Skip to content

Commit 828cf8e

Browse files
committed
connectivity A2A
1 parent 545f612 commit 828cf8e

File tree

4 files changed

+10
-77
lines changed

4 files changed

+10
-77
lines changed

articles/site-recovery/azure-to-azure-about-networking.md

Lines changed: 4 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: sujayt
66
manager: rochakm
77
ms.service: site-recovery
88
ms.topic: article
9-
ms.date: 1/8/2020
9+
ms.date: 1/23/2020
1010
ms.author: sutalasi
1111

1212
---
@@ -45,77 +45,21 @@ If you are using a URL-based firewall proxy to control outbound connectivity, al
4545
--- | ---
4646
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
4747
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
48-
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM. You can use the corresponding 'Site Recovery IP' if your firewall proxy supports IPs.
49-
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM. You can use the corresponding 'Site Recovery Monitoring IP' if your firewall proxy supports IPs.
48+
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
49+
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
5050

5151
## Outbound connectivity for IP address ranges
5252

53-
If you are using an IP-based firewall proxy, or NSG to control outbound connectivity, these IP ranges need to be allowed.
53+
If you are using an NSG to control outbound connectivity, these service tags need to be allowed.
5454

5555
- All IP address ranges that correspond to the storage accounts in source region
5656
- Create a [Storage service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for the source region.
5757
- Allow these addresses so that data can be written to the cache storage account, from the VM.
5858
- Create a [Azure Active Directory (AAD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to AAD
59-
- If new addresses are added to the Azure Active Directory (AAD) in the future, you need to create new NSG rules.
6059
- Create an EventsHub service tag based NSG rule for the target region, allowing access to Site Recovery monitoring.
6160
- Create an AzureSiteRecovery service tag based NSG rule for allowing access to Site Recovery service in any region.
6261
- We recommend that you create the required NSG rules on a test NSG, and verify that there are no problems before you create the rules on a production NSG.
6362

64-
65-
If you prefer using Site Recovery IP address ranges (not recommended), please refer the below table:
66-
67-
**Target** | **Site Recovery IP** | **Site Recovery monitoring IP**
68-
--- | --- | ---
69-
East Asia | 52.175.17.132 | 13.94.47.61
70-
Southeast Asia | 52.187.58.193 | 13.76.179.223
71-
Central India | 52.172.187.37 | 104.211.98.185
72-
South India | 52.172.46.220 | 104.211.224.190
73-
North Central US | 23.96.195.247 | 168.62.249.226
74-
North Europe | 40.69.212.238 | 52.169.18.8
75-
West Europe | 52.166.13.64 | 40.68.93.145
76-
East US | 13.82.88.226 | 104.45.147.24
77-
West US | 40.83.179.48 | 104.40.26.199
78-
South Central US | 13.84.148.14 | 104.210.146.250
79-
Central US | 40.69.144.231 | 52.165.34.144
80-
East US 2 | 52.184.158.163 | 40.79.44.59
81-
Japan East | 52.185.150.140 | 138.91.1.105
82-
Japan West | 52.175.146.69 | 138.91.17.38
83-
Brazil South | 191.234.185.172 | 23.97.97.36
84-
Australia East | 104.210.113.114 | 191.239.64.144
85-
Australia Southeast | 13.70.159.158 | 191.239.160.45
86-
Canada Central | 52.228.36.192 | 40.85.226.62
87-
Canada East | 52.229.125.98 | 40.86.225.142
88-
West Central US | 52.161.20.168 | 13.78.149.209
89-
West US 2 | 52.183.45.166 | 13.66.228.204
90-
UK West | 51.141.3.203 | 51.141.14.113
91-
UK South | 51.140.43.158 | 51.140.189.52
92-
UK South 2 | 13.87.37.4| 13.87.34.139
93-
UK North | 51.142.209.167 | 13.87.102.68
94-
Korea Central | 52.231.28.253 | 52.231.32.85
95-
Korea South | 52.231.198.185 | 52.231.200.144
96-
France Central | 52.143.138.106 | 52.143.136.55
97-
France South | 52.136.139.227 |52.136.136.62
98-
Australia central| 20.36.34.70 | 20.36.46.142
99-
Australia Central 2| 20.36.69.62 | 20.36.74.130
100-
South Africa West | 102.133.72.51 | 102.133.26.128
101-
South Africa North | 102.133.160.44 | 102.133.154.128
102-
US Gov Virginia | 52.227.178.114 | 23.97.0.197
103-
US Gov Iowa | 13.72.184.23 | 23.97.16.186
104-
US Gov Arizona | 52.244.205.45 | 52.244.48.85
105-
US Gov Texas | 52.238.119.218 | 52.238.116.60
106-
US DoD East | 52.181.164.103 | 52.181.162.129
107-
US DoD Central | 52.182.95.237 | 52.182.90.133
108-
China North | 40.125.202.254 | 42.159.4.151
109-
China North 2 | 40.73.35.193 | 40.73.33.230
110-
China East | 42.159.205.45 | 42.159.132.40
111-
China East 2 | 40.73.118.52| 40.73.100.125
112-
Germany North| 51.116.208.58| 51.116.58.128
113-
Germany West Central | 51.116.156.176 | 51.116.154.192
114-
Switzerland West | 51.107.231.223| 51.107.154.128
115-
Switzerland North | 51.107.68.31| 51.107.58.128
116-
Norway East | 51.120.100.64| 51.120.98.128
117-
Norway West | 51.120.220.65| 51.120.218.160
118-
11963
## Example NSG configuration
12064

