You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'Tutorial: Configure outbound connectivity with a gateway load balancer'
3
3
titleSuffix: Azure Load Balancer
4
-
description: Learn to configure to configure gateway load balancer using the Azure portal higher scalability and performance with network virtual appliances.
4
+
description: Learn to configure gateway load balancer using the Azure portal higher scalability and performance with network virtual appliances.
5
5
author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: load-balancer
8
8
ms.topic: tutorial
9
-
ms.date: 06/15/2023
9
+
ms.date: 03/16/2023
10
10
ms.custom: template-tutorial
11
11
---
12
12
13
13
# Tutorial: Configure outbound connectivity with a gateway load balancer
14
14
15
-
Azure Load Balancer consists of Standard, Basic, and Gateway SKUs. Gateway Load Balancer is used for transparent insertion of Network Virtual Appliances (NVA). Use Gateway Load Balancer for scenarios that require high performance and high scalability of NVAs.
15
+
Azure Load Balancer consists of Standard, Basic, and Gateway SKUs. Gateway Load Balancer (GWLB) is used for transparent insertion of Network Virtual Appliances (NVA). Use Gateway Load Balancer for scenarios that require high performance and high scalability of NVAs.
16
16
17
-
In this tutorial, you’ll learn how to:
17
+
In this tutorial, you learn how to:
18
18
> [!div class="checklist"]
19
-
> - Create a new load balancer frontend IP configuration and outbound rule
20
-
> - Chain a load balancer’s frontend or virtual machine’s IP or to a Gateway Load Balancer
19
+
> - Chain a virtual machine’s IP or to a Gateway Load Balancer.
20
+
> - Create a new load balancer frontend IP configuration.
21
+
> - Create an outbound rule for virtual machine traffic.
21
22
22
23
## Prerequisites
23
24
24
25
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
26
- An existing public standard SKU Azure Load Balancer. For more information on creating a load balancer, see **[Create a public load balancer using the Azure portal](quickstart-load-balancer-standard-public-portal.md)**.
26
-
- For the purposes of this tutorial, the load balancer in the examples is named **myLoadBalancer**.
27
+
- For the purposes of this tutorial, the load balancer in the examples is named **myLoadBalancer** and is located in a resource group called **myResourceGroup**.
27
28
- An existing Gateway SKU Azure Load Balancer. For more information on creating a gateway load balancer, see [Create a gateway load balancer using the Azure portal](tutorial-gateway-portal.md).
28
29
- For the purposes of this tutorial, the gateway load balancer in the examples is name **myGatewayLoadBalancer**.
29
30
30
-
## Chain a virtual machine to Gateway Load Balancer
31
+
## Chain a virtual machine to a gateway load balancer
31
32
32
-
Gateway Load Balancer can be inserted in the path of outbound traffic by chaining to virtual machine instance level public IPs. This method will secure both inbound and outbound traffic reaching or originating from this virtual machine’s public IP.
33
-
34
-
In this example, we will chain an existing virtual machine’s public IP to a Gateway Load Balancer.
33
+
In this example, we'll chain an existing virtual machine’s public IP to a gateway load balancer. A gateway load balancer can be inserted in the path of outbound traffic by chaining to virtual machine instance level public IPs. This method secures both inbound and outbound traffic reaching or originating from this virtual machine’s public IP.
35
34
36
35
1. Navigate to your existing virtual machine. In this example, the virtual machine is named myVM1.
37
36
38
-
1. Make sure your virtual machine has a Standard SKU public IP associated with it.
39
-
1. Go to **Public IP address > Overview** and confir that the SKU is **Standard**.
37
+
1. To verify your virtual machine has a standard SKU public IP associated with it, go to **Public IP address > Overview** and confirm that the SKU is **Standard**.
