You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-dhcp-azure-vmware-solution.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure DHCP by using either NSX-T Manager to host a
4
4
ms.topic: how-to
5
5
ms.custom: contperf-fy21q2, contperf-fy22q1
6
6
ms.service: azure-vmware
7
-
ms.date: 10/04/2022
7
+
ms.date: 10/17/2022
8
8
9
9
# Customer intent: As an Azure service administrator, I want to configure DHCP by using either NSX-T Manager to host a DHCP server or use a third-party external DHCP server.
10
10
@@ -45,7 +45,7 @@ You can create a DHCP server or relay directly from Azure VMware Solution in the
45
45
46
46
:::image type="content" source="media/networking/add-dhcp-server-relay.png" alt-text="Screenshot showing how to add a DHCP server or DHCP relay in Azure VMware Solutions.":::
47
47
48
-
4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-segment) and then select **OK**.
48
+
4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-network-segment) and then select **OK**.
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-external-identity-source-nsx-t.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: Configure external identity source for NSX-T
3
-
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T.
2
+
title: Configure external identity source for NSX-T Data Center
3
+
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T Data Center.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 09/20/2022
6
+
ms.date: 10/17/2022
7
7
8
8
---
9
-
# Configure external identity source for NSX-T
9
+
# Configure external identity source for NSX-T Data Center
10
10
11
-
In this article, you'll learn how to configure an external identity source for NSX-T in an Azure VMware Solution. The NSX-T Data Center can be configured with external LDAP directory service to add remote directory users or groups. The users can be assigned an NSX-T Data Center Role-based access control (RBAC) role like you've on-premises.
11
+
In this article, you'll learn how to configure an external identity source for NSX-T Data Center in an Azure VMware Solution. The NSX-T Data Center can be configured with external LDAP directory service to add remote directory users or groups. The users can be assigned an NSX-T Data Center Role-based access control (RBAC) role like you've on-premises.
12
12
13
13
## Prerequisites
14
14
@@ -20,13 +20,13 @@ In this article, you'll learn how to configure an external identity source for N
20
20
>[!Note]
21
21
> Self-sign certificates are not recommended for production environments.
22
22
23
-
- Ensure your Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. For more information, see [Configure NSX-T DNS for resolution to your Active Directory Domain and Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) .
23
+
- Ensure your Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. For more information, see [Configure NSX-T Data Center DNS for resolution to your Active Directory Domain and Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) .
24
24
>[!NOTE]
25
25
> For more information about LDAPS and certificate issuance, see with your security or identity management team.
26
26
27
27
## Add Active Directory as LDAPS identity source
28
28
29
-
1. Sign-in to NSX-T and Navigate to System > Users and Roles > LDAP.
29
+
1. Sign-in to NSX-T Manager and Navigate to System > Users and Roles > LDAP.
30
30
31
31
1. Select on the Add Identity Source.
32
32
@@ -59,11 +59,11 @@ In this article, you'll learn how to configure an external identity source for N
59
59
1. Select **Save** to complete the changes.
60
60
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-server.png":::
61
61
62
-
## Assign other NSX-T roles to Active Directory identities
62
+
## Assign other NSX-T Data Center roles to Active Directory identities
63
63
64
-
After adding an external identity, you can assign NSX-T Roles to Active Directory security groups based on your organization's security controls.
64
+
After adding an external identity, you can assign NSX-T Data Center Roles to Active Directory security groups based on your organization's security controls.
65
65
66
-
1. Sign in to NSX-T and navigate to **System** > **Users and Roles**.
66
+
1. Sign in to NSX-T Manager and navigate to **System** > **Users and Roles**.
67
67
68
68
1. Select **Add** > **Role Assignment for LDAP**.
69
69
@@ -76,7 +76,7 @@ After adding an external identity, you can assign NSX-T Roles to Active Director
76
76
1. Verify the permission assignment is displayed under **Users and Roles**.
77
77
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-verify.png":::
78
78
79
-
1. Users should now be able to sign in to NSX-T using their Active Directory credentials.
79
+
1. Users should now be able to sign in to NSX-T Manager using their Active Directory credentials.
80
80
81
81
## Next steps
82
82
Now that you've configured the external source, you can also learn about:
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-nsx-network-components-azure-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Configure NSX-T Data Center network components using Azure VMware Solutio
3
3
description: Learn how to use the Azure VMware Solution to configure NSX-T Data Center network segments.
