Skip to content

Commit 8b75c61

Browse files
committed
More link fixes
1 parent df5bdd0 commit 8b75c61

File tree

5 files changed

+12
-12
lines changed

5 files changed

+12
-12
lines changed

articles/vmware-cloudsimple/azure-expressroute-connection.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Virtual network connection allows you to:
2020
* Deploy KMS servers in your Azure subscription to encrypt your Private Cloud vSAN datastore.
2121
* Use hybrid applications where the web tier of the application runs in the public cloud while the application and database tiers run in your Private Cloud.
2222

23-
[![Azure ExpressRoute Connection to virtual network](media/cloudsimple-azure-network-connection.png)](media/cloudsimple-azure-network-connection.png)
23+
![Azure ExpressRoute Connection to virtual network](media/cloudsimple-azure-network-connection.png)
2424

2525
## Set up a virtual network connection
2626

@@ -29,10 +29,10 @@ To set up the virtual network connection to your Private Cloud, you need your au
2929
> [!TIP]
3030
> If you already have a Azure virtual network, gateway subnet, and virtual network gateway, you can skip to step 4.
3131
32-
1. Create a virtual network on your Azure subscription and verify that the address space you select is different from the address space of your Private Cloud. If you already have an Azure virtual network, you can use the existing one. For details, see [Create a virtual network using the Azure portal](..\virtual-network\quick-create-portal.md).
33-
2. Create the gateway subnet on your Azure virtual network. If you already have a gateway subnet in your Azure virtual network, you can use the existing one. For details, see [Create the gateway subnet](..\expressroute\expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet).
34-
3. Create the virtual network gateway on your virtual network. If you have an existing virtual network gateway, you can use the existing one. For details, see [Create the virtual network gateway](..\expressroute\expressroute-howto-add-gateway-portal-resource-manager.md#create-the-virtual-network-gateway).
35-
4. Create the connection between your virtual network and your Private Cloud by redeeming the authorization key as described in [Connect a virtual network to a circuit - different subscription](..\expressroute\expressroute-howto-linkvnet-portal-resource-manager.md#connect-a-vnet-to-a-circuit---different-subscription).
32+
1. Create a virtual network on your Azure subscription and verify that the address space you select is different from the address space of your Private Cloud. If you already have an Azure virtual network, you can use the existing one. For details, see [Create a virtual network using the Azure portal](../virtual-network/quick-create-portal.md).
33+
2. Create the gateway subnet on your Azure virtual network. If you already have a gateway subnet in your Azure virtual network, you can use the existing one. For details, see [Create the gateway subnet](../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-gateway-subnet).
34+
3. Create the virtual network gateway on your virtual network. If you have an existing virtual network gateway, you can use the existing one. For details, see [Create the virtual network gateway](../expressroute/expressroute-howto-add-gateway-portal-resource-manager.md#create-the-virtual-network-gateway).
35+
4. Create the connection between your virtual network and your Private Cloud by redeeming the authorization key as described in [Connect a virtual network to a circuit - different subscription](../expressroute/expressroute-howto-linkvnet-portal-resource-manager.md#connect-a-vnet-to-a-circuit---different-subscription).
3636

3737
> [!WARNING]
3838
> If you are using an existing virtual network gateway and it has an ExpressRoute connection to the same location as the CloudSimple ExpressRoute circuit, the connection will not be established. Create a new virtual network and follow the previous steps.

articles/vmware-cloudsimple/high-availability-vpn-connection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ By default, CloudSimple VPN gateways are configured in IKEv1 mode along with the
4646
Complete the following tasks before you configure the on-premises firewall.
4747

4848
1. Verify that your organization has [purchased](create-nodes.md) or [reserved](reserve-nodes.md) the required nodes and created at least one CloudSimple Private Cloud.
49-
2. [Configure a Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway) between your on-premises network and your CloudSimple Private Cloud.
49+
2. [Configure a Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway) between your on-premises network and your CloudSimple Private Cloud.
5050

5151
## Configure on-premises Cisco ASA firewall
5252

@@ -75,7 +75,7 @@ lifetime 28800
7575

7676
### 3. Create a tunnel group
7777

78-
Create a tunnel group under the IPsec attributes. Configure the peer IP address and the tunnel pre-shared key, which you set when [configuring your Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway).
78+
Create a tunnel group under the IPsec attributes. Configure the peer IP address and the tunnel pre-shared key, which you set when [configuring your Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway).
7979

8080
```
8181
tunnel-group <primary peer ip> type ipsec-l2l
@@ -151,11 +151,11 @@ The following is the NAT rule that is used. Ensure that the VPN traffic is not s
151151

152152
Phase 1 output:
153153

154-
![Phase 1 output for Cisco ASA firewall](../media/ha-vpn-connection-cisco-phase1.png)
154+
![Phase 1 output for Cisco ASA firewall](media/ha-vpn-connection-cisco-phase1.png)
155155

156156
Phase 2 output:
157157

158-
![Phase 2 output for Cisco ASA firewall](../media/ha-vpn-connection-cisco-phase2.png)
158+
![Phase 2 output for Cisco ASA firewall](media/ha-vpn-connection-cisco-phase2.png)
159159

160160
## Configure on-premises Palo Alto Networks firewall
161161

98 KB
Loading

articles/vmware-cloudsimple/set-up-vpn.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ In a region, you can create one Site-to-Site VPN gateway and one Point-to-Site V
2323

2424
## Point-to-site VPN
2525

26-
To create a Point-to-Site VPN gateway, see [Create Point-to-Site VPN gateway](vpn-gateway.md/#create-point-to-site-vpn-gateway).
26+
To create a Point-to-Site VPN gateway, see [Create Point-to-Site VPN gateway](vpn-gateway.md#create-point-to-site-vpn-gateway).
2727

2828
### Connect to CloudSimple using Point-to-Site VPN
2929

@@ -101,7 +101,7 @@ A Point-to-Site VPN connection resolves the DNS names of the first Private Cloud
101101
102102
## Site-to-Site VPN
103103

104-
To create a Site-to-Site VPN gateway, see [Create Site-to-Site VPN gateway](vpn-gateway.md/#set-up-a-site-to-site-vpn-gateway). Site-to-Site VPN connection from your on-premises network to your Private Cloud provides these benefits.
104+
To create a Site-to-Site VPN gateway, see [Create Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway). Site-to-Site VPN connection from your on-premises network to your Private Cloud provides these benefits.
105105

106106
* Accessibility of your Private Cloud vCenter from any workstation in your on-premises network
107107
* Use of your on-premises Active Directory as a vCenter identity source

articles/vmware-cloudsimple/vpn-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,4 +117,4 @@ The following table lists the number of concurrent client connections for prefix
117117
| Number of concurrent TCP connections | 124 | 60 | 28 | 12 | 4 |
118118
| Number of concurrent UDP connections | 124 | 60 | 28 | 12 | 4 |
119119

120-
To connect using Point-to-Site VPN, see [Connect to CloudSimple using Point-to-Site VPN](set-up-vpn.md/#connect-to-cloudsimple-using-point-to-site-vpn).
120+
To connect using Point-to-Site VPN, see [Connect to CloudSimple using Point-to-Site VPN](set-up-vpn.md#connect-to-cloudsimple-using-point-to-site-vpn).

0 commit comments

Comments
 (0)