You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/azure-expressroute-connection.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Virtual network connection allows you to:
20
20
* Deploy KMS servers in your Azure subscription to encrypt your Private Cloud vSAN datastore.
21
21
* Use hybrid applications where the web tier of the application runs in the public cloud while the application and database tiers run in your Private Cloud.
22
22
23
-
[](media/cloudsimple-azure-network-connection.png)
23
+

24
24
25
25
## Set up a virtual network connection
26
26
@@ -29,10 +29,10 @@ To set up the virtual network connection to your Private Cloud, you need your au
29
29
> [!TIP]
30
30
> If you already have a Azure virtual network, gateway subnet, and virtual network gateway, you can skip to step 4.
31
31
32
-
1. Create a virtual network on your Azure subscription and verify that the address space you select is different from the address space of your Private Cloud. If you already have an Azure virtual network, you can use the existing one. For details, see [Create a virtual network using the Azure portal](..\virtual-network\quick-create-portal.md).
33
-
2. Create the gateway subnet on your Azure virtual network. If you already have a gateway subnet in your Azure virtual network, you can use the existing one. For details, see [Create the gateway subnet](..\expressroute\expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet).
34
-
3. Create the virtual network gateway on your virtual network. If you have an existing virtual network gateway, you can use the existing one. For details, see [Create the virtual network gateway](..\expressroute\expressroute-howto-add-gateway-portal-resource-manager.md#create-the-virtual-network-gateway).
35
-
4. Create the connection between your virtual network and your Private Cloud by redeeming the authorization key as described in [Connect a virtual network to a circuit - different subscription](..\expressroute\expressroute-howto-linkvnet-portal-resource-manager.md#connect-a-vnet-to-a-circuit---different-subscription).
32
+
1. Create a virtual network on your Azure subscription and verify that the address space you select is different from the address space of your Private Cloud. If you already have an Azure virtual network, you can use the existing one. For details, see [Create a virtual network using the Azure portal](../virtual-network/quick-create-portal.md).
33
+
2. Create the gateway subnet on your Azure virtual network. If you already have a gateway subnet in your Azure virtual network, you can use the existing one. For details, see [Create the gateway subnet](../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet).
34
+
3. Create the virtual network gateway on your virtual network. If you have an existing virtual network gateway, you can use the existing one. For details, see [Create the virtual network gateway](../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-virtual-network-gateway).
35
+
4. Create the connection between your virtual network and your Private Cloud by redeeming the authorization key as described in [Connect a virtual network to a circuit - different subscription](../expressroute/expressroute-howto-linkvnet-portal-resource-manager.md#connect-a-vnet-to-a-circuit---different-subscription).
36
36
37
37
> [!WARNING]
38
38
> If you are using an existing virtual network gateway and it has an ExpressRoute connection to the same location as the CloudSimple ExpressRoute circuit, the connection will not be established. Create a new virtual network and follow the previous steps.
Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/high-availability-vpn-connection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ By default, CloudSimple VPN gateways are configured in IKEv1 mode along with the
46
46
Complete the following tasks before you configure the on-premises firewall.
47
47
48
48
1. Verify that your organization has [purchased](create-nodes.md) or [reserved](reserve-nodes.md) the required nodes and created at least one CloudSimple Private Cloud.
49
-
2.[Configure a Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway) between your on-premises network and your CloudSimple Private Cloud.
49
+
2.[Configure a Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway) between your on-premises network and your CloudSimple Private Cloud.
50
50
51
51
## Configure on-premises Cisco ASA firewall
52
52
@@ -75,7 +75,7 @@ lifetime 28800
75
75
76
76
### 3. Create a tunnel group
77
77
78
-
Create a tunnel group under the IPsec attributes. Configure the peer IP address and the tunnel pre-shared key, which you set when [configuring your Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway).
78
+
Create a tunnel group under the IPsec attributes. Configure the peer IP address and the tunnel pre-shared key, which you set when [configuring your Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway).
79
79
80
80
```
81
81
tunnel-group <primary peer ip> type ipsec-l2l
@@ -151,11 +151,11 @@ The following is the NAT rule that is used. Ensure that the VPN traffic is not s
151
151
152
152
Phase 1 output:
153
153
154
-

154
+

155
155
156
156
Phase 2 output:
157
157
158
-

158
+

Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/set-up-vpn.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ In a region, you can create one Site-to-Site VPN gateway and one Point-to-Site V
23
23
24
24
## Point-to-site VPN
25
25
26
-
To create a Point-to-Site VPN gateway, see [Create Point-to-Site VPN gateway](vpn-gateway.md/#create-point-to-site-vpn-gateway).
26
+
To create a Point-to-Site VPN gateway, see [Create Point-to-Site VPN gateway](vpn-gateway.md#create-point-to-site-vpn-gateway).
27
27
28
28
### Connect to CloudSimple using Point-to-Site VPN
29
29
@@ -101,7 +101,7 @@ A Point-to-Site VPN connection resolves the DNS names of the first Private Cloud
101
101
102
102
## Site-to-Site VPN
103
103
104
-
To create a Site-to-Site VPN gateway, see [Create Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway). Site-to-Site VPN connection from your on-premises network to your Private Cloud provides these benefits.
104
+
To create a Site-to-Site VPN gateway, see [Create Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway). Site-to-Site VPN connection from your on-premises network to your Private Cloud provides these benefits.
105
105
106
106
* Accessibility of your Private Cloud vCenter from any workstation in your on-premises network
107
107
* Use of your on-premises Active Directory as a vCenter identity source
Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/vpn-gateway.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,4 +117,4 @@ The following table lists the number of concurrent client connections for prefix
117
117
| Number of concurrent TCP connections | 124 | 60 | 28 | 12 | 4 |
118
118
| Number of concurrent UDP connections | 124 | 60 | 28 | 12 | 4 |
119
119
120
-
To connect using Point-to-Site VPN, see [Connect to CloudSimple using Point-to-Site VPN](set-up-vpn.md/#connect-to-cloudsimple-using-point-to-site-vpn).
120
+
To connect using Point-to-Site VPN, see [Connect to CloudSimple using Point-to-Site VPN](set-up-vpn.md#connect-to-cloudsimple-using-point-to-site-vpn).
0 commit comments