4
4
ms.topic: reference
5
5
ms.service: azure-vmware
6
-
ms.date: 10/04/2022
6
+
ms.date: 10/17/2022
7
7
8
8
# Customer intent: As an Azure service administrator, I want to configure NSX-T Data Center network components using a simplified view of NSX-T Data Center operations a VMware administrator needs daily. The simplified view is targeted at users unfamiliar with NSX-T Manager.
9
9
@@ -17,7 +17,7 @@ After deploying Azure VMware Solution, you can configure the necessary NSX-T Dat
17
17
18
18
You'll have four options to configure NSX-T Data Center components in the Azure VMware Solution console:
19
19
20
-
-**Segments** - Create segments that display in NSX-T Manager and vCenter Server. For more information, see [Add an NSX-T Data Center segment using the Azure portal](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-segment).
20
+
-**Segments** - Create segments that display in NSX-T Manager and vCenter Server. For more information, see [Add an NSX-T Data Center segment using the Azure portal](tutorial-nsx-t-network-segment.md#use-azure-portal-to-add-an-nsx-t-data-center-network-segment).
21
21
22
22
-**DHCP** - Create a DHCP server or DHCP relay if you plan to use DHCP. For more information, see [Use the Azure portal to create a DHCP server or relay](configure-dhcp-azure-vmware-solution.md#use-the-azure-portal-to-create-a-dhcp-server-or-relay).
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-public-ip-nsx-edge.md
+31-31Lines changed: 31 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,24 @@
1
1
---
2
-
title: Enable Public IP to the NSX Edge for Azure VMware Solution
2
+
title: Enable Public IP to the NSX-T Data Center Edge for Azure VMware Solution
3
3
description: This article shows how to enable internet access for your Azure VMware Solution.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 07/21/2022
6
+
ms.date: 10/17/2022
7
7
---
8
8
9
-
# Enable Public IP to the NSX Edge for Azure VMware Solution
9
+
# Enable Public IP to the NSX-T Data Center Edge for Azure VMware Solution
10
10
11
-
In this article, you'll learn how to enable Public IP to the NSX Edge for your Azure VMware Solution.
11
+
In this article, you'll learn how to enable Public IP to the NSX-T Data Center Edge for your Azure VMware Solution.
12
12
13
13
>[!TIP]
14
14
>Before you enable Internet access to your Azure VMware Solution, review the [Internet connectivity design considerations](concepts-design-public-internet-access.md).
15
15
16
-
Public IP to the NSX Edge is a feature in Azure VMware Solution that enables inbound and outbound internet access for your Azure VMware Solution environment.
16
+
Public IP to the NSX-T Data Center Edge is a feature in Azure VMware Solution that enables inbound and outbound internet access for your Azure VMware Solution environment.
17
17
18
18
>[!IMPORTANT]
19
19
>The use of Public IPv4 addresses can be consumed directly in Azure VMware Solution and charged based on the Public IPv4 prefix shown on [Pricing - Virtual Machine IP Address Options.](https://azure.microsoft.com/pricing/details/ip-addresses/).
20
20
21
-
The Public IP is configured in Azure VMware Solution through the Azure portal and the NSX-T Data center interface within your Azure VMware Solution private cloud.
21
+
The Public IP is configured in Azure VMware Solution through the Azure portal and the NSX-T Data Center interface within your Azure VMware Solution private cloud.
22
22
23
23
With this capability, you have the following features:
24
24
- A cohesive and simplified experience for reserving and using a Public IP down to the NSX Edge.
@@ -32,14 +32,14 @@ With this capability, you have the following features:
32
32
33
33
## Prerequisites
34
34
- Azure VMware Solution private cloud
35
-
- DNS Server configured on the NSX-T Datacenter
35
+
- DNS Server configured on the NSX-T Data Center
36
36
37
37
## Reference architecture
38
-
The architecture shows Internet access to and from your Azure VMware Solution private cloud using a Public IP directly to the NSX Edge.
38
+
The architecture shows Internet access to and from your Azure VMware Solution private cloud using a Public IP directly to the NSX-T Data Center Edge.
