You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-about-networking.md
+17-18Lines changed: 17 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,28 +2,27 @@
2
2
title: About networking in Azure VM disaster recovery with Azure Site Recovery
3
3
description: Provides an overview of networking for replication of Azure VMs using Azure Site Recovery.
4
4
author: ankitaduttaMSFT
5
-
manager: rochakm
6
5
ms.service: azure-site-recovery
7
-
ms.topic: conceptual
8
-
ms.date: 11/21/2021
6
+
ms.topic: how-to
7
+
ms.date: 09/11/2024
9
8
ms.author: ankitadutta
10
9
ms.custom: engagement-fy23
11
10
---
12
-
# About networking in Azure VM disaster recovery
11
+
# About networking in Azure virtual machine disaster recovery
13
12
14
13
15
14
16
-
This article provides networking guidance for platform connectivity when you're replicating Azure VMs from one region to another, using [Azure Site Recovery](site-recovery-overview.md).
15
+
This article provides networking guidance for platform connectivity when you're replicating Azure virtual machines from one region to another, using [Azure Site Recovery](site-recovery-overview.md).
17
16
18
17
## Before you start
19
18
20
19
Learn how Site Recovery provides disaster recovery for [this scenario](azure-to-azure-architecture.md).
21
20
22
21
## Typical network infrastructure
23
22
24
-
The following diagram depicts a typical Azure environment, for applications running on Azure VMs:
23
+
The following diagram depicts a typical Azure environment, for applications running on Azure virtual machines:
25
24
26
-

25
+

27
26
28
27
If you're using Azure ExpressRoute or a VPN connection from your on-premises network to Azure, the environment is as follows:
29
28
@@ -44,24 +43,24 @@ If you're using a URL-based firewall proxy to control outbound connectivity, all
44
43
45
44
**URL** | **Details**
46
45
--- | ---
47
-
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
46
+
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the virtual machine. If you know all the cache storage accounts for your virtual machines, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
48
47
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
49
-
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
50
-
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
48
+
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the virtual machine.
49
+
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the virtual machine.
51
50
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
52
51
*.automation.ext.azure.com | Allows enabling autoupgrade of mobility agent for a replicated item via portal
53
52
54
53
## Outbound connectivity using Service Tags
55
54
56
55
Apart from controlling URLs, you can also use service tags to control connectivity. To do so, you must first create a [Network Security Group](../virtual-network/network-security-group-how-it-works.md) in Azure. Once created, you need to use our existing service tags and create an NSG rule to allow access to Azure Site Recovery services.
57
56
58
-
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there is no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication is not impacted for your machines. Whereas, a dependency on hard coded IP addresses causes the replication status to become critical and put your systems at risk. Moreover, service tags ensure better security, stability and resiliency than hard coded IP addresses.
57
+
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there's no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication isn't impacted for your machines. Whereas, a dependency on hard coded IP addresses causes the replication status to become critical and put your systems at risk. Moreover, service tags ensure better security, stability and resiliency than hard coded IP addresses.
59
58
60
59
While using NSG to control outbound connectivity, these service tags need to be allowed.
61
60
62
61
- For the storage accounts in source region:
63
62
- Create a [Storage service tag](../virtual-network/network-security-groups-overview.md#service-tags) based NSG rule for the source region.
64
-
- Allow these addresses so that data can be written to the cache storage account, from the VM.
63
+
- Allow these addresses so that data can be written to the cache storage account, from the virtual machine.
65
64
- Create a [Microsoft Entra service tag](../virtual-network/network-security-groups-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to Microsoft Entra ID
66
65
- Create an EventsHub service tag-based NSG rule for the target region, allowing access to Site Recovery monitoring.
67
66
- Create an Azure Site Recovery service tag-based NSG rule for allowing access to Site Recovery service in any region.
@@ -71,10 +70,10 @@ While using NSG to control outbound connectivity, these service tags need to be
71
70
72
71
## Example NSG configuration
73
72
74
-
This example shows how to configure NSG rules for a VM to replicate.
73
+
This example shows how to configure NSG rules for a virtual machine to replicate.
75
74
76
75
- If you're using NSG rules to control outbound connectivity, use "Allow HTTPS outbound" rules to port:443 for all the required IP address ranges.
77
-
- The example presumes that the VM source location is "East US" and the target location is "Central US".
76
+
- The example presumes that the virtual machine source location is "East US" and the target location is "Central US".
78
77
79
78
### NSG rules - East US
80
79
@@ -104,18 +103,18 @@ These rules are required so that replication can be enabled from the target regi
104
103
105
104
## Network virtual appliance configuration
106
105
107
-
If you're using network virtual appliances (NVAs) to control outbound network traffic from VMs, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't go to the NVA.
106
+
If you're using network virtual appliances (NVAs) to control outbound network traffic from virtual machines, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't go to the NVA.
108
107
109
108
### Create network service endpoint for Storage
110
109
111
110
You can create a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't leave Azure boundary.
112
111
113
-
- Select your Azure virtual network and click on 'Service endpoints'
112
+
- Select your Azure virtual network and select **Service endpoints**.
