Skip to content

Commit 7960a5e

Browse files
Merge pull request #249276 from cherylmc/fresh4
freshness update
2 parents fc1a2aa + 1851b84 commit 7960a5e

9 files changed

+23
-23
lines changed

articles/virtual-wan/azure-vpn-client-optional-configurations-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure the Azure VPN Client optional configuration
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: how-to
8-
ms.date: 07/20/2022
8+
ms.date: 08/24/2023
99
ms.author: cherylmc
1010

1111
---

articles/virtual-wan/install-client-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to install client certificates for User VPN P2S certifica
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: how-to
8-
ms.date: 07/06/2022
8+
ms.date: 08/24/2023
99
ms.author: cherylmc
1010

1111
---

articles/virtual-wan/quickstart-any-to-any-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to create an any-to-any configuration using an Azure Reso
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: quickstart
8-
ms.date: 06/14/2022
8+
ms.date: 08/24/2023
99
ms.author: cherylmc
1010
ms.custom: subject-armqs, mode-arm, devx-track-arm-template
1111
---

articles/virtual-wan/scenario-any-to-any.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: virtual-wan
99
ms.topic: conceptual
10-
ms.date: 04/27/2021
10+
ms.date: 08/24/2023
1111
ms.author: cherylmc
1212
ms.custom: fasttrack-edit
1313

articles/virtual-wan/scenario-isolate-vnets-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: virtual-wan
99
ms.topic: conceptual
10-
ms.date: 04/27/2021
10+
ms.date: 08/24/2023
1111
ms.author: cherylmc
1212

1313
---

articles/virtual-wan/scenario-isolate-vnets.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: virtual-wan
99
ms.topic: conceptual
10-
ms.date: 05/26/2021
10+
ms.date: 08/24/2023
1111
ms.author: cherylmc
1212
ms.custom: fasttrack-edit
1313

@@ -18,7 +18,7 @@ When working with Virtual WAN virtual hub routing, there are quite a few availab
1818

1919
## <a name="design"></a>Design
2020

21-
In this scenario, the workload within a certain VNet remains isolated and is not able to communicate with other VNets. However, the VNets are required to reach all branches (VPN, ER, and User VPN). In order to figure out how many route tables will be needed, you can build a connectivity matrix. For this scenario it will look like the following table, where each cell represents whether a source (row) can communicate to a destination (column):
21+
In this scenario, the workload within a certain VNet remains isolated and isn't able to communicate with other VNets. However, the VNets are required to reach all branches (VPN, ER, and User VPN). In order to figure out how many route tables will be needed, you can build a connectivity matrix. For this scenario it will look like the following table, where each cell represents whether a source (row) can communicate to a destination (column):
2222

2323
| From | To | *VNets* | *Branches* |
2424
| -------------- | -------- | ---------- | ---|
@@ -27,9 +27,9 @@ In this scenario, the workload within a certain VNet remains isolated and is not
2727

2828
Each of the cells in the previous table describes whether a Virtual WAN connection (the "From" side of the flow, the row headers) communicates with a destination prefix (the "To" side of the flow, the column headers in italics). In this scenario there are no firewalls or Network Virtual Appliances, so communications flows directly over Virtual WAN (hence the word "Direct" in the table).
2929

30-
This connectivity matrix gives us two different row patterns, which translate to two route tables. Virtual WAN already has a Default route table, so we will need another route table. For this example, we will name the route table **RT_VNET**.
30+
This connectivity matrix gives us two different row patterns, which translate to two route tables. Virtual WAN already has a Default route table, so we'll need another route table. For this example, we'll name the route table **RT_VNET**.
3131

32-
VNets will be associated to this **RT_VNET** route table. Because they need connectivity to branches, branches will need to propagate to **RT_VNET** (otherwise the VNets would not learn the branch prefixes). Since the branches are always associated to the Default route table, VNets will need to propagate to the Default route table. As a result, this is the final design:
32+
VNets will be associated to this **RT_VNET** route table. Because they need connectivity to branches, branches need to propagate to **RT_VNET** (otherwise the VNets wouldn't learn the branch prefixes). Since the branches are always associated to the Default route table, VNets need to propagate to the Default route table. As a result, this is the final design:
3333

3434
* Virtual networks:
3535
* Associated route table: **RT_VNET**
@@ -50,7 +50,7 @@ In order to configure this scenario, take the following steps into consideration
5050
2. When you create the **RT_VNet** route table, configure the following settings:
5151

