Skip to content

Commit 7615dfc

Browse files
authored
Merge pull request #214733 from rvandenbedem/patch-34
Updated index and TOC to match
2 parents 993325e + a440ef1 commit 7615dfc

7 files changed

+70
-68
lines changed

articles/azure-vmware/configure-dhcp-azure-vmware-solution.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure DHCP by using either NSX-T Manager to host a
44
ms.topic: how-to
55
ms.custom: contperf-fy21q2, contperf-fy22q1
66
ms.service: azure-vmware
7-
ms.date: 10/04/2022
7+
ms.date: 10/17/2022
88

99
# Customer intent: As an Azure service administrator, I want to configure DHCP by using either NSX-T Manager to host a DHCP server or use a third-party external DHCP server.
1010

@@ -45,7 +45,7 @@ You can create a DHCP server or relay directly from Azure VMware Solution in the
4545
4646
:::image type="content" source="media/networking/add-dhcp-server-relay.png" alt-text="Screenshot showing how to add a DHCP server or DHCP relay in Azure VMware Solutions.":::
4747

48-
4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-segment) and then select **OK**.
48+
4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-network-segment) and then select **OK**.
4949

5050

5151

articles/azure-vmware/configure-external-identity-source-nsx-t.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Configure external identity source for NSX-T
3-
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T.
2+
title: Configure external identity source for NSX-T Data Center
3+
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T Data Center.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 09/20/2022
6+
ms.date: 10/17/2022
77

88
---
9-
# Configure external identity source for NSX-T
9+
# Configure external identity source for NSX-T Data Center
1010

11-
In this article, you'll learn how to configure an external identity source for NSX-T in an Azure VMware Solution. The NSX-T Data Center can be configured with external LDAP directory service to add remote directory users or groups. The users can be assigned an NSX-T Data Center Role-based access control (RBAC) role like you've on-premises.
11+
In this article, you'll learn how to configure an external identity source for NSX-T Data Center in an Azure VMware Solution. The NSX-T Data Center can be configured with external LDAP directory service to add remote directory users or groups. The users can be assigned an NSX-T Data Center Role-based access control (RBAC) role like you've on-premises.
1212

1313
## Prerequisites
1414

@@ -20,13 +20,13 @@ In this article, you'll learn how to configure an external identity source for N
2020
>[!Note]
2121
> Self-sign certificates are not recommended for production environments.  
2222
23-
- Ensure your Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. For more information, see [Configure NSX-T DNS for resolution to your Active Directory Domain and Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) .
23+
- Ensure your Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. For more information, see [Configure NSX-T Data Center DNS for resolution to your Active Directory Domain and Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) .
2424
>[!NOTE]
2525
> For more information about LDAPS and certificate issuance, see with your security or identity management team.
2626
2727
## Add Active Directory as LDAPS identity source
2828

29-
1. Sign-in to NSX-T and Navigate to System > Users and Roles > LDAP.
29+
1. Sign-in to NSX-T Manager and Navigate to System > Users and Roles > LDAP.
3030

3131
1. Select on the Add Identity Source.
3232

@@ -59,11 +59,11 @@ In this article, you'll learn how to configure an external identity source for N
5959
1. Select **Save** to complete the changes.
6060
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-server.png":::
6161

62-
## Assign other NSX-T roles to Active Directory identities
62+
## Assign other NSX-T Data Center roles to Active Directory identities
6363

64-
After adding an external identity, you can assign NSX-T Roles to Active Directory security groups based on your organization's security controls.
64+
After adding an external identity, you can assign NSX-T Data Center Roles to Active Directory security groups based on your organization's security controls.
6565

66-
1. Sign in to NSX-T and navigate to **System** > **Users and Roles**.
66+
1. Sign in to NSX-T Manager and navigate to **System** > **Users and Roles**.
6767

6868
1. Select **Add** > **Role Assignment for LDAP**. 
6969

@@ -76,7 +76,7 @@ After adding an external identity, you can assign NSX-T Roles to Active Director
7676
1. Verify the permission assignment is displayed under **Users and Roles**.
7777
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-verify.png":::
7878