-Click 'Add' and 'Add service endpoints' tab opens
118
-
- Select 'Microsoft.Storage' under 'Service' and the required subnets under 'Subnets' field and click 'Add'
116
+
-Select **Add** and **Add service endpoints** tab opens.
117
+
- Select *Microsoft.Storage* under **Service** and the required subnets under 'Subnets' field and select **Add**.
119
118
120
119
>[!NOTE]
121
120
>If you're using firewall enabled cache storage account or target storage account, ensure you ['Allow trusted Microsoft services'](../storage/common/storage-network-security.md). Also, ensure that you allow access to at least one subnet of source Vnet.
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-common-questions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article answers common questions about Azure virtual machine d
4
4
ms.author: ankitadutta
5
5
author: ankitaduttaMSFT
6
6
manager: rochakm
7
-
ms.date: 08/30/2024
7
+
ms.date: 09/16/2024
8
8
ms.topic: conceptual
9
9
ms.service: azure-site-recovery
10
10
@@ -268,7 +268,7 @@ Yes. By default, when you enable disaster recovery for Azure virtual machines, S
268
268
269
269
Site Recovery tries to provide the IP address at the time of failover. If another virtual machine uses that address, Site Recovery sets the next available IP address as the target.
270
270
271
-
[Learn more about](azure-to-azure-network-mapping.md#set-up-ip-addressing-for-target-vms) setting up network mapping and IP addressing for virtual networks.
271
+
[Learn more about](azure-to-azure-network-mapping.md#set-up-ip-addressing-for-target-virtual-machines) setting up network mapping and IP addressing for virtual networks.
title: Map virtual networks between two regions in Azure Site Recovery
3
-
description: Learn about mapping virtual networks between two Azure regions for Azure VM disaster recovery with Azure Site Recovery.
3
+
description: Learn about mapping virtual networks between two Azure regions for Azure virtual machine disaster recovery with Azure Site Recovery.
4
4
author: ankitaduttaMSFT
5
-
manager: rochakm
6
5
ms.service: azure-site-recovery
7
-
ms.topic: conceptual
8
-
ms.date: 08/31/2023
6
+
ms.topic: how-to
7
+
ms.date: 09/11/2024
9
8
ms.author: ankitadutta
10
9
ms.custom: engagement-fy23
11
10
@@ -29,74 +28,74 @@ Map networks as follows:
29
28
30
29
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping1.png" alt-text="Screenshot of Create a network mapping." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping1.png":::
31
30
32
-
3. In **Add network mapping**, select the source and target locations. In our example, the source VM is running in the East Asia region, and replicates to the Southeast Asia region.
31
+
3. In **Add network mapping**, select the source and target locations. In our example, the source virtual machine is running in the East Asia region, and replicates to the Southeast Asia region.
33
32
34
33
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping2.png" alt-text="Screenshot of Select source and target." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping2.png":::
35
-
3. Now create a network mapping in the opposite direction. In our example, the source will now be Southeast Asia, and the target will be East Asia.
34
+
3. Now create a network mapping in the opposite direction. In our example, the source is now Southeast Asia, and the target is East Asia.
36
35
37
36
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping3.png" alt-text="Screenshot of Add network mapping pane - Select source and target locations for the target network." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping3.png":::
38
37
39
38
40
39
## Map networks when you enable replication
41
40
42
-
If you haven't prepared network mapping before you configure disaster recovery for Azure VMs, you can specify a target network when you [set up and enable replication](azure-to-azure-how-to-enable-replication.md). When you do this the following happens:
41
+
If you haven't prepared network mapping before you configure disaster recovery for Azure virtual machines, you can specify a target network when you [set up and enable replication](azure-to-azure-how-to-enable-replication.md). When you do this, the following happens:
43
42
44
43
- Based on the target you select, Site Recovery automatically creates network mappings from the source to target region, and from the target to source region.
45
44
- By default, Site Recovery creates a network in the target region that's identical to the source network. Site Recovery adds **-asr** as a suffix to the name of the target network. You can customize the target network. For example, if the source network name was *contoso-vnet*, then the target network is named *contoso-vnet-asr*.
46
45
47
-
So, if the source network name was "contoso-vnet", then the target network name will be "contoso-vnet-asr". Source network's name will not be edited by ASR.
48
-
- If network mapping has already occurred for a source network, the mapped target network will always be the default at the time of enabling replications for more VMs. You can choose to change the target virtual network by choosing other available options from the dropdown.
46
+
So, if the source network name was "contoso-vnet", then the target network name is `contoso-vnet-asr`. Source network's name won't be edited by Azure Site Recovery.
47
+
- If network mapping has already occurred for a source network, the mapped target network is always the default at the time of enabling replications for more virtual machines. You can choose to change the target virtual network by choosing other available options from the dropdown.
49
48
- To change the default target virtual network for new replications, you need to modify the existing network mapping.
50
49
- If you wish to modify a network mapping from region A to region B, ensure that you first delete the network mapping from region B to region A. After reverse mapping deletion, modify the network mapping from region A to region B and then create the relevant reverse mapping.