5252
* **Association**: Select the VNets you want to isolate.
53-
* **Propagation**: Select the option for branches, implying branch(VPN/ER/P2S) connections will propagate routes to this route table.
53+
* **Propagation**: Select the option for branches, implying branch(VPN/ER/P2S) connections propagate routes to this route table.
5454

5555
:::image type="content" source="./media/routing-scenarios/isolated/isolated-vnets.png" alt-text="Isolated VNets":::
5656

articles/virtual-wan/scenario-shared-services-vnet.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: virtual-wan
99
ms.topic: conceptual
10-
ms.date: 04/27/2021
10+
ms.date: 08/24/2023
1111
ms.author: cherylmc
1212
ms.custom: fasttrack-edit
1313

@@ -32,9 +32,9 @@ We can use a connectivity matrix to summarize the requirements of this scenario:
3232

3333
Each of the cells in the previous table describes whether a Virtual WAN connection (the "From" side of the flow, the row headers) communicates with a destination (the "To" side of the flow, the column headers in italics). In this scenario there are no firewalls or Network Virtual Appliances, so communication flows directly over Virtual WAN (hence the word "Direct" in the table).
3434

35-
Similarly to the [Isolated VNet scenario](scenario-isolate-vnets.md), this connectivity matrix gives us two different row patterns, which translate to two route tables (the shared services VNets and the branches have the same connectivity requirements). Virtual WAN already has a Default route table, so we will need another custom route table, which we will call **RT_SHARED** in this example.
35+
Similarly to the [Isolated VNet scenario](scenario-isolate-vnets.md), this connectivity matrix gives us two different row patterns, which translate to two route tables (the shared services VNets and the branches have the same connectivity requirements). Virtual WAN already has a Default route table, so we'll need another custom route table, which we will call **RT_SHARED** in this example.
3636

37-
VNets will be associated to the **RT_SHARED** route table. Because they need connectivity to branches and to the shared service VNets, the shared service VNet and branches will need to propagate to **RT_SHARED** (otherwise the VNets would not learn the branch and shared VNet prefixes). Because the branches are always associated to the Default route table, and the connectivity requirements are the same for shared services VNets, we will associate the shared service VNets to the Default route table too.
37+
VNets will be associated to the **RT_SHARED** route table. Because they need connectivity to branches and to the shared service VNets, the shared service VNet and branches will need to propagate to **RT_SHARED** (otherwise the VNets wouldn't learn the branch and shared VNet prefixes). Because the branches are always associated to the Default route table, and the connectivity requirements are the same for shared services VNets, we'll associate the shared service VNets to the Default route table too.
3838

3939
As a result, this is the final design:
4040

@@ -61,13 +61,13 @@ To configure the scenario, consider the following steps:
6161
2. Create a custom route table. In the example, we refer to the route table as **RT_SHARED**. For steps to create a route table, see [How to configure virtual hub routing](how-to-virtual-hub-routing.md). Use the following values as a guideline:
6262

6363
* **Association**
64-
* For **VNets *except* the shared services VNet**, select the VNets to isolate. This will imply that all these VNets (except the shared services VNet) will be able to reach destination based on the routes of RT_SHARED route table.
64+
* For **VNets *except* the shared services VNet**, select the VNets to isolate. This implies that all these VNets (except the shared services VNet) will be able to reach destination based on the routes of RT_SHARED route table.
6565

6666
* **Propagation**
6767
* For **Branches**, propagate routes to this route table, in addition to any other route tables you may have already selected. Because of this step, the RT_SHARED route table will learn routes from all branch connections (VPN/ER/User VPN).
6868
* For **VNets**, select the **shared services VNet**. Because of this step, RT_SHARED route table will learn routes from the shared services VNet connection.
6969

70-
This will result in the routing configuration shown in the following figure:
70+
This results in the routing configuration shown in the following figure:
7171

7272
:::image type="content" source="./media/routing-scenarios/shared-service-vnet/shared-services.png" alt-text="Diagram for shared services VNet." lightbox="./media/routing-scenarios/shared-service-vnet/shared-services.png":::
7373

articles/virtual-wan/virtual-wan-route-table-nva-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: virtual-wan
88
ms.topic: conceptual
9-
ms.date: 08/19/2021
9+
ms.date: 08/24/2023
1010
ms.author: cherylmc
1111
# Customer intent: As someone with a networking background, I want to create a route table using the portal.
1212
---
@@ -25,7 +25,7 @@ Verify that you have met the following criteria:
2525