79-
1. Users should now be able to sign in to NSX-T using their Active Directory credentials.
79+
1. Users should now be able to sign in to NSX-T Manager using their Active Directory credentials.
8080

8181
## Next steps
8282
Now that you've configured the external source, you can also learn about:

articles/azure-vmware/configure-nsx-network-components-azure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure NSX-T Data Center network components using Azure VMware Solutio
33
description: Learn how to use the Azure VMware Solution to configure NSX-T Data Center network segments.
44
ms.topic: reference
55
ms.service: azure-vmware
6-
ms.date: 10/04/2022
6+
ms.date: 10/17/2022
77

88
# Customer intent: As an Azure service administrator, I want to configure NSX-T Data Center network components using a simplified view of NSX-T Data Center operations a VMware administrator needs daily. The simplified view is targeted at users unfamiliar with NSX-T Manager.
99

@@ -17,7 +17,7 @@ After deploying Azure VMware Solution, you can configure the necessary NSX-T Dat
1717

1818
You'll have four options to configure NSX-T Data Center components in the Azure VMware Solution console:
1919

20-
- **Segments** - Create segments that display in NSX-T Manager and vCenter Server. For more information, see [Add an NSX-T Data Center segment using the Azure portal](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-segment).
20+
- **Segments** - Create segments that display in NSX-T Manager and vCenter Server. For more information, see [Add an NSX-T Data Center segment using the Azure portal](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-network-segment).
2121

2222
- **DHCP** - Create a DHCP server or DHCP relay if you plan to use DHCP. For more information, see [Use the Azure portal to create a DHCP server or relay](configure-dhcp-azure-vmware-solution.md#use-the-azure-portal-to-create-a-dhcp-server-or-relay).
2323

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Enable Public IP to the NSX Edge for Azure VMware Solution
2+
title: Enable Public IP to the NSX-T Data Center Edge for Azure VMware Solution
33
description: This article shows how to enable internet access for your Azure VMware Solution.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 07/21/2022
6+
ms.date: 10/17/2022
77
---
88

9-
# Enable Public IP to the NSX Edge for Azure VMware Solution
9+
# Enable Public IP to the NSX-T Data Center Edge for Azure VMware Solution
1010

11-
In this article, you'll learn how to enable Public IP to the NSX Edge for your Azure VMware Solution.
11+
In this article, you'll learn how to enable Public IP to the NSX-T Data Center Edge for your Azure VMware Solution.
1212

1313
>[!TIP]
1414
>Before you enable Internet access to your Azure VMware Solution, review the [Internet connectivity design considerations](concepts-design-public-internet-access.md).
1515
16-
Public IP to the NSX Edge is a feature in Azure VMware Solution that enables inbound and outbound internet access for your Azure VMware Solution environment.
16+
Public IP to the NSX-T Data Center Edge is a feature in Azure VMware Solution that enables inbound and outbound internet access for your Azure VMware Solution environment.
1717

1818
>[!IMPORTANT]
1919
>The use of Public IPv4 addresses can be consumed directly in Azure VMware Solution and charged based on the Public IPv4 prefix shown on [Pricing - Virtual Machine IP Address Options.](https://azure.microsoft.com/pricing/details/ip-addresses/).
2020
21-
The Public IP is configured in Azure VMware Solution through the Azure portal and the NSX-T Data center interface within your Azure VMware Solution private cloud.
21+
The Public IP is configured in Azure VMware Solution through the Azure portal and the NSX-T Data Center interface within your Azure VMware Solution private cloud.
2222

2323
With this capability, you have the following features:
2424
- A cohesive and simplified experience for reserving and using a Public IP down to the NSX Edge.
@@ -32,14 +32,14 @@ With this capability, you have the following features:
3232
3333
## Prerequisites
3434
- Azure VMware Solution private cloud
35-
- DNS Server configured on the NSX-T Datacenter
35+
- DNS Server configured on the NSX-T Data Center
3636