40
38
41
39
:::image type="content" source="media/gateway-configure-outbound-connectivity/confirm-sku.png" alt-text="Screenshot of virtual machine overview highlighting standard sku.":::
42
40
43
-
1. In the overview blade of the virtual machine, select Networking in Settings.
44
-
1.In Networking, select the name of the network interface attached to the virtual machine. In this example, it's myvm1229.
41
+
1. In the **Overview** page of the virtual machine, select **Networking** under **Settings**.
42
+
1.Select the network interface attached to the virtual machine. In this example, it's **myvm1229**.
45
43
46
44
:::image type="content" source="media/gateway-configure-outbound-connectivity/select-network-interface.png" alt-text="Screenshot of network interface attached to virtual machine.":::
47
45
48
-
1. In the network interface page, select IP configurations in Settings.
49
-
6. Select myFrontend in Gateway Load balancer.
46
+
1. In the **Network interface** page, select **IP configurations** under **Settings**.
47
+
6. Select **myFrontend** in **Gateway Load balancer**.
50
48
51
49
:::image type="content" source="media/gateway-configure-outbound-connectivity/select-gateway-load-balancer.png" alt-text="Screenshot of gateway load balancer selection in IP configuration settings.":::
52
50
53
51
1. Select **Save**.
54
52
55
53
## Create a load balancer frontend
56
54
57
-
For best practices, we recommend leveraging separate public IPs for inbound and outbound traffic. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules will decrease the number of available SNAT ports.
55
+
In this example, we'll create a new frontend IP configuration for outbound traffic in our existing standard public load balancer. Using separate public IPs for inbound and outbound traffic is a reccomend best practice. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules decrease the number of available SNAT ports.
58
56
59
-
1. Navigate to your existing Standard Public Load Balancer and go to the Frontend IP configurations blade under Settings
57
+
1. Navigate to your existing standard public load balancer and go to the **Frontend IP configuration**under **Settings**.
60
58
61
59
:::image type="content" source="media/gateway-configure-outbound-connectivity/frontend-settings.png" alt-text="Screenshot of frontend IP configuration.":::
62
60
63
-
1. Select + Add to create a new frontend IP configuration
61
+
1. Select **+ Add** to create a new frontend IP configuration
62
+
1. In the **Add frontend IP configuration** page, enter or select the following information:
:::image type="content" source="media/gateway-configure-outbound-connectivity/add-frontend-ip-configuration.png" alt-text="Screenshot of Add frontend ip configuration screen.":::
66
74
67
-
1. Enter myOutboundFrontend in Name
68
-
1. Select IPv4 and IP address for IP version and IP type respectively
69
-
1. Select myGatewayLoadBalancerFrontend for Gateway Load balancer
70
-
1. This step will effectively “chain” this frontend to the Gateway Load Balancer frontend specified.
71
-
1. Any traffic, inbound or outbound, served by this frontend will be redirected to the Gateway Load Balancer to be inspected by the configured NVAs before being distributed to this load balancer’s backend instances
72
75
1. Select Save.
73
76
77
+
> [!NOTE]
78
+
> This step will “chain” your frontend to the gateway load balancer frontend specified.
79
+
> Any inbound or outbound traffic served by this frontend is redirected to the gateway load balancer for inspection by the configured NVAs before being distributed to this load balancer’s backend instances.
74
80
## Create outbound rule
75
81
76
-
1.On the load balancer page, select Outbound rules in Settings.
77
-
2. Select + Add in Outbound rules to add a rule.
82
+
1.In the **Load balancer** page, select **Outbound rules** under **Settings**.
