You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/nat-gateway-resource.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Design virtual networks with NAT gateway
3
-
titleSuffix: Azure Virtual Network NAT
3
+
titleSuffix: Azure NAT Gateway
4
4
description: Learn how to design virtual networks that use Network Address Translation (NAT) gateway resources.
5
5
author: asudbring
6
6
ms.service: virtual-network
@@ -14,11 +14,11 @@ ms.author: allensu
14
14
15
15
# Design virtual networks with NAT gateway
16
16
17
-
NAT gateway provides outbound internet connectivity for one or more subnets of a virtual network. Once NAT gateway is associated to a subnet, NAT provides source network address translation (SNAT) for that subnet. NAT gateway specifies which static IP addresses virtual machines use when creating outbound flows. Static IP addresses come from public IP addresses, public IP prefixes, or both. If a public IP prefix is used, all IP addresses of the entire public IP prefix are consumed by a NAT gateway. A NAT gateway can use up to 16 static IP addresses from either.
17
+
NAT gateway provides outbound internet connectivity for one or more subnets of a virtual network. Once NAT gateway is associated to a subnet, NAT gateway provides source network address translation (SNAT) for that subnet. NAT gateway specifies which static IP addresses virtual machines use when creating outbound flows. Static IP addresses come from public IP addresses, public IP prefixes, or both. If a public IP prefix is used, all IP addresses of the entire public IP prefix are consumed by a NAT gateway. A NAT gateway can use up to 16 static IP addresses from either.
18
18
19
19
:::image type="content" source="./media/nat-overview/flow-direction1.png" alt-text="Diagram of a NAT gateway resource with virtual machines and a Virtual Machine Scale Set.":::
20
20
21
-
*Figure: Virtual Network NAT for outbound to internet*
21
+
*Figure: NAT gateway for outbound to internet*
22
22
23
23
## How to deploy NAT
24
24
@@ -64,7 +64,7 @@ The following examples demonstrate co-existence of a load balancer or instance-l
64
64
65
65
:::image type="content" source="./media/nat-overview/flow-direction2.png" alt-text="Diagram of a NAT gateway resource that consumes all IP addresses for a public IP prefix. The NAT gateway directs traffic for two subnets of VMs and a Virtual Machine Scale Set.":::
66
66
67
-
*Figure: Virtual Network NAT and VM with an instance level public IP*
67
+
*Figure: NAT gateway and VM with an instance level public IP*
68
68
69
69
| Direction | Resource |
70
70
|:---:|:---:|
@@ -77,7 +77,7 @@ VM will use NAT gateway for outbound. Inbound originated isn't affected.
77
77
78
78
:::image type="content" source="./media/nat-overview/flow-direction3.png" alt-text="Diagram that depicts a NAT gateway that supports outbound traffic to the internet from a virtual network and inbound traffic with a public load balancer.":::
79
79
80
-
*Figure: Virtual Network NAT and VM with a standard public load balancer*
80
+
*Figure: NAT gateway and VM with a standard public load balancer*
81
81
82
82
| Direction | Resource |
83
83
|:---:|:---:|
@@ -101,7 +101,7 @@ Any outbound configuration from a load-balancing rule or outbound rules is super
101
101
102
102
### Monitor outbound network traffic with NSG flow logs
103
103
104
-
A network security group allows you to filter inbound and outbound traffic to and from a virtual machine. To monitor outbound traffic flowing from NAT, you can enable NSG flow logs.
104
+
A network security group allows you to filter inbound and outbound traffic to and from a virtual machine. To monitor outbound traffic flowing from the virtual machine behind your NAT gateway, enable NSG flow logs.
105
105
106
106
To learn more about NSG flow logs, see [NSG Flow Log Overview](../../network-watcher/network-watcher-nsg-flow-logging-overview.md).
107
107
@@ -117,7 +117,7 @@ Review the following section for details and the [troubleshooting article](./tro
117
117
118
118
## Scalability
119
119
120
-
Scaling NAT gateway is primarily a function of managing the shared, available SNAT port inventory. NAT needs sufficient SNAT port inventory for expected peak outbound flows for all subnets that are attached to a NAT gateway. You can use public IP addresses, public IP prefixes, or both to create SNAT port inventory.
120
+
Scaling NAT gateway is primarily a function of managing the shared, available SNAT port inventory. NAT gateway needs sufficient SNAT port inventory for expected peak outbound flows for all subnets that are attached to a NAT gateway. You can use public IP addresses, public IP prefixes, or both to create SNAT port inventory.
121
121
122
122
A single NAT gateway can scale up to 16 IP addresses. Each NAT gateway public IP address provides 64,512 SNAT ports to make outbound connections. NAT gateway can scale up to over 1 million SNAT ports. TCP and UDP are separate SNAT port inventories and are unrelated to NAT gateway.
123
123
@@ -162,7 +162,7 @@ NAT gateway dynamically allocates SNAT ports across a subnet's private resources
162
162
163
163
:::image type="content" source="./media/nat-overview/lb-vnnat-chart.png" alt-text="Diagram that depicts the inventory of all available SNAT ports used by any VM on subnets configured with NAT.":::
Pre-allocation of SNAT ports to each virtual machine is required for other SNAT methods. This pre-allocation of SNAT ports can cause SNAT port exhaustion on some virtual machines while others still have available SNAT ports for connecting outbound. With NAT gateway, pre-allocation of SNAT ports isn't required, which means SNAT ports aren't left unused by VMs not actively needing them.
168
168
@@ -234,7 +234,7 @@ Design recommendations for configuring timers:
234
234
235
235
## Next steps
236
236
237
-
- Review [virtual network NAT](nat-overview.md).
237
+
- Review [Azure NAT Gateway](nat-overview.md).
238
238
239
239
- Learn about [metrics and alerts for NAT gateway](nat-metrics.md).
0 commit comments