3737
## Reference architecture
38-
The architecture shows Internet access to and from your Azure VMware Solution private cloud using a Public IP directly to the NSX Edge.
38+
The architecture shows Internet access to and from your Azure VMware Solution private cloud using a Public IP directly to the NSX-T Data Center Edge.
3939
:::image type="content" source="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png" alt-text="Diagram that shows architecture of Internet access to and from your Azure VMware Solution Private Cloud using a Public IP directly to the NSX Edge." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-expanded.png":::
4040

4141
>[!IMPORTANT]
42-
>The use of Public IP down to the NSX Edge is not compatible with reverse DNS Lookup.
42+
>The use of Public IP down to the NSX-T Data Center Edge is not compatible with reverse DNS Lookup.
4343
4444
## Configure a Public IP in the Azure portal
4545
1. Log on to the Azure portal.
@@ -48,8 +48,8 @@ The architecture shows Internet access to and from your Azure VMware Solution pr
4848
1. In the left navigation, under **Workload Networking**, select **Internet connectivity**.
4949
4. Select the **Connect using Public IP down to the NSX-T Edge** button.
5050

51-
>[!TIP]
52-
>Before selecting a Public IP, ensure you understand the implications to your existing environment. For more information, see [Internet connectivity design considerations](concepts-design-public-internet-access.md).
51+
>[!IMPORTANT]
52+
>Before selecting a Public IP, ensure you understand the implications to your existing environment. For more information, see [Internet connectivity design considerations](concepts-design-public-internet-access.md). This should include a risk mitigation review with your relevant networking and security governance and compliance teams.
5353
5454
5. Select **Public IP**.
5555
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-connectivity.png" alt-text="Diagram that shows how to select public IP to the NSX Edge":::
@@ -61,21 +61,21 @@ The architecture shows Internet access to and from your Azure VMware Solution pr
6161
9. After configuring the Public IP, select the **Connect using the Public IP down to the NSX-T Edge** checkbox to disable all other Internet options.
6262
10. Select **Save**.
6363

64-
You have successfully enabled Internet connectivity for your Azure VMware Solution private cloud and reserved a Microsoft allocated Public IP. You can now configure this Public IP down to the NSX Edge for your workloads. The NSX-T Datacenter is used for all VM communication. There are several options for configuring your reserved Public IP down to the NSX Edge.
64+
You have successfully enabled Internet connectivity for your Azure VMware Solution private cloud and reserved a Microsoft allocated Public IP. You can now configure this Public IP down to the NSX-T Data Center Edge for your workloads. The NSX-T Data Center is used for all VM communication. There are several options for configuring your reserved Public IP down to the NSX-T Data Center Edge.
6565

66-
There are three options for configuring your reserved Public IP down to the NSX Edge: Outbound Internet Access for VMs, Inbound Internet Access for VMs, and Gateway Firewall used to Filter Traffic to VMs at T1 Gateways.
66+
There are three options for configuring your reserved Public IP down to the NSX-T Data Center Edge: Outbound Internet Access for VMs, Inbound Internet Access for VMs, and Gateway Firewall used to Filter Traffic to VMs at T1 Gateways.
6767

6868
### Outbound Internet access for VMs
6969

7070
A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT) is used to allow many VMs to one SNAT service. This connection means you can provide Internet connectivity for many VMs.
7171

7272
>[!IMPORTANT]
73-
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-network-address-tranlation-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
73+
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-network-address-translation-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
7474
7575
**Add rule**
76-
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
77-
2. Locate your NSX-T URL and credentials.
78-
3. Log in to **VMWare NSX-T**.
76+
1. From your Azure VMware Solution private cloud, select **vCenter Server Credentials**
77+
2. Locate your NSX-T Manager URL and credentials.
78+
3. Log in to **VMware NSX-T Manager**.
7979
4. Navigate to **NAT Rules**.
8080
5. Select the T1 Router.
8181
1. Select **ADD NAT RULE**.
@@ -89,15 +89,15 @@ A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT)
8989
1. Optionally, give the rule a higher priority number. This prioritization will move the rule further down the rule list to ensure more specific rules are matched first.
9090
1. Click **SAVE**.
9191

92-
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
93-
[NSX-T NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
92+
Logging can be enabled by way of the logging slider. For more information on NSX-T Data Center NAT configuration and options, see the
93+
[NSX-T Data Center NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
9494

