Skip to content

Commit 917b663

Browse files
authored
Merge pull request #47545 from ScottHolden/avsioRevert
Revert FQDN name changes to match service
2 parents 37d3f8d + 34545f6 commit 917b663

File tree

6 files changed

+10
-10
lines changed

6 files changed

+10
-10
lines changed

articles/vmware-cloudsimple/disaster-recovery-site-recovery-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ You can add an external identity provider as described in [Use Azure AD as an id
9696

9797
To provide IP address lookup, IP address management, and name resolution services for your workloads in the AVS Private Cloud, set up a DHCP and DNS server as described in [Set up DNS and DHCP applications and workloads in your AVS Private Cloud](dns-dhcp-setup.md).
9898

99-
The *.avs.io domain is used by management VMs and hosts in your AVS Private Cloud. To resolve requests to this domain, configure DNS forwarding on the DNS server as described in [Create a Conditional Forwarder](on-premises-dns-setup.md#create-a-conditional-forwarder).
99+
The *.cloudsimple.io domain is used by management VMs and hosts in your AVS Private Cloud. To resolve requests to this domain, configure DNS forwarding on the DNS server as described in [Create a Conditional Forwarder](on-premises-dns-setup.md#create-a-conditional-forwarder).
100100

101101
### Install vSphere Replication Appliance in your on-premises environment
102102

articles/vmware-cloudsimple/disaster-recovery-zerto.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following sections describe how to deploy a DR solution using Zerto Virtual
4646
To enable Zerto Virtual Replication from your on-premises environment to your AVS Private Cloud, complete the following prerequisites.
4747

4848
1. [Set up a Site-to-Site VPN connection between your on-premises network and your AVS Private Cloud](set-up-vpn.md).
49-
2. [Set up DNS lookup so that your AVS Private Cloud management components are forwarded to AVS Private Cloud DNS servers](on-premises-dns-setup.md). To enable forwarding of DNS lookup, create a forwarding zone entry in your on-premises DNS server for `*.AVS.io` to AVS DNS servers.
49+
2. [Set up DNS lookup so that your AVS Private Cloud management components are forwarded to AVS Private Cloud DNS servers](on-premises-dns-setup.md). To enable forwarding of DNS lookup, create a forwarding zone entry in your on-premises DNS server for `*.cloudsimple.io` to AVS DNS servers.
5050
3. Set up DNS lookup so that on-premises vCenter components are forwarded to on-premises DNS servers. The DNS servers must be reachable from your AVS Private Cloud over Site-to-Site VPN. For assistance, submit a [support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest), providing the following information.
5151

5252
* On-premises DNS domain name

articles/vmware-cloudsimple/migration-layer-2-vpn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Verify that the following are in place before deploying and configuring the solu
4343
* The version of the standalone NSX-T Edge appliance is compatible with the NSX-T Manager version (NSX-T 2.3.0) used in your AVS Private Cloud environment.
4444
* A trunk port group has been created in the on-premises vCenter with forged transmits enabled.
4545
* A public IP address has been reserved to use for the NSX-T standalone client uplink IP address, and 1:1 NAT is in place for translation between the two addresses.
46-
* DNS forwarding is set on the on-premises DNS servers for the az.AVS.io domain to point to the AVS Private Cloud DNS servers.
46+
* DNS forwarding is set on the on-premises DNS servers for the az.cloudsimple.io domain to point to the AVS Private Cloud DNS servers.
4747
* RTT latency is less than or equal to 150 ms, as required for vMotion to work across the two sites.
4848

4949
## Limitations and considerations

articles/vmware-cloudsimple/on-premises-dns-setup.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ To access the vCenter server on an AVS Private Cloud from on-premises workstatio
2626

2727
Use either of these options for the DNS configuration.
2828

29-
* [Create a zone on the DNS server for *.AVS.io](#create-a-zone-on-a-microsoft-windows-dns-server)
30-
* [Create a conditional forwarder on your on-premises DNS server to resolve *.AVS.io](#create-a-conditional-forwarder)
29+
* [Create a zone on the DNS server for *.cloudsimple.io](#create-a-zone-on-a-microsoft-windows-dns-server)
30+
* [Create a conditional forwarder on your on-premises DNS server to resolve *.cloudsimple.io](#create-a-conditional-forwarder)
3131