12165
This example shows how to configure NSG rules for a VM to replicate.

articles/site-recovery/azure-to-azure-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: rayne-wiselman
66
manager: carmonm
77
ms.service: site-recovery
88
ms.topic: conceptual
9-
ms.date: 1/08/2020
9+
ms.date: 1/23/2020
1010
ms.author: raynew
1111
---
1212

@@ -142,7 +142,7 @@ Please note that details of network connectivity requirements can be found in [
142142
**Rule** | **Details** | **Service tag**
143143
--- | --- | ---
144144
Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage accounts in the source region | Storage.\<region-name>
145-
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Active Directory (Azure AD).<br/><br/> If Azure AD addresses are added in future you need to create new Network Security Group (NSG) rules. | AzureActiveDirectory
145+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Active Directory (Azure AD) | AzureActiveDirectory
146146
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the target region. | EventsHub.\<region-name>
147147
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
148148

@@ -151,7 +151,7 @@ Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Reco
151151
**Rule** | **Details** | **Service tag**
152152
--- | --- | ---
153153
Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage accounts in the target region | Storage.\<region-name>
154-
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure AD.<br/><br/> If Azure AD addresses are added in future you need to create new NSG rules. | AzureActiveDirectory
154+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure AD | AzureActiveDirectory
155155
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the source region. | EventsHub.\<region-name>
156156
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
157157

articles/site-recovery/azure-to-azure-tutorial-enable-replication.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rayne-wiselman
55
manager: carmonm
66
ms.service: site-recovery
77
ms.topic: tutorial
8-
ms.date: 1/8/2020
8+
ms.date: 1/24/2020
99
ms.author: raynew
1010
ms.custom: mvc
1111
---
@@ -77,17 +77,6 @@ If you're using a URL-based firewall proxy to control outbound connectivity, all
7777

7878
If you're using NSG, create service tag based NSG rules for access to Azure Storage, Azure Active Directory, Site Recovery service and Site Recovery monitoring. [Learn more](azure-to-azure-about-networking.md#outbound-connectivity-for-ip-address-ranges).
7979

80-
If you want to control outbound connectivity using IP addresses instead of NSG rules, allow these addresses for IP-based firewalls, proxy, or NSG rules.
81-
82-
>[!NOTE]
83-
>It is recommended to always configure NSG rules with service tags for outbound access.
84-
85-
- [Microsoft Azure Datacenter IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653)
86-
- [Windows Azure Datacenter IP Ranges in Germany](https://www.microsoft.com/download/details.aspx?id=54770)
87-
- [Windows Azure Datacenter IP Ranges in China](https://www.microsoft.com/download/details.aspx?id=42064)
88-
- [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2#bkmk_identity)
89-
- [Site Recovery service endpoint IP addresses](https://aka.ms/site-recovery-public-ips)
90-
9180
## Verify Azure VM certificates
9281

9382
Check that the VMs you want to replicate have the latest root certificates. If they don't the VM can't registered to Site Recovery, due to security constraints.

articles/site-recovery/site-recovery-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: General questions about the Azure Site Recovery service
33
description: This article discusses popular general questions about Azure Site Recovery.
44
ms.topic: conceptual
5-
ms.date: 1/10/2020
5+
ms.date: 1/24/2020
66
ms.author: raynew
77

88
---
@@ -142,7 +142,7 @@ Azure Site Recovery replicates data to an Azure storage account or managed disks
142142

143143
### Why can't I replicate over VPN?
144144

145-
When you replicate to Azure, replication traffic reaches the public endpoints of an Azure Storage. Thus you can only replicate over the public internet with ExpressRoute (Microsoft peering or an existing public peering), and VPN doesn't work.
145+
When you replicate to Azure, replication traffic reaches the public endpoints of an Azure Storage. Thus you can only replicate over the public internet or via ExpressRoute (Microsoft peering or an existing public peering).
146146

147147
### Can I use Riverbed SteelHeads for replication?
148148

0 commit comments

Comments
 (0)