Skip to content

Commit 6cbb2a8

Browse files
author
Michael Bender
committed
Refining markdown - Need to run full article in Azure
1 parent 837d7f3 commit 6cbb2a8

File tree

1 file changed

+46
-47
lines changed

1 file changed

+46
-47
lines changed
Lines changed: 46 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,86 @@
11
---
22
title: 'Tutorial: Configure outbound connectivity with a gateway load balancer'
33
titleSuffix: Azure Load Balancer
4-
description: Learn to configure to configure gateway load balancer using the Azure portal higher scalability and performance with network virtual appliances.
4+
description: Learn to configure gateway load balancer using the Azure portal higher scalability and performance with network virtual appliances.
55
author: mbender-ms
66
ms.author: mbender
77
ms.service: load-balancer
88
ms.topic: tutorial
9-
ms.date: 06/15/2023
9+
ms.date: 03/16/2023
1010
ms.custom: template-tutorial
1111
---
1212

1313
# Tutorial: Configure outbound connectivity with a gateway load balancer
1414

15-
Azure Load Balancer consists of Standard, Basic, and Gateway SKUs. Gateway Load Balancer is used for transparent insertion of Network Virtual Appliances (NVA). Use Gateway Load Balancer for scenarios that require high performance and high scalability of NVAs.
15+
Azure Load Balancer consists of Standard, Basic, and Gateway SKUs. Gateway Load Balancer (GWLB) is used for transparent insertion of Network Virtual Appliances (NVA). Use Gateway Load Balancer for scenarios that require high performance and high scalability of NVAs.
1616

17-
In this tutorial, you’ll learn how to:
17+
In this tutorial, you learn how to:
1818
> [!div class="checklist"]
19-
> - Create a new load balancer frontend IP configuration and outbound rule
20-
> - Chain a load balancer’s frontend or virtual machine’s IP or to a Gateway Load Balancer
19+
> - Chain a virtual machine’s IP or to a Gateway Load Balancer.
20+
> - Create a new load balancer frontend IP configuration.
21+
> - Create an outbound rule for virtual machine traffic.
2122
2223
## Prerequisites
2324

2425
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2526
- An existing public standard SKU Azure Load Balancer. For more information on creating a load balancer, see **[Create a public load balancer using the Azure portal](quickstart-load-balancer-standard-public-portal.md)**.
26-
- For the purposes of this tutorial, the load balancer in the examples is named **myLoadBalancer**.
27+
- For the purposes of this tutorial, the load balancer in the examples is named **myLoadBalancer** and is located in a resource group called **myResourceGroup**.
2728
- An existing Gateway SKU Azure Load Balancer. For more information on creating a gateway load balancer, see [Create a gateway load balancer using the Azure portal](tutorial-gateway-portal.md).
2829
- For the purposes of this tutorial, the gateway load balancer in the examples is name **myGatewayLoadBalancer**.
2930

30-
## Chain a virtual machine to Gateway Load Balancer
31+
## Chain a virtual machine to a gateway load balancer
3132

32-
Gateway Load Balancer can be inserted in the path of outbound traffic by chaining to virtual machine instance level public IPs. This method will secure both inbound and outbound traffic reaching or originating from this virtual machine’s public IP.
33-
34-
In this example, we will chain an existing virtual machine’s public IP to a Gateway Load Balancer.
33+
In this example, we'll chain an existing virtual machine’s public IP to a gateway load balancer. A gateway load balancer can be inserted in the path of outbound traffic by chaining to virtual machine instance level public IPs. This method secures both inbound and outbound traffic reaching or originating from this virtual machine’s public IP.
3534

3635
1. Navigate to your existing virtual machine. In this example, the virtual machine is named myVM1.
3736

38-
1. Make sure your virtual machine has a Standard SKU public IP associated with it.
39-
1. Go to **Public IP address > Overview** and confir that the SKU is **Standard**.
37+
1. To verify your virtual machine has a standard SKU public IP associated with it, go to **Public IP address > Overview** and confirm that the SKU is **Standard**.
4038