39
39
:::image type="content" source="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip.png" alt-text="Diagram that shows architecture of Internet access to and from your Azure VMware Solution Private Cloud using a Public IP directly to the NSX Edge." border="false" lightbox="media/public-ip-nsx-edge/architecture-internet-access-avs-public-ip-expanded.png":::
40
40
41
41
>[!IMPORTANT]
42
-
>The use of Public IP down to the NSX Edge is not compatible with reverse DNS Lookup.
42
+
>The use of Public IP down to the NSX-T Data Center Edge is not compatible with reverse DNS Lookup.
43
43
44
44
## Configure a Public IP in the Azure portal
45
45
1. Log on to the Azure portal.
@@ -48,8 +48,8 @@ The architecture shows Internet access to and from your Azure VMware Solution pr
48
48
1. In the left navigation, under **Workload Networking**, select **Internet connectivity**.
49
49
4. Select the **Connect using Public IP down to the NSX-T Edge** button.
50
50
51
-
>[!TIP]
52
-
>Before selecting a Public IP, ensure you understand the implications to your existing environment. For more information, see [Internet connectivity design considerations](concepts-design-public-internet-access.md).
51
+
>[!IMPORTANT]
52
+
>Before selecting a Public IP, ensure you understand the implications to your existing environment. For more information, see [Internet connectivity design considerations](concepts-design-public-internet-access.md). This should include a risk mitigation review with your relevant networking and security governance and compliance teams.
53
53
54
54
5. Select **Public IP**.
55
55
:::image type="content" source="media/public-ip-nsx-edge/public-ip-internet-connectivity.png" alt-text="Diagram that shows how to select public IP to the NSX Edge":::
@@ -61,21 +61,21 @@ The architecture shows Internet access to and from your Azure VMware Solution pr
61
61
9. After configuring the Public IP, select the **Connect using the Public IP down to the NSX-T Edge** checkbox to disable all other Internet options.
62
62
10. Select **Save**.
63
63
64
-
You have successfully enabled Internet connectivity for your Azure VMware Solution private cloud and reserved a Microsoft allocated Public IP. You can now configure this Public IP down to the NSXEdge for your workloads. The NSX-T Datacenter is used for all VM communication. There are several options for configuring your reserved Public IP down to the NSX Edge.
64
+
You have successfully enabled Internet connectivity for your Azure VMware Solution private cloud and reserved a Microsoft allocated Public IP. You can now configure this Public IP down to the NSX-T Data Center Edge for your workloads. The NSX-T Data Center is used for all VM communication. There are several options for configuring your reserved Public IP down to the NSX-T Data Center Edge.
65
65
66
-
There are three options for configuring your reserved Public IP down to the NSX Edge: Outbound Internet Access for VMs, Inbound Internet Access for VMs, and Gateway Firewall used to Filter Traffic to VMs at T1 Gateways.
66
+
There are three options for configuring your reserved Public IP down to the NSX-T Data Center Edge: Outbound Internet Access for VMs, Inbound Internet Access for VMs, and Gateway Firewall used to Filter Traffic to VMs at T1 Gateways.
67
67
68
68
### Outbound Internet access for VMs
69
69
70
70
A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT) is used to allow many VMs to one SNAT service. This connection means you can provide Internet connectivity for many VMs.
71
71
72
72
>[!IMPORTANT]
73
-
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-network-address-tranlation-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
73
+
> To enable SNAT for your specified address ranges, you must [configure a gateway firewall rule](#gateway-firewall-used-to-filter-traffic-to-vms-at-t1-gateways) and SNAT for the specific address ranges you desire. If you don't want SNAT enabled for specific address ranges, you must create a [No-NAT rule](#no-network-address-translation-rule-for-specific-address-ranges) for the address ranges to exclude. For your SNAT service to work as expected, the No-NAT rule should be a lower priority than the SNAT rule.
74
74
75
75
**Add rule**
76
-
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**
77
-
2. Locate your NSX-T URL and credentials.
78
-
3. Log in to **VMWare NSX-T**.
76
+
1. From your Azure VMware Solution private cloud, select **vCenter Server Credentials**
77
+
2. Locate your NSX-T Manager URL and credentials.
78
+
3. Log in to **VMware NSX-T Manager**.
79
79
4. Navigate to **NAT Rules**.
80
80
5. Select the T1 Router.
81
81
1. Select **ADD NAT RULE**.
@@ -89,15 +89,15 @@ A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT)
89
89
1. Optionally, give the rule a higher priority number. This prioritization will move the rule further down the rule list to ensure more specific rules are matched first.
