **ng-spoke-<region1>**.
57-
3. Under **Manage membships of your network group**, select **Add virtual networks**.
57+
3. Under **Manage memberships of your network group**, select **Add virtual networks**.
5858
4. In the **Manually add members** window, select the spoke virtual networks in region 1, then select **Add**.
5959

6060
## Deploy hub and spoke topologies in each region
6161

62-
In this step, you deploy two hub and spoke topologies in different Azure regions. You use connectivity configurations in your network manager.
62+
In this step, you create two connectivity configurations in your network manager instance to deploy hub and spoke topologies in each region. You create a connectivity configuration for each hub and spoke topology in each region.
6363

6464
1. In your network manager instance, navigate to **Configurations** under **Settings**.
6565
2. Select **+ Create**>**Connectivity configuration**.
@@ -71,7 +71,7 @@ In this step, you deploy two hub and spoke topologies in different Azure regions
7171
|-------|-------|
7272
| **Topology** | Select **Hub and spoke**. |
7373
| **Hub** | Choose **Select a hub** and select the hub virtual network in region 1. |
74-
| **Spoke network groups** | Select **Add*.</br>In the **Add network groups** window, select the spoke network groups from region 1: **ng-spoke-<region1>**,**ng-spoke-<region2>** |
74+
| **Spoke network groups** | Select **Add*.</br> In the **Add network groups** window, select the spoke network groups from region 1: **ng-spoke-<region1>**,**ng-spoke-<region2>** |
7575

7676
6. Select the **Visualization** tab or **Next: Visualization** to review the topology.
7777
7. Select **Review + create** then **Create and start deployment** to deploy the connectivity configuration.
@@ -138,7 +138,7 @@ In this step, you create a routing rule for the spoke virtual networks in region
138138

139139
In these steps, you create a routing rule for the Azure Firewall subnet in region 1 allowing communication with the spoke virtual networks in region 2.
140140

141-
For this example, the remote regions address prefixes will be summarized. Summarizing address prefixes offers the benefit of not needing to change the routing rules for the FW subnet even if new spokes are added to each region. However, it's important to pre-define the address prefixes used in each region, including for future use.
141+
For this example, the remote regions address prefixes are summarized. Summarizing address prefixes offers the benefit of not needing to change the routing rules for the Azure firewall subnet even if new spokes are added to each region. However, it's important to predefine the address prefixes used in each region, including for future use.
142142

143143
1. In the **Rule collections** window, select the rule collection for the Azure Firewall subnet in region 1 - **rc-azfw-<region1>**.
144144
2. In the **Edit a rule collection** window, select **+ Add**.
@@ -238,7 +238,5 @@ In this step, you confirm the routing configuration by testing network connectiv
238238

239239
## Next steps
240240

241-
## Next steps
242-
243241
> [!div class="nextstepaction"]
244242
> [How to deploy hub and spoke topology with Azure Firewall](how-to-deploy-hub-spoke-topology-with-azure-firewall.md)

0 commit comments

Comments
 (0)