Skip to content

Commit 6dd2fb5

Browse files
author
Michael Bender
committed
Testing steps in Azure
1 parent 5230521 commit 6dd2fb5

File tree

5 files changed

+5
-4
lines changed

5 files changed

+5
-4
lines changed
-46.8 KB
Loading
-18.4 KB
Loading
-46.9 KB
Loading
-53.8 KB
Loading

articles/load-balancer/tutorial-gateway-outbound-connectivity.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,11 @@ This example uses hain an existing virtual machine’s public IP to a gateway lo
3434

3535
1. Navigate to your existing virtual machine. This example uses irtual machine is named myVM1.
3636

37-
1. To verify your virtual machine has a standard SKU public IP associated with it, go to **Public IP address > Overview** and confirm that the SKU is **Standard**.
37+
1. To verify your virtual machine has a standard SKU public IP associated with it, select **Public IP address > Overview** and confirm that the SKU is **Standard**.
3838

39-
:::image type="content" source="media/gateway-configure-outbound-connectivity/confirm-sku.png" alt-text="Screenshot of virtual machine overview highlighting standard sku.":::
39+
:::image type="content" source="media/gateway-configure-outbound-connectivity/confirm-sku.png" alt-text="Screenshot of virtual machine overview highlighting standard sku." lightbox="media/gateway-configure-outbound-connectivity/confirm-sku-thumb.png":::
4040

41+
1. Return to your virtual machine.
4142
1. In the **Overview** page of the virtual machine, select **Networking** under **Settings**.
4243
1. Select the network interface attached to the virtual machine. This example uses **myvm1229**.
4344

@@ -52,7 +53,7 @@ This example uses hain an existing virtual machine’s public IP to a gateway lo
5253

5354
## Create a load balancer frontend
5455

55-
This example uses reate a new frontend IP configuration for outbound traffic in our existing standard public load balancer. Using separate public IPs for inbound and outbound traffic is a recommend best practice. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules decrease the number of available SNAT ports.
56+
In this example, you create a new frontend IP configuration for outbound traffic in our existing standard public load balancer. Using separate public IPs for inbound and outbound traffic is a recommend best practice. Reusing the same public IP for inbound and outbound traffic can increase the risk of SNAT exhaustion, as load balancing and inbound NAT rules decrease the number of available SNAT ports.
5657

5758
1. Navigate to your existing standard public load balancer and go to the **Frontend IP configuration** under **Settings**.
5859

@@ -71,7 +72,7 @@ This example uses reate a new frontend IP configuration for outbound traffic in
7172

7273

7374
:::image type="content" source="media/gateway-configure-outbound-connectivity/add-frontend-ip-configuration.png" alt-text="Screenshot of Add frontend ip configuration screen.":::
74-
75+
<<PickUpdHere>>
7576
1. Select Save.
7677

7778
> [!NOTE]

0 commit comments

Comments
 (0)