51
50
52
51
>[!NOTE]
53
-
>* Modifying the network mapping only changes the defaults for new VM replications. It does not impact the target virtual network selections for existing replications.
52
+
>* Modifying the network mapping only changes the defaults for new virtual machine replications. It does not impact the target virtual network selections for existing replications.
54
53
>* If you wish to modify the target network for an existing replication, go to **Network** Settings of the replicated item.
55
54
56
55
## Specify a subnet
57
56
58
-
The subnet of the target VM is selected based on the name of the subnet of the source VM.
57
+
The subnet of the target virtual machine is selected based on the name of the subnet of the source virtual machine.
59
58
60
-
- If a subnet with the same name as the source VM subnet is available in the target network, that subnet is set for the target VM.
59
+
- If a subnet with the same name as the source virtual machine subnet is available in the target network, that subnet is set for the target virtual machine.
61
60
- If a subnet with the same name doesn't exist in the target network, the first subnet in the alphabetical order is set as the target subnet.
62
-
- You can modify the target subnet in the **Network** settings for the VM.
61
+
- You can modify the target subnet in the **Network** settings for the virtual machine.
63
62
64
63
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/modify-subnet.png" alt-text="Screenshot of Network compute properties window." lightbox="./media/site-recovery-network-mapping-azure-to-azure/modify-subnet.png":::
65
64
66
-
## Set up IP addressing for target VMs
65
+
## Set up IP addressing for target virtual machines
67
66
68
67
The IP address for each NIC on a target virtual machine is configured as follows:
69
68
70
-
-**DHCP**: If the NIC of the source VM uses DHCP, the NIC of the target VM is also set to use DHCP.
71
-
-**Static IP address**: If the NIC of the source VM uses static IP addressing, the target VM NIC will also use a static IP address.
69
+
-**DHCP**: If the NIC of the source virtual machine uses DHCP, the NIC of the target virtual machine is also set to use DHCP.
70
+
-**Static IP address**: If the NIC of the source virtual machine uses static IP addressing, the target virtual machine NIC also uses a static IP address.
72
71
73
72
The same holds for the Secondary IP Configurations as well.
74
73
75
74
## IP address assignment during failover
76
75
77
76
>[!Note]
78
-
>The following approach is used to assign IP address to the target VM, irrespective of the NIC settings.
77
+
>The following approach is used to assign IP address to the target virtual machine, irrespective of the NIC settings.
79
78
80
79
**Source and target subnets** | **Details**
81
80
--- | ---
82
-
Same address space | IP address of the source VM NIC is set as the target VM NIC IP address.<br/><br/> If the address isn't available, the next available IP address is set as the target.
83
-
Different address space | The next available IP address in the target subnet is set as the target VM NIC address.
81
+
Same address space | IP address of the source virtual machine NIC is set as the target virtual machine NIC IP address.<br/><br/> If the address isn't available, the next available IP address is set as the target.
82
+
Different address space | The next available IP address in the target subnet is set as the target virtual machine NIC address.
84
83
85
84
86
85
87
86
## IP address assignment during test failover
88
87
89
88
**Target network** | **Details**
90
89
--- | ---
91
-
Target network is the failover VNet | - Target IP address will be static with the same IP address. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range. For example: If the source IP address is 10.0.0.19 and failover network uses range 10.0.0.0/24, then the next IP address assigned to the target VM is 10.0.0.254.
92
-
Target network isn't the failover VNet | - Target IP address will be static with the same IP address, only if it is available in the target virtual network. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range.<br/><br/> For example: If the source static IP address is 10.0.0.19 and failover is on a network that isn't the failover network, with the range 10.0.0.0/24, then the target static IP address will be 10.0.0.19 if available, and otherwise it will be 10.0.0.254.
90
+
Target network is the failover VNet | - Target IP address is static with the same IP address. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range. For example: If the source IP address is `10.0.0.19` and failover network uses range `10.0.0.0/24`, then the next IP address assigned to the target virtual machine is `10.0.0.254`.
91
+
Target network isn't the failover VNet | - Target IP address is static with the same IP address, only if it's available in the target virtual network. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range.<br/><br/> For example: If the source static IP address is `10.0.0.19` and failover is on a network that isn't the failover network, with the range `10.0.0.0/24`, then the target static IP address is `10.0.0.19` if available. Otherwise it is `10.0.0.254`.
93
92
94
93
- The failover VNet is the target network that you select when you set up disaster recovery.
95
-
- We recommend that you always use a non-production network for test failover.
96
-
- You can modify the target IP address in the **Network** settings of the VM.
94
+
- We recommend that you always use a nonproduction network for test failover.
95
+
- You can modify the target IP address in the **Network** settings of the virtual machine.
97
96
98
97
99
98
## Next steps
100
99
101
-
- Review [networking guidance](./azure-to-azure-about-networking.md) for Azure VM disaster recovery.
100
+
- Review [networking guidance](./azure-to-azure-about-networking.md) for Azure virtual machine disaster recovery.
102
101
-[Learn more](site-recovery-retain-ip-azure-vm-failover.md) about retaining IP addresses after failover.
0 commit comments