32-
## Create a zone on the DNS server for *.AVS.io
32+
## Create a zone on the DNS server for *.cloudsimple.io
3333

3434
You can set up a zone up as a stub zone and point to the DNS servers on the Private
3535
Cloud for name resolution. This section provides information on using a BIND DNS server or a Microsoft Windows DNS server.
@@ -76,7 +76,7 @@ from the AVS portal.
7676

7777
## Create a conditional forwarder
7878

79-
A conditional forwarder forwards all DNS name resolution requests to the designated server. With this setup, any request to *.AVS.io is forwarded to the DNS servers located on the AVS Private Cloud. The following examples show how to set up
79+
A conditional forwarder forwards all DNS name resolution requests to the designated server. With this setup, any request to *.cloudsimple.io is forwarded to the DNS servers located on the AVS Private Cloud. The following examples show how to set up
8080
forwarders on different types of DNS servers.
8181

8282
### Create a conditional forwarder on a BIND DNS server

articles/vmware-cloudsimple/on-premises-firewall-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To access your AVS Private Cloud vCenter and NSX-T manager, ports defined in the
2222

2323
| Port | Source | Destination | Purpose |
2424
|------------|----------------------------------|----------------------------------|------------------------------------------------------------------------------------------------------------------------|
25-
| 53 (UDP) | On-premises DNS servers | AVS Private Cloud DNS servers | Required for forwarding DNS lookup of *az.AVS.io* to AVS Private Cloud DNS servers from on-premises network. |
25+
| 53 (UDP) | On-premises DNS servers | AVS Private Cloud DNS servers | Required for forwarding DNS lookup of *az.cloudsimple.io* to AVS Private Cloud DNS servers from on-premises network. |
2626
| 53 (UDP) | AVS Private Cloud DNS servers | On-premises DNS servers | Required for forwarding DNS look up of on-premises domain names from AVS Private Cloud vCenter to on-premises DNS servers. |
2727
| 80 (TCP) | On-premises network | AVS Private Cloud management network | Required for redirecting vCenter URL from *http* to *https*. |
2828
| 443 (TCP) | On-premises network | AVS Private Cloud management network | Required for accessing vCenter and NSX-T manager from on-premises network. |

articles/vmware-cloudsimple/set-up-vpn.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ A Point-to-Site VPN connection resolves the DNS names of the first AVS Private C
9292

9393
![Edit VPN Connection](media/viscosity-edit-connection.png)
9494

95-
7. Click the **Networking** tab and enter the AVS Private Cloud DNS server IP addresses separated by a comma or space and the domain as ```AVS.io```. Select **Ignore DNS settings sent by VPN server**.
95+
7. Click the **Networking** tab and enter the AVS Private Cloud DNS server IP addresses separated by a comma or space and the domain as ```az.cloudsimple.io```. Select **Ignore DNS settings sent by VPN server**.
9696

9797
![VPN Networking](media/viscosity-edit-connection-networking.png)
9898

@@ -112,4 +112,4 @@ To set up your on-premises VPN gateway in high-availability mode, see [Configure
112112

113113
> [!IMPORTANT]
114114
> 1. Set TCP MSS Clamping at 1200 on your VPN device. Or if your VPN devices do not support MSS clamping, you can alternatively set the MTU on the tunnel interface to 1240 bytes instead.
115-
> 2. After Site-to-Site VPN is set up, forward the DNS requests for *.AVS.io to the AVS Private Cloud DNS servers. Follow the instructions in [On-Premises DNS Setup](on-premises-dns-setup.md).
115+
> 2. After Site-to-Site VPN is set up, forward the DNS requests for *.cloudsimple.io to the AVS Private Cloud DNS servers. Follow the instructions in [On-Premises DNS Setup](on-premises-dns-setup.md).

0 commit comments

Comments
 (0)