4139
:::image type="content" source="media/gateway-configure-outbound-connectivity/confirm-sku.png" alt-text="Screenshot of virtual machine overview highlighting standard sku.":::
4240

43-
1. In the overview blade of the virtual machine, select Networking in Settings.
44-
1. In Networking, select the name of the network interface attached to the virtual machine. In this example, it's myvm1229.
41+
1. In the **Overview** page of the virtual machine, select **Networking** under **Settings**.
42+
1. Select the network interface attached to the virtual machine. In this example, it's **myvm1229**.
4543

4644
:::image type="content" source="media/gateway-configure-outbound-connectivity/select-network-interface.png" alt-text="Screenshot of network interface attached to virtual machine.":::
4745

48-
1. In the network interface page, select IP configurations in Settings.
49-
6. Select myFrontend in Gateway Load balancer.
46+
1. In the **Network interface** page, select **IP configurations** under **Settings**.
47+
6. Select **myFrontend** in **Gateway Load balancer**.
5048

5149
:::image type="content" source="media/gateway-configure-outbound-connectivity/select-gateway-load-balancer.png" alt-text="Screenshot of gateway load balancer selection in IP configuration settings.":::
5250

5351
1. Select **Save**.
5452

5553
## Create a load balancer frontend
5654

57-
For best practices, we recommend leveraging separate public IPs for inbound and outbound traffic. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules will decrease the number of available SNAT ports.
55+
In this example, we'll create a new frontend IP configuration for outbound traffic in our existing standard public load balancer. Using separate public IPs for inbound and outbound traffic is a reccomend best practice. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules decrease the number of available SNAT ports.
5856

59-
1. Navigate to your existing Standard Public Load Balancer and go to the Frontend IP configurations blade under Settings
57+
1. Navigate to your existing standard public load balancer and go to the **Frontend IP configuration** under **Settings**.
6058

6159
:::image type="content" source="media/gateway-configure-outbound-connectivity/frontend-settings.png" alt-text="Screenshot of frontend IP configuration.":::
6260

63-
1. Select + Add to create a new frontend IP configuration
61+
1. Select **+ Add** to create a new frontend IP configuration
62+
1. In the **Add frontend IP configuration** page, enter or select the following information:
63+
64+
| Setting | Value |
65+
| --- | --- |
66+
| Name | Enter **myOutboundFrontend**. |
67+
| IP version | Select **IPv4**. |
68+
| IP type | Select **IP address**. |
69+
| Public IP address | |
70+
| Gateway Load balancer | Select **myGatewayLoadBalancerFrontEnd**. |
71+
6472

6573
:::image type="content" source="media/gateway-configure-outbound-connectivity/add-frontend-ip-configuration.png" alt-text="Screenshot of Add frontend ip configuration screen.":::
6674

67-
1. Enter myOutboundFrontend in Name
68-
1. Select IPv4 and IP address for IP version and IP type respectively
69-
1. Select myGatewayLoadBalancerFrontend for Gateway Load balancer
70-
1. This step will effectively “chain” this frontend to the Gateway Load Balancer frontend specified.
71-
1. Any traffic, inbound or outbound, served by this frontend will be redirected to the Gateway Load Balancer to be inspected by the configured NVAs before being distributed to this load balancer’s backend instances
7275
1. Select Save.
7376

77+
> [!NOTE]
78+
> This step will “chain” your frontend to the gateway load balancer frontend specified.
79+
> Any inbound or outbound traffic served by this frontend is redirected to the gateway load balancer for inspection by the configured NVAs before being distributed to this load balancer’s backend instances.
7480
## Create outbound rule
7581

76-
1. On the load balancer page, select Outbound rules in Settings.
77-
2. Select + Add in Outbound rules to add a rule.
82+
1. In the **Load balancer** page, select **Outbound rules** under **Settings**.
83+
2. Select **+ Add** in **Outbound rules** to add a rule.
7884

7985
:::image type="content" source="media/gateway-configure-outbound-connectivity/outbound-rules.png" alt-text="Screenshot of Load Balancer Outbound rules settings.":::
8086

