Skip to content

Commit 8be4326

Browse files
authored
Merge pull request #206994 from jjaygbay1/no-nat-rule-4
introduced additional step
2 parents f1156ce + 51fc24b commit 8be4326

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/azure-vmware/enable-public-ip-nsx-edge.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,14 +85,15 @@ A Sourced Network Translation Service (SNAT) with Port Address Translation (PAT)
8585
Logging can be enabled by way of the logging slider. For more information on NSX-T NAT configuration and options, see the
8686
[NSX-T NAT Administration Guide](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-7AD2C384-4303-4D6C-A44A-DEF45AA18A92.html)
8787

88-
## No NAT rule for specific address ranges
88+
### No NAT rule for specific address ranges
8989

9090
A No NAT rule can be used to exclude certain matches from performing Network Address Translation. This policy can be used to allow private IP traffic to bypass the NAT rule.
9191

9292
1. From your Azure VMware Solution private cloud, select **vCenter Credentials**.
9393
2. Locate your NSX-T URL and credentials.
94-
3. Log in to **VMWare NSX-T** and then select **3 NAT Rules**.
95-
1. Select the T1 Router and then select **ADD NAT RULE**.
94+
3. Log in to **VMWare NSX-T** and then select **NAT Rules**.
95+
1. Select the T1 Router and then select **ADD NAT RULE**.
96+
1. The **Source IP** is **Any** and **Destination IP** is the Azure VMware Solution reserved Public IP.
9697
1. Select **SAVE**.
9798

9899
### Inbound Internet Access for VMs

0 commit comments

Comments
 (0)