2626
* A private IP address must be assigned to the NVA network interface.
2727

28-
* The NVA is not deployed in the virtual hub. It must be deployed in a separate virtual network.
28+
* The NVA isn't deployed in the virtual hub. It must be deployed in a separate virtual network.
2929

3030
* The NVA virtual network may have one or many virtual networks connected to it. In this article, we refer to the NVA virtual network as an 'indirect spoke VNet'. These virtual networks can be connected to the NVA VNet by using VNet peering. The VNet Peering links are depicted by black arrows in the above figure between VNet 1, VNet 2, and NVA VNet.
3131
* You have created two virtual networks. They will be used as spoke VNets.
@@ -34,7 +34,7 @@ Verify that you have met the following criteria:
3434

3535
* Ensure there are no virtual network gateways in any of the VNets.
3636

37-
* The VNets do not require a gateway subnet.
37+
* The VNets don't require a gateway subnet.
3838

3939
## <a name="signin"></a>1. Sign in
4040

@@ -99,7 +99,7 @@ Repeat the following procedure for each virtual network that you want to connect
9999
* **Connection name** - Name your connection.
100100
* **Hubs** - Select the hub you want to associate with this connection.
101101
* **Subscription** - Verify the subscription.
102-
* **Virtual network** - Select the virtual network you want to connect to this hub. The virtual network cannot have an already existing virtual network gateway.
102+
* **Virtual network** - Select the virtual network you want to connect to this hub. The virtual network can't have an already existing virtual network gateway.
103103
4. Click **OK** to create the connection.
104104

105105
## Next steps

articles/virtual-wan/virtual-wan-route-table-nva.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: virtual-wan
88
ms.topic: conceptual
9-
ms.date: 09/22/2020
9+
ms.date: 08/24/2023
1010
ms.author: cherylmc
1111
ms.custom: devx-track-azurepowershell
1212
# Customer intent: As someone with a networking background, I want to work with routing tables for NVA.
@@ -35,16 +35,16 @@ Verify that you have met the following criteria:
3535

3636
* You have a Network Virtual Appliance (NVA). This is a third-party software of your choice that is typically provisioned from Azure Marketplace in a virtual network.
3737
* You have a private IP assigned to the NVA network interface.
38-
* The NVA cannot be deployed in the virtual hub. It must be deployed in a separate VNet. For this article, the NVA VNet is referred to as the 'DMZ VNet'.
38+
* The NVA can't be deployed in the virtual hub. It must be deployed in a separate VNet. For this article, the NVA VNet is referred to as the 'DMZ VNet'.
3939
* The ‘DMZ VNet’ may have one or many virtual networks connected to it. In this article, this VNet is referred to as ‘Indirect spoke VNet’. These VNets can be connected to the DMZ VNet using VNet peering.
4040
* Verify that you have 2 VNets already created. These will be used as spoke VNets. For this article, the VNet spoke address spaces are 10.0.2.0/24 and 10.0.3.0/24. If you need information on how to create a VNet, see [Create a virtual network using PowerShell](../virtual-network/quick-create-powershell.md).
4141
* Ensure there are no virtual network gateways in any VNets.
4242

4343
## <a name="signin"></a>1. Sign in
4444

45-
Make sure you install the latest version of the Resource Manager PowerShell cmdlets. For more information about installing PowerShell cmdlets, see [How to install and configure Azure PowerShell](/powershell/azure/install-azure-powershell). This is important because earlier versions of the cmdlets do not contain the current values that you need for this exercise.
45+
Make sure you install the latest version of the Resource Manager PowerShell cmdlets. For more information about installing PowerShell cmdlets, see [How to install and configure Azure PowerShell](/powershell/azure/install-azure-powershell). This is important because earlier versions of the cmdlets don't contain the current values that you need for this exercise.
4646

47-
1. Open your PowerShell console with elevated privileges, and sign in to your Azure account. This cmdlet prompts you for the sign-in credentials. After signing in, it downloads your account settings so that they are available to Azure PowerShell.
47+
1. Open your PowerShell console with elevated privileges, and sign in to your Azure account. This cmdlet prompts you for the sign-in credentials. After signing in, it downloads your account settings so that they're available to Azure PowerShell.
4848

4949
```powershell
5050
Connect-AzAccount

0 commit comments

Comments
 (0)