83
+
2. Select **+ Add** in **Outbound rules** to add a rule.
78
84
79
85
:::image type="content" source="media/gateway-configure-outbound-connectivity/outbound-rules.png" alt-text="Screenshot of Load Balancer Outbound rules settings.":::
80
86
@@ -84,45 +90,38 @@ For best practices, we recommend leveraging separate public IPs for inbound and
84
90
| --- | --- |
85
91
| Name | Enter **myOutboundRule**. |
86
92
| IP version | Select **IPv4**. |
87
-
| Frontend IP address | Select the frontend IP address of the load balancer. In this example, it's myOutboundFrontend. |
93
+
| Frontend IP address | Select the frontend IP address of the load balancer. In this example, it's **myOutboundFrontend**. |
88
94
| Protocol | Leave the default of **All**. |
89
95
| Idle timeout (minutes) | Enter **4** or your desired value. |
90
96
| TCP Reset | Leave the default of **Enabled**. |
91
97
| Backend pool | Select the backend pool of the load balancer. In this example, it's **myBackendPool**. |
92
98
|**Port allocation**||
93
-
| Port allocation | Select **Manaually choose number of outbound ports.**|
99
+
| Port allocation | Select **Manually choose number of outbound ports**|
94
100
|**Outbound ports**||
95
101
| Choose by | Select **Maximum number of backend instances**. |
96
102
| Ports per instance | Enter the anticipated maximum number of backend instances. In this example, we have **2** backend instances.
97
103
98
-
1. Select **Add**.
99
104
100
105
:::image type="content" source="media/gateway-configure-outbound-connectivity/add-outbound-rule.png" alt-text="Screenshot of Add Outbound Rule screen.":::
101
106
107
+
1. Select **Add**.
108
+
102
109
## Limitations
103
110
104
-
- Gateway load balancer does not currently support chaining with NAT Gateway. Outbound traffic originating from Azure virtual machines, served through NAT Gateway, will go directly to the Internet. Please note that NAT Gateway will take precedence over any instance-level public IPs or load balancers for outbound traffic.
105
-
- NAT Gateway can be configured for outbound connectivity, in conjunction with a Standard Public Load Balancer and Gateway Load Balancer architecture for inbound connectivity. In this scenario, all inbound traffic will flow as expected through the GWLB to the Standard LB, while outbound traffic will go to the Internet directly.
106
-
- If NVAs need to be inserted for outbound traffic, please leverage the methods described above in this article (eg. chaining an ILPIP or outbound rules LB frontend to a GWLB)
111
+
- Gateway load balancer doesn't currently support chaining with NAT Gateway. Outbound traffic originating from Azure virtual machines, served through NAT Gateway, goes directly to the Internet. And that NAT Gateway takes precedence over any instance-level public IPs or load balancers for outbound traffic.
112
+
- NAT Gateway can be configured for outbound connectivity together with a Standard Public Load Balancer and Gateway Load Balancer architecture for inbound connectivity. In this scenario, all inbound traffic flows as expected through the GWLB to the Standard LB, while outbound traffic goes to the Internet directly.
113
+
- If NVAs need to be inserted for outbound traffic, apply the methods described in this article. For examples, chaining an ILPIP or outbound rules LB frontend to a gateway load balancer.
107
114
108
115
## Clean up resources
109
116
110
-
When no longer needed, delete the resource group, load balancer, and all related resources. To do so, select the resource group **TutorGwLB-rg** that contains the resources and then select **Delete**.
117
+
When no longer needed, delete the resource group, load balancer, and all related resources. To do so, select the resource group **myResourceGroup** that contains the resources and then select **Delete**.
111
118
112
119
## Next steps
113
120
114
-
Create Network Virtual Appliances in Azure.
115
-
116
-
When creating the NVAs, choose the resources created in this tutorial:
117
-
118
-
* Virtual network
119
-
120
-
* Subnet
121
-
122
-
* Network security group
121
+
In this tutorial, you created:
123
122
124
-
* Gateway load balancer
123
+
- Chained a virtual machine’s IP address to a Gateway Load Balancer.
124
+
- Created a new load balancer frontend IP configuration.
125
+
- Created an outbound rule for virtual machine traffic.
125
126
126
-
Advance to the next article to learn how to create a cross-region Azure Load Balancer.
0 commit comments