90
90
1. Click **SAVE**.
91
91
92
-
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
Logging can be enabled by way of the logging slider. For more information on NSX-T Data Center NAT configuration and options, see the
93
+
[NSX-T Data Center NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
94
94
95
-
### No Network Address Tranlation rule for specific address ranges
95
+
### No Network Address Translation rule for specific address ranges
96
96
97
-
A No SNAT rule in NSX manager can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass existing network translation rules.
98
-
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**.
99
-
1. Locate your NSX-T URL and credentials.
100
-
1. Log in to **VMWare NSX-T** and then select **NAT Rules**.
97
+
A No SNAT rule in NSX-T Manager can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass existing network translation rules.
98
+
1. From your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
99
+
1. Locate your NSX-T Manager URL and credentials.
100
+
1. Log in to **VMware NSX-T Manager** and then select **NAT Rules**.
101
101
1. Select the T1 Router and then select **ADD NAT RULE**.
102
102
1. Select **NO SNAT** rule as the type of NAT rule.
103
103
1. Select the **Source IP** as the range of addresses you do not want to be translated. The **Destination IP** should be any internal addresses you are reaching from the range of Source IP ranges.
@@ -106,10 +106,10 @@ A No SNAT rule in NSX manager can be used to exclude certain matches from perfor
106
106
### Inbound Internet Access for VMs
107
107
A Destination Network Translation Service (DNAT) is used to expose a VM on a specific Public IP address and/or a specific port. This service provides inbound internet access to your workload VMs.
108
108
109
-
**Log in to VMware NSX-T**
109
+
**Log in to VMware NSX-T Manager**
110
110
1. From your Azure VMware Solution private cloud, select **VMware credentials**.
111
-
2. Locate your NSX-T URL and credentials.
112
-
3. Log in to **VMware NSX-T**.
111
+
2. Locate your NSX-T Manager URL and credentials.
112
+
3. Log in to **VMware NSX-T Manager**.
113
113
114
114
**Configure the DNAT rule**
115
115
1. Name the rule.
@@ -125,8 +125,8 @@ The VM is now exposed to the internet on the specific Public IP and/or specific
125
125
126
126
You can provide security protection for your network traffic in and out of the public internet through your Gateway Firewall.
127
127
1. From your Azure VMware Solution Private Cloud, select **VMware credentials**.
128
-
2. Locate your NSX-T URL and credentials.
129
-
3. Log in to **VMware NSX-T**.
128
+
2. Locate your NSX-T Manager URL and credentials.
129
+
3. Log in to **VMware NSX-T Manager**.
130
130
4. From the NSX-T home screen, select **Gateway Policies**.
131
131
5. Select **Gateway Specific Rules**, choose the T1 Gateway and select **ADD POLICY**.
132
132
6. Select **New Policy** and enter a policy name.
@@ -143,8 +143,8 @@ For example, the following rule is set to Match External Address, and this setti
143
143
:::image type="content" source="media/public-ip-nsx-edge/gateway-specific-rules-match-external-connectivity.png" alt-text="Screenshot Internet connectivity inbound Public IP." lightbox="media/public-ip-nsx-edge/gateway-specific-rules-match-external-connectivity-expanded.png":::
144
144
145
145
If **Match Internal Address** was specified, the destination would be the internal or private IP address of the VM.
146
-
For more information on the NSX-T Gateway Firewall see the [NSX-T Gateway Firewall Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-A52E1A6F-F27D-41D9-9493-E3A75EC35481.html)
147
-
The Distributed Firewall could be used to filter traffic to VMs. This feature is outside the scope of this document. For more information, see [NSX-T Distributed Firewall Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-6AB240DB-949C-4E95-A9A7-4AC6EF5E3036.html).
146
+
For more information on the NSX-T Data Center Gateway Firewall see the [NSX-T Data Center Gateway Firewall Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-A52E1A6F-F27D-41D9-9493-E3A75EC35481.html)
147
+
The Distributed Firewall could be used to filter traffic to VMs. This feature is outside the scope of this document. For more information, see [NSX-T Data Center Distributed Firewall Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-6AB240DB-949C-4E95-A9A7-4AC6EF5E3036.html).
0 commit comments