95-
### No Network Address Tranlation rule for specific address ranges
95+
### No Network Address Translation rule for specific address ranges
9696

97-
A No SNAT rule in NSX manager can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass existing network translation rules.
98-
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**.
99-
1. Locate your NSX-T URL and credentials.
100-
1. Log in to **VMWare NSX-T** and then select **NAT Rules**.
97+
A No SNAT rule in NSX-T Manager can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass existing network translation rules.
98+
1. From your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
99+
1. Locate your NSX-T Manager URL and credentials.
100+
1. Log in to **VMware NSX-T Manager** and then select **NAT Rules**.
101101
1. Select the T1 Router and then select **ADD NAT RULE**.
102102
1. Select **NO SNAT** rule as the type of NAT rule.
103103
1. Select the **Source IP** as the range of addresses you do not want to be translated. The **Destination IP** should be any internal addresses you are reaching from the range of Source IP ranges.
@@ -106,10 +106,10 @@ A No SNAT rule in NSX manager can be used to exclude certain matches from perfor
106106
### Inbound Internet Access for VMs
107107
A Destination Network Translation Service (DNAT) is used to expose a VM on a specific Public IP address and/or a specific port. This service provides inbound internet access to your workload VMs.
108108

109-
**Log in to VMware NSX-T**
109+
**Log in to VMware NSX-T Manager**
110110
1. From your Azure VMware Solution private cloud, select **VMware credentials**.
111-
2. Locate your NSX-T URL and credentials.
112-
3. Log in to **VMware NSX-T**.
111+
2. Locate your NSX-T Manager URL and credentials.
112+
3. Log in to **VMware NSX-T Manager**.
113113

114114
**Configure the DNAT rule**
115115
1. Name the rule.
@@ -125,8 +125,8 @@ The VM is now exposed to the internet on the specific Public IP and/or specific
125125

126126
You can provide security protection for your network traffic in and out of the public internet through your Gateway Firewall.
127127
1. From your Azure VMware Solution Private Cloud, select **VMware credentials**.
128-
2. Locate your NSX-T URL and credentials.
129-
3. Log in to **VMware NSX-T**.
128+
2. Locate your NSX-T Manager URL and credentials.
129+
3. Log in to **VMware NSX-T Manager**.
130130
4. From the NSX-T home screen, select **Gateway Policies**.
131131
5. Select **Gateway Specific Rules**, choose the T1 Gateway and select **ADD POLICY**.
132132
6. Select **New Policy** and enter a policy name.
@@ -143,8 +143,8 @@ For example, the following rule is set to Match External Address, and this setti
143143
:::image type="content" source="media/public-ip-nsx-edge/gateway-specific-rules-match-external-connectivity.png" alt-text="Screenshot Internet connectivity inbound Public IP." lightbox="media/public-ip-nsx-edge/gateway-specific-rules-match-external-connectivity-expanded.png":::
144144

145145
If **Match Internal Address** was specified, the destination would be the internal or private IP address of the VM.
146-
For more information on the NSX-T Gateway Firewall see the [NSX-T Gateway Firewall Administration Guide]( https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-A52E1A6F-F27D-41D9-9493-E3A75EC35481.html)
147-
The Distributed Firewall could be used to filter traffic to VMs. This feature is outside the scope of this document. For more information, see [NSX-T Distributed Firewall Administration Guide]( https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-6AB240DB-949C-4E95-A9A7-4AC6EF5E3036.html).
146+
For more information on the NSX-T Data Center Gateway Firewall see the [NSX-T Data Center Gateway Firewall Administration Guide]( https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-A52E1A6F-F27D-41D9-9493-E3A75EC35481.html)
147+
The Distributed Firewall could be used to filter traffic to VMs. This feature is outside the scope of this document. For more information, see [NSX-T Data Center Distributed Firewall Administration Guide]( https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-6AB240DB-949C-4E95-A9A7-4AC6EF5E3036.html).
148148

149149
## Next steps
150150
[Internet connectivity design considerations (Preview)](concepts-design-public-internet-access.md)

0 commit comments

Comments
 (0)