@@ -84,45 +90,38 @@ For best practices, we recommend leveraging separate public IPs for inbound and
8490
| --- | --- |
8591
| Name | Enter **myOutboundRule**. |
8692
| IP version | Select **IPv4**. |
87-
| Frontend IP address | Select the frontend IP address of the load balancer. In this example, it's myOutboundFrontend. |
93+
| Frontend IP address | Select the frontend IP address of the load balancer. In this example, it's **myOutboundFrontend**. |
8894
| Protocol | Leave the default of **All**. |
8995
| Idle timeout (minutes) | Enter **4** or your desired value. |
9096
| TCP Reset | Leave the default of **Enabled**. |
9197
| Backend pool | Select the backend pool of the load balancer. In this example, it's **myBackendPool**. |
9298
| **Port allocation** | |
93-
| Port allocation | Select **Manaually choose number of outbound ports.** |
99+
| Port allocation | Select **Manually choose number of outbound ports** |
94100
| **Outbound ports** | |
95101
| Choose by | Select **Maximum number of backend instances**. |
96102
| Ports per instance | Enter the anticipated maximum number of backend instances. In this example, we have **2** backend instances.
97103

98-
1. Select **Add**.
99104

100105
:::image type="content" source="media/gateway-configure-outbound-connectivity/add-outbound-rule.png" alt-text="Screenshot of Add Outbound Rule screen.":::
101106

107+
1. Select **Add**.
108+
102109
## Limitations
103110

104-
- Gateway load balancer does not currently support chaining with NAT Gateway. Outbound traffic originating from Azure virtual machines, served through NAT Gateway, will go directly to the Internet. Please note that NAT Gateway will take precedence over any instance-level public IPs or load balancers for outbound traffic.
105-
- NAT Gateway can be configured for outbound connectivity, in conjunction with a Standard Public Load Balancer and Gateway Load Balancer architecture for inbound connectivity. In this scenario, all inbound traffic will flow as expected through the GWLB to the Standard LB, while outbound traffic will go to the Internet directly.
106-
- If NVAs need to be inserted for outbound traffic, please leverage the methods described above in this article (eg. chaining an ILPIP or outbound rules LB frontend to a GWLB)
111+
- Gateway load balancer doesn't currently support chaining with NAT Gateway. Outbound traffic originating from Azure virtual machines, served through NAT Gateway, goes directly to the Internet. And that NAT Gateway takes precedence over any instance-level public IPs or load balancers for outbound traffic.
112+
- NAT Gateway can be configured for outbound connectivity together with a Standard Public Load Balancer and Gateway Load Balancer architecture for inbound connectivity. In this scenario, all inbound traffic flows as expected through the GWLB to the Standard LB, while outbound traffic goes to the Internet directly.
113+
- If NVAs need to be inserted for outbound traffic, apply the methods described in this article. For examples, chaining an ILPIP or outbound rules LB frontend to a gateway load balancer.
107114

108115
## Clean up resources
109116

110-
When no longer needed, delete the resource group, load balancer, and all related resources. To do so, select the resource group **TutorGwLB-rg** that contains the resources and then select **Delete**.
117+
When no longer needed, delete the resource group, load balancer, and all related resources. To do so, select the resource group **myResourceGroup** that contains the resources and then select **Delete**.
111118

112119
## Next steps
113120

114-
Create Network Virtual Appliances in Azure.
115-
116-
When creating the NVAs, choose the resources created in this tutorial:
117-
118-
* Virtual network
119-
120-
* Subnet
121-
122-
* Network security group
121+
In this tutorial, you created:
123122

124-
* Gateway load balancer
123+
- Chained a virtual machine’s IP address to a Gateway Load Balancer.
124+
- Created a new load balancer frontend IP configuration.
125+
- Created an outbound rule for virtual machine traffic.
125126

126-
Advance to the next article to learn how to create a cross-region Azure Load Balancer.
127-
> [!div class="nextstepaction"]
128-
> [Cross-region load balancer](tutorial-cross-region-powershell.md)
127+
Learn how to [Deploy highly avialable NVAs](/azure/architecture/reference-architectures/dmz/nva-ha) with Azure Load Balancer.

0 commit comments

Comments
 (0)