Skip to content

Commit 8d5a337

Browse files
committed
done
1 parent 9fe5256 commit 8d5a337

File tree

3 files changed

+25
-2
lines changed

3 files changed

+25
-2
lines changed

articles/virtual-wan/how-to-network-virtual-appliance-inbound.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,13 @@ The list below corresponds to the diagram above and describes the packet flow fo
5757
1. The server responds and sends the reply packets to the NVA Firewall instance over the Firewall private IP.
5858
1. The NAT translation is reversed and the response is sent out the untrusted interface. Azure then directly sends the packet back to the user.
5959

60-
## Known Limitations and Considerations
60+
## Known Issues, Limitations and Considerations
6161

62+
### Known Issues
63+
|Issue | Description| Mitigation|
64+
|--|--|--|
65+
| DNAT traffic is not forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic is not forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
66+
|Inbound security rule configuration scalability| Inbound security rule configuration may fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
6267
### Limitations
6368

6469
* Destination NAT is supported only for the following NVAs: **checkpoint**, **fortinet-sdwan-and-ngfw** and **fortinet-ngfw**.
@@ -78,6 +83,10 @@ The list below corresponds to the diagram above and describes the packet flow fo
7883
* Timeout for idle flows is automatically set to 4 minutes.
7984
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.
8085

86+
87+
88+
89+
8190
## Managing DNAT/Internet Inbound configurations
8291

8392
The following section describes how to manage NVA configurations related to internet inbound and DNAT.

articles/virtual-wan/how-to-routing-policies.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,19 @@ Consider the following configuration where Hub 1 (Normal) and Hub 2 (Secured) ar
8787

8888
## <a name="knownlimitations"></a> Known Limitations
8989

90-
* Routing Intent is currently available in Azure public. Microsoft Azure operated by 21Vianet and Azure Government are currently in roadmap.
90+
* The following table describes the avaiablility of routing intent in different Azure environments.
91+
* Routing intent is not available in Mirosoft Azure operated by 21 Vianet.
92+
* Palo Alto Cloud NGFW is only available in Azure Public. Reach out to Palo Alto Networks regarding avaialbility of Cloud NGFW in Azure Government and Microsoft Azure operated by Viacom.
93+
* Network Virtual Appliances are not available in all Azure Government regions. Contact your NVA partner regarding availability in Azure Government.
94+
95+
96+
| Cloud Environment| Azure Firewall| Network Virtual Appliance| SaaS solutions|
97+
|--|--|--| --|
98+
| Azure Public | Yes | Yes | Yes|
99+
|Azure Government|Yes| Limited | No|
100+
|Microsoft Azure operated by 21 Vianet|No|No|No|
101+
102+
91103
* Routing Intent simplifies routing by managing route table associations and propagations for all connections (Virtual Network, Site-to-site VPN, Point-to-site VPN, and ExpressRoute). Virtual WANs with custom route tables and customized policies therefore can't be used with the Routing Intent constructs.
92104
* Encrypted ExpressRoute (Site-to-site VPN tunnels running over ExpressRoute circuits) is supported in hubs where routing intent is configured if Azure Firewall is configured to allow traffic between VPN tunnel endpoints (Site-to-site VPN Gateway private IP and on-premises VPN device private IP). For more information on the required configurations, see [Encrypted ExpressRoute with routing intent](#encryptedER).
93105
* The following connectivity use cases are **not** supported with Routing Intent:

articles/virtual-wan/monitor-virtual-wan-reference.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ This table contains more information about some of the metrics in the preceding
3030
|:-------|:------------|
3131
| **Routing Infrastructure Units** | The virtual hub's routing infrastructure units (RIU). The virtual hub's RIU determines how much bandwidth the virtual hub router can process for flows traversing the virtual hub router. The hub's RIU also determines how many VMs in spoke VNets the virtual hub router can support. For more information on routing infrastructure units, see [Virtual Hub Capacity](hub-settings.md#capacity).
3232
| **Spoke VM Utilization** | The approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support. For example, if the hub's RIU is set to 2, which supports 2,000 spoke VMs, and 1,000 VMs are deployed across spoke virtual networks, this metric's value is approximately 50%. |
33+
| **Count Of Routes Advertised To Peer** | The Virtual WAN hub router exchanges routes with all active instances of ExpressRoute gateways, VPN gateways and NVAs deployed in the Virtual WAN hub or in a connected Virtual Network spoke. When the Virtual WAN hub router learns a prefix with the same AS-PATH length from multiple peers, the router internally selects a peer to prefer for that specific route and re-advertises that route to all **other** peers (including the other gateway or NVA instance). This internal route selection process occurs for every route processed and the selected instance can change due to various factors such as network changes or maintenance events. As a result the number of routes advertised to an individual peer may fluctuate. When this metric is viewed with the maximum aggregation, Azure Monitor displays the data associated with a **single** BGP session between the Virtual WAN hub router and gateway or NVA. To effectively monitor changes or potential issues in your network, apply a split in Azure Monitor on the Count of Routes Advertised to Peer metric on a per peer IP address and ensure that the **sum** of count of routes advertised to your ExpressRoute, VPN or NVA is stable or in-line with any network changes. |
34+
3335

3436
### <a name="s2s-metrics"></a>Supported metrics for microsoft.network/vpngateways
3537

0 commit comments

Comments
 (0)